A critical analysis of RPL objective functions in internet of things paradigm

Author(s):  
Neeti Gupta ◽  
Anuradha Pughat ◽  
Vidushi Sharma
Author(s):  
Maria Grazia Gnoni ◽  
Valerio Elia ◽  
Sara Anastasi ◽  
Luigi Monica

In this chapter, the authors present a critical analysis about the current maintenance and inspection process carried out on hazardous lifting equipment. In Italy, a mandatory audit schema is working requesting a periodic interaction between owners of the lifting equipment and inspectors. The current condition has been analyzed aiming to evaluate potential points of criticalities. A smart platform integrating physical devices—based on internet of things technologies, mobile, and cloud applications—has been developed in order to provide companies and inspectors with a reliable and modular tool to organize, certify, and trace maintenance activities developed on the specific equipment. The final purpose is to guarantee a high level of safety for this type of hazardous equipment.


2019 ◽  
Vol 13 (12) ◽  
pp. 1
Author(s):  
Adeeb Saaidah ◽  
Omar Almomani ◽  
Laila Al-Qaisi. ◽  
Nesreen Alsharman ◽  
Faisal Alzyoud

Internet of Things (IOT) system often consists of thousands of constrained connected devices. Resource-constrained devices one of critical issues in a low- power and lossy network LLNs. RPL is IPv6 routing protocol. It’s designed by IETF to be simple and inter-operable networking protocol to overcome these resource limitations. The RPL carries out Objective Functions (OFs) in the aim of finding the best path. The OFs chooses the best parent nodes aiming to build the route and optimize it. The metrics used to build the OF must be selected in an effective and accurate manner for finding the optimal path and meets all constraints. A survey about node metrics which can be utilized in OFs of RPL is presented, and node metrics calculations are explained then discussed thoroughly. The researcher displays the most relevant research efforts regarding the RPL OFs existing in literature.


2021 ◽  
Vol 11 (17) ◽  
pp. 8117
Author(s):  
Mohammed Najah Mahdi ◽  
Abdul Rahim Ahmad ◽  
Qais Saif Qassim ◽  
Hayder Natiq ◽  
Mohammed Ahmed Subhi ◽  
...  

Due to the rapid development of the fifth-generation (5G) applications, and increased demand for even faster communication networks, we expected to witness the birth of a new 6G technology within the next ten years. Many references suggested that the 6G wireless network standard may arrive around 2030. Therefore, this paper presents a critical analysis of 5G wireless networks’, significant technological limitations and reviews the anticipated challenges of the 6G communication networks. In this work, we have considered the applications of three of the highly demanding domains, namely: energy, Internet-of-Things (IoT) and machine learning. To this end, we present our vision on how the 6G communication networks should look like to support the applications of these domains. This work presents a thorough review of 370 papers on the application of energy, IoT and machine learning in 5G and 6G from three major libraries: Web of Science, ACM Digital Library, and IEEE Explore. The main contribution of this work is to provide a more comprehensive perspective, challenges, requirements, and context for potential work in the 6G communication standard.


2021 ◽  
Vol 11 (10) ◽  
pp. 4580
Author(s):  
Amir Djenna ◽  
Saad Harous ◽  
Djamel Eddine Saidouni

As a new area of technology, the Internet of Things (IoT) is a flagship and promising paradigm for innovating society. However, IoT-based critical infrastructures are an appealing target for cybercriminals. Such distinctive infrastructures are increasingly sensitive to cyber vulnerabilities and subject to many cyberattacks. Thus, protecting these infrastructures is a significant issue for organizations and nations. In this context, raising the cybersecurity posture of critical cyber infrastructures is an extremely urgent international issue. In addition, with the rapid development of adversarial techniques, current cyber threats have become more sophisticated, complicated, advanced and persistent. Thus, given these factors, prior to implementing efficient and resilient cybersecurity countermeasures, identification and in-depth mapping of cyber threats is an important step that is generally overlooked. Therefore, to solve cybersecurity challenges, this study presents a critical analysis of the most recent cybersecurity issues for IoT-based critical infrastructures. We then discuss potential cyber threats and cyber vulnerabilities and the main exploitation strategies adopted by cybercriminals. Further, we provide a taxonomy of cyberattacks that may affect critical cyber infrastructures. Finally, we present security requirements and some realistic recommendations to enhance cybersecurity solutions.


2020 ◽  
Vol 13 (2) ◽  
pp. 159-167
Author(s):  
Robin Cyriac ◽  
Marimuthu Karuppiah

Internet of Things will be inevitable in all walks of our life, where it becomes necessary for all smart devices to have end-to-end data transfer capability. These low power and low-cost end devices need to be enabled with IPv6 address and corresponding routing mechanism for participating in Internet of Things environment. To enable fast and efficient routing in Internet of Things network and constrained with limited energy, Routing Protocol for Low-power Lossy Network (RPL) has been developed by ROLL-Work Group. As RPL is proactive and energyconserving, it has become the most promising routing protocol for Internet of Things. Nodes in Low-power Lossy Network (LLN) are designed to conserve energy by maintaining radio silence over 90% of its lifetime. It is possible to further improve the node’s lifetime and thereby considerably extending network’s longevity by performing sensible routing. Different routing structure in Internet of Things network can be attained by carefully crafting the objective function for the same set of nodes which satisfies different goals. This paper focuses on different objective functions in RPL which have been developed over time with the emphasis on energy conservation and maximizing the lifetime of the network. In this work, we have carefully studied different metric compositions used for creating an objective function. The study revealed that combining metrics provides better results in terms of energy conservation when compared to single metric defined as part of RPL standard. It was also noted that considering some metric as a constraint can increase the rate of route convergence without affecting the performance of the network.


Sensors ◽  
2020 ◽  
Vol 20 (20) ◽  
pp. 5943
Author(s):  
Jingwen Yan ◽  
Kaiming Xiao ◽  
Cheng Zhu ◽  
Jun Wu ◽  
Guoli Yang ◽  
...  

Network security is a crucial challenge facing Internet-of-Things (IoT) systems worldwide, which leads to serious safety alarms and great economic loss. This paper studies the problem of malicious interdicting network exploitation of IoT systems that are modeled as a bi-layer logical–physical network. In this problem, a virtual attack takes place at the logical layer (the layer of Things), while the physical layer (the layer of Internet) provides concrete support for the attack. In the interdiction problem, the attacker attempts to access a target node on the logical layer with minimal communication cost, but the defender can strategically interdict some key edges on the physical layer given a certain budget of interdiction resources. This setting generalizes the classic single-layer shortest-path network interdiction problem, but brings in nonlinear objective functions, which are notoriously challenging to optimize. We reformulate the model and apply Benders decomposition process to solve this problem. A layer-mapping module is introduced to improve the decomposition algorithm and a random-search process is proposed to accelerate the convergence. Extensive numerical experiments demonstrate the computational efficiency of our methods.


2015 ◽  
Vol 111 (7) ◽  
pp. 1-6 ◽  
Author(s):  
M. U.Farooq ◽  
Muhammad Waseem ◽  
Anjum Khairi ◽  
Sadia Mazhar

Sign in / Sign up

Export Citation Format

Share Document