[A.6.9] S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, ... draft-daniel-6lowpan-hilow-hierarchical-routing-01: Hierarchical Routing over ...
A Literature Collection on Routing in the Internet of Things (IoT) with RPL The Introduction Anatol Badach The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) has evolved into a very complex, upgradable "functional unit" which is being further developed and functionally enhanced. Therefore, the RPL is no longer just a single protocol, but a framework that integrates several functional modules. The issues that affect the RPL are presented in a large number of scientific articles. With the support of ResearchGate, I would like to make the list of RPL-related literature sources available to the broader research community. The list of literature sources presented here focuses on the following topics: A:
IoT Use Cases and Applications Requirements
B:
General Problems and Aspects of the Routing in IoT
C:
Different Security Aspects in IoT
The Structure and Topics of the presented Literature Collection
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
The further Parts of the Literature Collection and their Topics: Part 1:
RPL Framework
Part 2:
RPL Extensions
Part 3:
RPL Analysis and Evaluation
Part 4:
RPL Application – Concepts, Analysis and Evaluation
Part 5:
RPL Implementation – Concepts, Analysis and Evaluation
A:
IoT Use Cases and Applications Requirements
[A.1]
H. Chan and A. Perrig: Security and Privacy in Sensor Networks, Computer, Vol. 36(10), Oct. 2003; DOI: 10.1109/MC.2003.1236475
[A.2]
RFC 6568: Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs), Apr. 2012
[A.3]
M. R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. A. Grieco, G. Boggia and M. Dohler: Standardized Protocol Stack for the Internet of (Important) Things, IEEE Communications Surveys & Tutorials, Vol. 15(3), Third Quarter 2013; DOI: 10.1109/SURV.2012.111412.00158
[A.4]
Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann and K. Leung: A Survey on the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities, IEEE Wireless Communications, Vol. 20(6), Dec. 2013; DOI: 10.1109/MWC.2013.6704479
A.1:
Home Automation, Smart Home
[A.1.1]
E. Callaway, P. Gorday, L. Hester, J. A. Gutierrez, M. Naeve, B. Heile and V. Bahl: „Home Networking with IEEE 802.15.4: A Developing Standard for Low-Rate Wireless Personal Area Networks“, IEEE Communications Magazine, Vol. 40(8), Aug. 2002
[A.1.2]
RFC 5826: Home Automation Routing Requirements in Low-Power and Lossy Networks, Apr. 2010
[A.1.3]
A. J. D. Rathnayaka, V. M. Potdar and S. J. Kuruppu: Evaluation of Wireless Home Automation Technologies, 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST), June 2011; DOI: 10.1109/DEST.2011.5936601
[A.1.4]
K. Islam, W. Shen and X. Wang: Security and Privacy Considerations for Wireless Sensor Networks in Smart Home Environments, IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD), May 2012; DOI: 10.1109/CSCWD.2012.6221884
[A.1.5]
M. R. Alam, M. B. I. Reaz and M. A. M. Ali: ‘‘A Review of Smart Homes - Past, Present, and Future’’, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, Vol. 42(6), Nov. 2012; DOI: 10.1109/TSMCC.2012.2189204
[A.1.6]
N. Langhammer and R. Kays: Performance Evaluation of Wireless Home Automation Networks in Indoor Scenarios, IEEE Transactions on Smart Grid, Vol. 3(4), Dec. 2012; DOI: 10.1109/TSG.2012.2208770
[A.1.7]
F. Viani, F. Robol, A. Polo, P. Rocca, G. Oliveri and A. Mass: Wireless Architectures for Heterogeneous Sensing in Smart Home Applications: Concepts and Real Implementation, Proceedings of the IEEE, Vol. 101(11), Nov. 2013; DOI: 10.1109/JPROC.2013.2266858
A.2:
Bulding Automation, Smart Bulding
[A.2.1]
RFC 5867: Building Automation Routing Requirements in Low-Power and Lossy Networks, June 2010
[A.2.2]
D. Dietrich, D. Bruckner, G. Zucker and P. Palensky: ‘‘Communication and Computation in Buildings: A Short Introduction and Overview’’, IEEE Transactions on Industrial Electronics, Vol. 57(11), Nov. 2010; DOI: 10.1109/TIE.2010.2046570
[A.2.3]
L. Krammer, D. Bunyai, W. Kastner: Hierarchical concept for IP-based resilient communication in building automation, IEEE 23rd International Symposium on Industrial Electronics (ISIE), June 2014; DOI: 10.1109/ISIE.2014.6865040
2
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
A.3:
Urban Networks, Smart City
[A.3.1]
RFC 5548: Routing Requirements for Urban Low-Power and Lossy Networks, May 2009
[A.3.2]
C. Harrison and I. A. Donnelly: A Theory of Smart Cities, Proceedings of the 55th Annual Meeting of the International Society for the Systems Sciences (ISSS), 2011.
