Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (28)

Search Parameters:
Keywords = Low Power and Lossy Network (LLN)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 1140 KiB  
Article
Enhanced Beacons Dynamic Transmission over TSCH
by Erik Ortiz Guerra, Mario Martínez Morfa, Carlos Manuel García Algora, Hector Cruz-Enriquez, Kris Steenhaut and Samuel Montejo-Sánchez
Future Internet 2024, 16(6), 187; https://doi.org/10.3390/fi16060187 - 24 May 2024
Viewed by 1646
Abstract
Time slotted channel hopping (TSCH) has become the standard multichannel MAC protocol for low-power lossy networks. The procedure for associating nodes in a TSCH-based network is not included in the standard and has been defined in the minimal 6TiSCH configuration. Faster network formation [...] Read more.
Time slotted channel hopping (TSCH) has become the standard multichannel MAC protocol for low-power lossy networks. The procedure for associating nodes in a TSCH-based network is not included in the standard and has been defined in the minimal 6TiSCH configuration. Faster network formation ensures that data packet transmission can start sooner. This paper proposes a dynamic beacon transmission schedule over the TSCH mechanism that achieves a shorter network formation time than the default minimum 6TiSCH static schedule. A theoretical model is derived for the proposed mechanism to estimate the expected time for a node to get associated with the network. Simulation results obtained with different network topologies and channel conditions show that the proposed mechanism reduces the average association time and average power consumption during network formation compared to the default minimal 6TiSCH configuration. Full article
(This article belongs to the Special Issue Industrial Internet of Things (IIoT): Trends and Technologies)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Slotframe structure example with parameters: slotframe length 7 slots, <math display="inline"><semantics> <mrow> <mi>s</mi> <mi>l</mi> <mi>o</mi> <mi>t</mi> <mi>O</mi> <mi>f</mi> <mi>f</mi> <mi>s</mi> <mi>e</mi> <mi>t</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math> available channels.</p>
Full article ">Figure 2
<p>TSCH linear network association process.</p>
Full article ">Figure 3
<p>EBDT-TSCH with <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>β</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math> for 4 available network channels.</p>
Full article ">Figure 4
<p>Trade-off between <math display="inline"><semantics> <mi>α</mi> </semantics></math>, <math display="inline"><semantics> <mi>β</mi> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>E</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math> with <math display="inline"><semantics> <mrow> <mi>m</mi> <mo>=</mo> <mn>16</mn> </mrow> </semantics></math> available channels, <math display="inline"><semantics> <mrow> <mi>T</mi> <mi>e</mi> <mi>b</mi> <mo>=</mo> <mn>4</mn> <mi>s</mi> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>ρ</mi> <mo>=</mo> <mn>0.75</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Probability of getting associated at the intensive phase for different network available channels, represented by the symbol “x” in discrete values of <math display="inline"><semantics> <mi>β</mi> </semantics></math>.</p>
Full article ">Figure 6
<p>Pair synchronizer–join-seeker network scenario. Node 1 is the network coordinator and node 2 is a join-seeker. The green circle depicts the transmission range of node 1, while the grey circle depicts the interference range.</p>
Full article ">Figure 7
<p>EBDT-TSCH association time. Pair synchronizer–join-seeker scenario.</p>
Full article ">Figure 8
<p>Linear network scenario. The nodes are on a line and each node can only communicate with its adjacent nodes. Node 1 is the network coordinator and nodes 2–4 are join-seekers. The green circle depicts the transmission range of node 1, while the grey circle depicts the interference range.</p>
Full article ">Figure 9
<p>Association time in a linear network topology.</p>
Full article ">Figure 10
<p>Average energy consumption of the linear network scenario until all nodes get associated.</p>
Full article ">Figure 11
<p>Simulation scenario with ring topology. Node 1 is the network coordinator and nodes 2–11 are join-seekers. The green circle depicts the transmission range of node 1, while the grey circle depicts the interference range.</p>
Full article ">Figure 12
<p>Network formation time in a ring topology for different link quality values.</p>
Full article ">Figure 13
<p>Average energy consumption of the network in ring topology.</p>
Full article ">
22 pages, 4332 KiB  
Article
Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks
by Muhammad Ali Khan, Rao Naveed Bin Rais, Osman Khalid and Sanan Ahmad
Sensors 2024, 24(6), 1775; https://doi.org/10.3390/s24061775 - 9 Mar 2024
Viewed by 1484
Abstract
The Internet of Things (IoT) is empowering various sectors and aspects of daily life. Green IoT systems typically involve Low-Power and Lossy Networks (LLNs) with resource-constrained nodes. Lightweight routing protocols, such as the Routing Protocol for Low-Power and Lossy Networks (RPL), are increasingly [...] Read more.
The Internet of Things (IoT) is empowering various sectors and aspects of daily life. Green IoT systems typically involve Low-Power and Lossy Networks (LLNs) with resource-constrained nodes. Lightweight routing protocols, such as the Routing Protocol for Low-Power and Lossy Networks (RPL), are increasingly being applied for efficient communication in LLNs. However, RPL is susceptible to various attacks, such as the black hole attack, which compromises network security. The existing black hole attack detection methods in Green IoT rely on static thresholds and unreliable metrics to compute trust scores. This results in increasing false positive rates, especially in resource-constrained IoT environments. To overcome these limitations, we propose a delta-threshold-based trust model called the Optimized Reporting Module (ORM) to mitigate black hole attacks in Green IoT systems. The proposed scheme comprises both direct trust and indirect trust and utilizes a forgetting curve. Direct trust is derived from performance metrics, including honesty, dishonesty, energy, and unselfishness. Indirect trust requires the use of similarity. The forgetting curve provides a mechanism to consider the most significant and recent feedback from direct and indirect trust. To assess the efficacy of the proposed scheme, we compare it with the well-known trust-based attack detection scheme. Simulation results demonstrate that the proposed scheme has a higher detection rate and low false positive alarms compared to the existing scheme, confirming the applicability of the proposed scheme in green IoT systems. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>RPL-based IoT network with black hole attack. Malicious node 2 drops all received packets from nodes 5 and 6.</p>
Full article ">Figure 2
<p>Direct trust calculation: node A assesses node B’s trustworthiness.</p>
Full article ">Figure 3
<p>Indirect trust computation: nodes C and D contribute feedback about node B to node A.</p>
Full article ">Figure 4
<p>Comparative analysis of true positive recognition in ORM vs. TTD and RWC.</p>
Full article ">Figure 5
<p>Comparative analysis of false positives in ORM vs. TTD and RWC.</p>
Full article ">Figure 6
<p>Comparative analysis of false negatives in ORM vs. TTD.</p>
Full article ">Figure 7
<p>Comparative analysis of undetected positives in ORM vs. TTD.</p>
Full article ">Figure 8
<p>Comparative analysis of true negative evaluation in ORM vs. TTD.</p>
Full article ">Figure 9
<p>Comparative analysis of undetected negatives in ORM vs. TTD.</p>
Full article ">Figure 10
<p>Receiver operator curve—evaluating discrimination power in ORM vs. TTD.</p>
Full article ">
32 pages, 5248 KiB  
Review
A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach
by Hanin Almutairi and Ning Zhang
Network 2024, 4(1), 1-32; https://doi.org/10.3390/network4010001 - 15 Jan 2024
Cited by 2 | Viewed by 1834
Abstract
Low-Power and Lossy Networks (LLNs) have grown rapidly in recent years owing to the increased adoption of Internet of Things (IoT) and Machine-to-Machine (M2M) applications across various industries, including smart homes, industrial automation, healthcare, and smart cities. Owing to the characteristics of LLNs, [...] Read more.
Low-Power and Lossy Networks (LLNs) have grown rapidly in recent years owing to the increased adoption of Internet of Things (IoT) and Machine-to-Machine (M2M) applications across various industries, including smart homes, industrial automation, healthcare, and smart cities. Owing to the characteristics of LLNs, such as Lossy channels and limited power, generic routing solutions designed for non-LLNs may not be adequate in terms of delivery reliability and routing efficiency. Consequently, a routing protocol for LLNs (RPL) was designed. Several RPL objective functions have been proposed to enhance the routing reliability in LLNs. This paper analyses these solutions against performance and security requirements to identify their limitations. Firstly, it discusses the characteristics and security issues of LLN and their impact on packet delivery reliability and routing efficiency. Secondly, it provides a comprehensive analysis of routing solutions and identifies existing limitations. Thirdly, based on these limitations, this paper highlights the need for a reliable and efficient path-finding solution for LLNs. Full article
Show Figures

