Academy has grown become one of leading research institute in wireless communications and simulations.Our research in wireless communications will help to PhD scholars and MS students to get their doctorate program including paper writing and coding implementation.
PhD academy has come up with our recent research shows that LTE technology can be used in vechicular communication for future intelligent transport systems (ITS) to improve safety and accuracy by commnicate information between vehicles in safety aspects.
Contiki is an operating system mainly used in internet of things. Cooja is a simulator used in contiki in which we can simulate the scenario that we are going to create using contiki. IPv6 can be programmed using contiki cooja.
Technology has been improved in such a way that the gadgets and devices can interact with each other without human interaction. And these type of communication is called internet of things. The IoT communication includes smart cities, business communications, defence equipment, traffic systems, highway patrolling, smart offices , smart toll collection and satellite television. These devices are virtually connected and communication is performed automatically. IPv6 protocols using contiki cooja makes the network highly secure.
Types of Attack in IOT network:
Denial of Service (DoS) Attack
The DOS attack is done by malicious packet or by attacker node by blocking the communication channel or bandwidth of the devices. In this type of attack the attacker can attack the location from many locations. This is one of the dangerous attack in IOT.
Node Imitation Attack
In this type of attack the attacker can create own node with fake ID. And so the node can receive the messages that does not belong to that node. With the help of this attack the attacker can attack the whole scenario of IOT.
Application Level Attack:
In this type of attack the attacker can attack the node and tampers the message and retransmit the message to the destination node. By this attack the attacker can spread the fake messages to the nodes.
In this type of attack the attacker replicates the source node and manipulates the identity and forces the other nodes to move away from the network.
Why IPv6 Protocol using contiki cooja?:
Data security and data integrity is main problem with IOT devices. A secure communication is required between the devices. IPv6 protocol give high secure communication. IPv6 based algorithms will be highly secure with dynamic cryptographic authentication and key generation. RPL is IPv6 based protocol that mainly used in IOT. And it is mainly integrated with low power wireless personal area networks.
We do projects, thesis, dissertation in IPv6 protocols using contiki cooja. Any queries aout IPv6 protocols using contiki cooja mail us.