| dc.contributor.author | Hasan, Saad ul Reg # 48527 | |
| dc.contributor.author | Hamza, Muhammad Ameer Reg # 53679 | |
| dc.contributor.author | Fahad, Muhammad Reg # 51899 | |
| dc.date.accessioned | 2023-12-07T05:20:22Z | |
| dc.date.available | 2023-12-07T05:20:22Z | |
| dc.date.issued | 2021 | |
| dc.identifier.uri | http://hdl.handle.net/123456789/16712 | |
| dc.description | Supervised by Jawad Bhutta | en_US |
| dc.description.abstract | The RPL is a distance vector routing protocol. It mainly targets collection-based networks, where nodes periodically send measurements to a collection point. This RPL protocol was basically designed to be highly adaptive to network conditions and provide alternate routes, whenever default routes are inaccessible. RPL provides a mechanism to disseminate information over a dynamically formed network topology. The general task ofRPL i.e., is for low power and lossy network is to set up an optimal DODAG (designation oriented Directed Acyclic Graph) in an LLN (low power and lossy network) The most important feature ofrouting protocol which is for low power and lossy network is an objective function (OF) it influences the IoT network in terms of strategies based on routing as well as network topologies. This particular RPL protocol has some flaws which expose it to attacks, the popular attacks manipulations are objective function zero (OFO) and the minimum rank with hysteresis objective function (MRFHOF). The following RPL protocol has some vulnerabilities related to IoT based protocol and its objective functions which will result in a very deep and extensive evaluation ofthe objective function of the RPL protocol. In this study, we aim to assess the shortcoming of the Objective Function of RPL. Misappropriation attacks (decreased rank attack and identity attack), and attacks targeting the objective functions i.e Rank Identity Attack. To better understand the impact ofthis attack, we also study the energy consumption and the packet delivery ratio under non-malicious and malicious circumstances, using OFO and MRHOF | en_US |
| dc.language.iso | en_US | en_US |
| dc.publisher | Bahria University Karachi Campus | en_US |
| dc.relation.ispartofseries | BSCS;MFN 315 | |
| dc.title | VULNERABILITY ASSESSMENT OF OBJECTIVE FUNCTION OF RPL PROTOCOL FOR INTERNET OF THINGS | en_US |
| dc.type | Project Reports | en_US |