Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6891
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSingh, Sumeet-
dc.contributor.authorShukla, Shailendra [Guided by]-
dc.date.accessioned2022-09-27T07:07:37Z-
dc.date.available2022-09-27T07:07:37Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/6891-
dc.description.abstractInternet of Things is a relatively new field that focuses on building networks of devices that are connected over the internet. IoT networks consist of large number of devices. The components of network connected devices normally consists of different kinds of sensors for sensing environment, microcontrollers for processing the data, an energy source (e.g. a battery), protocols and transceivers for data communication. These physical world objects, sensors or actuators, interacts with one another and transfers their detected data to centralized servers. IoT makes use of IPv6 that has 128 bit address space, which basically supports the concept of IoT. IoT has a wide scope for applications for commercialization, but needs several issues to be tackled. The main concern in the field of IoT is security. RPL protocol used at network layer of IoT for routing purposes is vulnerable to many attacks. Our work focuses on realizing the scope of Man in The Middle attack at the network layer of IoT. Experimental results shows the implementation of Man in The Middle Attack over RPL and proves that security of data in IoT network can be compromised over RPL protocol.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectMITM attacken_US
dc.subjectIPv6 discoveryen_US
dc.titleSecurity Analysis of Network Layer Protocol in IoTen_US
dc.typeProject Reporten_US
Appears in Collections:B.Tech. Project Reports

Files in This Item:
File Description SizeFormat 
Security Analysis of Layer Protocol in IoT.pdf915.12 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.