Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/458964
Title: | Efficient fuzzy based MAC technique to detect the version number and rank attack for RPL based internet of things |
Researcher: | VENNILA G |
Guide(s): | ARIVAZHAGAN D |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | AMET University |
Completed Date: | 2022 |
Abstract: | IoT is one of the emerging areas in the modern era to automate every dayto- newlineday activity with the internet in the world. The RPL routing protocol is one of newlinethe network layer protocols that performs IPV6 addressing in the 6LOWPAN newlinenetwork. Security is also one of the essential factors in order to connect several newlinedevices with the internet. In view of this, Security is susceptible to various kinds newlineof attacks such as hello-flood attack, black hole attack, version number attack, newlineetc. RPL uses one or more Destination Oriented Directed Acyclic Graphs to newlineorganise low-power and lossy networks (DODAGs). A version number is newlineassigned to each DODAG. The version number is used to guarantee that there newlineare no loops to the root node, that the routing table entries of nodes in the newlineDODAG are not obsolete, and that the DODAG is consistent. In a DODAG, the newlineroot node increments the version number if there is a discrepancy. This newlinenecessitates a global repair process, and the DAG is rebuilt. In order to compel newlinea global repair, a rogue node may broadcast a bogus version number in its control newlinemessage. The malicious node advertises the false rank information to its newlinedescendant nodes in a rank attack. As a result, when routing information to the newlinesink node, a malicious node is chosen as the preferred parent. newline newlineThis research proposed a fuzzy based MAC technique to detect version newlinenumber attack and rank attack for RPL. Consequently, it has modified the DIO newlinecontrol message instead of sending additional control messages. In addition, the newlinefuzzy based Message Authentication Code (Fuzzy MAC) is used to authenticate newlinethe reliability and validity of the control messages exchanged between child newlinenodes and the root node. The proposed work is evaluated through simulation in newlineContiki-based Cooja simulator. The simulation results show that Fuzzy based newlineMAC technique achieves better performance in terms of detection accuracy, newlinepacket delivery ratio, detection latency and energy consumption over existing newlineversion number and rank attack detection scheme. newline newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/458964 |
Appears in Departments: | Dept of Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10 chapter 6.pdf | Attached File | 34.46 kB | Adobe PDF | View/Open |
11 chapter 7.pdf | 38.59 kB | Adobe PDF | View/Open | |
12 annexure.pdf | 388.09 kB | Adobe PDF | View/Open | |
1 title.pdf | 12.8 kB | Adobe PDF | View/Open | |
2 prelim page.pdf | 54.42 kB | Adobe PDF | View/Open | |
3 content.pdf | 40.77 kB | Adobe PDF | View/Open | |
4 abstract.pdf | 6.86 kB | Adobe PDF | View/Open | |
5 chapter 1.pdf | 290.6 kB | Adobe PDF | View/Open | |
6 chapter 2.pdf | 127.29 kB | Adobe PDF | View/Open | |
7 chapter 3.pdf | 101.22 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 50.58 kB | Adobe PDF | View/Open | |
8 chapter 4.pdf | 103.51 kB | Adobe PDF | View/Open | |
9 chapter 5.pdf | 225.51 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: