Optimized Approach for Isolation of Version Number Attack in IoT Systems
Abstract
Internet of Things (IoT) involves deploying low power and lossy networks, allowing communications among pervasive devices such as embedded sensors. A Different network may have different requirements, and hence the Routing protocol for Low Power and Lossy Networks (RPL) protocol supports different routing topologies called Destination Oriented Directed Acyclic Graph (DODAG) to optimize the routing. The version number system of DODAG is used to verify that the topology is optimal. An attacker may present in topology and has the ability to exploit the network topology mechanism by altering the version number and hence may reduce its lifetime. In this study, different types of attacks on IoT systems are discussed. A review of the RPL protocol and DODAG functionality is conducted, as well as two strategies for isolating the version number attack in IoT. A technique for detection and isolation of multiple version number attacks is discussed. In this research work, an optimized technique is proposed and is implemented in network simulator 2. The outcomes of the simulation were examined in terms of message overhead, throughput, delay, and power consumption.
Collections
- M Tech Dissertations [923]