Show simple item record

dc.contributor Graduate Program in Electrical and Electronic Engineering.
dc.contributor.advisor Anarım, Emin.
dc.contributor.author Çel, Ömer.
dc.date.accessioned 2023-03-16T10:19:15Z
dc.date.available 2023-03-16T10:19:15Z
dc.date.issued 2018.
dc.identifier.other EE 2018 C46
dc.identifier.uri http://digitalarchive.boun.edu.tr/handle/123456789/12915
dc.description.abstract In recent years, IOT applications have entered the world of information rapidly and are becoming more and more active every day. The number of end devices in the IOT has increased exponentially with respect to the previous year, and is becoming as important as safety. Since it is a new technology, standards have not yet been established in IOT communications and the work on security has been limited. In this study, the attacks on IOT were examined and the perception of these attacks by gateways was studied. Attacks have been realized with the widely used COOJA simulator of the Contiki operating system, which we can run embedded in end devices. From these attacks, due to their statistical properties, the focus is on Hello Flood and Black Hole attacks. In order to detect attacks, CUSUM, AR Processes, Shannon Entropy, Tsallis Entropy methods have been tried and performance results have been obtained. Besides these algorithms have been run into Raspberry Pi’s which are used as an IOT gateway and their behavior has been observed.
dc.format.extent 30 cm.
dc.publisher Thesis (M.A.) - Bogazici University. Institute for Graduate Studies in the Social Sciences, 2018.
dc.subject.lcsh Internet of things..
dc.title DOS attack mitigation in IOT
dc.format.pages xiii, 57 leaves ;


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital Archive


Browse

My Account