Analysis of routing attacks on RPL based 6LoWPAN networks

24Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

Abstract

With the advancement of IPv6 support in constrained wireless nodes, the new networking paradigm has emerged which is known as the Internet of Things. This paradigm is open to many threats because of its open and constrained nature. Routing attacks are one of the major threats to the Internet of Things which aim to disrupt normal routing operations of the network. In this paper, we analyze some well-known routing attacks (Sinkhole, Blackhole, Selective forwarding, Sybil, Clone ID, HELLO flooding and Local Repair) and show their effect on network throughput. Simulation of routing attacks is done using the state-of-the-art Internet of Things simulator, NetSim tool.

Cite

CITATION STYLE

APA

Verma, A., & Ranga, V. (2018). Analysis of routing attacks on RPL based 6LoWPAN networks. International Journal of Grid and Distributed Computing, 11(8), 43–56. https://doi.org/10.14257/ijgdc.2018.11.8.05

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free