Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Design and Analysis of Proactive Trust Classification for detection of Replication Attacks in 6LoWPAN-Based IoT Using Cooja Simulator

Design and Analysis of Proactive Trust Classification for detection of Replication Attacks in 6LoWPAN-Based IoT Using Cooja Simulator

Trust Classification for detection of Replication Attacks in 6LoWPAN-Based IoT - Cooja Project

Research Area:

IOT

Research Topics:

Contiki Cooja Simulator Projects in RPL Routing Protocol

Tools Languages:  Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C

Software Requirement:  Vmware workstation player, Instant Contiki-3.0

Aim and Objectives:  
To create a design and analysis of proactive trust classification for detecting replication attacks in 6LoWPAN-Based IoT using the Contiki-Cooja simulator.

Contribution:  
1. To focus on the replication attacks considered as the attack in topology. The replication attack is classified as a sub-optimal path attack in an IoT network.
2. Create a duplication node using the same properties, such as node ID and location.
3. Use a trust-based detection strategy to insert the replica test node next to the selected witness node. Calculating the trust score depends on three factors: energy used to transmit a packet, Transmission delay and Packet delivery ratio.

Performance Evalution:  
To evaluate the trust-based strategy using the Contiki-Cooja network simulator to analyze the performance of the trust-based strategy in terms of the probability of detection of replication attacks and runtime of detection. Create 5% of Attacker nodes with different network variations, such as 20 and 40 nodes.
Performance Metrics:
 •  Delay
 •  PDR
 •  Energy Consumption
 •  Throughput
 •  CPU Energy Consumption
 •  Control Packet Overhead
 •  Execution Time