Sie sind auf Seite 1von 5

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 5 Issue: 5 1132 1136


Security and Power Aware IPV6 Programming in Internet of Things Using


Amit Sharma,
Asst. Professor,
School of Information Technology,
Apeejay Institute of Management Technical Campus,
Jalandhar, Punjab, India

Abstract: The current era is surrounded with enormous devices and gadgets connected with each other using high performance technologies.
Such type of technology loaded object communication is treated under the aegis of Internet of Things (IoT). A number of applications are using
IoT based communication whether it is related to defense equipments, smart cities, smart offices, highway patrolling, smart toll collections,
business communications, satellite televisions, traffic systems or interconnected web cams for social security. IoT is also known and associated
with other terms including Ubiquitous Computing (UbiComp), Pervasive Computing or Ambient Computing in which number of devices and
objects are virtually connected for remote monitoring and decision making. This manuscript underlines the security and power aware
programming in IoT for higher performance in Cooja.

Keywords: Wireless Networks, Internet of Things, Wireless Security


I. INTRODUCTION In this attack, the malicious node or attacker perform the

As there are so many devices and equipments connected attack from multiple and different locations.
with each other using virtual environment, there are the
stern issues related to security, privacy and overall Sybil Attack: Sybil attack affects the network layer of
performance of networks so that integrity aware vehicular network a lot. Using this attack, the manipulation
communication can take place with greater efficiency. Since of source identity takes place. The malicious node attempts
the inception of IoT devices and intercommunication, a to fabricate and manipulate the original identity and
significant work on security and privacy is going on because pretends to be a registered or original source node. In Sybil
of the increasing vulnerability aspects and attacks from attack, the attacker node creates assorted vehicles or nodes
assorted sources. of same identity by replication and forces other nodes to
leave or move fast from the road. Using resource testing
Different types of attacks are used to control and damage the these attacks can be detected which works on the
IoT environment at different layers. The attackers can assumption that vehicles have limited resources. This
damage and control the IoT network by sending the problem of Sybil attack can be addressed using public key
malicious packets and signals and infrastructure can be cryptography where public keys are used to authenticate
virtually destroyed. Such attacks are in the high priority as vehicles.
these attacks affect the entire network. A number of attacks
are prevalent for controlling and damaging the pervasive Node Imitation Attack: In this type of attack, the
networks. transmission of messages takes place by the imitated node of
other identity. In this way, the attacker can send the
Denial of Service (DoS) Attack: In DoS attack, the malicious or wrong messages to any node hiding or
network availability is jammed by the attacker node or changing its own identity. The identity of IoT node can be
malicious packet by capturing the bandwidth or disguised in this attack to capture the authentic and secured
communication channel. Here, the authentic and legitimate packet which can be very harmful and disaster prone for the
users are not able to access the network services. This is one entire scenario.
of the prominent attacks that works on the network layer of
IoT based scenario. Such type of attack is more dangerous Application Level Attack: This type of attack in IoT
when it becomes Distributed Denial of Service (DDoS) environment tamper the messages and retransmit to the
because this mechanism is involved as distributed in nature. destination which can be very insecure. For example, in
Internet of Vehicles (IoV) based implementation the high

IJRITCC | May 2017, Available @
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1132 1136
traffic lane can be broadcasted as Congestion Free Lane. of Destination-Oriented Directed Acyclic Graph (DODAG)
With this approach, the upcoming congestion can be very having unidirectional as well as bi-directional
high on that lane which can result in the disasters. communication. It is having multiple instances with the
localized behavior for higher optimization. RPL enables
Importance of IPv6 in Internet of Things (IoT) each node in the framework to pick if packets are to be sent
Security and integrity is the main issue in IoT based network upwards to their root or downwards to their child nodes.
environment in which interception free secured
communication is required. To enforce and integrate the Programming RPL with IPv6 in Cooja
higher degree of security, there is need to implement IPv6 Contiki is one of the widely used IoT enabled operating
for IoT scenarios with dynamic hybrid cryptography in the system under free and open source distribution available on
keys generation and authentication. The IPv6 based ( Contiki is equipped with Cooja
approach can be enabled with fully secured algorithms and Simulator that is used for the simulation as well as
non vulnerable towards the interceptions. With the programming for sensor devices having enormous options to
increasing implementations of IoT in diversified domains, it program the IoT nodes for real life implementations. Contiki
becomes necessary to work out the security aspects of IoT is having an excellent and powerful IoT simulator Cooja
with the secured routing of packets so that the intrusion which enable the programmer to import and program
cannot take place and all the transmission can be fully enormous types of IoT motes and get the results from
secured. different algorithms. To program, control and monitor the
remote IoT devices, the back-end C programs and related
RPL (Routing Protocol for Low-Power and Lossy header files can be customized and recompiled to get the
Networks) desired results. Contiki works on IPv4 as well as IPv6
RPL is the IPv6 Based Protocol for IoT. It is primarily networking with the integration of lightweight protocols so
integrated for IPv6 over Low power Wireless Personal Area that low power chips and radio frequency chips can be
Networks (6LowPAN). It works with the dynamic creation connected without performance issues.