Figure 1

Figure 1
<p>A typical LLN.</p>
Full article ">Figure 2
<p>Packet dropping attacks in LLNs.</p>
Full article ">Figure 3
<p>Generic routing protocols.</p>
Full article ">Figure 4
<p>RPL instance comprising two DODAGs.</p>
Full article ">Figure 5
<p>RPL control packets and flow direction.</p>
Full article ">Figure 6
<p>RPL nodes rank.</p>
Full article ">Figure 7
<p>Fuzzy logic components.</p>
Full article ">
22 pages, 2186 KiB  
Article
Autonomous Scheduling for Reliable Transmissions in Industrial Wireless Sensor Networks
by Armaghan Darbandi and Myung-Kyun Kim
Energies 2023, 16(20), 7039; https://doi.org/10.3390/en16207039 - 11 Oct 2023
Cited by 1 | Viewed by 1038
Abstract
Deploying Internet of Things (IoT) on low-power lossy wireless sensor/actuator networks (LLN) in harsh industrial environments presents challenges such as dynamic link qualities due to noise, signal attenuations and spurious interferences. However, the critical demand for industrial applications is reliability of data delivery [...] Read more.
Deploying Internet of Things (IoT) on low-power lossy wireless sensor/actuator networks (LLN) in harsh industrial environments presents challenges such as dynamic link qualities due to noise, signal attenuations and spurious interferences. However, the critical demand for industrial applications is reliability of data delivery on low-cost low-power sensor/actuator devices. To address these issues, this paper proposes a fully autonomous scheduling approach, called Auto-Sched, which ensures reliability of data delivery for both downlink and uplink traffic scheduling and enhances network robustness against node/link failures. To ensure reliability, Auto-Sched assigns retransmission time slots based on the reliability constraints of the communication link. To avoid collision issues, Auto-Sched creates an upward pipeline-like communication schedule for uplink end-to-end data delivery, and a downward pipeline-like communication schedule for downlink scheduling. For enhancing network robustness, we propose a simple algorithm for real-time autonomous schedule reconstruction, when node or link failures occur, with minimal influence on communication overhead. Performance evaluations quantified the performance of our proposed approaches under a variety of scenarios comparing them with existing approaches. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) An example network graph with four sensor devices sending data to the gateway <span class="html-italic">G</span> and three actuator devices receiving controlling course of actions from <span class="html-italic">G</span>. The links <span class="html-italic">v</span><sub>1</sub><span class="html-italic">G</span> and <span class="html-italic">Gv</span><sub>5</sub> are reliable, while the rest of the links have <span class="html-italic">ETX</span>(<span class="html-italic">v<sub>i</sub></span>,<span class="html-italic">v<sub>j</sub></span>) = 2. (<b>b</b>) An example schedule in a TSCH slotframe consisting of <span class="html-italic">N<sub>S</sub><sup>Up</sup></span> and <span class="html-italic">N<sub>S</sub><sup>Dn</sup></span> time slots in uplink and downlink sections, respectively.</p>
Full article ">Figure 2
<p>Timeline of Auto-Sched<sup>U</sup> scheduling of node <span class="html-italic">v<sub>S</sub></span> and all intermediate nodes in its path toward the gateway, where <span class="html-italic">v<sub>p</sub></span> = <span class="html-italic">Pr</span>(<span class="html-italic">v<sub>S</sub></span>), <span class="html-italic">v<sub>q</sub></span> = <span class="html-italic">Pr</span>(<span class="html-italic">v<sub>p</sub></span>).</p>
Full article ">Figure 3
<p>Auto-Sched<sup>U</sup> schedule constructed for the uplink packets in <a href="#energies-16-07039-f001" class="html-fig">Figure 1</a>a.</p>
Full article ">Figure 4
<p>Timeline of Auto-Sched<sup>D</sup> scheduling at node <span class="html-italic">v<sub>D</sub></span> and all intermediate nodes in its path from the gateway.</p>
Full article ">Figure 5
<p>Auto-Sched<sup>D</sup> schedule constructed for the downlink packets in <a href="#energies-16-07039-f001" class="html-fig">Figure 1</a>a.</p>
Full article ">Figure 6
<p>Packet delivery ratio by varying packet generation intervals and number of nodes in the network. The packet generation interval is (<b>a</b>) 5 s, (<b>b</b>) 10 s and (<b>c</b>) 20 s.</p>
Full article ">Figure 7
<p>Average end-to-end delay of packets for network with 50 nodes, where packet generation interval is (<b>a</b>) 5 s, (<b>b</b>) 10 s and (<b>c</b>) 20 s.</p>
Full article ">Figure 8
<p>Distribution of average PDR and end-to-end delays in a network with 50 sensor nodes, where the packet generation interval is 20 s. (<b>a</b>) Distribution of average PDR. (<b>b</b>) Distribution of average end-to-end delays.</p>
Full article ">
28 pages, 5278 KiB  
Article
TB-RPL: A Try-the-Best Fused Mode of Operation to Enhance Point-to-Point Communication Performance in RPL
by Kaibin Zhang, Khadak Singh Bhandari and Gihwan Cho
Electronics 2023, 12(7), 1639; https://doi.org/10.3390/electronics12071639 - 30 Mar 2023
Cited by 1 | Viewed by 1658
Abstract
RPL is the IPv6 routing protocol for low-power and lossy networks in the Internet of Things which supports point-to-point (P2P) communication. However, the partition of two modes of operations (MOPs) in downward routing complicates achieving high performance. In the non-storing mode, a downward [...] Read more.
RPL is the IPv6 routing protocol for low-power and lossy networks in the Internet of Things which supports point-to-point (P2P) communication. However, the partition of two modes of operations (MOPs) in downward routing complicates achieving high performance. In the non-storing mode, a downward route with the longest path length is often picked. In the storing mode, the downward routes to some child nodes cannot be stored by their parent because of the limitation of memory space, which makes some nodes unreachable. In addition, there are extra performance costs of mixing or switching the two modes in the existing hybrid-MOPs works. Therefore, this article proposes TB-RPL to achieve an enhancement of RPL with a better performance of P2P communication. It allows all nodes to behave in a single and uniformly fused MOP that solves the problems mentioned above. The proposed mode uses a modified routing header format and introduces a threshold to the number of route entries. We implemented and compared TB-RPL with related mechanisms in Cooja simulator based on the Contiki-NG operating system. Simulation results verify that TB-RPL eliminates the three identified problems. Consequently, it significantly improves the performance of P2P communication in LLN. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

Figure 1
<p>A big picture of RPL and connections with outer space networks. The solid line in the RPL network refers to the inner-DODAG link, while the dashed line indicates the inter-DODAG link.</p>
Full article ">Figure 2
<p>An example of the DODAG formation process. LBR broadcasts the initial DIO message at first, then nodes B and C receive, update, and broadcast their own DIO messages. Node D repeats the process, then the related nodes choose their preferred parents.</p>
Full article ">Figure 3
<p>The three different routing schemes in RPL. (<b>a</b>) shows the upward routing. In fact, there is no upward routing table stored, every node just sends messages to its preferred parent directly. In (<b>a</b>), a virtual upward routing table is shown just in logic; while (<b>b</b>,<b>c</b>) describe the downward routing with the non-storing mode and storing mode, respectively. The pattern “#:DAO(E)” means that node E is the originator of that DAOs set, and the logical order of which in the DAOs set is #. In both downward routing cases, only node E’s DAOs sets are shown. Other nodes follow the same way to send and process their own DAOs set.</p>
Full article ">Figure 4
<p>The modified DAO message format used by TB-RPL. The red mark is the weak flag bit. The fields DODAGID and Parent Address are optional that are marked with *.</p>
Full article ">Figure 5
<p>The detailed downward routing schemes in RPL, while (<b>a</b>,<b>b</b>) describe the downward routing with the non-storing mode and the storing mode, respectively. The pattern “#:DAO(X,Y)” (X, Y are placeholders) indicates that the logical order in corresponding DAOs set is number #, while the originator of this downward routing is node X and the preferred parent of originator/current producer is node Y. Specifically, in the non-storing mode, node A generates a route table in the primitive form, where Parent is the preferred parent of Destination. When node A performs source routing, a source routing table will be logically produced as shown.</p>
Full article ">Figure 6
<p>An establishment of downward route between node G and F and corresponding DAOs sets in TB-RPL. The pattern “#:DAO(X,Y)” (X, Y are placeholders) indicates that the logical order in the corresponding DAOs set is number #, while the originator of this downward routing is node X and the preferred parent of originator/current producer is node Y. Specifically, the route tables above only show the related items in this P2P communication between node G and F, while other non-related route entries are not shown.</p>
Full article ">Figure 7
<p>The data flows in P2P communication based on the previous downward routes in <a href="#electronics-12-01639-f006" class="html-fig">Figure 6</a>, where node G and node F send packets to each other. (<b>a</b>) illustrates the data flow from node G to node F, while (<b>b</b>) shows the direction from node F to node G.</p>
Full article ">Figure 8
<p>The logic flow of a parent node to process input DAO messages. “nbr” refers to neighbor table.</p>
Full article ">Figure 9
<p>The example of grid deployment in simulation. Node 1 is the root located at the top left corner of the upper border.</p>
Full article ">Figure 10
<p>End-to-end path length of UDP messages on various network sizes.</p>
Full article ">Figure 11
<p>End-to-end delay of UDP messages on various network sizes.</p>
Full article ">Figure 12
<p>End-to-end PDR of UDP messages on various network sizes.</p>
Full article ">Figure 13
<p>End-to-end packet loss of UDP messages on various network sizes.</p>
Full article ">Figure 14
<p>End-to-end evaluation on four metrics with different route entries threshold <span class="html-italic">α</span>.</p>
Full article ">Figure 15
<p>End-to-end evaluation on four metrics with different transmission range.</p>
Full article ">Figure 16
<p>End-to-end evaluation on four metrics with different receive success ratio.</p>
Full article ">
14 pages, 2686 KiB  
Article
Clustering Based Optimal Cluster Head Selection Using Bio-Inspired Neural Network in Energy Optimization of 6LowPAN
by Mudassir Khan, A. Ilavendhan, C. Nelson Kennedy Babu, Vishal Jain, S. B. Goyal, Chaman Verma, Calin Ovidiu Safirescu and Traian Candin Mihaltan
Energies 2022, 15(13), 4528; https://doi.org/10.3390/en15134528 - 21 Jun 2022
Cited by 1 | Viewed by 2451
Abstract
The goal of today’s technological era is to make every item smart. Internet of Things (IoT) is a model shift that gives a whole new dimension to the common items and things. Wireless sensor networks, particularly Low-Power and Lossy Networks (LLNs), are essential [...] Read more.
The goal of today’s technological era is to make every item smart. Internet of Things (IoT) is a model shift that gives a whole new dimension to the common items and things. Wireless sensor networks, particularly Low-Power and Lossy Networks (LLNs), are essential components of IoT that has a significant influence on daily living. Routing Protocol for Low Power and Lossy Networks (RPL) has become the standard protocol for IoT and LLNs. It is not only used widely but also researched by various groups of people. The extensive use of RPL and its customization has led to demanding research and improvements. There are certain issues in the current RPL mechanism, such as an energy hole, which is a huge issue in the context of IoT. By the initiation of Grid formation across the sensor nodes, which can simplify the cluster formation, the Cluster Head (CH) selection is accomplished using fish swarm optimization (FSO). The performance of the Graph-Grid-based Convolution clustered neural network with fish swarm optimization (GG-Conv_Clus-FSO) in energy optimization of the network is compared with existing state-of-the-art protocols, and GG-Conv_Clus-FSO outperforms the existing approaches, whereby the packet delivery ratio (PDR) is enhanced by 95.14%. Full article
(This article belongs to the Special Issue Energy Efficiency in Wireless Networks)
Show Figures

Figure 1

Figure 1
<p>Flow chart of FSO based CH selection.</p>
Full article ">Figure 2
<p>Comparison of energy consumption.</p>
Full article ">Figure 3
<p>Comparison of end-to-end delay.</p>
Full article ">Figure 4
<p>Comparison of the packet delivery ratio.</p>
Full article ">Figure 5
<p>Comparison of packet loss.</p>
Full article ">Figure 6
<p>Comparison of throughput.</p>
Full article ">
44 pages, 8626 KiB  
Review
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
by Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Iznan H. Hasbullah and Ziyad R. Alashhab
Sensors 2022, 22(9), 3400; https://doi.org/10.3390/s22093400 - 29 Apr 2022
Cited by 51 | Viewed by 5638
Abstract
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it [...] Read more.
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore® digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions. Full article
Show Figures

Figure 1

Figure 1
<p>Taxonomy of RPL attacks.</p>
Full article ">Figure 2
<p>Flowchart of the SLR methodology stages.</p>
Full article ">Figure 3
<p>Taxonomy of existing research literature in RPL.</p>
Full article ">Figure 4
<p>The steps and tools for conducting the SLR study.</p>
Full article ">Figure 5
<p>Distribution of selected studies according to (<b>a</b>) Year of Publication, (<b>b</b>) Digital Libraries.</p>
Full article ">Figure 6
<p>Distribution of selected studies according to (<b>a</b>) Publication Per Type, (<b>b</b>) Publication Per Topic.</p>
Full article ">Figure 7
<p>Distribution of studies according to country of origin.</p>
Full article ">Figure 8
<p>Distribution of the attacks in the existing studies.</p>
Full article ">Figure 9
<p>Distribution percentages of the used tools and network simulators in the existing studies.</p>
Full article ">Figure 10
<p>Distribution of the used metrics and parameters in the existing studies.</p>
Full article ">Figure 11
<p>Occurrence of the datasets in the existing studies.</p>
Full article ">Figure 12
<p>Issues and challenges.</p>
Full article ">
22 pages, 5150 KiB  
Article
3D Void Handling Geographic P2P-RPL for Indoor Multi-Hop IR-UWB Networks
by Dongwon Kim, Jiwon Jung and Younggoo Kwon
Electronics 2022, 11(4), 625; https://doi.org/10.3390/electronics11040625 - 17 Feb 2022
Viewed by 1235
Abstract
IETF has standardized the point-to-point RPL (P2P-RPL) to ensure reliable and optimal P2P route discovery for low-power and lossy networks (LLNs). P2P-RPL propagates route discovery packets to all nodes in the network, which results in high routing communication overheads. Recently, other RPL-based P2P [...] Read more.
IETF has standardized the point-to-point RPL (P2P-RPL) to ensure reliable and optimal P2P route discovery for low-power and lossy networks (LLNs). P2P-RPL propagates route discovery packets to all nodes in the network, which results in high routing communication overheads. Recently, other RPL-based P2P routing algorithms have been proposed to reduce such overheads, but still, quite an amount of overheads occur due to their flooding-based approach. In real life 3D environments, a larger number of nodes should be deployed to guarantee the full network connectivity, and thus the flooding strategy incurs higher overheads. In effort to alleviate high overheads, geographic routing is an attractive solution that exploits the nodes’ geographic locations in its next-hop routing selection. However, geographic routing inherently suffers from the local minimum (void) problem following greedy next-hop selection. Local minima occur more often in 3D space, and therefore, a reliable 3D void handling technique is required. In this paper, we propose greedy forwarding and void handling point-to-point RPL with adaptive trickle timer (GVA-P2P-RPL), which is a novel RPL-based P2P routing protocol that quickly discovers energy-efficient and reliable P2P routes in 3D networks. In GVA-P2P-RPL, P2P-RPL is modified to greedily forward routing packets when it is possible. IR-UWB-based 3D multi-hop self-positioning is conducted in advance to obtain the geographical location of each node. When local minima are encountered, routing packets are temporarily broadcast just like in the traditional P2P-RPL. A new trickle algorithm called adaptive trickle timer (ATT) is also presented to reduce route discovery time and provide better collision avoidance effects. The performance of GVA-P2P-RPL is compared with that of P2P-RPL, partial flooding-based P2P-RPL (PF-P2P-RPL) and ER-RPL. It shows significant improvements in route discovery overheads and route discovery time against these state-of-the-art RPL-based P2P routing methods in 3D environments. Performance evaluation in the special network case where a huge 3D void volume exists in the center is also presented to show the strong void recovery capability of the proposed GVA-P2P-RPL in 3D environments. Full article
(This article belongs to the Special Issue IoT Sensor Network Application)
Show Figures

Figure 1

Figure 1
<p>Routing strategies of P2P-RPL, PF-P2P-RPL and GVA-P2P-RPL. In (<b>a</b>), P2P-RPL floods P2P-DIO messages throughout the whole network. In (<b>b</b>), PF-P2P-RPL floods P2P-DIO messages only to the nodes in the restricted flooding zone, which is determined by the source and destination’s locations. In (<b>c</b>), GVA-P2P-RPL selects the closest neighbor node to the destination and forwards the P2P-DIO message to that neighbor node.</p>
Full article ">Figure 2
<p>IR-UWB-based 3D multi-hop self-positioning with bounding-box and mobile tracking scheme.</p>
Full article ">Figure 3
<p>3D bounding-box determination process. Node <span class="html-italic">B</span> initializes its B-box state vector <math display="inline"><semantics> <msub> <mi mathvariant="bold">b</mi> <mi>B</mi> </msub> </semantics></math> after exchanging ranging message with node <span class="html-italic">A</span>. Node <span class="html-italic">C</span> initializes its B-box state vector <math display="inline"><semantics> <msub> <mi mathvariant="bold">b</mi> <mi>C</mi> </msub> </semantics></math> after exchanging ranging message with node <span class="html-italic">D</span>. Finally, <math display="inline"><semantics> <msub> <mi mathvariant="bold">b</mi> <mi>C</mi> </msub> </semantics></math> is updated after exchanging ranging message with <span class="html-italic">B</span> and is depicted as the bold dashed lines.</p>
Full article ">Figure 4
<p>Void problem in 3D. As the dimension expands from 2D to 3D, internode connectivity weakens and the void problem appears more often.</p>
Full article ">Figure 5
<p>GVA-P2P-RPL. (<b>a</b>) The network node connectivity, where the gray nodes are void nodes that have no neighbor node closer to the destination than themselves. From (<b>b</b>–<b>g</b>), P2P-DIO messages are greedily forwarded when possible and locally broadcast when void nodes are encountered. The solid arrows are greedily forwarded P2P-DIO messages, and solid dashed arrows are locally broadcast P2P-DIO messages. (<b>e</b>) The final P2P route chosen by the destination as the solid arrows.</p>
Full article ">Figure 6
<p>Example of P2P route discovery case for explanation of adaptive trickle timer operation. (<b>a</b>) The network node deployment and node connectivity. Nodes <span class="html-italic">s</span> and <span class="html-italic">d</span> are the source and destination, respectively. The solid arrows in (<b>b</b>) construct the route first discovered by both P2P-RPL and GVA-P2P-RPL.</p>
Full article ">Figure 7
<p>Standard trickle timer in 3D P2P-RPL.</p>
Full article ">Figure 8
<p>Standard trickle timer in 3D GVA-P2P-RPL.</p>
Full article ">Figure 9
<p>Adaptive trickle timer in 3D GVA-P2P-RPL.</p>
Full article ">Figure 10
<p>Example of P2P route discovery case for explanation of adaptive listen-only periods operation in adaptive trickle timer. (<b>a</b>) The network node deployment and node connectivity. Nodes <span class="html-italic">s</span> and <span class="html-italic">d</span> are the source and destination, respectively. Nodes <span class="html-italic">s</span>, <math display="inline"><semantics> <msub> <mi>n</mi> <mn>4</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>n</mi> <mn>5</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>n</mi> <mn>7</mn> </msub> </semantics></math> are void nodes. (<b>b</b>) P2P-DIO messages are greedily forwarded through the solid arrows and flooded through the dashed arrows.</p>
Full article ">Figure 11
<p>Adaptive listen-only periods for adaptive trickle timer in 3D GVA-P2P-RPL.</p>
Full article ">Figure 12
<p>IEEE802.15.4 UWB PHY protocol data unit (PPDU) structure and transmission timing model. The transmission time of PPDU <math display="inline"><semantics> <msub> <mi>T</mi> <mrow> <mi>P</mi> <mi>P</mi> <mi>D</mi> <mi>U</mi> </mrow> </msub> </semantics></math> is the sum of <math display="inline"><semantics> <msub> <mi>T</mi> <mrow> <mi>S</mi> <mi>H</mi> <mi>R</mi> </mrow> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>T</mi> <mrow> <mi>P</mi> <mi>H</mi> <mi>R</mi> </mrow> </msub> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>P</mi> <mi>S</mi> <mi>D</mi> <mi>U</mi> </mrow> </msub> <mrow> <mo>(</mo> <msub> <mi>n</mi> <mrow> <mi>P</mi> <mi>S</mi> <mi>D</mi> <mi>U</mi> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math>. <math display="inline"><semantics> <msub> <mi>n</mi> <mrow> <mi>P</mi> <mi>S</mi> <mi>D</mi> <mi>U</mi> </mrow> </msub> </semantics></math> is the number of bytes in the PSDU. The transmission time of PSDU <math display="inline"><semantics> <mrow> <msub> <mi>T</mi> <mrow> <mi>P</mi> <mi>S</mi> <mi>D</mi> <mi>U</mi> </mrow> </msub> <mrow> <mo>(</mo> <msub> <mi>n</mi> <mrow> <mi>P</mi> <mi>S</mi> <mi>D</mi> <mi>U</mi> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math> is a function of <math display="inline"><semantics> <msub> <mi>n</mi> <mrow> <mi>P</mi> <mi>S</mi> <mi>D</mi> <mi>U</mi> </mrow> </msub> </semantics></math> where the Reed–Solomon encoding adds 48 bits to every block of 330 bits or less as shown.</p>
Full article ">Figure 13
<p>Positioning error (cm).</p>
Full article ">Figure 14
<p>75 m × 75 m × 75 m 125 nodes grid deployment.</p>
Full article ">Figure 15
<p>Route discovery success ratio.</p>
Full article ">Figure 16
<p>Number of DIOs sent and number of DIOs received.</p>
Full article ">Figure 17
<p>Energy consumption (mJ) and hop count.</p>
Full article ">Figure 18
<p>Route discovery time (ms).</p>
Full article ">Figure 19
<p>75 m × 75 m × 75 m 98 nodes grid deployment with void.</p>
Full article ">Figure 20
<p>Route discovery success ratio.</p>
Full article ">Figure 21
<p>Number of DIOs sent and number of DIOs received.</p>
Full article ">Figure 22
<p>Energy consumption (mJ) and hop count.</p>
Full article ">Figure 23
<p>Route discovery time (ms).</p>
Full article ">
29 pages, 582 KiB  
Review
Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions
by Zawar Shah, Andrew Levula, Khawar Khurshid, Jawad Ahmed, Imdad Ullah and Sushmita Singh
Electronics 2021, 10(19), 2320; https://doi.org/10.3390/electronics10192320 - 22 Sep 2021
Cited by 30 | Viewed by 8234
Abstract
The Internet of Things (IoT) is aimed to provide efficient and seamless connectivity to a large number of low-power and low-cost embedded devices, consequently, the routing protocols play a fundamental role in achieving these goals. The IETF has recently standardized the IPv6 Routing [...] Read more.
The Internet of Things (IoT) is aimed to provide efficient and seamless connectivity to a large number of low-power and low-cost embedded devices, consequently, the routing protocols play a fundamental role in achieving these goals. The IETF has recently standardized the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) for LLNs (i.e., Low-power and Lossy Networks) and is well-accepted among the Internet community. However, RPL was proposed for static IoT devices and suffers from many issues when IoT devices are mobile. In this paper, we first present various issues that are faced by the RPL when IoT devices are mobile. We then carry out a detailed survey of various solutions that are proposed in the current literature to mitigate the issues faced by RPL. We classify various solutions into five categories i.e., ‘Trickle-timer based solutions’, ‘ETX based solutions’, ‘RSSI based solutions’, ‘Position-based solutions’, and ‘Miscellaneous solutions’. For each category of these solutions, we illustrate their working principles, issues addressed and make a thorough assessment of their strengths and weaknesses. In addition, we found several flaws in the performance analysis done by the authors of each of the solutions, e.g., nodes mobility, time intervals, etc., and suggest further investigations for the performance evaluations of these solutions in order to assess their applicability in real-world environments. Moreover, we provide future research directions for RPL supporting various real-time applications, mobility support, energy-aware, and privacy-aware routing. Full article
(This article belongs to the Special Issue Network Protocols for Wireless Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Low Power and Lossy IoT Network.</p>
Full article ">Figure 2
<p>DODAG Construction process [<a href="#B40-electronics-10-02320" class="html-bibr">40</a>].</p>
Full article ">Figure 3
<p>Classification of Solutions.</p>
Full article ">
18 pages, 3852 KiB  
Article
Compression-Aware Aggregation and Energy-Aware Routing in IoT–Fog-Enabled Forest Environment
by Srividhya Swaminathan, Suresh Sankaranarayanan, Sergei Kozlov and Joel J. P. C. Rodrigues
Sensors 2021, 21(13), 4591; https://doi.org/10.3390/s21134591 - 4 Jul 2021
Cited by 5 | Viewed by 2704
Abstract
Forest fire monitoring is very much needed for protecting the forest from any kind of disaster or anomaly leading to the destruction of the forest. Now, with the advent of Internet of Things (IoT), a good amount of research has been done on [...] Read more.
Forest fire monitoring is very much needed for protecting the forest from any kind of disaster or anomaly leading to the destruction of the forest. Now, with the advent of Internet of Things (IoT), a good amount of research has been done on energy consumption, coverage, and other issues. These works did not focus on forest fire management. The IoT-enabled environment is made up of low power lossy networks (LLNs). For improving the performance of routing protocol in forest fire management, energy-efficient routing protocol for low power lossy networks (E-RPL) was developed where residual power was used as an objective function towards calculating the rank of the parent node to form the destination-oriented directed acyclic graph (DODAG). The challenge in E-RPL is the scalability of the network resulting in a long end-to-end delay and less packet delivery. Additionally, the energy of sensor nodes increased with different transmission range. So, for obviating the above-mentioned drawbacks in E-RPL, compressed data aggregation and energy-based RPL routing (CAA-ERPL) is proposed. The CAA-ERPL is compared with E-RPL, and the performance is analyzed resulting in reduced packet transfer delay, less energy consumption, and increased packet delivery ratio for 10, 20, 30, 40, and 50 nodes. This has been evaluated using a Contiki Cooja simulator. Full article
(This article belongs to the Collection Sensors in Agriculture and Forestry)
Show Figures

