Reference Paper:  Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT-[2021]
IOT
Contiki Cooja Simulator Projects in RPL Routing Protocol
Tools Languages:  Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C
Software Requirement:  Vmware workstation player, Instant Contiki-3.0
Aim and Objectives:  
To create a design and analysis of proactive trust classification for detecting replication attacks in 6LoWPAN-Based IoT using the Contiki-Cooja simulator.
Contribution:  
1. To focus on the replication attacks considered as the attack in topology. The replication attack is classified as a sub-optimal path attack in an IoT network.
2. Create a duplication node using the same properties, such as node ID and location.
3. Use a trust-based detection strategy to insert the replica test node next to the selected witness node.
Calculating the trust score depends on three factors: energy used to transmit a packet, Transmission delay and Packet delivery ratio.
Performance Evalution:  
To evaluate the trust-based strategy using the Contiki-Cooja network simulator to analyze the performance of the trust-based strategy in terms of the probability of detection of replication attacks and runtime of detection. Create 5% of Attacker nodes with different network variations, such as 20 and 40 nodes.
Performance Metrics:
• Delay
• PDR
• Energy Consumption
• Throughput
• CPU Energy Consumption
• Control Packet Overhead
• Execution Time