Main Reference PaperSVELTE: Real-time intrusion detection in the Internet of Things.,2013 [Contiki-Cooja Simulator]
  • Raza, Shahid, Linus Wallgren, and Thiemo Voigt

Author Name(s):
  • Raza, Shahid, Linus Wallgren, and Thiemo Voigt

  • Ad hoc networks, 2013

Journal Name and year:
  • Ad hoc networks, 2013

  • 10.1016/j.adhoc.2013.04.014

DOI:
  • 10.1016/j.adhoc.2013.04.014

  • Internet of Things (IoT)

Research Area:
  • Internet of Things (IoT)

  • In this paper we design, implement, and evaluate a novel intrusion detection system for the IoT that we call SVELTE.

  • In our implementation and evaluation we primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding.

  • However, our approach can be extended to detect other attacks

  • We implement SVELTE in the Contiki OS and thoroughly evaluate it.

  • Our evaluation shows that in the simulated scenarios, SVELTE detects all malicious nodes that launch our implemented sinkhole and/or selective forwarding attacks.

  • However, the true positive rate is not 100%, i.e., we have some false alarms during the detection of malicious nodes.

  • Also, SVELTE’s overhead is small enough to deploy it on constrained nodes with limited energy and memory capacity

Abstract:
  • In this paper we design, implement, and evaluate a novel intrusion detection system for the IoT that we call SVELTE.

  • In our implementation and evaluation we primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding.

  • However, our approach can be extended to detect other attacks

  • We implement SVELTE in the Contiki OS and thoroughly evaluate it.

  • Our evaluation shows that in the simulated scenarios, SVELTE detects all malicious nodes that launch our implemented sinkhole and/or selective forwarding attacks.

  • However, the true positive rate is not 100%, i.e., we have some false alarms during the detection of malicious nodes.

  • Also, SVELTE’s overhead is small enough to deploy it on constrained nodes with limited energy and memory capacity

  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit