Generic placeholder image

Recent Advances in Electrical & Electronic Engineering

Editor-in-Chief

ISSN (Print): 2352-0965
ISSN (Online): 2352-0973

Research Article

FOG-RPL: Fog Computing-based Routing Protocol for IoT Networks

Author(s): Ankit Verma* and Suman Deswal

Volume 17, Issue 2, 2024

Published on: 12 July, 2023

Page: [170 - 180] Pages: 11

DOI: 10.2174/2352096516666230510125238

Price: $65

Abstract

Background: The Internet of Things (IoT) is widely used because of the connectivity of devices with the Internet which provides accessibility, quick transmission, and broader coverage. IoT networks provide vast connectivity but finding the best path for sharing information is a big challenge because of limited resources like limited power and limited bandwidth. The routing protocol for low power lossy network (RPL) is standard protocol but it selects a node that has already been selected in a busty network.

Methods: The fog computing technique is combined with RPL and the new objective function is used to design FOG-RPL which is the optimum routing protocol that reduces the network load using the fog computing principle and selects the right node using the new objective function.

Results: The simulation is performed and experimental results show that FOG-RPL gives better results in terms of improvement and in terms of performance parameters.

Conclusion: The FOG-RPL protocol uses the fog computing principle with a new objective function and performance analysis shows that as compared to the existing routing protocol, it is more efficient.

