Sign in
Log inSign up

Simulating RPL attacks on Wireless Sensor Networks with RPL-Attacks-Framework and Contiki

Alex's photo
Alex
·Jan 10, 2018

This project was born in the scope of a course of Mobile and Embedded Computing. This aims to take advantage of Contiki, especially its Cooja simulator for making simulations, while wrapping the complete chain of operations (from creating a simulation to building the real sensor) into a user-friendly command-line interface.

It was very helpful for demonstrating a few common attacks (i.e. presented in this excellent paper), as explained in this report, and could be helpful for further researches (that I can't perform myself due to time shortage).

Any feedback or contribution would be greatly appreciated.

Hassle-free blogging platform that developers and teams love.
  • Docs by Hashnode
    New
  • Blogs
  • AI Markdown Editor
  • GraphQL APIs
  • Open source Starter-kit

© Hashnode 2024 — LinearBytes Inc.

Privacy PolicyTermsCode of Conduct