Please use this identifier to cite or link to this item: http://drsr.daiict.ac.in//handle/123456789/1127
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorLalchandani, JayPrakash-
dc.contributor.authorPatel, Parthkumar-
dc.date.accessioned2024-08-22T05:21:06Z-
dc.date.available2024-08-22T05:21:06Z-
dc.date.issued2022-
dc.identifier.citationPatel, Parthkumar (2022). Optimized Approach for Isolation of Version Number Attack in IoT Systems. Dhirubhai Ambani Institute of Information and Communication Technology. vii, 47 p. (Acc. # T01047).-
dc.identifier.urihttp://drsr.daiict.ac.in//handle/123456789/1127-
dc.description.abstractInternet of Things (IoT) involves deploying low power and lossy networks, allowing communications among pervasive devices such as embedded sensors. A Different network may have different requirements, and hence the Routing protocol for Low Power and Lossy Networks (RPL) protocol supports different routing topologies called Destination Oriented Directed Acyclic Graph (DODAG) to optimize the routing. The version number system of DODAG is used to verify that the topology is optimal. An attacker may present in topology and has the ability to exploit the network topology mechanism by altering the version number and hence may reduce its lifetime. In this study, different types of attacks on IoT systems are discussed. A review of the RPL protocol and DODAG functionality is conducted, as well as two strategies for isolating the version number attack in IoT. A technique for detection and isolation of multiple version number attacks is discussed. In this research work, an optimized technique is proposed and is implemented in network simulator 2. The outcomes of the simulation were examined in terms of message overhead, throughput, delay, and power consumption.-
dc.publisherDhirubhai Ambani Institute of Information and Communication Technology-
dc.subjectInternet of Things(IoT)-
dc.subjectVersion number attack-
dc.subjectIoT attacks-
dc.subjectNetwork simulator-
dc.classification.ddc004.678 PAT-
dc.titleOptimized Approach for Isolation of Version Number Attack in IoT Systems-
dc.typeDissertation-
dc.degreeM. Tech-
dc.student.id202011062-
dc.accession.numberT01047-
Appears in Collections:M Tech Dissertations

Files in This Item:
File SizeFormat 
202011062.pdf1.47 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.