G. Chandana Swathi,G. Kishor Kumar,A. P. Siva Kumar,



Internet of Things,Security,Collaborative attack,


Internet of Things (IoT) is distinct as a paradigm wherein things armed with sensors, actuators, and embedded processors connect with everyone to help significant determinations. Secure communication in IoT is a demanding issue since IoT suffers from different vulnerabilities. Low memory capabilities, limited power supply, constrained resources are unique characteristics but at the same time these are making IoT prone to various attacks. These attacks turn into more effective when introduced with collaboratively. Various protocols and secure algorithms are developed to make the communication problem free from intruders. However, the existing protocols are not providing absolute solutions to the security issues for evergrowing IoT applications. This paper tries to figure out the performance issues by evaluating routing protocols AODV, LOADng, RPL, and CORPL under collaborative attacks.


I. A. David, J. Gutierrez, S. K. Ray, “Securing RPL routing protocol from
blackhole attacks using a trust-based mechanism”, Telecommunication
Networks and Applications Conference (ITNAC), 26th International. IEEE,
II. Aijaz, A. Aghvami, “Cognitive machine-to-machine communications for
internet-of-things: A protocol stack perspective,” IEEE Internet of Things
Journal, Vol.: 2, Issue: 2, pp. 103-112, 2015.
III. A. Shoukat, “Detection and prevention of Black Hole Attacks in IOT &
WSN”, Fog and Mobile Edge Computing (FMEC), Third International
Conference on. IEEE, 2018.
IV. C. Christian, “Detection of sinkhole attacks for supporting secure routing on
6LoWPAN for Internet of Things”, IM, 2015.
V. C. Perkins, E. B. Royer, S. Das, “Ad hoc On-Demand Distance Vector
(AODV) Routing,” IETF, RFC 3561, 2003.
VI. G. Ghada, A. Rachedi, A. Meddeb, “A secure routing protocol based on RPL
for Internet of Things”, Global Communications Conference
VII. G. Jorge, E. Monteiro, J. S. Silva, “Security for the internet of things: a
survey of existing protocols and open research issues”, IEEE
Communications Surveys & Tutorials, Vol.: 17, Issue: 3, pp. 1294-1312,
VIII. J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, “Internet of things (IOT):
A vision, architectural elements, and future directions,” Future Generation
Computer Systems, 2013.

IX. K. Iuchi, “Secure parent node selection scheme in route construction to
exclude attacking nodes from RPL network”, IEICE Communications
Express, Vol.: 4, Issue: 11, pp. 340-345, 2015.
X. N. Kushalnagar, G. Montenegro, C. Schumacher, “IPv6 over low-power
wireless personal Area networks (6LoWPANs): Overview, assumptions,
problem statement, and goals,” RFC 4919, 2007.
XI. T. Clausen, A. C. D. Verdiere, J. Yi, A. Niktash, Y. Igarashi, U. Herberg,
“The Lightweight On-demand Ad hoc Distance-vector Routing Protocol –
Next Generation (LOADng),” IETF, Draft, 2012.
XII. T. Winter, P. Thubert, A. Brandt, “RPL: IPv6 routing protocol for lowpower
and lossynetworks”, RFC 6550, 2012.
XIII. W. Kevin, K. Pister, “Evaluating sinkhole defense techniques in RPL
networks”, Network Protocols (ICNP), 20th IEEE International Conference
on. IEEE, 2012.
XIV. W. Linus, S. Raza, T. Voigt, “Routing Attacks and Countermeasures in the
RPL-based Internet of Things”, International Journal of Distributed Sensor
Networks, Vol.: 9, Issue: 8, 2013.

View | Download