Figure 1

Figure 1
<p>Network Model.</p>
Full article ">Figure 2
<p>DODAG formation process.</p>
Full article ">Figure 3
<p>Parent selection based on ETX and energy.</p>
Full article ">Figure 4
<p>Total power consumption vs. scalability of nodes.</p>
Full article ">Figure 5
<p>Average hop count vs. network size.</p>
Full article ">Figure 6
<p>Overhead vs. number of nodes.</p>
Full article ">Figure 7
<p>PDR vs. scalability.</p>
Full article ">Figure 8
<p>Average number of parent changes vs. data rate.</p>
Full article ">Figure 9
<p>Average end-to-end delay vs. average hop count.</p>
Full article ">Figure 10
<p>CPU utilization vs. scalability of the network.</p>
Full article ">
23 pages, 1056 KiB  
Article
Collision Avoidance Geographic P2P-RPL in Multi-Hop Indoor Wireless Networks
by Yunyoung Choi, Jaehyung Park, Jiwon Jung and Younggoo Kwon
Electronics 2021, 10(12), 1484; https://doi.org/10.3390/electronics10121484 - 20 Jun 2021
Cited by 2 | Viewed by 1834
Abstract
In home and building automation applications, wireless sensor devices need to be connected via unreliable wireless links within a few hundred milliseconds. Routing protocols in Low-power and Lossy Networks (LLNs) need to support reliable data transmission with an energy-efficient manner and short routing [...] Read more.
In home and building automation applications, wireless sensor devices need to be connected via unreliable wireless links within a few hundred milliseconds. Routing protocols in Low-power and Lossy Networks (LLNs) need to support reliable data transmission with an energy-efficient manner and short routing convergence time. IETF standardized the Point-to-Point RPL (P2P-RPL) routing protocol, in which P2P-RPL propagates the route discovery messages over the whole network. This leads to significant routing control packet overhead and a large amount of energy consumption. P2P-RPL uses the trickle algorithm to control the transmission rate of routing control packets. The non-deterministic message suppression nature of the trickle algorithm may generate a sub-optimal routing path. The listen-only period of the trickle algorithm may lead to a long network convergence time. In this paper, we propose Collision Avoidance Geographic P2P-RPL, which achieves energy-efficient P2P data delivery with a fast routing request procedure. The proposed algorithm uses the location information to limit the network search space for the desired route discovery to a smaller location-constrained forwarding zone. The Collision Avoidance Geographic P2P-RPL also dynamically selects the listen-only period of the trickle timer algorithm based on the transmission priority related to geographic position information. The location information of each node is obtained from the Impulse-Response Ultra-WideBand (IR-UWB)-based cooperative multi-hop self localization algorithm. We implement Collision Avoidance Geographic P2P-RPL on Contiki OS, an open-source operating system for LLNs and the Internet of Things. The performance results show that the Collision Avoidance Geographic P2P-RPL reduced the routing control packet overheads, energy consumption, and network convergence time significantly. The cooperative multi-hop self localization algorithm improved the practical implementation characteristics of the P2P-RPL protocol in real world environments. The collision avoidance algorithm using the dynamic trickle timer increased the operation efficiency of the P2P-RPL under various wireless channel conditions with a location-constrained routing space. Full article
(This article belongs to the Special Issue IoT Sensor Network Application)
Show Figures

