IoT THEORETICAL TO PRACTICAL: CONTIKI-OS AND ZOLERTIA REMOTE

2017 ◽  
Vol 17 (4) ◽  
pp. 915-921 ◽  
Author(s):  
Yousaf Bin Zikria ◽  
Rashid Ali ◽  
Rojeena Bajracharya ◽  
Heejung Yu ◽  
Sung Won Kim
Keyword(s):  
2018 ◽  
Vol 7 (2.8) ◽  
pp. 261
Author(s):  
Prateek Singhal ◽  
Puneet Sharma ◽  
Deepak Arora

In this paper we propagate the Sybil attack in WSN (Wireless sensor network), by the researchers many attacks have been recognized in WSN till now and there are many attacks which can attack over through internet, Internet of thing means all devices is interconnected to each other M2M over internet and can be attacked by any of the attacker on any devices. Sybil attack is the detrimental attack against sensor network where several counterfeit identities and legitimate identities are used to get prohibited pass in a network. This is major attack which results an information loss and misinterpretation in the network, and it also minimizes the routing disturbance, trustworthiness and dropping sensitivity packets into a network. In this instance node can trust the imaginary node and sharing of information starts, owed to this security of node is get affected and information is lost. In this paper, a survey of CONTIKI OS-2.7, stimulation tool COOJA and the Sybil attack and proposed the defense mechanisms and CAM (Compare and Match) approach to verify the Sybil attack position and prevent it. This Sybil attack can be stimulated on the stimulation tool COOJA which helps to identify the attacker position node, whereas these attacks outcome in uni-casting as well as multicasting and in this paper specifically given the secure security for Wireless sensor network.


2021 ◽  
Vol 37 ◽  
pp. 301188
Author(s):  
Jens-Petter Sandvik ◽  
Katrin Franke ◽  
Habtamu Abie ◽  
André Årnes
Keyword(s):  

Author(s):  
Uzair A. Noman ◽  
Behailu Negash ◽  
Amir M. Rahmani ◽  
Pasi Liljeberg ◽  
Hannu Tenhunen
Keyword(s):  

Author(s):  
Muhammad Rafiq ◽  
Ghazala Rafiq ◽  
Hafiz Muhammad ur Rehman ◽  
Yousaf Bin Zikria ◽  
Sung Won Kim ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document