Main Reference PaperThe impact of rank attack on network topology of routing protocol for low-power and lossy networks.,2013, [Contiki-Cooja Simulator]
  • Wireless Communications and Mobile Computing, 2019

  • Le, Anhtuan, Jonathan Loo, Aboubaker Lasebae, Alexey Vinel, Yue Chen, and Michael Chai.

Author Name(s):
  • Le, Anhtuan, Jonathan Loo, Aboubaker Lasebae, Alexey Vinel, Yue Chen, and Michael Chai.

  • IEEE Sensors Journal, 2013

Journal Name and year:
  • IEEE Sensors Journal, 2013

  • 10.1109/JSEN.2013.2266399

DOI:
  • 10.1109/JSEN.2013.2266399

  • Internet of Things (IoT)

Research Area:
  • Internet of Things (IoT)

  • In this paper, we analyze several different types of internal threats that are aimed at the Rank property and study their impact on the performance of the wireless sensor network

  • In RPL, the child node only receives the parent information through control messages, but it cannot check the services that its parent provide hence it will follow a bad quality route if it has a malicious parent

  • Our results show that different types of the Rank attacks can be used to intentionally downgrade specific QoS parameters

  • This paper also reveals that attack in a high forwarding load area will have more impact on network performance than attack in other areas

  • The defenders can use the knowledge of such correlation between attack location and its impact to set higher security levels at particular positions by monitoring sensitive network parameters and detecting the anomalies

Abstract:
  • In this paper, we analyze several different types of internal threats that are aimed at the Rank property and study their impact on the performance of the wireless sensor network

  • In RPL, the child node only receives the parent information through control messages, but it cannot check the services that its parent provide hence it will follow a bad quality route if it has a malicious parent

  • Our results show that different types of the Rank attacks can be used to intentionally downgrade specific QoS parameters

  • This paper also reveals that attack in a high forwarding load area will have more impact on network performance than attack in other areas

  • The defenders can use the knowledge of such correlation between attack location and its impact to set higher security levels at particular positions by monitoring sensitive network parameters and detecting the anomalies

  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit

  • Simulator: Cooja, Instant Contiki-3.0 and Vmware Player 12.5.6

  • Language: C

  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

Project Recommended For
  • M.E / M.Tech/ MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Order To Delivery
  • No Readymade Projects-project delivery Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.

Leave Comment

Your email address will not be published. Required fields are marked *

clear formSubmit