Figure 1

Figure 1
<p>Impulse-Response Ultra-WideBand (IR-UWB)-based cooperative multi-hop self-localization system.</p>
Full article ">Figure 2
<p>The flowchart of the proposed algorithm.</p>
Full article ">Figure 3
<p>The process of (<b>a</b>) Determining the location-constrained forwarding zone and (<b>b</b>) location-aided P2P route discovery.</p>
Full article ">Figure 4
<p>Example of a Collision Avoidance Elastic Trickle operation, <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Trickle operations of (<b>a</b>) Collision Avoidance Geographic P2P-RPL, (<b>b</b>) P2P route discovery with only the location-constrained forwarding zone and (<b>c</b>) P2P-RPL, <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>1</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>The software architectureof Collision Avoidance Geographic P2P-RPL on Contiki OS.</p>
Full article ">Figure 7
<p>The CDF comparison at the average node degree of 12.</p>
Full article ">Figure 8
<p>Average control packet overhead versus average node degree.</p>
Full article ">Figure 9
<p>The average energy consumption versus the average node degree.</p>
Full article ">Figure 10
<p>The average hop count versus the average node degree.</p>
Full article ">Figure 11
<p>The packet delivery ratio versus the average node degree.</p>
Full article ">Figure 12
<p>The route discovery success ratio versus the average node degree.</p>
Full article ">Figure 13
<p>The network convergence time versus the number of active source-destination pairs.</p>
Full article ">Figure 14
<p>The control packet overhead versus the number of active source-destination pairs.</p>
Full article ">
16 pages, 508 KiB  
Article
On-Demand Scheduling of Command and Responses for Low-Power Multihop Wireless Networks
by Mingyu Park and Jeongyeup Paek
Sensors 2021, 21(3), 738; https://doi.org/10.3390/s21030738 - 22 Jan 2021
Cited by 6 | Viewed by 2070
Abstract
Many IoT applications require a mechanism to disseminate commands and collect responses over a wireless network in order to control and collect data from multiple embedded devices. However, severe collisions may occur if a large number of nodes attempt to respond simultaneously and [...] Read more.
Many IoT applications require a mechanism to disseminate commands and collect responses over a wireless network in order to control and collect data from multiple embedded devices. However, severe collisions may occur if a large number of nodes attempt to respond simultaneously and promptly, not only among the responses, but also with the dissemination of commands. This is because low-power wireless network protocols for dissemination and collection have been designed separately. Tuning the parameters of one side of the protocol has clear trade-off between reliability and latency. To address this challenge, we propose SCoRe, an on-demand scheme for joint scheduling of command and responses on multihop low-power wireless networks to improve both reliability and latency simultaneously at runtime. SCoRe gathers the amount of time required by network nodes for dissemination and collection, and allocates relative timeslots to each node recursively over multihop on-demand when (and only when) disseminating a command. While doing so, information exchange occurs only between local neighbor nodes without a need for global routing table nor time synchronization. We implement SCoRe on a low-power embedded platform, and compare with well-known dissemination and collection schemes through both simulations and testbed experiments on 30 devices. Our evaluation results show that SCoRe can improve both latency and reliability without tuning the parameters for one metric, while the legacy schemes require careful parameter selection to match only one side of SCoRe, never both. Full article
(This article belongs to the Special Issue Intelligent Wireless Technologies for Future Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Grid topology for the preliminary simulation and the result.</p>
Full article ">Figure 2
<p>SCoRe’s scheduling process overview.</p>
Full article ">Figure 3
<p>Slot violation scenario.</p>
Full article ">Figure 4
<p>An example of parallel transmission scenario.</p>
Full article ">Figure 5
<p>Response and dissemination time update.</p>
Full article ">Figure 6
<p>A 3D plots representing Packet Reception Ratio with varying parameters.</p>
Full article ">Figure 7
<p>Three-simulation topology with change of root’s position: top-left, top, and middle.</p>
Full article ">Figure 8
<p>Simulation results when the root is placed at the top-left corner of the grid topology with <span class="html-italic">M</span> = 3, <span class="html-italic">T<sub>C</sub></span> = 200 ms, <span class="html-italic">K</span> = 5 and varying <span class="html-italic">T<sub>R</sub></span>.</p>
Full article ">Figure 9
<p>Simulation results when the root is placed in the middle of the grid topology with <span class="html-italic">M</span> = 3, <span class="html-italic">T<sub>C</sub></span> = 200 ms, <span class="html-italic">K</span> = 5, and varying <span class="html-italic">T<sub>R</sub></span>.</p>
Full article ">Figure 10
<p>Simulation results from random topologies with <span class="html-italic">M</span> = 3, <span class="html-italic">T<sub>C</sub></span> = 200 ms, <span class="html-italic">K</span> = 5, and varying <span class="html-italic">T<sub>R</sub></span>.</p>
Full article ">Figure 11
<p>Results from the testbed experiments with <span class="html-italic">M</span> = 3, <span class="html-italic">T<sub>C</sub></span> = 200 ms, <span class="html-italic">K</span> = 5, and varying <span class="html-italic">T<sub>R</sub></span>.</p>
Full article ">
26 pages, 23395 KiB  
Article
An Efficient Deep-Learning-Based Detection and Classification System for Cyber-Attacks in IoT Communication Networks
by Qasem Abu Al-Haija and Saleh Zein-Sabatto
Electronics 2020, 9(12), 2152; https://doi.org/10.3390/electronics9122152 - 15 Dec 2020
Cited by 105 | Viewed by 9244
Abstract
With the rapid expansion of intelligent resource-constrained devices and high-speed communication technologies, the Internet of Things (IoT) has earned wide recognition as the primary standard for low-power lossy networks (LLNs). Nevertheless, IoT infrastructures are vulnerable to cyber-attacks due to the constraints in computation, [...] Read more.
With the rapid expansion of intelligent resource-constrained devices and high-speed communication technologies, the Internet of Things (IoT) has earned wide recognition as the primary standard for low-power lossy networks (LLNs). Nevertheless, IoT infrastructures are vulnerable to cyber-attacks due to the constraints in computation, storage, and communication capacity of the endpoint devices. From one side, the majority of newly developed cyber-attacks are formed by slightly mutating formerly established cyber-attacks to produce a new attack that tends to be treated as normal traffic through the IoT network. From the other side, the influence of coupling the deep learning techniques with the cybersecurity field has become a recent inclination of many security applications due to their impressive performance. In this paper, we provide the comprehensive development of a new intelligent and autonomous deep-learning-based detection and classification system for cyber-attacks in IoT communication networks that leverage the power of convolutional neural networks, abbreviated as IoT-IDCS-CNN (IoT based Intrusion Detection and Classification System using Convolutional Neural Network). The proposed IoT-IDCS-CNN makes use of high-performance computing that employs the robust Compute Unified Device Architectures (CUDA) based Nvidia GPUs (Graphical Processing Units) and parallel processing that employs high-speed I9-core-based Intel CPUs. In particular, the proposed system is composed of three subsystems: a feature engineering subsystem, a feature learning subsystem, and a traffic classification subsystem. All subsystems were developed, verified, integrated, and validated in this research. To evaluate the developed system, we employed the Network Security Laboratory-Knowledge Discovery Databases (NSL-KDD) dataset, which includes all the key attacks in IoT computing. The simulation results demonstrated a greater than 99.3% and 98.2% cyber-attack classification accuracy for the binary-class classifier (normal vs. anomaly) and the multiclass classifier (five categories), respectively. The proposed system was validated using a K-fold cross-validation method and was evaluated using the confusion matrix parameters (i.e., true negative (TN), true positive (TP), false negative (FN), false positive (FP)), along with other classification performance metrics, including precision, recall, F1-score, and false alarm rate. The test and evaluation results of the IoT-IDCS-CNN system outperformed many recent machine-learning-based IDCS systems in the same area of study. Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Internet of things (IoT) layered architecture considering the three-layer scheme of the IoT.</p>
Full article ">Figure 2
<p>Sample records of the NSL-KDD training dataset.</p>
Full article ">Figure 3
<p>The three main subsystems comprising the proposed system. FE: feature engineering, FL: feature learning, DC: detection and classification.</p>
Full article ">Figure 4
<p>Imported NSL-KDD dataset: samples from the training dataset.</p>
Full article ">Figure 5
<p>Imported NSL-KDD dataset: samples from the training dataset.</p>
Full article ">Figure 6
<p>Encoded dataset with labeling: sample from the training set. FTP: file transfer protocol, HTTP: hypertext transfer protocol.</p>
Full article ">Figure 7
<p>Encoded dataset with labeling: sample from the training set.</p>
Full article ">Figure 8
<p>Illustration of the min-max normalization’s impact on the data with different scales.</p>
Full article ">Figure 9
<p>Illustration of the re-shaping operation of the dataset samples: the 1D vector was reshaped into a 2D matrix.</p>
Full article ">Figure 10
<p>Implementation of convolution layer of our convolutional neural network (CNN).</p>
Full article ">Figure 11
<p>Implementation of ReLU activation layer of our CNN.</p>
Full article ">Figure 12
<p>Implementation of pooling layer of our CNN.</p>
Full article ">Figure 13
<p>Implementation of the flattening layer (FTL) of our CNN.</p>
Full article ">Figure 14
<p>Implementation of the flattened layer of our CNN.</p>
Full article ">Figure 15
<p>Implementation of the output layer using softmax in our CNN.</p>
Full article ">Figure 16
<p>Top-view architecture of the proposed IoT-IDCS-CNN.</p>
Full article ">Figure 17
<p>Comprehensive view of the computation process of the IoT-IDCS-CNN.</p>
Full article ">Figure 18
<p>Testing detection/classification accuracy/error rate vs. the number of epochs.</p>
Full article ">Figure 19
<p>Run time performance of the IoT traffic classification over 500 simulation runs.</p>
Full article ">Figure 20
<p>Confusion matrix analysis for both classification models: (<b>left</b>) two-class and (<b>right</b>) five-class.</p>
Full article ">Figure 21
<p>Scheme for the five-fold cross-validation of the proposed system.</p>
Full article ">
16 pages, 2672 KiB  
Article
Energy Consumption Evaluation of a Routing Protocol for Low-Power and Lossy Networks in Mesh Scenarios for Precision Agriculture
by Frederico O. Sales, Yelco Marante, Alex B. Vieira and Edelberto Franco Silva
Sensors 2020, 20(14), 3814; https://doi.org/10.3390/s20143814 - 8 Jul 2020
Cited by 14 | Viewed by 2790
Abstract
Sensor nodes are small, low-cost electronic devices that can self-organize into low-power networks and are susceptible to data packet loss, having computational and energy limitations. These devices expand the possibilities in many areas, like agriculture and urban spaces. In this work, we consider [...] Read more.
Sensor nodes are small, low-cost electronic devices that can self-organize into low-power networks and are susceptible to data packet loss, having computational and energy limitations. These devices expand the possibilities in many areas, like agriculture and urban spaces. In this work, we consider an IoT environment for monitoring a coffee plantation in precision agriculture. We investigate the energy consumption under low-power and lossy networks considering three different network topologies and an Internet Engineering Task Force (IETF) standardized Low-power and Lossy Network (LLN) routing protocol, the Routing Protocol for LLNs (RPL). For RPL, each secondary node selects a better parent according to some Objective Functions (OFs). We conducted simulations using Contiki Cooja 3.0, where we considered the Expected Transmission Count (ETX) and hop-count metric (HOP) metrics to evaluate energy consumption for three distinct topologies: tree, circular, and grid. The simulation results show that the circular topology had the best (lowest) energy consumption, being 15% better than the grid topology and 30% against the tree topology. The results help the need to improve the evolution of RPL metrics and motivate the network management of the topology. Full article
(This article belongs to the Special Issue Low-Power Sensors and Systems for IoT)
Show Figures

