A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol

  • Bhalaji N
  • Hariharasudan K
  • Aashika K
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This article deals with a prime security attack -blackhole attack in Internet of Things networks that uses the RPL in the network layer for routing of data packets. Latest studies indicate that the security has not been given a bigger priority among manufacturers thereby providing a window of opportunity for attacks to creep into a network. A trust-based mechanism is built over the RPL protocol specifically tackle the blackhole attacks. The Cooja simulator based on Contiki OS was used for experimental analysis and the proposed scheme yields better security when the participating nodes were exposed to the blackhole attack.

Cite

CITATION STYLE

APA

Bhalaji, N., Hariharasudan, K. S., & Aashika, K. (2020). A Trust Based Mechanism to Combat Blackhole Attack in RPL Protocol. In ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management (pp. 457–464). Springer Singapore. https://doi.org/10.1007/978-981-13-8461-5_51

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free