New RPL Protocol for IoT Applications

نویسندگان

چکیده

The Objective Function (OF) can be used by the Routing protocol for low power lossy networks (RPL) to construct a Destination Oriented Directed Acyclic Graph (DODAG) based on routing metrics. standard OFs suffer from long hops when selecting route, which may cause consume node's energy faster. In this paper, we suggest an improvement of RPL OF that considers three results show proposed increases network lifetime reducing consumption, increasing efficiency, Packet Delivery Ratio (PDR), and decreasing packet loss ratio. terms PDR, ratio, average best performance is shown in with 70 nodes transmission range 50m. Compared MRHOF, increased PDR 58.425%, decreased ratio 0.21765, total consumption 181.815mW. Expected Transmission Count (ETX) 60 40m. reduced ETX 49 compared MRHOF.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Trust Metric for RPL Routing Protocol

Establishing trust relationships between nodes participating in constructing the routing paths represents a primary security milestone to have reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new scheme for RPL (Routing Protocol for Low-power and Lossy Networks) named: Metric-based RPL Trustworthiness Scheme (MRTS) to enhance RPL security and deal w...

متن کامل

Low Power RPL for Internet of Things (IoT)

Internet of Things (IoT) has the potential to improve the way we interact with things. IoT envisions the idea of universal connectivity of everything which is defined as the global network of uniquely identifiable and addressable smart things posing the capability to interact and communicate with other smart things. Every smart object consists of a microprocessor, transceiver module, a sensor a...

متن کامل

Iot-1-pass-security: 1(one)-pass Authenticated Key Agreement Protocol for Energy Constraint Iot Applications

IoT data security is one of the core unresolved challenges in IoT community. Lack of resource-efficient authenticated secure key exchange methods among resourceconstrained IoT devices makes man-in-the-middle attacks a serious vulnerability. In this regard, we propose 1(One) pass Authenticated Key Agreement (AKA) protocol for IoT applications. This protocol requires only one round of communicati...

متن کامل

Protocol architectures for IoT domains

In this work we discuss proxy architectures which interconnect IoT domains running CoAP with the rest of Internet including micro datacenters and other domains building scalable hierarchical architectures. We assume that CoAP domain is terminated by an IoT proxy with cache, and we investigate several design issues with respect to successful data transmission, round trip delay and energy consump...

متن کامل

Improving the Performance of RPL Routing Protocol for Internet of Things

The emerging Internet of Things (IoT) connects the physical world to the digital one and composes large networks of smart devices to support various applications. In order to provide a suitable communication in such networks, a reliable routing protocol is needed. In this paper, a modified version of an IPv6 Routing Protocol for Low-Power and Lossy networks (RPL), which has been standardized by...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of communications software and systems

سال: 2022

ISSN: ['1845-6421', '1846-6079']

DOI: https://doi.org/10.24138/jcomss-2021-0094