Internet of things - A Survey

Authors

  • Pranjal Upadhyay  M.E (Cyber Security), GTU, Graduate school of Engineering and Technology, Ahmedabad, Gujarat, India
  • Prof. Deepak Upadhyay  Assistant Professor, GTU, Graduate school of Engineering and Technology, Ahmedabad, Gujarat, India

DOI:

https://doi.org//10.32628/CSEIT217394

Keywords:

IoT, Internet of Things, RPL, IoT Protocols, IoT Architecture, IoT Ecosystem, IoT Attacks, Routing Attack, 6LowPAN, Rank Attack, Sybil Attack, Countermeasures

Abstract

In the survey paper we defined all the topics related to the Internet of Things. All the components related to the internet of things in Details. You will get detailed knowledge about the Internet of things ecosystem, Internet of things Elements, Internet of things Architecture. Also, we will cover all the internet of things protocols and brief about protocols. In this we will provide the details of attack based on Protocols and at the end we justify why RPL is useful over 6Low-PAN in the internet on things network layer.

References

  1. Philokypros P. Ioulianou, Vassilios G. Vassilakis, Ioannis D. Moscholios, Michael D. Logothetis “A Signature-based Intrusion Detection System for the Internet of Things ”, White Rose Research online , 2018.
  2. Abdul Rehman, Meer Muhammad khan, M. Ali Lodhi , Faisal Bashir Hussain “Rank Attack using Objective Function in RPL for Low Power and Lossy Networks”, IEEE Internet of Things Journal, May2016.
  3. T. Winter, P. Thubert, A. Brandt, “RPL: IPv6 Routing Protocol for LowPower and Lossy Networks”, Internet Engineering Task Force,2012.
  4. Ali Alharbi , Mohamed Zohdy , Debatosh Debnath , Richard Olawoyin and George Corser, “Sybil Attacks and Defenses in Internet of Things and Mobile Social Networks”, IJCSI, 2018.
  5. Linus Wallgren, Shahid Raza, and Thiemo Voigt, “Routing Attacks and Countermeasures in the RPL-Based Internet of Things”, International Journal of Distributed Sensor Networks, 2013.
  6. P. Levis ,T. Clausen, J. Hui, O. Gnawali, J. Ko, “The Trickle Algorithm”, Internet Engineering Task Force (IETF), 2011.
  7. Usman Shafique, Abid Khan, Abdur Rehman, Faisal Bashir, Masoom Alam, “Detection of rank attack in routing protocol for Low Power and Lossy Networks”, Springer, 2018.
  8. Kuan Zhang, Xiaohui Liang,Rongxing Lu and Xuemin Shen, “Sybil Attacks and Their Defenses in the Internet of Things”, IEEE, 2014.

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Pranjal Upadhyay, Prof. Deepak Upadhyay, " Internet of things - A Survey, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 7, Issue 3, pp.417-438, May-June-2021. Available at doi : https://doi.org/10.32628/CSEIT217394