
Trust Based Technique for the Mitigation of Version Number Attack in Internet of Things
Author(s) -
Chandni*,
Rakesh Kumar
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.c4293.098319
Subject(s) - computer science , overhead (engineering) , computer network , node (physics) , computer security , throughput , wireless sensor network , internet of things , engineering , wireless , telecommunications , structural engineering , operating system
The internet of things is the self-configuring type of network in which sensor nodes join or leave the network. The version number is the active type of attack possible in DODAG protocol of IoT. The Shield technique is proposed in the previous research work for the mitigation of version number attack in the network. It is very much complex for the detection of malicious nodes. In this research work, the trust based mechanism is proposed for the isolation of version number attack. The trust based mechanism calculates trust of each sensor node. The sensor nodes with the least trust are identified from the network as malicious nodes. The proposed mechanism is implemented in network simulator version 2. The trust based mechanism and shied based techniques are implemented and results are analyzed in terms of throughput, delay, control message overhead and average power consumption. It is analyzed that in terms of all parameters trust mechanism performs well as compared to shield based technique