Figure 1

Figure 1
<p>A real monitoring scenario for a coffee plantation with three different topologies, which are tree, circular, and grid topologies.</p>
Full article ">Figure 2
<p>Scenario 1, 10 nodes, tree topology: (<b>left</b>) 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 3
<p>Scenario 2, 20 nodes, tree topology: (<b>left)</b> 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 4
<p>Scenario 3, 30 nodes, tree topology: (<b>left</b>) 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 5
<p>Scenario 1, 10 nodes: energy consumption versus disconnected nodes from the tree topology.</p>
Full article ">Figure 6
<p>Scenario 2, 20 nodes: energy consumption versus disconnected nodes from the tree topology.</p>
Full article ">Figure 7
<p>Scenario 3, 30 nodes: energy consumption versus disconnected nodes from the tree topology.</p>
Full article ">Figure 8
<p>Scenario 4, 10 nodes, circular topology: (<b>left</b>) 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 9
<p>Scenario 5, 20 nodes, circular topology: (<b>left</b>) 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 10
<p>Scenario 6, 30 nodes, circular topology: (<b>left</b>) 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 11
<p>Scenario 4, 10 nodes: energy consumption versus disconnected nodes from the circular topology.</p>
Full article ">Figure 12
<p>Scenario 5, 20 nodes, energy consumption versus disconnected nodes from the circular topology.</p>
Full article ">Figure 13
<p>Scenario 6, 30 nodes: energy consumption versus disconnected nodes from the circular topology.</p>
Full article ">Figure 14
<p>Scenario 7, 10 nodes: grid topology: (<b>left</b>) 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 15
<p>Scenario 8, 20 nodes, grid topology: (<b>left)</b> 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 16
<p>Scenario 9, 30 nodes, grid topology (<b>left</b>) 50/100 m, (<b>right</b>) 70/90 m.</p>
Full article ">Figure 17
<p>Scenario 7, 10 nodes: energy consumption versus disconnected nodes from the grid topology.</p>
Full article ">Figure 18
<p>Scenario 8, 20 nodes: energy consumption versus disconnected nodes from the grid topology.</p>
Full article ">Figure 19
<p>Scenario 8, 30 nodes: energy consumption versus disconnected nodes from the grid topology.</p>
Full article ">Figure 20
<p>Energy consumption from the three topologies with the HOP metric.</p>
Full article ">
23 pages, 726 KiB  
Article
DYNASTI—Dynamic Multiple RPL Instances for Multiple IoT Applications in Smart City
by Sidnei Junior, André Riker, Bruno Silvestre, Waldir Moreira, Antonio Oliveira-Jr and Vinicius Borges
Sensors 2020, 20(11), 3130; https://doi.org/10.3390/s20113130 - 1 Jun 2020
Cited by 14 | Viewed by 3428
Abstract
Internet of Things (IoT) is evolving to multi-application scenarios in smart cities, which demand specific traffic patterns and requirements. Multi-applications share resources from a single multi-hop wireless networks, where smart devices collaborate to send collected data over a Low-Power and Lossy Networks (LLNs). [...] Read more.
Internet of Things (IoT) is evolving to multi-application scenarios in smart cities, which demand specific traffic patterns and requirements. Multi-applications share resources from a single multi-hop wireless networks, where smart devices collaborate to send collected data over a Low-Power and Lossy Networks (LLNs). Routing Protocol for LLNs (RPL) emerged as a routing protocol to be used in IoT scenarios where the devices have limited resources. Instances are RPL mechanisms that play a key role in order to support the IoT scenarios with multiple applications, but it is not standardized yet. Although there are related works proposing multiple instances in RPL on the same IoT network, those works still have limitations to support multiple applications. For instance, there is a lack of flexibility and dynamism in management of multiple instances and service differentiation for applications. In this context, the goal of this work is to develop a solution called DYNAmic multiple RPL instanceS for multiple ioT applicatIons (DYNASTI), which provides more dynamism and flexibility by managing multiple instances of RPL. As a result of this, the traffic performance of multiple applications is enhanced through the routing, taking into consideration the distinct requirements of the applications. In addition, DYNASTI enables the support of sporadic applications as well as the coexistence between regular and sporadic applications. DYNASTI achieved results that demonstrate a significant improvement in reducing the number of control messages, which resulted in increased packet received, decreased end-to-end delay, reduced energy consumption, and an improvement in service differentiation to multiple applications. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Figure 1
<p>Diagram of the linkage between applications, instances, and traffic classes.</p>
Full article ">Figure 2
<p>Relationship diagram between applications, instances, and traffic classes.</p>
Full article ">Figure 3
<p>Flowchart of the mechanisms of the DYNASTI solution in the sensor nodes.</p>
Full article ">Figure 4
<p>Example of four hours of operation of three schedules with two instances associated with the regular application and one critical application with one instance.</p>
Full article ">Figure 5
<p>State diagram for instances status.</p>
Full article ">Figure 6
<p>Sequence diagram that shows the interaction between sink, database, and sensor nodes.</p>
Full article ">Figure 7
<p>Example of timeline for the scheduling selection.</p>
Full article ">Figure 8
<p>The average number of control messages and average delay for critical instance.</p>
Full article ">Figure 9
<p>Average of lost application messages and average energy consumption.</p>
Full article ">Figure 10
<p>The average number of control messages and average number of lost application messages.</p>
Full article ">Figure 11
<p>Average end-to-end delay and average energy consumption.</p>
Full article ">Figure 12
<p>The average number of control messages and sent and received application messages.</p>
Full article ">Figure 13
<p>Average end-to-end delay for critical application (Instance 20) and average energy consumption.</p>
Full article ">
Back to TopTop