dc.contributor.author | Mavani, Monali | |
dc.date.accessioned | 2023-01-24T09:07:10Z | |
dc.date.available | 2023-01-24T09:07:10Z | |
dc.date.issued | 2017 | |
dc.identifier.uri | https://ieeexplore.ieee.org/document/7943192 | |
dc.identifier.uri | http://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8689 | |
dc.description.abstract | 6L0WPAN is a communication protocol for Internet of Things. 6LoWPAN is IPv6 protocol modified for low power and lossy personal area networks. 6LoWPAN inherits threats from its predecessors IPv4 and IPv6. IP spoofing is a known attack prevalent in IPv4 and IPv6 networks but there are new vulnerabilities which creates new paths, leading to the attack. This study performs the experimental study to check the feasibility of performing IP spoofing attack on 6LoWPAN Network. Intruder misuses 6LoWPAN control messages which results into wrong IPv6-MAC binding in router. Attack is also simulated in cooja simulator. Simulated results are analyzed for finding cost to the attacker in terms of energy and memory consumption. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.subject | Computer Science | en_US |
dc.subject | 6LoWPAN | en_US |
dc.subject | RPL | en_US |
dc.subject | 6LoWPAN-ND | en_US |
dc.subject | IPv6 spoofing | en_US |
dc.title | Experimental study of IP spoofing attack in 6LoWPAN network | en_US |
dc.type | Article | en_US |
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |