To make possible dream of connecting 30 billion smart devices assessable from anywhere, anytime and to fuel the engine growth of internet of things (IoT) both in terms of physical and virtual things, internet engineering task force (IETF) came up with a concept of 6LoWPAN possessing characteristics like low power, bandwidth and cost. To bridge the routing gap and to collaborate between low power private area network and the outside world, IETF ROLL group proposed IPv6 based lightweight standard RPL (routing protocol for low power and lossy networks). Due to large chunks of random data generated on daily basis security either externally or internally always remain bigger threat which may lead to devastation and eventually degrades the quality of service parameters affecting network resources. This paper evaluates and compare the effect of internal attacks like sinkhole and selective forwarding attacks on routing protocol for low power and lossy network topology. Widely known IoT operating system Contiki and Cooja as the simulator are used to analyse different consequences on low power and lossy network.
Man and Machine in terms of heterogeneous devices and sensors collaborate giving birth to the Internet of Things, Internet of future. Within a short span of time 30billions intelligent devices in form of smart applications will get connected making it difficult to test and debug in terms of time and cost.Simulators play vital role in verifying application and providing security before actually deploying it in real environment.Due to constraint environment in terms of memory, computation, and energy this review paper under a single umbrella will throw insight on comprehensive and in-depth analysis keeping in mind various barriers, critical design characteristics along with the comparison of candidate simulator and packet sniffing tool. Post simulated analysis play vital role in deciding behavior of data and helping research community to satisfy quality of service parameters.This review makes it feasible to make an appropriate choice for simulators and network analyzer tool easy fulfilling needs and making IoT a reality
Mobile Ad-hoc network is a situate of portable nodes that correspond with wireless links and communication acknowledged out without any central control or fixed communication. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time .this generic characteristic of MANET has rendered it vulnerable to security attacks. The black hole attack is one of such security risks. In this attack, a malicious node fallaciously advertise shortest path to the destination node with an intension to disrupt the communication In this paper, we intend a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The anticipated scheme uses Watchdog mechanism to detect malicious node with usage of local information of intermediate node and propagates the information of black hole node to all other node in network the simulation results show the efficiency of anticipated scheme in presences of black hole node.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.