Trust Based Technique for the Mitigation of Version Number Attack in Internet of Things
Chandni1, Rakesh Kumar2
1Chandni, Computer Science & Engineering, National Institute of Technical Teachers Training & Research, Chandigarh, India.
2Rakesh Kumar, Computer Science & Engineering, National Institute of Technical Teachers Training & Research, Chandigarh, India
Manuscript received on 11 August 2019. | Revised Manuscript received on 18 August 2019. | Manuscript published on 30 September 2019. | PP: 1197-1203 | Volume-8 Issue-3 September 2019 | Retrieval Number: C4293098319/19©BEIESP | DOI: 10.35940/ijrte.C4293.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The internet of things is the self-configuring type of network in which sensor nodes join or leave the network. The version number is the active type of attack possible in DODAG protocol of IoT. The Shield technique is proposed in the previous research work for the mitigation of version number attack in the network. It is very much complex for the detection of malicious nodes. In this research work, the trust based mechanism is proposed for the isolation of version number attack. The trust based mechanism calculates trust of each sensor node. The sensor nodes with the least trust are identified from the network as malicious nodes. The proposed mechanism is implemented in network simulator version 2. The trust based mechanism and shied based techniques are implemented and results are analyzed in terms of throughput, delay, control message overhead and average power consumption. It is analyzed that in terms of all parameters trust mechanism performs well as compared to shield based technique.
Keywords: Shield Technique, Trust Technique, Version Number Attack
Scope of the Article: Internet Technologies, Infrastructure, Services & Applications