DSpace
 

Dépôt Institutionnel de l'Université Ferhat ABBAS - Sétif 1 >
Faculté des Sciences >
Département d'Informatique >
Mémoires de master >

Veuillez utiliser cette adresse pour citer ce document : http://dspace.univ-setif.dz:8888/jspui/handle/123456789/5730

Titre: Security and energy consumption in TSCH
Auteur(s): Ghamoud, Haithem
Djerdi, Abd El Moumen
Mots-clés: IoT
TSCH
Contiki-NG
RPL
Blackhole Attack
Security
Date de publication: 2025
Résumé: The widespread adoption of the Internet of Things (IoT) has brought forth remarkable opportunities, but also complex challenges in terms of energy efficiency, communication reliability, and network security. Among the solutions developed for low-power wireless networks, the IEEE 802.15.4e TSCH (Time-Slotted Channel Hopping) protocol stands out by offering deterministic, synchronized, and interference resilient communication for constrained devices. However, its reliance on upper-layer routing protocols, particularly RPL and its assumption of full node cooperation, make it susceptible to routing-layer threats, especially the Blackhole attack. This master’s thesis focuses on analyzing and mitigating the impact of Black hole attacks in TSCH-based networks. These attacks exploit trust-based routing by advertising false routes and subsequently dropping all incoming packets, disrupting the flow of communication. Through this work, we designed and proposed three solutions, adapted to the different variants of this attack. The first mechanism detects intruders using unknown identifiers; the second targets attacks by detecting suspicious activity, where the absence of messages from a node suspects the existence of a black hole, using unknown identifiers. The third mechanism is the automatic detection and isolation of an attack without having to know the unknown identifiers. Our proposed solutions were implemented using Cooja simulator under the Contiki-NG OS . Through simulations, we measured their effectiveness in terms of Packet Delivery Ratio (PDR), average latency, throughput, and energy consumption using tools such as PowerTracker and Wireshark. The results showed a clear improvement in network resilience and communication integrity, validating the relevance and practicality of our contributions.
URI/URL: http://dspace.univ-setif.dz:8888/jspui/handle/123456789/5730
Collection(s) :Mémoires de master

Fichier(s) constituant ce document :

Il n'y a pas de fichiers associés à ce document.

View Statistics

Tous les documents dans DSpace sont protégés par copyright, avec tous droits réservés.

 

Valid XHTML 1.0! Ce site utilise l'application DSpace, Version 1.4.1 - Commentaires