2019
DOI: 10.5539/mas.v13n12p1
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Node Metrics of RPL Protocol for IoT

Abstract: Internet of Things (IOT) system often consists of thousands of constrained connected devices. Resource-constrained devices one of critical issues in a low- power and lossy network LLNs. RPL is IPv6 routing protocol. It’s designed by IETF to be simple and inter-operable networking protocol to overcome these resource limitations. The RPL carries out Objective Functions (OFs) in the aim of finding the best path. The OFs chooses the best parent nodes aiming to build the route and optimize it. The metrics… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 34 publications
0
0
0
Order By: Relevance
“…The Intrusion Detection System (IDS) technology has initially been designed for conventional networks, and thus the existing methods of developing IDSs for IoT are unable to identify various types of intrusions for the following reasons. First, the recent IDSs protect against known as security threats, so they are beaten by the new types of malware used by cybercriminals as they can escape conventional systems [4,5]. For example, a high quantity of Distributed Denial-of-Service (DDoS) attacks uses methods that trick source IP addresses to conceal attacks; therefore, they become unnoticeable by conventional IDSs.…”
Section: Introductionmentioning
confidence: 99%
“…The Intrusion Detection System (IDS) technology has initially been designed for conventional networks, and thus the existing methods of developing IDSs for IoT are unable to identify various types of intrusions for the following reasons. First, the recent IDSs protect against known as security threats, so they are beaten by the new types of malware used by cybercriminals as they can escape conventional systems [4,5]. For example, a high quantity of Distributed Denial-of-Service (DDoS) attacks uses methods that trick source IP addresses to conceal attacks; therefore, they become unnoticeable by conventional IDSs.…”
Section: Introductionmentioning
confidence: 99%
“…Routing Protocol for Low Power and Lossy Networks (RPL), 6LowPAN-IPV6 over IEEE 802.15.4, and Constrained Application Protocol (COAP) are the routing protocols used in the IoT [5,6]; RPL is the most used [7][8][9]. The most important part of an RPL is the trickling timer algorithm, which is an IPV6 distance vector proactive routing protocol [10].…”
Section: Introductionmentioning
confidence: 99%