#08 Simulating Blackhole Attack on IoT Nodes Running RPL Protocol

Поделиться
HTML-код
  • Опубликовано: 11 янв 2025

Комментарии • 18

  • @faisalagarbaaa
    @faisalagarbaaa  Год назад

    For more details purchase my book "Simulating Routing for Low Power and Lossy Networks Protocol Attacks: A Comprehensive Guide for Researchers " on Amazon.
    Link: www.amazon.com/Simulating-Routing-Networks-Protocol-Attacks/dp/B0CNV5SR7F/ref=sr_1_5?crid=HY41IQZIU0PL&keywords=rpl+attacks&qid=1700771527&sprefix=rpl+attacks%2Caps%2C369&sr=8-5

  • @faisalagarbaaa
    @faisalagarbaaa  Год назад

    My book is releasing out soon on Amazon. Get a copy and get all the details. Thank you.

  • @B-ys7yj
    @B-ys7yj 9 месяцев назад

    hello sir , thank you for the vedio.
    I couldn't find the file uiop6.c that you shared. Is it possible for you to reshare it? I'm not sure what modifications to make

  • @faisalagarbaaa
    @faisalagarbaaa  Год назад

    Please subscribe to the channel for more educational videos like this.

  • @madhuyadav2184
    @madhuyadav2184 Год назад

    I can't find all the nodes in collect view if I have taken 12 nodes then then in the collect view only 4-5 nodes are shown under the all nodes kindly help I am using contiki 3.0

    • @faisalagarbaaa
      @faisalagarbaaa  Год назад +1

      Remember Blackhole attack is an isolation attack. A DoS attack.

    • @faisalagarbaaa
      @faisalagarbaaa  Год назад

      Get complete details and other attacks simulations from my book: "Simulating Routing for Low Power and Lossy Networks (RPL) Protocol"
      a.co/d/2MY9mbp

    • @B-ys7yj
      @B-ys7yj 9 месяцев назад

      Hello @madhuyadav2184, could you please share the uiop6.c file for the malicious node? I couldn't find it, Thank you in advance.

    • @B-ys7yj
      @B-ys7yj 9 месяцев назад

      Hello @madhuyadav2184, could you please share the uiop6.c file for the malicious node? I couldn't find it, Thank you in advance.

  • @asif074
    @asif074 Год назад

    Video is very informative. But I am unable to simulate because of few errors. 1. I am using Contiki 2.7. Normal Scenerio is working fine. but Attacker scenerio is not. Above mentioned step #4 is not clear. Is it should be like this: Move it to Blackhole/core/net/ipv6/ instead of contiki/core/net/ipv6/?
    and when i add malicious node, it give compilation error.
    Please guide me.

    • @leelavathirajanna6636
      @leelavathirajanna6636 Год назад

      use contiki 3.0

    • @faisalagarbaaa
      @faisalagarbaaa  Год назад

      Get complete details and other attacks simulations from my book: "Simulating Routing for Low Power and Lossy Networks (RPL) Protocol"
      a.co/d/2MY9mbp

  • @sonikabhaskar1234
    @sonikabhaskar1234 Год назад

    thank you sir for informative video.I m currently working on IoT security.When i run rank attack code i got error in rpl.timers.c file.could u help me

    • @faisalagarbaaa
      @faisalagarbaaa  Год назад

      Just make sure you follow the video strictly.

    • @sonikabhaskar1234
      @sonikabhaskar1234 Год назад

      @@faisalagarbaaa yeah sir....

    • @faisalagarbaaa
      @faisalagarbaaa  Год назад

      Get complete details and other attacks simulations from my book: "Simulating Routing for Low Power and Lossy Networks (RPL) Protocol"
      a.co/d/2MY9mbp

  • @cheicksissoko9983
    @cheicksissoko9983 2 года назад

    Thank you for this video Sir.
    I'm Working on RPL security and I want to activate the promiscuous mode for nodes but I don't know how to do it.
    Can you help me?

    • @faisalagarbaaa
      @faisalagarbaaa  Год назад

      Get complete details and other attacks simulations from my book: "Simulating Routing for Low Power and Lossy Networks (RPL) Protocol"
      a.co/d/2MY9mbp