Reference Paper:  RPL rank based-attack mitigation scheme in IoT environment-[2021]
IOT
Contiki Cooja Simulator Projects in RPL Routing Protocol
Tools Languages:  Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C
Software Requirement:  Vmware workstation player, Instant Contiki-3.0
Aim and Objectives:  
This project develops an RPL rank-based attack mitigation scheme in an IoT environment using the Contiki-cooja simulator.
Contribution:  
1. This project creates a detection and elimination solution using a trust threshold to detect the attack against the rank value presented.
2. The detection scheme does not significantly impact the overall power consumption or the lifetime of the network, because it uses the messages and routing information of the original RPL protocol.
Performance Evalution:  The approach has been tested and evaluated through several simulation scenarios by varying the number of nodes (20, 30, 40 and 50 nodes) with random positions of malicious nodes.
Performance Metrics:
• Detection Rate
• PDR
• Throughput
• CPU Energy Consumption
• Control Packet Overhead
• Execution Time
• Delay
• Energy Consumption