Abstract: The Internet of Things (IoT) is a fast-growing technology. In IoT, the devices are connected through the Internet and controlled from any remote areas. Before the advent of IoT, the interaction between the users was only through the internet. By 2020 there will be 75.4 billion devices interconnected through the internet. Machine-to-machine (M2M) interaction is achieved by sending and receiving the information, such as room temperature, humidity etc. IoT can be viewed as heterogeneous networks that bring some security challenges like network privacy problems, confidentiality, integrity and availability. In IoT, we have Routing Protocol for Low-Power and Lossy networks (RPL). RPL is a light-weight protocol which has a good routing functionality, context aware and it supports dynamic topology but has only the basic security functionality. This paper elaborates on attacks in Routing Protocol for Low Power and Lossy networks (RPL) and its implementation using Cooja simulation methodologyand in Contiki operating system. Blackhole and version number attack are the most vulnerable security attacks based on routing of data in IoT networks. We proposed a common prevention technique to overcome those attacks based on the measurements of throughput, packet delay and packet delivery ratio values. The results show that our proposed detection technique is very secure from both the attacks. This technique can be used in real time applications like smart living, smart mobility and smart environment etc.
CITATION STYLE
Sreekanth, S., & Jyothisree, M. V. R. (2019). Attacks in RPL and Detection Technique used for Internet of Things. International Journal of Recent Technology and Engineering (IJRTE), 8(1), 1–4. Retrieved from https://www.ijrte.org/wp-content/uploads/papers/v8i1/A1257058119.pdf
Mendeley helps you to discover research relevant for your work.