Abstract
Everyone is aware that existing approaches to IoT networks have nothing to do with certain security issues that may expose sensitive data to unauthorised user. Today, low-power and lossy networks (LLNs) speak as one of the most fascinating examination regions. They incorporate wireless personal area networks (WPANs), low-power line communication (PLC) systems and wireless sensor networks (WSNs). Such systems are frequently improved to spare vitality, bolster track designs not the same as the standard unicast correspondence, run steering conventions over connection layers with limited edge sizes and numerous others. The IoT is a quickly developing innovation. In IoT, the gadgets (device) are associated through the Internet and controlled from any remote territories. Before the approach of IoT, the association between the clients was distinctly through the Web. By 2020, there will be 75.4 billion gadgets interconnected through the Web. In IoT, we have routing protocol for low-power and lossy networks (RPL). RPL is a lightweight convention that has decent directing usefulness and mindful setting, and it underpins dynamic topology, having fundamental security usefulness. This paper explores the power-efficient and secure ipv6 routing protocol RPL and proposed the Caesar Cipher hash algorithm for the trust privacy and security of the information of IoT node with power full tool CONTIKI COOJA SIMULATOR security solution (CCSS).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lin J, Yu W, Zhang N, Yang X, Zhang H (2015) A survey on internet of things: architecture enabling technologies security and privacy and applications. IEEE Internet Things J 4:2327–4662
Atmel-8994-Security-for-Intelligent-Connected-IoT-Edge-Nodes. Atmel Corporation./Rev.:Atmel-8994A-CryptoAuth-Security-for-Intelligent-Connected-IoT-Edge NodesWhitePaper_112015, 2015
Arun R, Salau A (2019) Recent trends in IoT, its requisition with IoT built engineering: a review. Springer, Singapore. ISBN 978-981-13-2553-3
Sharma S, Kumar A (2019) Enhanced energy-efficient heterogeneous routing protocols in WSNs for IoT application. IJEAT 9(1). ISSN: 2249-8958
Kumar K, Gupta S, Rana A (2018) Wireless sensor networks: a review on “challenges and opportunities for the future world-LTE”. AJCS, 1(2). ISSN: 2456-6616
Cheng B., Solmaz G, Cirillo F, Kovacs E, Terasawa K, Kitazawa A (2017) FogFlow: easy programming of IoT services over cloud and edges for smart cities. IEEE Internet Things J 2:2327–4662
Mick T, Tourani R, Misra S (2017) LASeR: Lightweight authentication and secured routing for NDN IoT in smart cities. IEEE Internet Things J, 2327–4662
Montori F, Bedogni L, Bononi L (2017) A collaborative internet of things architecture for smart cities and environmental monitoring. IEEE Internet Things J 4:2327–4662
Siegel JE, Kumar S, Sarma SE (2017) The future internet of things: secure, efficient, and model-based. IEEE Internet Things J, 2327–4662
Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J 4:2327–4662
Krishna R, Dhawan S, Sharma S, Kumar A (2019) Review on artificial intelligence with internet of things—problems, challenges and opportunities. In: 2nd International conference on power energy, environment and intelligent control (PEEIC). Greater Noida, India, pp 383–387
Solapure SS, Kenchannavar HH, Sarode KP (2020) Issues faced during RPL protocol analysis in Contiki-2.7. In: Tuba M, Akashe S, Joshi A (eds) ICT systems and sustainability. Advances in intelligent systems and computing, vol 1077. Springer, Singapore
ChetanKhona (2017) Key attributes of an intelligent IIoT edge platform. White Paper: All Programmable Devices XILINX. WP493 (v1.0) September 6
Sobral JVV (2019) Routing protocols for low power and lossy networks in internet of things applications sensors
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rana, A.K., Sharma, S. (2021). Contiki Cooja Security Solution (CCSS) with IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things Applications. In: Marriwala, N., Tripathi, C.C., Kumar, D., Jain, S. (eds) Mobile Radio Communications and 5G Networks. Lecture Notes in Networks and Systems, vol 140. Springer, Singapore. https://doi.org/10.1007/978-981-15-7130-5_19
Download citation
DOI: https://doi.org/10.1007/978-981-15-7130-5_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7129-9
Online ISBN: 978-981-15-7130-5
eBook Packages: EngineeringEngineering (R0)