Main Reference PaperReal Time Intrusion and Wormhole Attack Detection in Internet of Things, International Journal of Computer Appications, 2015 [NS2].
  • A novel intrusion detection system is proposed for the IoT, which is capable of detecting Wormhole attack and attacker. It uses the location information of node and neighbor information to identify the Wormhole attack and received signal strength to identify attacker nodes. Design of such system will help in securing the IoT network and may prevent such attacks. This method is very energy efficient and only takes fixed number of UDP packets for attack detection, hence it is beneficial for resource constrained environment.

Description
  • A novel intrusion detection system is proposed for the IoT, which is capable of detecting Wormhole attack and attacker. It uses the location information of node and neighbor information to identify the Wormhole attack and received signal strength to identify attacker nodes. Design of such system will help in securing the IoT network and may prevent such attacks. This method is very energy efficient and only takes fixed number of UDP packets for attack detection, hence it is beneficial for resource constrained environment.

  • To improve the detection accuracy.

  • To reduce the energy consumption.

Aim & Objectives
  • To improve the detection accuracy.

  • To reduce the energy consumption.

  • The technique is contributed to detect the neighbor attack also.

Contribution
  • The technique is contributed to detect the neighbor attack also.

  • OS : Ubuntu 12.04 LTS 64bit,Instant Contiki-3.0 and Vmware Player 12.5.6

  • Simulator: Cooja , Language : C

Software Tools & Technologies
  • OS : Ubuntu 12.04 LTS 64bit,Instant Contiki-3.0 and Vmware Player 12.5.6

  • Simulator: Cooja , Language : C

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.