• Login
    View Item 
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A framework for hello flood attack detection and mitigation in resource constrained RPL-Based IoT Networks

    Thumbnail
    View/Open
    Master's dissertation (1.792Mb)
    Date
    2024-11
    Author
    Yangisiriza, Sylivia
    Metadata
    Show full item record
    Abstract
    The Internet of Things (IoT) and the Industrial Internet of Things (IIoT) have revolutionized modern industries, but the security of these networks remains a critical concern. The Routing Protocol for Low-Power and Lossy Networks (RPL), widely used in IoT and IIoT for routing, is vulnerable to various attacks, including Hello Flood (HF) attacks. These attacks exploit the resource-constrained nature of IoT devices, leading to increased energy consumption and rapid memory depletion. This dissertation investigates the impact of Hello Flood attacks on resourceconstrained IoT nodes, particularly in terms of energy consumption and memory usage. A novel framework is proposed for detecting and mitigating HF attacks in resource-constrained RPL-based IoT networks. Through simulations using the Cooja simulator and Contiki 3.0 operating system, we demonstrate that HF attacks can significantly increase energy consumption by over 50% and deplete memory within minutes. The proposed framework leverages machine learning (ML) models trained on simulated network data to identify malicious traffic patterns accurately. The ML trained models were able to do HF attack detection with great accuracy. By denying malicious packets predicted by the model, the framework effectively mitigates the impact of HF attacks, conserving valuable resources and enhancing the resilience of RPL-based IoT networks.
    URI
    http://hdl.handle.net/10570/13737
    Collections
    • School of Computing and Informatics Technology (CIT) Collection

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak IRCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV