Skip to main content
Loading...
Scholar9 logo True scholar network
  • Login/Sign up
  • Scholar9
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
    Publications ▼
    Article List Deposit Article
    Mentorship ▼
    Overview Sessions
    Q&A Institutions Scholars Journals
  • Login/Sign up
  • Back to Top

    Transparent Peer Review By Scholar9

    SYBIL ATTACK DETECTION IN RPL PROTOCOL

    Abstract

    Because of their limited resources and dynamic topologies, Internet of Things (IoT) settings need a unique protocol called Routing Protocol for Low-Power and Lossy Networks (RPL). But because to its intrinsic flaws, the protocol is vulnerable to a number of security risks, the most dangerous of which being the Sybil attack.A Sybil attack is a type of network intrusion that jeopardizes data correctness, routing stability, and network integrity by having a single hostile node impersonate multiple users. This study evaluated the RPL (Routing Protocol for Low-Power and Lossy Networks) routing protocol's performance in terms of control overhead and packet delivery during mobile sybil attacks, or SybM.

    Reviewer Photo

    Rajas Paresh Kshirsagar Reviewer

    badge Review Request Accepted
    Reviewer Photo

    Rajas Paresh Kshirsagar Reviewer

    10 Oct 2024 04:39 PM

    badge Approved

    Relevance and Originality

    Methodology

    Validity & Reliability

    Clarity and Structure

    Results and Analysis

    Relevance and Originality

    The research article addresses a significant challenge in Internet of Things (IoT) environments by focusing on the Routing Protocol for Low-Power and Lossy Networks (RPL) and its vulnerabilities, particularly to Sybil attacks. The originality of the study lies in its exploration of RPL's performance under mobile Sybil attacks, which is a critical area of investigation given the increasing reliance on IoT systems. This focus on a contemporary threat in IoT settings enhances the article's relevance, as it not only contributes to the existing body of knowledge but also offers insights that could inform future research and practical applications.


    Methodology

    The methodology employed in the research article appears to be well-structured, although the specifics regarding experimental design and data collection are not detailed in the abstract. It would be beneficial to elaborate on the simulation parameters, the metrics used for evaluating control overhead and packet delivery, and the environmental conditions under which the experiments were conducted. This clarity would bolster the reader's understanding of the robustness of the findings and allow for better replication of the study.


    Validity & Reliability

    The validity and reliability of the results are essential for establishing the study's credibility. The article must demonstrate that the experiments were conducted under controlled conditions and that the metrics used for assessment are appropriate for evaluating RPL's performance during Sybil attacks. Providing comparative analysis with other protocols or benchmarks could further strengthen the findings and establish reliability. Clear descriptions of data analysis methods would also enhance confidence in the reported outcomes.


    Clarity and Structure

    The clarity and structure of the research article are crucial for effective communication of its findings. The abstract presents the problem and the focus of the study clearly; however, subsequent sections should maintain this clarity by logically organizing content and ensuring that technical jargon is well-defined. A coherent structure with distinct sections for methodology, results, and discussion would aid readers in navigating the text and grasping the key contributions of the research more easily.


    Result Analysis

    The result analysis presented in the article should provide comprehensive insights into how RPL performed during mobile Sybil attacks, emphasizing not just the metrics of control overhead and packet delivery, but also their implications for real-world applications. Discussion of the significance of the results, including how they compare to previous studies or theoretical expectations, would enhance the article's impact. It is essential to contextualize the findings within the broader scope of IoT security to highlight their relevance and potential applications in the field.

    Publisher Logo

    IJ Publication Publisher

    Ok Sir

    Publisher

    IJ Publication

    IJ Publication

    Reviewer

    Rajas Paresh

    Rajas Paresh Kshirsagar

    More Detail

    Category Icon

    Paper Category

    Computer Engineering

    Journal Icon

    Journal Name

    JETIR - Journal of Emerging Technologies and Innovative Research External Link

    Info Icon

    p-ISSN

    Info Icon

    e-ISSN

    2349-5162

    Subscribe us to get updated

    logo logo

    Scholar9 is aiming to empower the research community around the world with the help of technology & innovation. Scholar9 provides the required platform to Scholar for visibility & credibility.

    QUICKLINKS

    • What is Scholar9?
    • About Us
    • Mission Vision
    • Contact Us
    • Privacy Policy
    • Terms of Use
    • Blogs
    • FAQ

    CONTACT US

    • +91 82003 85143
    • hello@scholar9.com
    • www.scholar9.com

    © 2026 Sequence Research & Development Pvt Ltd. All Rights Reserved.

    whatsapp