Main Reference Paper Dynamic and comprehensive trust model for IoT and its integration into RPL- 2018 [Contiki-Cooja Simulator]
  • Hashemi, Seyyed Yasser, and Fereidoon Shams Aliee.

Author Name(s):
  • Hashemi, Seyyed Yasser, and Fereidoon Shams Aliee.

  • The Journal of Supercomputing, 2018

Journal Name and year:
  • The Journal of Supercomputing, 2018

  • 10.1007/s11227-018-2700-3

DOI:
  • 10.1007/s11227-018-2700-3

  • Internet of Things (IoT)

Research Area:
  • Internet of Things (IoT)

  • To overcome the limitations of the use of a single metric and to prevent the consequences of routing attacks, we used the concept of trust and propose dynamic and comprehensive trust model for IoT (DCTM-IoT) and integrate it into RPL (DCTM-RPL).

  • We provide a comprehensive hierarchical model for trusting of things in IoT, which has a multi-dimensional vision of trust.

  • We put the combination of metrics and necessary activities to deal with attacks under the umbrella of trust level calculation.

  • The performance of DCTM-RPL is compared with the standard RPL protocol in mobile environment and under routing major attacks

  • DCTM-RPL demonstrates its superior performance over the standard RPL protocol in the detection and isolation attacks.

  • The DCTM-RPL, in addition to resistance mitigating routing attacks, improves network performance.

Abstract:
  • To overcome the limitations of the use of a single metric and to prevent the consequences of routing attacks, we used the concept of trust and propose dynamic and comprehensive trust model for IoT (DCTM-IoT) and integrate it into RPL (DCTM-RPL).

  • We provide a comprehensive hierarchical model for trusting of things in IoT, which has a multi-dimensional vision of trust.

  • We put the combination of metrics and necessary activities to deal with attacks under the umbrella of trust level calculation.

  • The performance of DCTM-RPL is compared with the standard RPL protocol in mobile environment and under routing major attacks

  • DCTM-RPL demonstrates its superior performance over the standard RPL protocol in the detection and isolation attacks.

  • The DCTM-RPL, in addition to resistance mitigating routing attacks, improves network performance.

  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit