Reference Paper:  Sinkhole+CloneID: A hybrid attack on RPL performance and detection method-[2019]
IOT
Contiki Cooja Simulator Projects in RPL Routing Protocol
Tools Languages:  Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C
Software Requirement:  Vmware workstation player, Instant Contiki-3.0
Aim and Objectives:  This project aims to design and detect the method of RPL hybrid attack(Sinkhole+CloneID) in IoT using the contiki-cooja simulator.
Contribution:  
1. The main contribution of the project is to explain the effect of Sinkhole and CloneID attacks on the performance of a network.
2. It presents a detection mechanism for detecting and combatting this hybrid attack.
3. The project demonstrates the effect of this hybrid attack on RPL performance and evaluates it against a detection method inspired by previous detection methods.
Performance Evalution:  
This project uses RPL implementation in the Contiki OS to design network nodes and implement attacks. Simulating network nodes can be simplified by using a system simulator for developing algorithms. The evaluation includes 5% of attack scenarios with different network sizes, such as 15, 30, and 45 nodes scenarios.
Performance Metrics:
• PDR
• Energy Consumption
• Throughput
• Delay
• Control Packet Overhead
• Execution Time
• CPU Energy Consumption