Reference Paper:  Detection of rank attack in routing protocol for Low Power and Lossy Networks-[2018]
IOT
Contiki Cooja Simulator Projects in RPL Routing Protocol
Tools Languages:   Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C
Software Requirement:   Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C
Aim and Objectives:  
This project aims to detection of rank attacks in routing protocol for Low Power and Lossy Networks in IoT using the contiki-cooja simulator.
Contribution:  
1. A sink/root-based statistical intrusion detection system (IDS) is proposed to detect the rank attack.
2. The proposed scheme does not affect the network lifetime as all the computation in the detection process occurs at the sink.
3. Extensive simulations are performed in Contiki OS-based Cooja simulator to demonstrate that the proposed scheme can detect malicious nodes.
Performance Evalution:  
For simulating the performance of various networks, the Cooja simulator runs over Contiki OS with 30 Tmote sky devices deployed randomly and five attacker nodes are placed randomly.
Performance Metrics:
• False Positive Ratio
• False Negative Ratio
• PDR
• Energy Consumption
• Throughput
• Delay
• Control Packet Overhead
• Execution Time
• CPU Energy Consumption