Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5958
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, Mehul-
dc.contributor.authorKumar, Arvind [Guided by]-
dc.date.accessioned2022-08-23T04:57:49Z-
dc.date.available2022-08-23T04:57:49Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5958-
dc.description.abstractThe routing protocol for low power and lossy networks (RPL) is recommended by internet engineering task force (IETF) for IPv6 based Low power personal area network (6LowPAN). RPL is proactive routing protocol for internet of things that has applications in smart homes, smart cities and smart world. RPL creates directed acyclic graphs (DAG) of the network topology. In this project we introduce a sinkhole attack in which the attacker’s aim is to attract more traffic from a particular area through a compromised node. In RPL this attack can be easily performed through the manipulation of the rank. By falsifying (decreasing) the rank of a node one can make it attract more traffic and thus sinkhole attack can be implemented. Because of this falsified advertisement, the malicious node is more frequently chosen as parent by the other nodes. Then we have analyzed the topology, average power, average radio duty cycle and the power history of the malicious node. From the analysis we conclude that the power and radio duty cycle due to malicious node increases.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectRPLen_US
dc.subjectSinkhole Attacken_US
dc.titleAnalysis and Implementation of Sinkhole Attack in RPLen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Analysis and Implementation of Sinkhole Attack in RPL.pdf964.64 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.