The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSN) are widely used to monitor and control physical environments. An efficient energy management system is needed to be able to deploy these networks in lossy environments while maintaining reliable communication. The IPv6 Routing Protocol for Low-Power and Lossy networks is a routing protocol designed to properly manage energy without compromising reliability. This protocol...
Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopted for routing information maintenance in such networks. This algorithm is originally designed for disseminating code updates through a wireless sensor network. Thus, when it comes to routing maintenance in LLNs, Trickle suffers...
Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things and mainly for the RPL (Routing Protocol for Low-power and Lossy Networks) called: Metric-based RPL Trustworthiness Scheme (MRTS). The primary aim is...
Ensuring security in routing protocols designed for Internet of Things (IoT) is more challenging owing to the fact that devices are resource constrained. The need for lightweight security mechanisms is apparent because cryptography based mechanisms have intense computation requirements. Although Routing Protocol for Low power and lossy networks (RPL) inherently comprises a few security mechanisms,...
Cognitive Radio (CR) is viewed as a revolutionary potential radio technology capable of offering dynamic spectrum access. CR Networks (CRNs) with such spectrum aware devices is a hopeful solution to the spectrum scarcity issue in wireless communication sector. In this paper, an effective routing solution with a cross layer design is proposed for the multi-hop CRNs. Most of the existing work uses Ad-hoc...
In the last few years, Wireless Sensor Network (WSN) emerges and appears as an essential platform for prominent concept of Internet of Things (IoT). Their application ranges from so-called “smart cities”, “smart homes” over environmental monitoring. The connectivity in IoT mainly relies on RPL (IPv6 Routing Protocol for Low Power and Lossy Network) - a routing algorithm that constructs and maintains...
The contribution of this article is two local recovery methods that may reduce overhead and make a more immediate reconnection of disconnected nodes compared to the soft state global recovery method applied in WSNs running RPL [1]. In addition, we perform an analysis of the implication to better judge the context where local recovery methods should be used. One of our suggested methods is based on...
In this paper, we propose two adaptive algorithms to control Destination Advertisement Option (DAO) packet emissions in RPL non-storing mode: a centralized, or controlled by the DAG root, and a distributed. We propose new mechanisms to derive the most appropriate value for the DelayDAO Timer, a timer that determines how long a node should wait before transmitting its destination advertisement packet...
This paper focuses on the security aspect of RPL (Routing Protocol for Low-power and lossy network) by introducing a new type of threat — the topology attack, which changes the node operation for breaking the optimised network topology, and designing a specification-based IDS for detecting it. We present two novel RPL attacks of this type: the rank attack and local repair attack. We also propose an...
The IETF ROLL WG is currently in the final steps of the specification of RPL, a new routing protocol for low power and lossy networks (e.g. wireless sensor networks). RPL may use layer two- and layer three-based mechanisms for neighbor reachability maintenance. Since layer two mechanisms may not always be available, RPL relies by default on the 6LoWPAN Neighbor Discovery, a version of the IPv6 Neighbor...
In this paper, a performance evaluation of the Routing Protocol for Low power and Lossy Networks (RPL) in a typical outdoor Smart Grid Substation Network is presented. Detailed simulations are carried out to produce several routing performance metrics using real-life scenarios. The real outdoor network was reproduced in simulation with the help of topology and link quality data gathered from the network...
In this paper, a performance evaluation of the Routing Protocol for Low power and Lossy Networks (RPL) is presented. Detailed simulations are carried out to produce several routing performance metrics using a set of real-life scenarios. A real outdoor network was reproduced in simulation with the help of topology and link quality data. Behaviors of such a network in presence of RPL, their reason and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.