Graphical Abstract

[1]
H. Bouzebiba, and M. Lehsaini, "FreeBW-RPL: A new RPL protocol objective function for internet of multimedia things", Wirel. Pers. Commun., vol. 112, no. 2, pp. 1003-1023, 2020.
[http://dx.doi.org/10.1007/s11277-020-07088-6]
[2]
A. Verma, and J.S. Prasad, "Optimum path routing algorithm using ant colony optimisation to solve travelling salesman problem in wire-less networks", International Journal of Wireless and Mobile Computing, vol. 13, no. 2, pp. 131-138, 2017.
[http://dx.doi.org/10.1504/IJWMC.2017.088080]
[3]
K. Psounis, Institute of Electrical and Electronics Engineers, IEEE Communications Society, and International Federation for Information Processing., 2017 13th Annual Conference on Wireless Ondemand Network Systems and Services (WONS): conference proceedings, 2017 Jackson Hole, Wyoming, USA
[4]
A. Musaddiq, and Y.B. Zikria, "Zulqarnain, and S.W. Kim, “Routing protocol for low-power and lossy networks for heterogeneous traffic net-work”", EURASIP J. Wirel. Commun. Netw., vol. 2020, no. 1, p. 21, 2020.
[http://dx.doi.org/10.1186/s13638-020-1645-4]
[5]
A. Verma, and S. Deswal, "Comparative study of routing protocols for IoT networks", Recent Pat. Eng., vol. 17, no. 6, 2023.e200123212972
[http://dx.doi.org/10.2174/1872212117666230120142358]
[6]
A. Verma, and J.S. Prasad, "Performance enhancement by efficient ant colony routing algorithm based on swarm intelligence in wireless sensor networks", International Journal of Wireless and Mobile Computing, vol. 12, no. 3, pp. 232-238, 2017.
[http://dx.doi.org/10.1504/IJWMC.2017.084813]
[7]
D. Airehrour, J.A. Gutierrez, and S.K. Ray, "Sec Trust-RPL: A secure trust-aware RPL routing protocol for Internet of Things", Future Gener. Comput. Syst., vol. 93, pp. 860-876, 2019.
[http://dx.doi.org/10.1016/j.future.2018.03.021]
[8]
Y. Kim, and J. Paek, "NG-RPL for efficient P2P routing in low-power multihop wireless networks", IEEE Access, vol. 8, pp. 182591-182599, 2020.
[http://dx.doi.org/10.1109/ACCESS.2020.3028771]
[9]
" "Body area networks MAC protocols for healthcare: Performance evaluation", 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019",
[10]
S.M.H. Mirshahjafari, and B.S. Ghahfarokhi, Sinkhole+CloneID: A hybrid attack on RPL performance and detection method Information Security Journal: A Global Perspective, vol. 28. 2019, no. 4-5, pp. 107-119.
[http://dx.doi.org/10.1080/19393555.2019.1658829]
[11]
X. Zhong, and Y. Liang, "Scalable downward routing for wireless sensor networks actuation", IEEE Sensors Journal., vol. 19, no. 20, 2019.
[12]
M. Farooq, and D. Pesch, "Reduced overhead routing in shortrange low-power and lossy wireless networks", Sensors , vol. 19, no. 5, p. 1240, 2019.
[http://dx.doi.org/10.3390/s19051240] [PMID: 30870991]
[13]
S. Oh, D. Hwang, K. Kim, and K.H. Kim, "A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks", Int. J. Distrib. Sens. Netw., vol. 14, no. 4, 2018.
[http://dx.doi.org/10.1177/1550147718772533]
[14]
A. Sanila, B. Mahapatra, and A. Ku Turuk, Performance evaluation of RPL protocol in a 6LoWPAN based smart home environment. 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020.
[http://dx.doi.org/10.1109/ICCSEA49143.2020.9132942]
[15]
A.O. Bang, and U.P. Rao, "A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case", J. Supercomput., vol. 77, no. 12, pp. 13703-13738, 2021.
[http://dx.doi.org/10.1007/s11227-021-03816-2]
[16]
E. Rojas, H. Hosseini, C. Gomez, D. Carrascal, and J. Rodrigues Cotrim, "Outperforming RPL with scalable routing based on meaningful MAC addressing", Ad Hoc Netw., vol. 114, 2021.102433
[http://dx.doi.org/10.1016/j.adhoc.2021.102433]
[17]
A. Al-Abdi, W. Mardini, S. Aljawarneh, and T. Mohammed, Using of multiple RPL instances for enhancing the performance of IoT-based systems. ACM International Conference Proceeding Series, 2019.
[http://dx.doi.org/10.1145/3368691.3368718]
[18]
G. Raj, A. Verma, P. Dalal, A.K. Shukla, and P. Garg, "Performance comparison of several LPWAN technologies for energy constrained IOT network", International Journal of Intelligent Systems and Applications in Engineering, vol. 11, no. 1s, pp. 150-158, 2023.
[19]
S. Pahuja, R. Kumar, A. Verma, S. Negi, and H. Arora, Priority based approach against congestion in sensor network. 2011 Annual IEEE India Conference, 2011, pp. 1-4.
[http://dx.doi.org/10.1109/INDCON.2011.6139476]
[20]
G. Simoglou, G. Violettas, S. Petridou, and L. Mamatas, "Intrusion detection systems for RPL security: A comparative analysis", Computers & Security., vol. 104, 2021.102219
[http://dx.doi.org/10.1016/j.cose.2021.102219]
[21]
S. Pahuja, S. Negi, A. Verma, P. Rathi, and N. Narang, A novel intrusion preventive routing scheme for data dissemination in sensor network. Conference on Electrical, Electronics and Computer Science, 2012, pp. 1-6.
[http://dx.doi.org/10.1109/SCEECS.2012.6184804]
[22]
N. Marriwala, C.C. Tripathi, D. Kumar, and S. Jain, Lecture Notes in Networks and Systems 140 Mobile Radio Communications and 5G Networks Proceedings of MRCN 2020. Available from: http://www.springer.com/series/15179
[23]
