Please use this identifier to cite or link to this item:
http://drsr.daiict.ac.in//handle/123456789/1127
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Lalchandani, JayPrakash | - |
dc.contributor.author | Patel, Parthkumar | - |
dc.date.accessioned | 2024-08-22T05:21:06Z | - |
dc.date.available | 2024-08-22T05:21:06Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | Patel, Parthkumar (2022). Optimized Approach for Isolation of Version Number Attack in IoT Systems. Dhirubhai Ambani Institute of Information and Communication Technology. vii, 47 p. (Acc. # T01047). | - |
dc.identifier.uri | http://drsr.daiict.ac.in//handle/123456789/1127 | - |
dc.description.abstract | Internet of Things (IoT) involves deploying low power and lossy networks, allowing communications among pervasive devices such as embedded sensors. A Different network may have different requirements, and hence the Routing protocol for Low Power and Lossy Networks (RPL) protocol supports different routing topologies called Destination Oriented Directed Acyclic Graph (DODAG) to optimize the routing. The version number system of DODAG is used to verify that the topology is optimal. An attacker may present in topology and has the ability to exploit the network topology mechanism by altering the version number and hence may reduce its lifetime. In this study, different types of attacks on IoT systems are discussed. A review of the RPL protocol and DODAG functionality is conducted, as well as two strategies for isolating the version number attack in IoT. A technique for detection and isolation of multiple version number attacks is discussed. In this research work, an optimized technique is proposed and is implemented in network simulator 2. The outcomes of the simulation were examined in terms of message overhead, throughput, delay, and power consumption. | - |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | - |
dc.subject | Internet of Things(IoT) | - |
dc.subject | Version number attack | - |
dc.subject | IoT attacks | - |
dc.subject | Network simulator | - |
dc.classification.ddc | 004.678 PAT | - |
dc.title | Optimized Approach for Isolation of Version Number Attack in IoT Systems | - |
dc.type | Dissertation | - |
dc.degree | M. Tech | - |
dc.student.id | 202011062 | - |
dc.accession.number | T01047 | - |
Appears in Collections: | M Tech Dissertations |
Files in This Item:
File | Size | Format | |
---|---|---|---|
202011062.pdf | 1.47 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.