SECURING CONNECTED OBJECTS BY TRUST

Loading...
Thumbnail Image

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

In recent years, connected devices, or the Internet of Things (IoT), have been increasingly used in many felds. Some of these objects mainly sensors and actuators form low-power and lossy networks (LLN), which are characterized by limited resources and unstable connections. The RoLL (Routing Over Low- power and Lossy networks) group has developed the RPL protocol to enable connected objects to communicate with each other, but it is vulnerable to var- ious security attacks. In this project report, we explore the operation of the RPL protocol and analyzes the security of connected objects in the context of this protocol. We assess existing solutions , propose and evaluate our own novel approach to mitigate security attacks that target this protocol.

Description

Citation

Endorsement

Review

Supplemented By

Referenced By