Research Area:  Internet of Things
This article deals with a prime security attack -blackhole attack in Internet of Things networks that uses the RPL in the network layer for routing of data packets. Latest studies indicate that the security has not been given a bigger priority among manufacturers thereby providing a window of opportunity for attacks to creep into a network. A trust-based mechanism is built over the RPL protocol specifically tackle the blackhole attacks. The Cooja simulator based on Contiki OS was used for experimental analysis and the proposed scheme yields better security when the participating nodes were exposed to the blackhole attack.
Keywords:  
Author(s) Name:  N. Bhalaji,K. S. Hariharasudan,K. Aashika
Journal name:  
Conferrence name:  International Conference on Intelligent Computing and Communication Technologies
Publisher name:  Springer
DOI:  10.1007/978-981-13-8461-5_51
Volume Information:  
Paper Link:   https://link.springer.com/chapter/10.1007/978-981-13-8461-5_51