Internet of things - A Survey
DOI:
https://doi.org/10.32628/CSEIT217394Keywords:
IoT, Internet of Things, RPL, IoT Protocols, IoT Architecture, IoT Ecosystem, IoT Attacks, Routing Attack, 6LowPAN, Rank Attack, Sybil Attack, CountermeasuresAbstract
In the survey paper we defined all the topics related to the Internet of Things. All the components related to the internet of things in Details. You will get detailed knowledge about the Internet of things ecosystem, Internet of things Elements, Internet of things Architecture. Also, we will cover all the internet of things protocols and brief about protocols. In this we will provide the details of attack based on Protocols and at the end we justify why RPL is useful over 6Low-PAN in the internet on things network layer.
References
- Philokypros P. Ioulianou, Vassilios G. Vassilakis, Ioannis D. Moscholios, Michael D. Logothetis “A Signature-based Intrusion Detection System for the Internet of Things ”, White Rose Research online , 2018.
- Abdul Rehman, Meer Muhammad khan, M. Ali Lodhi , Faisal Bashir Hussain “Rank Attack using Objective Function in RPL for Low Power and Lossy Networks”, IEEE Internet of Things Journal, May2016.
- T. Winter, P. Thubert, A. Brandt, “RPL: IPv6 Routing Protocol for LowPower and Lossy Networks”, Internet Engineering Task Force,2012.
- Ali Alharbi , Mohamed Zohdy , Debatosh Debnath , Richard Olawoyin and George Corser, “Sybil Attacks and Defenses in Internet of Things and Mobile Social Networks”, IJCSI, 2018.
- Linus Wallgren, Shahid Raza, and Thiemo Voigt, “Routing Attacks and Countermeasures in the RPL-Based Internet of Things”, International Journal of Distributed Sensor Networks, 2013.
- P. Levis ,T. Clausen, J. Hui, O. Gnawali, J. Ko, “The Trickle Algorithm”, Internet Engineering Task Force (IETF), 2011.
- Usman Shafique, Abid Khan, Abdur Rehman, Faisal Bashir, Masoom Alam, “Detection of rank attack in routing protocol for Low Power and Lossy Networks”, Springer, 2018.
- Kuan Zhang, Xiaohui Liang,Rongxing Lu and Xuemin Shen, “Sybil Attacks and Their Defenses in the Internet of Things”, IEEE, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.