Main Reference Paper Detection of rank attack in routing protocol for Low Power and Lossy Networks – 2018 [Contiki-Cooja Simulator]
  • Shafique, Usman, Abid Khan, Abdur Rehman, Faisal Bashir, and Masoom Alam

Author Name(s):
  • Shafique, Usman, Abid Khan, Abdur Rehman, Faisal Bashir, and Masoom Alam

  • Annals of Telecommunications, 2018

Journal Name and year:
  • Annals of Telecommunications, 2018

  • 10.1007/s12243-018-0645-4

DOI:
  • 10.1007/s12243-018-0645-4

  • Internet of Things (IoT)

Research Area:
  • Internet of Things (IoT)

  • In this paper, a novel Sink-based intrusion detection system (SBIDS) for the detection of rank attack in RPL is presented.

  • SBIDS has less computational overhead as all detection processes take place at the sink node, which saves network resources.

  • Through a comprehensive simulation analysis, it is shown that the proposed SBIDS provides high detection rate.

Abstract:
  • In this paper, a novel Sink-based intrusion detection system (SBIDS) for the detection of rank attack in RPL is presented.

  • SBIDS has less computational overhead as all detection processes take place at the sink node, which saves network resources.

  • Through a comprehensive simulation analysis, it is shown that the proposed SBIDS provides high detection rate.

  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit