Browse By Repository:

 
 
 
   

Comparison of hybrid technique of intrusion detection system in 6LoWPAN

Razali, Siti Aishah (2021) Comparison of hybrid technique of intrusion detection system in 6LoWPAN. Project Report. Universiti Teknikal Malaysia Melaka, Melaka, Malaysia. (Submitted)

[img] Text (24 Pages)
Comparison of hybrid technique of intrusion detection system in 6LoWPAN.pdf - Submitted Version

Download (462kB)
[img] Text (Full Text)
Comparison of hybrid technique of intrusion detection system in 6LoWPAN.pdf - Submitted Version
Restricted to Repository staff only

Download (1MB)

Abstract

The term "Internet of Things" refers to the connectivity of physical items, such as smart objects, that exchange data and provide services through the internet. The network between IoT nodes can be protected by avoiding attacks with conventional mechanisms such as encryption and authentication, however these methods will not detect all potential attacks. The resource-constrained sensors node in an IoT environment are causing untrusted connection were made since the connection are made through internet using IPv6 and because communication protocol is IPv6 over Low -Power Wireless Personal Area Networks (6LowPAN). 6LowPAN is a communication protocol that were used for resource-constrained applications. Since the attack are more likely to happen, Intrusion Detection System are necessary to detect the attack that occur in the system or network by analysing the activity in the system or in the network and get the IDS log information about it and get the alarm report. In this project research will be focus on hybrid detection method using Network Intrusion Detection System (NIDS). The project experiment is a comparison between two extended version of existing computer simulation of hybrid detection method IDS, SVELTE. The Cooja network simulator will be used as the Routing Protocol for Low-Power and Lossy Networks (RPL) simulator in a 6LowPAN environment to create nodes of IoT and the attacker such as sink node using set of source code. The simulation produced network traffic and the data, metrics, and graph of RPL that can be collect and analyse.

Item Type: Final Year Project (Project Report)
Uncontrolled Keywords: Protocol, Detection, Ipv, Nodes, Node, Network, Internet, Simulation, Simulator, Networks
Divisions: Library > Final Year Project > FTMK
Depositing User: Norfaradilla Idayu Ab. Ghafar
Date Deposited: 25 Nov 2022 00:18
Last Modified: 25 Nov 2022 00:18
URI: http://digitalcollection.utem.edu.my/id/eprint/27163

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year