Figure 1: Fetching the data and messages for plotting graphs

Figure 1 depicts the simulation of multiple IoT motes in Once the simulation is complete, the network log files are
Cooja Simulator with the integration of dynamic analyzed which includes the source and destination motes,
cryptography. The simulation results can be analyzed from time and overall activities performed during simulation. In
Mote Output in which there is option to fetch the execution the Mote Output Window, the log data can be copied and
logs. All the data communication and signals are logged in further analyzed using data mining and machine learning
Mote Output which can be further investigated using tools for predictive analytics.
different types of graphs.

IJRITCC | May 2017, Available @
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1132 1136

Figure 2: Collect View Activation for Detailed Logs

Figure 2 represents the Collect View in Cooja Simulator. It IoT motes can be analyzed on multiple parameters including
is the tool available with Cooja IoT Simulator to analyze the Latency, Temperature, Time and other important parameters
individual IoT mote. The IoT mote analytics can be viewed which contribute to the performance evaluation.
from Tools menu of Cooja. From Collect View, any of the

Figure 3: Network Graph Option in Cooja

IJRITCC | May 2017, Available @
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1132 1136
Figure 3 depicts the different options by which IoT View of Cooja enable the researcher to view the dynamic
Simulation can be analyzed and prediction on various topology and connections of sensor nodes as shown in
parameters can be done. The network graph tab in Collect Figure 4.

Figure 4: View of Network Graph for Dynamic Topology

Plotting Results in form of Graphs

Figure 5: Average Power Consumption in the Motes

As depicted in Figure 5, there are enormous parameters cited graph are consistent and low power mode is in the
including LPM, CPU, Radio Listen and Radio Transmit integrity mode. In addition, the radio listen the having the
during the IoT simulation. The graphical results in the above consistency.

IJRITCC | May 2017, Available @
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1132 1136
II. Conclusion
Internet of Things is one of emerging domain of research at
various academic as well as corporate establishments.
Because of increasing number of devices, there are so many
segments for research in this area. Following are some of the
approaches on which the novel and effectual algorithms can
be devised and implemented using Cooja
Interoperability and Cross-Protocol Compatibility
Development of Energy Aware IoT Scenarios
Power Aware Scheduling and Routing
Prediction and Avoidance of Energy Consumption
Lifetime Analytics for Robustness of IoT
Reproducible and Multi-Interface Implementations
o and many others

[1] Chan H., & Perrig A. Security and privacy in sensor
networks, Computer Networks, 36(10), pp. 103-105, Oct.
[2] Huang Q., Cukier J., Kobayashi H., Liu B., & Zhang J.,
Fast authenticated key establishment protocols for self-
organizing sensor networks, In Proceedings of the 2nd
ACM international conference on Wireless sensor
networks and applications, pp. 141-150, ACM, Feb. 2003.
[3] Gura N., Patel A., Wander A., Eberle H., & Shantz S.,
Comparing elliptic curve cryptography and RSA on 8-bit
CPUs, In International Workshop on Cryptographic
Hardware and Embedded Systems, pp. 119-132, Springer
Berlin Heidelberg, 2004.
[4] Watro R., Kong D., Cuti S. F., Gardiner C., Lynn C., &
Kruus P., TinyPK: securing sensor networks with public
key technology, In proceedings of the 2nd ACM workshop
on Security of ad hoc and sensor networks, pp. 59-64,
ACM, 2004.
[5] Liao W.H., & Huang C. C., SF-MAC: A spatially fair MAC
protocol for underwater acoustic sensor networks, IEEE
Sensors Journal, 12(6), pp. 1686-1694, Jan. 2012.
[6] Rodrguez-Colina E., Multiple attribute dynamic spectrum
decision making for cognitive radio networks, In 2011
Eighth International Conference on Wireless and Optical
Communications Networks, pp. 1-5, IEEE July 2011.
[7] Ioannis K., Dimitriou T., & Freiling F. C., Towards
intrusion detection in wireless sensor networks, In Proc. of
the 13th European Wireless Conference, pp. 1-10, 2007.
[8] Sung W. T., Multi-sensors data fusion system for wireless
sensors networks of factory monitoring via BPN
technology, Expert Systems with Applications, 37(3), pp.
2124-2131, 2010.

IJRITCC | May 2017, Available @