dc.description.abstract |
In recent years, IOT applications have entered the world of information rapidly and are becoming more and more active every day. The number of end devices in the IOT has increased exponentially with respect to the previous year, and is becoming as important as safety. Since it is a new technology, standards have not yet been established in IOT communications and the work on security has been limited. In this study, the attacks on IOT were examined and the perception of these attacks by gateways was studied. Attacks have been realized with the widely used COOJA simulator of the Contiki operating system, which we can run embedded in end devices. From these attacks, due to their statistical properties, the focus is on Hello Flood and Black Hole attacks. In order to detect attacks, CUSUM, AR Processes, Shannon Entropy, Tsallis Entropy methods have been tried and performance results have been obtained. Besides these algorithms have been run into Raspberry Pi’s which are used as an IOT gateway and their behavior has been observed. |
|