Reference Paper:  Dynamic and comprehensive trust model for IoT and its integration into RPL-[2018]
IOT
Contiki Cooja Simulator Projects in RPL Routing Protocol
Tools Languages:  Contiki-Cooja / Contiki NG simulator, Front End: Java, Back End: C
Software Requirement:  Vmware workstation player, Instant Contiki-3.0
Aim and Objectives:  
This project aims to detection of rank attacks in routing protocol for Low Power and Lossy Networks in IoT using the contiki-cooja simulator.
Contribution:  
1. This project provides a comprehensive hierarchical model for trusting things in IoT, with a multi-dimensional vision of trust.
2. It combines metrics and necessary activities to deal with attacks under trust level calculation.
3. This work demonstrates its superior performance over the standard RPL protocol in the detection and isolation attacks.
Performance Evalution:  
After generating node mobility information, use it in Cooja`s mobility extension. There are 30 sky motes in the simulated topology, and it uses three attack sensor nodes in the simulated topology, as it assumed that up to 10% of all nodes could act as attack nodes.
Performance Metrics:
• PDR
• Energy Consumption
• Throughput
• Delay
• Control Packet Overhead
• Execution Time
• CPU Energy Consumption