SCAD College of Engineering and Technology and Institute of Electrical and Electronics Engineers, Proceedings of the 4th International Conference on Trends in Electronics and Informatics (ICOEI 2020), 2020, pp. 15-17.
[24]
A.E. Hassani, A. Sahel, and A. Badri, "A new objective function based on additive combination of node and link metrics as a mechanism path selection for RPL protocol", International Journal of Communication Networks and Information Security (IJCNIS), vol. 12, no. 1, 2022.
[25]
C. Vallati, F. Righetti, G. Tanganelli, E. Mingozzi, and G. Anastasi, "Analysis of the interplay between RPL and the congestion control strategies for CoAP", Ad Hoc Netw., vol. 109, 2020.102290
[http://dx.doi.org/10.1016/j.adhoc.2020.102290]
[26]
Y. Jin, S. Gormus, P. Kulkarni, and M. Sooriyabandara, "Content centric routing in IoT networks and its integration in RPL", Comput. Commun., vol. 89-90, pp. 87-104, 2016.
[http://dx.doi.org/10.1016/j.comcom.2016.03.005]
[27]
N. Bhalaji, K.S. Hariharasudan, and K. Aashika, A trust based mechanism to combat blackhole attack in RPL protocol l", ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management, pp. 457-464 Singapore, 2020.
[http://dx.doi.org/10.1007/978-981-13-8461-5_51]
[28]
S. Chen, Z. Wang, H. Zhang, G. Yang, and K. Wang, “Fog-based Optimized Kronecker-Supported Compression Design for Industrial IoT,”.IEEE Transactions on Sustainable Computing, vol. 5, no. 1, pp. 95–-106, .
Jan. 2020, [http://dx.doi.org/10.1109/TSUSC.2019.2906729]
[29]
A.S.J. Charles, and P. Kalavathi, "“QoS measurement of RPL using cooja simulator and wireshark network analyser”, Int. J. COMP. SCI", ENG, vol. 6, no. 4, pp. 283-291, 2018.
[30]
S. Sankar, S. Ramasubbareddy, A.K. Luhach, A. Nayyar, and B. Qureshi, "Ct‐rpl: Cluster tree based routing protocol to maximize the lifetime of internet of things", Sensors , vol. 20, no. 20, p. 5858, 2020.
[http://dx.doi.org/10.3390/s20205858]
[31]
S. Pahuja, S. Negi, A. Verma, P. Rathi, N. Narang, and R. Chawla, "An authentication protocol for secure tag-reader communication",., Conference on Electrical, Electronics and Computer Science , pp. 1-4,.
2012 [http://dx.doi.org/10.1109/SCEECS.2012.6184757]
[32]
Z. Magubane, P. Tarwireyi, A.M. Abu-Mahfouz, and M.O. Adigun, Performance evaluation of ETXPC-RPL routing algorithm in IoT network. , 2020 2nd International Multidisciplinary Information Technology and Engineering Conference, IMITEC, 2020.
[http://dx.doi.org/10.1109/IMITEC50163.2020.9334136]
[33]
A. Verma, and P.C. Vashist, "Enhanced clustering ant colony routing algorithm based on swarm intelligence in wireless sensor network", 2015 International Conference on Advances in Computer Engineering and Applications, pp. 150-154, 2015.
[http://dx.doi.org/ 10.1109/ICACEA.2015.7164684]
[34]
H. Kharrufa, H.A.A. Al-Kashoash, and A.H. Kemp, "RPL-Based Routing Protocols in IoT Applications: A Review", IEEE Sens. J., vol. 19, no. 15, pp. 5952-5967, 2019.
[http://dx.doi.org/10.1109/JSEN.2019.2910881]
[35]
" "Annual IEEE Computer Conference", 19th IEEE International Conference on Networks (ICON), 2013 Singapore",
[36]
P.P. Angelov, IEEE Computational Intelligence Society, International Neural Network Society. Morocco regional chapter, and institute of electrical and electronics engineers. , ICDS2019: the Third International Conference on Intelligent Computing in Data Sciences, 2019 Marrakech, Morocco.
[37]
S. Kanhere, J. Tölle, and S. Cherkaoui, "Eds., 40th IEEE Conference on Local Computer Networks, LCN 2015, 2015 Clearwater Beach, FL, USA",
[38]
D. Shreenivas, S. Raza, and T. Voigt, "Intrusion detection in the RPL-connected 6LoWPAN Networks", In IoTPTS 2017 - Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, co-located with ASIA CCS 2017,, 2017, pp. 31-38
[http://dx.doi.org/10.1145/3055245.3055252]
[39]
H.S. Kim, H. Cho, H. Kim, and S. Bahk, "DT-RPL: Diverse bidirectional traffic delivery through RPL routing protocol in low power and lossy networks", Comput. Netw., vol. 126, pp. 150-161, 2017.
[http://dx.doi.org/10.1016/j.comnet.2017.07.001]
[40]
H. Lamaazi, N. Benamar, and A.J. Jara, "RPL-based networks in static and mobile environment: A performance assessment analysis", Journal of King Saud University-Computer and Information Sciences, vol. 30, no. 3, pp. 320-333, 2018.
[http://dx.doi.org/10.1016/j.jksuci.2017.04.001]
[41]
A. Jamalipour, and C.B. Papadias, "Institute of Electrical and Electronics Engineers, and IEEE Communications Society, 2017 IEEE International Conference on Communications (ICC Workshops), 2017 [42] Institute of Electrical and Electronics Engineers, IWCMC 2017: the 13th International Wireless Communications & Mobile Computing Conference, 2017 Valencia, Spain",
[42]
Institute of Electrical and Electronics Engineers, IWCMC 2017: the 13th International Wireless Communications & Mobile Computing Conference, 2017 Valencia, Spain.
[43]
Institute of Electrical and Electronics Engineers, 2018 IEEE Global Communications Conference (GLOBECOM):proceedings, 2018 Abu Dhabi UAE..
[44]
Sri Shakthi Institute of Engineering and Technology, Institute of Electrical and Electronics Engineers. Madras Section, India Electronics & Semiconductor Association, and Institute of Electrical and Electronics Engineers, 2017, International Conference on Computer Communication and Informatics Coimbatore, India.
[45]
J. Ko, J. Jeong, J. Park, J.A. Jun, O. Gnawali, and J. Paek, "DualMOP-RPL", ACM Trans. Sens. Netw., vol. 11, no. 2, pp. 1-20, 2015.
[http://dx.doi.org/10.1145/2700261]
[46]
P. Singh, and Y-C. Chen, "RPL enhancement for a parent selection mechanism and an efficient objective function", IEEE Sensors. Journal., vol. 19, no. 21, 2019.
[47]
Institute of Electrical and Electronics Engineers, 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013. Shanghai, P.R. China.
[48]
A. Seyfollahi, and A. Ghaffari, "A lightweight load balancing and route minimizing solution for routing protocol for low-power and lossy networks", Comput. Netw., vol. 179, 2020.107368
[http://dx.doi.org/10.1016/j.comnet.2020.107368]
[49]
O. Gaddour, A. Koubâa, S. Chaudhry, M. Tezeghdanti, R. Chaari, and M. Abid, "Simulation and Performance Evaluation of DAG Con-struction with RPL",. Third International Conference on Communications and Networking, Hammamet, Tunisia, 2012.
[http://dx.doi.org/ 10.1109/ComNet.2012.6217747]
[50]
O. Gaddour, A. Koubâa, R. Rangarajan, O. Cheikhrouhou, E. Tovar, and M. Abid, Co-RPL: RPL routing for mobile low power wireless sensor networks using Corona mechanism. International Symposium on Industrial Embedded Systems, Pisa, Italy, 2014.
[http://dx.doi.org/10.1109/SIES.2014.6871205]
[51]
""Securware", International Conference on Emerging Security Information., 2012",
[52]
M. Bouaziz, A. Rachedi, A. Belghith, M. Berbineau, and S. Al-Ahmadi, "EMA-RPL: Energy and mobility aware routing for the Internet of Mobile Things", Future Gener. Comput. Syst., vol. 97, pp. 247-258, 2019.
[http://dx.doi.org/10.1016/j.future.2019.02.042]
[53]
L. Wallgren, S. Raza, and T. Voigt, "Routing attacks and countermeasures in the RPL-based internet of things", Int. J. Distrib. Sens. Netw., vol. 9, no. 8, 2013.794326
[http://dx.doi.org/10.1155/2013/794326]
[54]
""Intelligent Systems Scientific Society of Iran, Institute of Electrical and Electronics Engineers. Iran Section, and Institute of Electrical and Electronics Engineers", 2019 IEEE 5th Conference on Knowledge Based Engineering and Innovation, Iran University of Science and Technology, Tehran, Iran, 2019",
[55]
S.S. Solapure, and H.H. Kenchannavar, "Design and analysis of RPL objective functions using variant routing metrics for IoT applications", Wirel. Netw., vol. 26, no. 6, pp. 4637-4656, 2020.
[http://dx.doi.org/10.1007/s11276-020-02348-6]
[56]
P.D. Acevedo, D. Jabba, P. Sanmartin, S. Valle, and E.D. Nino-Ruiz, "WRF-RPL: Weighted random forward RPL for high traffic and energy demanding scenarios", IEEE Access, vol. 9, pp. 60163-60174, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3074436]
[57]
S.Y. Hashemi, and F. Shams Aliee, "Dynamic and comprehensive trust model for IoT and its integration into RPL", J. Supercomput., vol. 75, no. 7, pp. 3555-3584, 2019.
[http://dx.doi.org/10.1007/s11227-018-2700-3]
[58]
"Institute of Electrical and Electronics Engineers, International federation for information processing., and IEEE Communications Society", Proceedings of the NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium 2016, Istanbul, Turkey, 2016..
[59]
M. Qasem, H. Altawssi, M.B. Yassien, and A. Al-Dubai, Performance Evaluation of RPL Objective Functions. 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing,, 2015, pp. 1606-1613.
[http://dx.doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.242]
[60]
T. Zhang, and X. Li, "Evaluating and analyzing the performance of RPL in Contiki", Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 19-24, 2014.
[http://dx.doi.org/10.1145/2633675.2633678]
[61]
M. Tabari, M. Yadollahzadeh-Tabari, and Z. Mataji, "Detecting sinkhole attack in RPL-based internet of things routing protocol", Journal of AI and Data mining, vol. 9, no. 1, pp. 73-85, 2021.
[http://dx.doi.org/10.22044/JADM.2020.9253.2060]
[62]
"Institute of Electrical and Electronics Engineers", In 2015 International Conference on Advanced Technologies for Communications (ATC), Ho Chi Minh, Vietnam, 2015.
[63]
"Computational intelligence for smart power system and sustainable energy", International Conference on Computational Intelligence for Smart Power System and Sustainable Energy (CISPSSE- 2020), 2020",
[64]
M.C. Belavagi, and B. Muniyal, "Multiple intrusion detection in RPL based networks", International Journal of Electrical and Computer Engineering (IJECE),, vol. 10, no. 1, pp. 467-476, 2020.
[http://dx.doi.org/10.11591/ijece.v10i1.pp467-476]
[65]
C-C. Hung, ACM Digital Library., SIGAPP, and Panepistēmio Kyprou. The 34th Annual ACM Symposium on Applied Computing, 2019 Limassol, Cyprus..
[66]
A. Saleem, M.K. Afzal, M. Ateeq, S.W. Kim, and Y.B. Zikria, "Intelligent learning automata-based objective function in RPL for IoT", Sustain Cities Soc., vol. 59, 2020.102234
[http://dx.doi.org/10.1016/j.scs.2020.102234]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy