Generic placeholder image

Recent Patents on Engineering

Editor-in-Chief

ISSN (Print): 1872-2121
ISSN (Online): 2212-4047

Review Article

Comparative Study of Routing Protocols for IoT Networks

Author(s): Ankit Verma* and Suman Deswal

Volume 17, Issue 6, 2023

Published on: 08 February, 2023

Article ID: e200123212972 Pages: 14

DOI: 10.2174/1872212117666230120142358

Price: $65

conference banner
Abstract

The Internet of things (IoT) is widely used for communication between portable and intelligent heterogeneous devices, like laptops, smartphones, computers, etc. IoT networks are popular in the modern era because they allow data to be exchanged anywhere when connected to the internet. IoT networks have several challenges, including those related to routing, connectivity, privacy, security, and other issues. The major challenge is routing in terms of choosing the best route for sharing data in IoT networks; IoT routing algorithms use more time and energy. In this paper, we review relevent literature and patents and also various routing approaches are categorized into groups, like multicast, clustering, emergency application, traffic, location, tree, and residual energy based approach, and they are compared based on several parameters, like energy consumption, network lifetime, path length, packet delivery ratio, and network latency. In terms of performance metrics, like energy consumption, network lifetime, reliability, efficiency, and packet delivery ratio, the comparison shows that Routing Protocol for Low Power and Lossy Networks (RPL), Efficient Treebased Self-organizing Protocol (ETSP), Collection Tree Protocol (CTP), and Fast Multi-constrained Multicast Routing Algorithms (FAMOUS) are the best protocols. The best approach is a tree-based one since it solves the larger problem in the hierarchy with the least amount of time complexity.

Graphical Abstract

[1]
A.K. Ravishanker, A.K. Luhach, S.V.N. Kumar, and R.C. Poonia, "Speed of Things (SoT): Evolution of isolation-to-intermingle (I2I) Technology Transition Towards IoT", Recent Pat. Comput. Sci., vol. 12, no. 4, pp. 354-360, 2019.
[http://dx.doi.org/10.2174/2213275911666181010114221]
[2]
N. Kashyap, A.C. Kumari, and R. Chhikara, "Service discovery and selection in internet of things - A review", Recent Pat. Eng., vol. 14, no. 1, pp. 4-11, 2020.
[http://dx.doi.org/10.2174/1872212113666181211095048]
[3]
T. Qiu, X. Liu, L. Feng, Y. Zhou, and K. Zheng, "An efficient tree-based self-organizing protocol for internet of things", IEEE Access, vol. 4, pp. 3535-3546, 2016.
[http://dx.doi.org/10.1109/ACCESS.2016.2578298]
[4]
C.H. Tseng, "Multipath load balancing routing for internet of things", J. Sens., vol. 2016, pp. 1-8, 2016.
[http://dx.doi.org/10.1155/2016/4250746]
[5]
L. Zhang, Z. Cai, P. Li, L. Wang, and X. Wang, "Spectrum-availability based routing for cognitive sensor networks", IEEE Access, vol. 5, pp. 4448-4457, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2681743]
[6]
H.S. Kim, H. Kim, J. Paek, and S. Bahk, "Load balancing under heavy traffic in rpl routing protocol for low power and lossy networks", IEEE Trans. Mobile Comput., vol. 16, no. 4, pp. 964-979, 2017.
[http://dx.doi.org/10.1109/TMC.2016.2585107]
[7]
D. Shin, V. Sharma, J. Kim, S. Kwon, and I. You, "Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks", IEEE Access, vol. 5, pp. 11100-11117, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2710379]
[8]
Y. Liao, M. Leeson, M. Higgins, and C. Bai, "Analysis of in-to-out wireless body area network systems: Towards QoS-aware health internet of things applications", Electronics (Basel), vol. 5, no. 4, p. 38, 2016.
[http://dx.doi.org/10.3390/electronics5030038]
[9]
R. Ullah, Y. Faheem, and B.S. Kim, "Energy and congestion-aware routing metric for smart grid ami networks in smart city", IEEE Access, vol. 5, pp. 13799-13810, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2728623]
[10]
J. Huang, Q. Duan, Y. Zhao, Z. Zheng, and W. Wang, "Multicast routing for multimedia communications in the internet of things", IEEE Internet Things J., vol. 4, no. 1, pp. 215-224, 2017.
[http://dx.doi.org/10.1109/JIOT.2016.2642643]
[11]
M.Z. Hasan, and F. Al-Turjman, "Optimizing multipath routing with guaranteed fault tolerance in internet of things", IEEE Sens. J., vol. 17, no. 19, pp. 6463-6473, 2017.
[http://dx.doi.org/10.1109/JSEN.2017.2739188]
[12]
T. Baker, M. Asim, H. Tawfik, B. Aldawsari, and R. Buyya, "An energy-aware service composition algorithm for multiple cloud-based IoT applications", J. Netw. Comput. Appl., vol. 89, pp. 96-108, 2017.
[http://dx.doi.org/10.1016/j.jnca.2017.03.008]
[13]
T. Qiu, Y. Lv, F. Xia, N. Chen, J. Wan, and A. Tolba, "ERGID: An efficient routing protocol for emergency response internet of things", J. Netw. Comput. Appl., vol. 72, pp. 104-112, 2016.
[http://dx.doi.org/10.1016/j.jnca.2016.06.009]
[14]
M.S. Pan, and S.W. Yang, "A lightweight and distributed geographic multicast routing protocol for IoT applications", Comput. Netw., vol. 112, pp. 95-107, 2017.
[http://dx.doi.org/10.1016/j.comnet.2016.11.006]
[15]
J. Xie, L. Lyu, Y. Deng, and L.T. Yang, "Improving routing performance via dynamic programming in large-scale data centers", IEEE Internet Things J., vol. 2, no. 4, pp. 321-328, 2015.
[http://dx.doi.org/10.1109/JIOT.2014.2386326]
[16]
S. Rani, R. Talwar, J. Malhotra, S. Ahmed, M. Sarkar, and H. Song, "A novel scheme for an energy efficient internet of things based on wireless sensor networks", Sensors (Basel), vol. 15, no. 11, pp. 28603-28626, 2015.
[http://dx.doi.org/10.3390/s151128603] [PMID: 26569260]
[17]
J. Shen, A. Wang, C. Wang, P.C.K. Hung, and C.F. Lai, "An efficient centroid-based routing protocol for energy management in WSN-assisted IoT", IEEE Access, vol. 5, pp. 18469-18479, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2749606]
[18]
G. Li, D.G. Zhang, K. Zheng, X.C. Ming, Z.H. Pan, and K.W. Jiang, "A kind of new multicast routing algorithm for application of internet of things", J. Appl. Res. Technol., vol. 11, no. 4, pp. 578-585, 2013.
[http://dx.doi.org/10.1016/S1665-6423(13)71565-7]
[19]
F. Al-Turjman, and A. Radwan, "Data delivery in wireless multimedia sensor networks: Challenging and defying in the IoT era", IEEE Wirel. Commun., vol. 24, no. 5, pp. 126-131, 2017.
[http://dx.doi.org/10.1109/WCM.2017.1700054]
[20]
M. Vellanki, S.P.R. Kandukuri, and A. Razaque, "Node level energy efficiency protocol for internet of things", J. Theor. Comput. Sci, vol. 3, no. 1, 2015.
[http://dx.doi.org/10.4172/2376-130X.1000140]
[21]
P. Sharma, M. Kherajani, B.D. Jain, and D. Patel, "A study of routing protocols, security issues and attacks in network layer of internet of things framework", In 2nd International Conference on Data, Engineering and Applications (IDEA), Bhopal, India, 2020.
[22]
J. Marietta, and B. Chandra Mohan, "A review on routing in internet of things", Wireless Personal Communications, vol. 111, no. 1, pp. 209-233, 2020.
[http://dx.doi.org/10.1007/s11277-019-06853-6]
[23]
A. Verma, and J.S. Prasad, "Optimum path routing algorithm using ant colony optimisation to solve travelling salesman problem in wireless networks", Inter. J. Wireless Mobile Comput., vol. 13, no. 2, pp. 131-138, 2017.
[http://dx.doi.org/10.1504/IJWMC.2017.088080]
[24]
A. Verma, N. Yadav, A. Professor, and K. Kalan, Heart Disease Prediction and Analysis using various Machine Learning Algorithms., vol. 20, pp. 11-6497, 2022.
[25]
A. Verma, and J.S. Prasad, "Performance enhancement by efficient ant colony routing algorithm based on swarm intelligence in wireless sensor networks", Int. J. Wireless Mobile Comput., vol. 12, no. 3, pp. 232-238, 2017.
[http://dx.doi.org/10.1504/IJWMC.2017.084813]
[26]
S.M.H. Mirshahjafari, and B.S. Ghahfarokhi, "Sinkhole+CloneID: A hybrid attack on RPL performance and detection method", Inform. Secur. J., vol. 28, no. 4-5, pp. 107-119, 2019.
[http://dx.doi.org/10.1080/19393555.2019.1658829]
[27]
A. Al-Abdi, W. Mardini, S. Aljawarneh, and T. Mohammed, "Using of multiple RPL instances for enhancing the performance of IoT-based systems", In: ACM International Conference Proceeding Series, 2019.
[http://dx.doi.org/10.1145/3368691.3368718]
[28]
H. Kharrufa, H.A.A. Al-Kashoash, and A.H. Kemp, "RPl-based routing protocols in IoT applications: A review", IEEE Sens. J., vol. 19, no. 15, pp. 5952-5967, 2019.
[http://dx.doi.org/10.1109/JSEN.2019.2910881]
[29]
D. Shreenivas, S. Raza, and T. Voigt, "Intrusion detection in the RPL-connected 6LoWPAN networks", In: the 3rd ACM International Workshop, 2017.
[http://dx.doi.org/10.1145/3055245.3055252]
[30]
H. Lamaazi, N. Benamar, and A.J. Jara, "RPL-based networks in static and mobile environment: A performance assessment analysis", J. King Saud Univ. Comput. Inform. Sci., vol. 30, no. 3, pp. 320-333, 2018.
[http://dx.doi.org/10.1016/j.jksuci.2017.04.001]
[31]
L. Wallgren, S. Raza, and T. Voigt, "Routing attacks and countermeasures in the RPL-based internet of things", Int. J. Distrib. Sens. Netw., vol. 9, no. 8, p. 794326, 2013.
[http://dx.doi.org/10.1155/2013/794326]
[32]
S.S. Solapure, and H.H. Kenchannavar, "Design and analysis of RPL objective functions using variant routing metrics for IoT applications", Wirel. Netw., vol. 26, no. 6, pp. 4637-4656, 2020.
[http://dx.doi.org/10.1007/s11276-020-02348-6]
[33]
M.C. Belavagi, and B. Muniyal, "Multiple intrusion detection in RPL based networks", International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 1, pp. 467-476, 2020.
[http://dx.doi.org/10.11591/ijece.v10i1]
[34]
A. Saleem, M.K. Afzal, M. Ateeq, S.W. Kim, and Y.B. Zikria, "Intelligent learning automata-based objective function in RPL for IoT", Sustain Cities Soc., vol. 59, p. 102234, 2020.
[http://dx.doi.org/10.1016/j.scs.2020.102234]
[35]
Y. Jin, S. Gormus, P. Kulkarni, and M. Sooriyabandara, "Content centric routing in IoT networks and its integration in RPL", Comput. Commun., vol. 89-90, pp. 87-104, 2016.
[http://dx.doi.org/10.1016/j.comcom.2016.03.005]
[36]
M. Qasem, H. Altawssi, M.B. Yassien, and A. Al-Dubai, "Performance evaluation of RPL objective functions", In: 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, pp. 1606-1613, 2015.
[http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.242]
[37]
T. Zhang, and X. Li, "Evaluating and analyzing the performance of RPL in Contiki", In: Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 19-24, 2014.
[http://dx.doi.org/10.1145/2633675.2633678]
[38]
S.Y. Hashemi, and F. Shams Aliee, "Dynamic and comprehensive trust model for IoT and its integration into RPL", J. Supercomput., vol. 75, no. 7, pp. 3555-3584, 2019.
[http://dx.doi.org/10.1007/s11227-018-2700-3]
[39]
N. Bhalaji, K.S. Hariharasudan, and K. Aashika, "A trust based mechanism to combat blackhole attack in RPL protocol", In: ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, 2020, pp. 457-464.
[http://dx.doi.org/10.1007/978-981-13-8461-5_51]
[40]
C. Vallati, F. Righetti, G. Tanganelli, E. Mingozzi, and G. Anastasi, "Analysis of the interplay between RPL and the congestion control strategies for CoAP", Ad Hoc Netw., vol. 109, p. 102290, 2020.
[http://dx.doi.org/10.1016/j.adhoc.2020.102290]
[41]
A.E. Hassani, A. Sahel, and A. Badri, A New Objective Function Based on Additive Combination of Node and Link Metrics as a Mechanism Path Selection for RPL Protocol., 2020. Available from: https://www.researchgate.net/publication/342476456
[42]
G. Simoglou, G. Violettas, S. Petridou, and L. Mamatas, "Intrusion detection systems for RPL security: A comparative analysis", In: Computers and Security., vol. 104. Elsevier Ltd, 2021.
[http://dx.doi.org/10.1016/j.cose.2021.102219]
[43]
E. Rojas, H. Hosseini, C. Gomez, D. Carrascal, and J. Rodrigues Cotrim, "Outperforming RPL with scalable routing based on meaningful MAC addressing", Ad Hoc Netw., vol. 114, p. 102433, 2021.
[http://dx.doi.org/10.1016/j.adhoc.2021.102433]
[44]
A.O. Bang, and U.P. Rao, "A novel decentralized security architecture against sybil attack in RPL-based IoT networks: A focus on smart home use case", J. Supercomput., vol. 77, no. 12, pp. 13703-13738, 2021.
[http://dx.doi.org/10.1007/s11227-021-03816-2]
[45]
A. Sanila, B. Mahapatra, and A. Ku Turuk, "Performance evaluation of RPL protocol in a 6LoWPAN based smart home environment", In 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), Gunupur, India, 2020.
[http://dx.doi.org/10.1109/ICCSEA49143.2020.9132942]
[46]
S. Oh, D. Hwang, K. Kim, and K.H. Kim, "A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks", Int. J. Distrib. Sens. Netw., vol. 14, no. 4, 2018.
[http://dx.doi.org/10.1177/1550147718772533]
[47]
M. Farooq, and D. Pesch, "Reduced overhead routing in short-range low-power and lossy wireless networks", Sensors (Basel), vol. 19, no. 5, p. 1240, 2019.
[http://dx.doi.org/10.3390/s19051240] [PMID: 30870991]
[48]
Y. Kim, and J. Paek, "NG-RPL for efficient P2P routing in low-power multihop wireless networks", IEEE Access, vol. 8, pp. 182591-182599, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.3028771]
[49]
D. Airehrour, J.A. Gutierrez, and S.K. Ray, "SecTrust-RPL: A secure trust-aware RPL routing protocol for internet of things", Future Gener. Comput. Syst., vol. 93, pp. 860-876, 2019.
[http://dx.doi.org/10.1016/j.future.2018.03.021]
[50]
A. Musaddiq, Y.B. Zikria, Zulqarnain, and S.W. Kim, "Routing protocol for Low-Power and Lossy Networks for heterogeneous traffic network", EURASIP J. Wirel. Commun. Netw., vol. 2020, no. 1, p. 21, 2020.
[http://dx.doi.org/10.1186/s13638-020-1645-4]
[51]
H. Bouzebiba, and M. Lehsaini, "FreeBW-RPL: A new RPL protocol objective function for internet of multimedia things", Wirel. Pers. Commun., vol. 112, no. 2, pp. 1003-1023, 2020.
[http://dx.doi.org/10.1007/s11277-020-07088-6]
[52]
Z. Magubane, P. Tarwireyi, A.M. Abu-Mahfouz, and M.O. Adigun, "Performance evaluation of ETXPC-RPL routing algorithm in IoT network", In: 2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)., Kimberley, South Africa, 2020.
[http://dx.doi.org/10.1109/IMITEC50163.2020.9334136]
[53]
S. Sankar, S. Ramasubbareddy, A.K. Luhach, A. Nayyar, and B. Qureshi, "Ct‐rpl: Cluster tree based routing protocol to maximize the lifetime of internet of things", Sensors (Basel), vol. 20, no. 20, p. 5858, 2020.
[http://dx.doi.org/10.3390/s20205858]
[54]
P.D. Acevedo, D. Jabba, P. Sanmartin, S. Valle, and E.D. Nino-Ruiz, "WRF-RPL: Weighted random forward RPL for high traffic and energy demanding scenarios", IEEE Access, vol. 9, pp. 60163-60174, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3074436]
[55]
M. Bouaziz, A. Rachedi, A. Belghith, M. Berbineau, and S. Al-Ahmadi, "EMA-RPL: Energy and mobility aware routing for the internet of mobile things", Future Gener. Comput. Syst., vol. 97, pp. 247-258, 2019.
[http://dx.doi.org/10.1016/j.future.2019.02.042]
[56]
A. Seyfollahi, and A. Ghaffari, "A lightweight load balancing and route minimizing solution for routing protocol for low-power and lossy networks", Comput. Netw., vol. 179, p. 107368, 2020.
[http://dx.doi.org/10.1016/j.comnet.2020.107368]
[57]
J. Ko, J. Jeong, J. Park, J.A. Jun, O. Gnawali, and J. Paek, "DualMOP-RPL", ACM Trans. Sens. Netw., vol. 11, no. 2, pp. 1-20, 2015.
[http://dx.doi.org/10.1145/2700261]
[58]
H.S. Kim, H. Cho, H. Kim, and S. Bahk, "DT-RPL: Diverse bidirectional traffic delivery through RPL routing protocol in low power and lossy networks", Comput. Netw., vol. 126, pp. 150-161, 2017.
[http://dx.doi.org/10.1016/j.comnet.2017.07.001]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy