Reference Paper:  Detecting version number attacks in RPL-based networks using a distributed monitoring architecture-
IOT
Contiki Cooja Simulator Projects in RPL Routing Protocol
Tools and Languages:  Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C
Software Requirements:  Vmware workstation player, Instant Contiki-3.0
Aim and Objectives:  
The main objective of the project is to design and detect version number attacks in RPL-based networks using distributed monitoring architecture in IoT using the contiki-cooja simulator.
Contributions:  
1. The design of a detection strategy for these attacks and their associated algorithms.
2. The deployment and instantiation of the strategy using a distributed passive monitoring architecture.
3. The performance evaluation of our solution through extensive experiments.
Performance Evaluation:  
The Contiki 3.0 operating system implemented the sink, regular and monitoring nodes with a grid topology of 20, 40, and 60 nodes.
Performance Metrics:
• PDR
• False Positive Rate
• Energy Consumption
• Throughput
• Delay
• Control Packet Overhead
• Execution Time
• CPU Energy Consumption