With the advancement of IPv6 support in constrained wireless nodes, the new networking paradigm has emerged which is known as the Internet of Things. This paradigm is open to many threats because of its open and constrained nature. Routing attacks are one of the major threats to the Internet of Things which aim to disrupt normal routing operations of the network. In this paper, we analyze some well-known routing attacks (Sinkhole, Blackhole, Selective forwarding, Sybil, Clone ID, HELLO flooding and Local Repair) and show their effect on network throughput. Simulation of routing attacks is done using the state-of-the-art Internet of Things simulator, NetSim tool.
CITATION STYLE
Verma, A., & Ranga, V. (2018). Analysis of routing attacks on RPL based 6LoWPAN networks. International Journal of Grid and Distributed Computing, 11(8), 43–56. https://doi.org/10.14257/ijgdc.2018.11.8.05
Mendeley helps you to discover research relevant for your work.