SECURING CONNECTED OBJECTS BY TRUST

dc.contributor.authorNICHOLUS, BHAIRA
dc.date.accessioned2024-04-16T08:21:34Z
dc.date.available2024-04-16T08:21:34Z
dc.date.issued2023
dc.description.abstractIn recent years, connected devices, or the Internet of Things (IoT), have been increasingly used in many felds. Some of these objects mainly sensors and actuators form low-power and lossy networks (LLN), which are characterized by limited resources and unstable connections. The RoLL (Routing Over Low- power and Lossy networks) group has developed the RPL protocol to enable connected objects to communicate with each other, but it is vulnerable to var- ious security attacks. In this project report, we explore the operation of the RPL protocol and analyzes the security of connected objects in the context of this protocol. We assess existing solutions , propose and evaluate our own novel approach to mitigate security attacks that target this protocol.en_US
dc.identifier.urihttp://e-biblio.univ-mosta.dz/handle/123456789/26197
dc.language.isoenen_US
dc.relation.ispartofseriesMINF397;
dc.subjectIoTen_US
dc.subjectLLNen_US
dc.subjectRPLen_US
dc.subjectSecurityen_US
dc.subjectAttacken_US
dc.subjectMachine Learningen_US
dc.subjectTrusten_US
dc.titleSECURING CONNECTED OBJECTS BY TRUSTen_US
dc.typeOtheren_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
MINF397.pdf
Size:
1.95 MB
Format:
Adobe Portable Document Format
Description:
MINF397

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: