Mitigation of RPL stateless address auto-configuration IPV6 spoofing attack in IOT

dc.contributor.authorYadav, S.
dc.contributor.authorGangwar, S.
dc.contributor.authorKembhavi, P.
dc.contributor.authorChandavarkar, B.R.
dc.contributor.authorKamble, S.
dc.date.accessioned2026-02-08T16:50:01Z
dc.date.issued2023
dc.description.abstractAs wireless network usage is expanding, attempts are being made to disrupt the smooth functioning of the network. Due to power and memory constraints inherent in the Internet of Things (IoT) devices, implementing security measures becomes an even more significant challenge. There are many ways in which confidential information can be extracted from networks. IP address spoofing is one such attack. IP address spoofing is an illegal, unauthorized change of IP address. Malicious elements in the network impersonate as a genuine client by copying their IP address. As a result, attackers can intercept network communication between genuine clients. A false IP address makes it possible for the attacker to bypass existing security mechanisms, which creates severe security and confidentiality problems. This chapter proposes a method to resolve the issue by ensuring that an incoming node in a network always gets a unique IP address, thus making it difficult for the attacker to disguise itself as a genuine client and carry out the attack. © 2023 Apple Academic Press, Inc. All rights reserved.
dc.identifier.citationAdvanced Computer Science Applications: Recent Trends in AI, Machine Learning, and Network Security, 2023, Vol., , p. 283-295
dc.identifier.isbn9781774912393
dc.identifier.isbn9781003369066
dc.identifier.urihttps://doi.org/10.1002/csr.70170
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/33588
dc.publisherApple Academic Press
dc.subjectGenuine client
dc.subjectIP spoofing
dc.subjectMalicious client
dc.titleMitigation of RPL stateless address auto-configuration IPV6 spoofing attack in IOT

Files

Collections