Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Contiki Cooja Security Simulation Using To Detect Blackhole and Rank Attack in Iot Devices
Author Name : K. Kowsalyadevi , Dr. N. V. Balaji
ABSTRACT More applications emerge in the Internet of Things (IoT); the extent as concern IoT gadget fixed to the cyberspace will expand over the future. Scalability will increase dramatically as a result of this technology in order to handle these types of web works. The 6LOWPAN protocol over Internet Protocol Version 6 was employed, and the RPL be utilised to path in these network. The RPL is a constraint protocol designed specifically as long as IoT devices. This protocol may be vulnerable to several attacks as a result of its constraint behaviour. Wormhole attack, version number attack, Hello Flood attack, sinkhole attack, Cybil and clone ID attacks etc. are all examples of attacks that occur in the IoT. The tool contiki cooja simulator was simulated using blackhole and Rank attack; the results were generated, and show the effectiveness of the proposed technique will regard to Packet Delivery Rate (PDR), Throughput and End to End delay (EED).