Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Design and Analysis of RPL Rank-Based Attack Mitigation Scheme in IoT Environment Using Contiki-Cooja Simulator

Design and Analysis of RPL Rank-Based Attack Mitigation Scheme in IoT Environment Using Contiki-Cooja Simulator

RPL Rank-Based Attack Mitigation Scheme in IoT Environment - Cooja Project

Research Area:

IOT

Research Topics:

Contiki Cooja Simulator Projects in RPL Routing Protocol

Tools Languages:  Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C

Software Requirement:  Vmware workstation player, Instant Contiki-3.0

Aim and Objectives:  
This project develops an RPL rank-based attack mitigation scheme in an IoT environment using the Contiki-cooja simulator.

Contribution:  
1. This project creates a detection and elimination solution using a trust threshold to detect the attack against the rank value presented.
2. The detection scheme does not significantly impact the overall power consumption or the lifetime of the network, because it uses the messages and routing information of the original RPL protocol.

Performance Evalution:  The approach has been tested and evaluated through several simulation scenarios by varying the number of nodes (20, 30, 40 and 50 nodes) with random positions of malicious nodes.
Performance Metrics:
 •  Detection Rate
 •  PDR
 •  Throughput
 •  CPU Energy Consumption
 •  Control Packet Overhead
 •  Execution Time
 •  Delay
 •  Energy Consumption