DSpace Repository

VULNERABILITY ASSESSMENT OF OBJECTIVE FUNCTION OF RPL PROTOCOL FOR INTERNET OF THINGS

Show simple item record

dc.contributor.author Hasan, Saad ul Reg # 48527
dc.contributor.author Hamza, Muhammad Ameer Reg # 53679
dc.contributor.author Fahad, Muhammad Reg # 51899
dc.date.accessioned 2023-12-07T05:20:22Z
dc.date.available 2023-12-07T05:20:22Z
dc.date.issued 2021
dc.identifier.uri http://hdl.handle.net/123456789/16712
dc.description Supervised by Jawad Bhutta en_US
dc.description.abstract The RPL is a distance vector routing protocol. It mainly targets collection-based networks, where nodes periodically send measurements to a collection point. This RPL protocol was basically designed to be highly adaptive to network conditions and provide alternate routes, whenever default routes are inaccessible. RPL provides a mechanism to disseminate information over a dynamically formed network topology. The general task ofRPL i.e., is for low power and lossy network is to set up an optimal DODAG (designation oriented Directed Acyclic Graph) in an LLN (low power and lossy network) The most important feature ofrouting protocol which is for low power and lossy network is an objective function (OF) it influences the IoT network in terms of strategies based on routing as well as network topologies. This particular RPL protocol has some flaws which expose it to attacks, the popular attacks manipulations are objective function zero (OFO) and the minimum rank with hysteresis objective function (MRFHOF). The following RPL protocol has some vulnerabilities related to IoT based protocol and its objective functions which will result in a very deep and extensive evaluation ofthe objective function of the RPL protocol. In this study, we aim to assess the shortcoming of the Objective Function of RPL. Misappropriation attacks (decreased rank attack and identity attack), and attacks targeting the objective functions i.e Rank Identity Attack. To better understand the impact ofthis attack, we also study the energy consumption and the packet delivery ratio under non-malicious and malicious circumstances, using OFO and MRHOF en_US
dc.language.iso en_US en_US
dc.publisher Bahria University Karachi Campus en_US
dc.relation.ispartofseries BSCS;MFN 315
dc.title VULNERABILITY ASSESSMENT OF OBJECTIVE FUNCTION OF RPL PROTOCOL FOR INTERNET OF THINGS en_US
dc.type Project Reports en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account