Trust based technique for the mitigation of version number attack in internet of things

2Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The internet of things is the self-configuring type of network in which sensor nodes join or leave the network. The version number is the active type of attack possible in DODAG protocol of IoT. The Shield technique is proposed in the previous research work for the mitigation of version number attack in the network. It is very much complex for the detection of malicious nodes. In this research work, the trust based mechanism is proposed for the isolation of version number attack. The trust based mechanism calculates trust of each sensor node. The sensor nodes with the least trust are identified from the network as malicious nodes. The proposed mechanism is implemented in network simulator version 2. The trust based mechanism and shied based techniques are implemented and results are analyzed in terms of throughput, delay, control message overhead and average power consumption. It is analyzed that in terms of all parameters trust mechanism performs well as compared to shield based technique.

Cite

CITATION STYLE

APA

Chandni, & Kumar, R. (2019). Trust based technique for the mitigation of version number attack in internet of things. International Journal of Recent Technology and Engineering, 8(3), 1197–1203. https://doi.org/10.35940/ijrte.C4293.098319

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free