646 research outputs found

    The role of the RPL routing protocol for smart grid communications

    Get PDF
    Advanced communication/networking technologies should be integrated in next-generation power systems (a.k.a. smart grids) to improve their resilience, efficiency, adaptability, and sustainability. Many believe that the smart grid communication infrastructure will emerge from the interconnection of a large number of small-scale networks organized into a hierarchical architecture covering larger geographic areas. In this article, first we carry out a thorough analysis of the key components of the smart grid communication architecture, discussing the different network topologies and communication technologies that could be employed. Special emphasis is given to the advanced metering infrastructure, which will be used to interconnect the smart meters deployed at customers\u27 premises with data aggregators and control centers. The design of scalable, reliable, and efficient networking solutions for AMI systems is an important research problem because these networks are composed of thousands of resource-constrained embedded devices usually interconnected with communication technologies that can provide only low-bandwidth and unreliable links. The IPv6 Routing Protocol for Low Power and Lossy Networks was recently standardized by the IETF to specifically meet the requirements of typical AMI applications. In this article we present a thorough overview of the protocol, and we critically analyze its advantages and potential limits in AMI applications. We also conduct a performance evaluation of RPL using a Contiki-based prototype of the RPL standard and a network emulator. Our results indicate that although average performance may appear reasonable for AMI networks, a few RPL nodes may suffer from severe unreliability issues and experience high packet loss rates due to the selection of suboptimal paths with highly unreliable links

    IETF standardization in the field of the Internet of Things (IoT): a survey

    Get PDF
    Smart embedded objects will become an important part of what is called the Internet of Things. However, the integration of embedded devices into the Internet introduces several challenges, since many of the existing Internet technologies and protocols were not designed for this class of devices. In the past few years, there have been many efforts to enable the extension of Internet technologies to constrained devices. Initially, this resulted in proprietary protocols and architectures. Later, the integration of constrained devices into the Internet was embraced by IETF, moving towards standardized IP-based protocols. In this paper, we will briefly review the history of integrating constrained devices into the Internet, followed by an extensive overview of IETF standardization work in the 6LoWPAN, ROLL and CoRE working groups. This is complemented with a broad overview of related research results that illustrate how this work can be extended or used to tackle other problems and with a discussion on open issues and challenges. As such the aim of this paper is twofold: apart from giving readers solid insights in IETF standardization work on the Internet of Things, it also aims to encourage readers to further explore the world of Internet-connected objects, pointing to future research opportunities

    Latency Optimization in Smart Meter Networks

    Get PDF
    In this thesis, we consider the problem of smart meter networks with data collection to a central point within acceptable delay and least consumed energy. In smart metering applications, transferring and collecting data within delay constraints is crucial. IoT devices are usually resource-constrained and need reliable and energy-efficient routing protocol. Furthermore, meters deployed in lossy networks often lead to packet loss and congestion. In smart grid communication, low latency and low energy consumption are usually the main system targets. Considering these constraints, we propose an enhancement in RPL to ensure link reliability and low latency. The proposed new additive composite metric is Delay-Aware RPL (DA-RPL). Moreover, we propose a repeaters’ placement algorithm to meet the latency requirements. The performance of a realistic RF network is simulated and evaluated. On top of the routing solution, new asynchronous ordered transmission algorithms of UDP data packets are proposed to further enhance the overall network latency performance and mitigate the whole system congestion and interference. Experimental results show that the performance of DA-RPL is promising in terms of end-to-end delay and energy consumption. Furthermore, the ordered asynchronous transmission of data packets resulted in significant latency reduction using just a single routing metric

    QCOF: New RPL Extension for QoS and Congestion-Aware in Low Power and Lossy Network

    Get PDF
    Low power and lossy networks (LLNs) require a routing protocol under real-time and energy constraints, congestion aware and packet priority. Thus, Routing Protocol for Low power and lossy network (RPL) is recommended by Internet Engineering Task force (IETF) for LLN applications. In RPL, nodes select their optimal paths towards their preferred parents after meeting routing metrics that are injected in the objective function (OF). However, RPL did not impose any routing metric and left it open for implementation. In this paper, we propose a new RPL objective function which is based on the quality of service (QoS) and congestion-aware. In the case paths fail, we define new RPL control messages for enriching the network by adding more routing nodes. Extensive simulations show that QCOF achieves significant improvement in comparison with the existing objective functions, and appropriately satisfies real-time applications under QoS and network congestion.info:eu-repo/semantics/publishedVersio

    A RPL based adaptive and scalable data-collection protocol module for NS-3 simulation platform

    Get PDF
    International audienceThis paper presents data-collection protocol framework based on RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) for NS-3 (Network Simulator 3) simulation platform. Its design, implementation, simple examples of operations and evaluations will also be demonstrated. The conclusions and future developments are located in the final part of this paper

    A survey on subjecting electronic product code and non-ID objects to IP identification

