Main Reference PaperNew Lightweight Mitigation Techniques for RPL Version Number Attacks, 2018 [Contiki-Cooja Simulator].
  • Arış, Ahmet, Sıddıka Berna Örs Yalçın, and Sema F. Oktuğ

Author Name(s):
  • Arış, Ahmet, Sıddıka Berna Örs Yalçın, and Sema F. Oktuğ

  • Ad Hoc Networks, 2018

Journal Name and year:
  • Ad Hoc Networks, 2018

  • 10.1016/j.adhoc.2018.10.022

DOI:
  • 10.1016/j.adhoc.2018.10.022

  • Internet of Things (IoT)

Research Area:
  • Internet of Things (IoT)

  • This paper presents two lightweight mitigation techniques for RPL Version Number Attacks (VNA) which affect the performance of IPv6-connected Low Power and Lossy Networks (LLNs) detrimentally.

  • In RPL VNA, an attacker maliciously changes the version number of the network and thus increases delay and control message overhead and reduces network lifetime and packet delivery ratio

  • Simple yet effective mitigation mechanisms proposed in this paper promise significant performance improvements in an RPL network under attack.

  • By means of the proposed techniques, the delay caused by the attacker can be shortened up to 87%, the average power consumption can be reduced up to 63%, the control message overhead can be lowered up to 71% and the data packets delivery ratio can be increased up to 86%.

  • The proposed techniques, while allowing the ordinary RPL operation, trade off the mitigation performance against the resource overheads and thus allow network administrators to choose the right scheme for their RPL network.

Abstract:
  • This paper presents two lightweight mitigation techniques for RPL Version Number Attacks (VNA) which affect the performance of IPv6-connected Low Power and Lossy Networks (LLNs) detrimentally.

  • In RPL VNA, an attacker maliciously changes the version number of the network and thus increases delay and control message overhead and reduces network lifetime and packet delivery ratio

  • Simple yet effective mitigation mechanisms proposed in this paper promise significant performance improvements in an RPL network under attack.

  • By means of the proposed techniques, the delay caused by the attacker can be shortened up to 87%, the average power consumption can be reduced up to 63%, the control message overhead can be lowered up to 71% and the data packets delivery ratio can be increased up to 86%.

  • The proposed techniques, while allowing the ordinary RPL operation, trade off the mitigation performance against the resource overheads and thus allow network administrators to choose the right scheme for their RPL network.

  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit