Meet Inspiring Speakers and Experts at our 3000+ Global Conference Series Events with over 1000+ Conferences, 1000+ Symposiums
and 1000+ Workshops on Medical, Pharma, Engineering, Science, Technology and Business.

Explore and learn more about Conference Series : World's leading Event Organizer

Back

Vinod Kumar Verma

Vinod Kumar Verma

Sant Longowal Institute of Engineering and Technology, India

Title: An exploration on Internet Of Things focused security attacks for low power Wireless Networks

Biography

Biography: Vinod Kumar Verma

Abstract

The integration of the Internet of things and wireless communications enables the community to think for innovative solution for real life applications. The adaptability of these solutions lie in the framework of security encompassed over the associated nodes and devices. There are numerous strategies and protocols that have been emerged in order to provide accurate and efficient solutions for these applications. The security of the deployed applications using internet of things and wireless networks depends on a number of factors including routing, coverage, accuracy, reliability, trust and reputation etc. Out of these factors, some influence the network more as compared to others depending on the deployed environment. This presentation highlights the significance of routing attacks towards the security of IoT based applications. Commonly used security attacks on routing protocols for low power and lossy networks (RPL) have been analyzed in the Internet of Things. The simulation based study has been carried out to stimulate RPL attacks namely: hello-flood, decreased-rank and increased-version. For the given scenarios, these attacks can be analyzed one by one or in a simultaneous manner. In addition, machine learning using artificial neural network (ANN)-based supervised methods can be opted for addressing the security attacks. As the performance measures, a number of parameters can be addressed. These parameters are accuracy, precision, recall, F1-score and Mathew’s correlation coefficient (MCC). Overall, there is a need to explore more in the direction of security attacks to protect the real time applications from unauthorized and unauthenticated access.