Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    SYBIL ATTACK DETECTION IN RPL PROTOCOL

    Abstract

    Because of their limited resources and dynamic topologies, Internet of Things (IoT) settings need a unique protocol called Routing Protocol for Low-Power and Lossy Networks (RPL). But because to its intrinsic flaws, the protocol is vulnerable to a number of security risks, the most dangerous of which being the Sybil attack.A Sybil attack is a type of network intrusion that jeopardizes data correctness, routing stability, and network integrity by having a single hostile node impersonate multiple users. This study evaluated the RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol's performance in terms of control overhead and packet delivery during mobile sybil attacks, or SybM.

    Reviewer Photo

    Phanindra Kumar Kankanampati Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Phanindra Kumar Kankanampati Reviewer

    10 Oct 2024 05:53 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The research article addresses a pressing issue in IoT environments by focusing on the Routing Protocol for Low-Power and Lossy Networks (RPL) and its vulnerability to Sybil attacks. Given the increasing adoption of IoT technologies, this study is highly relevant, as it highlights the security challenges that can impact data integrity and network performance. The originality of the work is evident in its investigation of RPL under the specific threat of mobile Sybil attacks, a topic that is critical for developing secure IoT protocols. This exploration contributes valuable insights to the field of IoT security, potentially guiding future research and protocol improvements.


    Methodology

    The methodology employed in the study is clearly articulated, detailing how the evaluation of the RPL protocol was conducted in the context of mobile Sybil attacks. The study likely utilized simulation tools or models to replicate the behavior of RPL under attack conditions, though more specific information on the experimental setup would enhance understanding. Additionally, discussing the criteria for measuring control overhead and packet delivery would provide clarity on the analysis. Including the selection of parameters, such as the number of nodes and attack scenarios, would strengthen the methodology and allow for better reproducibility of results.


    Validity & Reliability

    The validity of the findings appears to be sound, given the focus on evaluating the RPL protocol's performance metrics during Sybil attacks. However, details about the testing conditions and how the results were verified against existing benchmarks would enhance confidence in the study’s reliability. Additionally, addressing any potential biases in the simulation setup or limitations in the attack model used would provide a more comprehensive understanding of the results. Including a comparison with other routing protocols could also support the claims regarding the specific vulnerabilities of RPL.


    Clarity and Structure

    The clarity and structure of the research article are generally effective, with a logical progression from the introduction of the problem to the evaluation of results. The sections appear to be well-organized, making it easy for readers to follow the narrative. However, the article could benefit from clearer headings and subheadings to differentiate between the various aspects of the study, such as methodology, results, and discussion. Including visual aids like flowcharts or diagrams could also improve the overall clarity, particularly in illustrating the dynamics of Sybil attacks on RPL.


    Result Analysis

    The result analysis provides a critical evaluation of the RPL protocol's performance during mobile Sybil attacks, focusing on control overhead and packet delivery metrics. The findings are significant, as they highlight the impact of these attacks on network stability and efficiency. However, the analysis could be enhanced by providing a deeper interpretation of the results, including potential implications for real-world IoT applications. Additionally, discussing the trade-offs involved in mitigating Sybil attacks while maintaining network efficiency would add depth to the analysis. Including future recommendations based on the findings could also guide subsequent research efforts in this area.

    Publisher Logo

    IJ Publication Publisher

    Ok sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Phanindra Kumar

    Phanindra Kumar Kankanampati

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    JETIR - Journal of Emerging Technologies and Innovative Research External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2349-5162

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp