DETEKSI SERANGAN BLACKHOLE PADA JARINGAN 6LOWPAN MENGGUNAKAN METODE PENDETEKSIAN BERDASARKAN AMBANG BATAS

JULIANSYAH, MUHAMMAD RIZKY and Ubaya, Huda (2025) DETEKSI SERANGAN BLACKHOLE PADA JARINGAN 6LOWPAN MENGGUNAKAN METODE PENDETEKSIAN BERDASARKAN AMBANG BATAS. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011382025146_cover.jpg]
Preview
Image
RAMA_56201_09011382025146_cover.jpg - Cover Image
Available under License Creative Commons Public Domain Dedication.

Download (407kB) | Preview
[thumbnail of RAMA_56201_09011382025146.pdf] Text
RAMA_56201_09011382025146.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011382025146_TURNITIN.pdf] Text
RAMA_56201_09011382025146_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (3MB) | Request a copy
[thumbnail of RAMA_56201_09011382025146_0216068101_01_front_ref.pdf] Text
RAMA_56201_09011382025146_0216068101_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (730kB)
[thumbnail of RAMA_56201_09011382025146_0216068101_02.pdf] Text
RAMA_56201_09011382025146_0216068101_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (331kB) | Request a copy
[thumbnail of RAMA_56201_09011382025146_0216068101_03.pdf] Text
RAMA_56201_09011382025146_0216068101_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (391kB) | Request a copy
[thumbnail of RAMA_56201_09011382025146_0216068101_04.pdf] Text
RAMA_56201_09011382025146_0216068101_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (1MB) | Request a copy
[thumbnail of RAMA_56201_09011382025146_0216068101_05.pdf] Text
RAMA_56201_09011382025146_0216068101_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (134kB) | Request a copy
[thumbnail of RAMA_56201_09011382025146_0216068101_06_ref.pdf] Text
RAMA_56201_09011382025146_0216068101_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (156kB) | Request a copy
[thumbnail of RAMA_56201_09011382025146_0216068101_07_lamp.pdf] Text
RAMA_56201_09011382025146_0216068101_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (429kB) | Request a copy

Abstract

Blackhole Attack Detection on 6LoWPAN Networks Still Has Several Disadvantages, Such as Limited Detection Accuracy Because It Only Depends on One Parameter, High Communication Overhead Due to the Use of Encryption or IDS, and Lack of Adaptation to Heterogeneous IoT Network Characteristics. The Threshold Method Offers a More Efficient Solution by Combining Packet Delivery Ratio (PDR), Packet Loss Ratio (PLR), and Delay Analysis Simultaneously, So That It Can Improve Detection Accuracy, Reduce Power Consumption and Be More Adaptive to 6LoWPAN Network Dynamics. Keywords: Blackhole, 6LoWPAN, Threshold Method.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Blackhole, 6LoWPAN, Metode Ambang Batas.
Subjects: T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Muhammad Rizky Juliansyah
Date Deposited: 13 Jul 2025 12:24
Last Modified: 13 Jul 2025 12:24
URI: http://repository.unsri.ac.id/id/eprint/177804

Actions (login required)

View Item View Item