Main Article Content
It is possible that the Internet of Things will revolutionize the world in the same way as the Internet did. This is possible to be much more so". The Internet of Things (IoT) does not fundamentally alter our lives or the computer sector, but it may be seen yet another step forward in the maturation of the Internet that we have already taken. This is accomplished via the development of a more advanced environment for humans, which will automatically recognise the needs of human beings and act in response to those needs. However, coordinating the communication of such many devices is a difficult issue for that. The Routing Protocol for Low-Power and Lossy Networks (RPL) is a unique routing protocol that has been standardised for use in limited situations such as 6LoWPAN wireless ad hoc networks. 6LoWPAN security is difficult to achieve because the devices are connected to the untrusted Internet and have limited resource availability, the communication links between the devices are lossy, and the devices use a variety of novel Internet of Things technologies such as RPL, 6LoWPAN, and CoAP/CoAPs. Throughout this article, we present a thorough examination of Internet of Things technologies, as well as their novel security capabilities that may be abused by attackers or intrusion detection systems. In this study, we provide the development and demonstration of well-known routing attacks against 6LoWPAN networks that use RPL as their routing protocol. This is a significant addition. We built the wormhole attack and its application on the Internet of Things with the aid of the contact operating system.