    Full text link
    Over the last decade, both research on the Internet of Things (IoT) and real-world IoT applications have grown exponentially. The IoT provides us with smarter cities, intelligent homes, and generally more comfortable lives. However, the introduction of these devices has led to several new challenges that must be addressed. One of the critical challenges facing interacting with IoT devices is to address billions of devices (things) around the world, including computers, tablets, smartphones, wearable devices, sensors, and embedded computers, and so on. This article provides a survey on subjecting Electronic Product Code and non-ID objects to IP identification for IoT devices, including their advantages and disadvantages thereof. Different metrics are here proposed and used for evaluating these methods. In particular, the main methods are evaluated in terms of their: (i) computational overhead, (ii) scalability, (iii) adaptability, (iv) implementation cost, and (v) whether applicable to already ID-based objects and presented in tabular format. Finally, the article proves that this field of research will still be ongoing, but any new technique must favorably offer the mentioned five evaluative parameters.Comment: 112 references, 8 figures, 6 tables, Journal of Engineering Reports, Wiley, 2020 (Open Access

    Internet of Satellites (IoSat): analysis of network models and routing protocol requirements

    Get PDF
    The space segment has been evolved from monolithic to distributed satellite systems. One of these distributed systems is called the federated satellite system (FSS) which aims at establishing a win-win collaboration between satellites to improve their mission performance by using the unused on-board resources. The FSS concept requires sporadic and direct communications between satellites, using inter satellite links. However, this point-to-point communication is temporal and thus it can break existent federations. Therefore, the conception of a multi-hop scenario needs to be addressed. This is the goal of the Internet of satellites (IoSat) paradigm which, as opposed to a common backbone, proposes the creation of a network using a peer-to-peer architecture. In particular, the same satellites take part of the network by establishing intermediate collaborations to deploy a FSS. This paradigm supposes a major challenge in terms of network definition and routing protocol. Therefore, this paper not only details the IoSat paradigm, but it also analyses the different satellite network models. Furthermore, it evaluates the routing protocol candidates that could be used to implement the IoSat paradigm.Peer ReviewedPostprint (author's final draft

    Design and Analysis of an Optimized Scheduling Approach using Decision Making over IoT (TOPSI) for Relay based Routing Protocols

    Get PDF
    This research work focuses on support towards QoS approaches over IoT using computational models based on scheduling schemes to enable service oriented systems. IoT system supports on application of day-to-day physical tasks with virtual objects which inter-connect to create opportunities for integration of world into computer-based systems. The QoS scheduling model TOPSI implements a top-down decision making process over top to bottom interconnected layers using service supportive optimization algorithms based on demandable QoS requirements and applications. TOPSI adopts Markov Decision Process (MDP) at the three layers from transport layer to application layer which identifies the QoS supportive metrics for IoT and maximizes the service quality at network layer. The connection cost over multiple sessions is stochastic in nature as service is supportive based on decision making algorithms. TOPSI uses QoS attributes adopted in traditional QoS mechanisms based on transmission of sensor data and decision making based on sensing ability. TOPSI model defines and measures the QoS metrics of IoT network using adaptive monitoring module at transport layer for the defined service in use. TOPSI shows optimized throughput for variable load in use, sessions and observed delay. TOPSI works on route identification, route binding, update and deletion process based on the validation of adaptive QoS metrics, before the optimal route selection process between source and destination. This research work discusses on the survey and analyzes the performance of TOPSI and RBL schemes. The simulation test beds and scenario mapping are carried out using Cooja network simulator

    The Impact of Mobile DIS and Rank-Decreased Attacks in Internet of Things Networks

    Get PDF
    With a predicted 50 billion devices by the end of 2020, the Internet of things has grown exponentially in the last few years. This growth has seen an increasing demand for mobility support in low power and lossy sensor networks, a type of network characterized by several limitations in terms of their resources including CPU, memory and batter, causing manufactures to push products out to the market faster, without the necessary security features. IoT networks rely on the Routing Protocol for Low Power and Lossy Network (RPL) for communication, designed by the Internet Engineering Task Force (IETF). This protocol has been proven to be efficient in relation to the handling of routing in such constrained networks, However, research studies revealed that RPL was inherently designed for static networks, indicating poor handling of mobile or dynamic topologies which is worsen when introducing mobile attacker. In this paper, two IoT routing attacks are evaluated under a mobile attacker with the aim of providing a critical evaluation of the impact the attacks have on the network in comparison to the case with static attacker. The first attack is the Rank attack in which the attacker announces false routing information to its neighbour attracting them to forward their data via the attacker. The second attack is the DIS attack in which the attacker floods the network with DIS messages triggering them to reset their transmission timers and sending messages more frequently. The comparison were conducted in terms of average power consumption and also the packet delivery ratio (PDR). Based on the results collected from the simulations, it was established that when an attacking node is mobile, there’s an average increase of 36.6 in power consumption and a decrease of 14 for packet delivery ratios when compared to a static attacking node
    corecore