[A.3.3]
Isabelle Augé-Blum, Khaled Boussetta, Hervé Rivano, Razvan Stanica and Fabrice Valois: „Capillary Networks: A Novel Networking Paradigm for Urban Environments“, ACM CoNext Workshop Urbane, Dec. 2012
[A.3.4]
A. Zanella, N. Bui, A. Castellani, L. Vangelista and M. Zorzi: Internet of Things for Smart Cities, IEEE Internet of Things Journal , Vol. 1(1), Feb. 2014; DOI: 10.1109/JIOT.2014.2306328
[A.3.5]
E. Avelar, L. Marques, D. dos Passos, R. Macedo, K. Dias and M. Nogueira: Interoperability issues on heterogeneous wireless communication for smart cities, Computer Communications, Vol. 58, March 2015; https://doi.org/10.1016/j.comcom.2014.07.005
A.4:
Industrial Networks, (Cognitive) M2M Commuicaion
[A.4.1]
RFC 5673: Industrial Routing Requirements in Low-Power and Lossy Networks, Oct. 2009
[A.4.2]
V. C. Gungor and G. P. Hancke: Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches, IEEE Transactions on Industrial Electronics, Vol. 56(10), Oct. 2009; DOI: 10.1109/TIE.2009.2015754
[A.4.3]
ETSI TS 102 689 v1.1.1: „Machine-to-Machine communications (M2M): M2M service requirements”, Aug. 2010
[A.4.4]
Y. Zhang, R. Yu, M. Nekovee, Y. Liu, S. Xie and S. Gjessing: “Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid“, IEEE Network, Vol. 26(3), May-June 2012; DOI: 10.1109/MNET.2012.6201210
[A.4.5]
A. Aijaz and A. H. Aghvami: „Cognitive Machine-to-Machine Communications for Internet-ofThings: A Protocol Stack Perspective“, IEEE Internet of Things Journal, Vol. 2(2), Apr. 2015; DOI: 10.1109/JIOT.2015.2390775
A.5:
Smart Grid, AMI Networks
[A.5.1]
A. Aggarwal, S. Kunta and P. K. Verma: A Proposed Communications Infrastructure for the Smart Grid, Conference: Innovative Smart Grid Technologies (ISGT), Jan. 2010; DOI: 10.1109/ISGT.2010.5434764
[A.5.2]
J. Tripathi, J. C. de Oliveira, J. P. Vasseur: Applicability Study of RPL with Local Repair in Smart Grid Substation Networks, First IEEE International Conference on Smart Grid Communications, Nov. 2010
[A.5.3]
J. Wang and V. C. M. Leung: A Survey of Technical Requirements and Consumer Application Standards for IP-based Smart Grid AMI Network, International Conference on Information Networking (ICOIN), Jan. 2011; DOI: 10.1109/ICOIN.2011.5723144
[A.5.4]
M. Daoud and X. Fernando: On the Communication Requirements for the Smart Grid, Energy and Power Engineering, Vol. 3(1), Feb. 2011; DOI:10.4236/epe.2011.31008
[A.5.5]
RFC 6272: Internet Protocols for the Smart Grid, June 2011
[A.5.6]
R. Yu, Y. Zhang, S. Gjessing, C. Yuen, S. Xie and M. Guizani: Cognitive Radio Based Hierarchical Communications Infrastructure for Smart Grid, IEEE Network, Vol. 25(5), Sep.-Oct. 2011; DOI: 10.1109/MNET.2011.6033030
[A.5.7]
W. Wang, Y. Xu, and M. Khanna: A survey on the communication architectures in smart grid. Computer Networks, Vol.55(15), Oct. 2011
[A.5.8]
N. Saputro, K. Akkaya and S. Uludag: A survey of routing protocols for smart grid communications, Computer Networks, Vol. 55(15), Oct. 2011
[A.5.9]
V.C. Güngör, D. Sahin, T. Kocak, S. Ergüt, C. Buccella, C. Cecati, and G. P. Hancke: “Smart Grid Technologies: Communication Technologies and Standards“, IEEE Transactions on Industrial Informatics, Vol. 7(4), Nov. 2011; DOI: 10.1109/TII.2011.2166794
[A.5.10] J. Gao, Y. Xiao, J. Liu, W. Liang and C.L. P. Chen: A survey of communication/networking in Smart Grids, Future Generation Computer Systems, Vol. 28(2), Feb. 2012
3
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
[A.5.11] H. Li, S. Gong, L. Lai, Z. Han, R. C. Qiu and D. Yang: Efficient and Secure Wireless Communications for Advanced Metering Infrastructure in Smart Grids, IEEE Transactions on Smart Grid, Vol. 3(3), Sep. 2012 [A.5.12] V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati and G. P. Hancke: A Survey on Smart Grid Potential Applications and Communication Requirements, IEEE Transactions on Industrial Informatics, Vol. 9(1), Feb. 2013; DOI: 10.1109/TII.2012.2218253 [A.5.13] Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. Kalogridis, M. Sooriyabandara, Z. Zhu, S. Lambotharan and W. H. Chin: „Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities“, IEEE Communications Surveys & Tutorials, Vol.15(1), First Quarter 2013 [A.5.14] D. Baimel, S. Tapuchi and N. Baimel: Smart Grid Communication Technologies- Overview, Research Challenges and Opportunities, International Symposium on Power Electronics, Electrical Drives, Automation and Motion(SPEEDAM), June 2016; DOI: 10.1109/SPEEDAM.2016.7526014 [A.5.15] F. Dalipi and S. Y. Yayilgan: „Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges“, 4th International Conference on Future Internet of Things and Cloud Workshops, Aug. 2016; DOI: 10.1109/W-FiCloud.2016.28 [A.5.16] Y. Saleem, N. Crespi, M. H. Rehmani and R. Copeland: „Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions“, arXiv:1704.08977, Apr. 2017
A.6:
Smart Healthcare
[A.6.1]
A. Milenković, C. Otto and E. Jovanov: „Wireless sensor network for personal health monitoring: Issues and an implementationf“ , Computer Communications, Vol. 29, Aug. 2006
[A.6.2]
A. J. Jara, M. A. Zamora and A. F. G. Skarmeta: „HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management“, International Conference on Computational Science and Engineering, CSE ‘09, Vol. 2, Aug. 2009; DOI: 10.1109/CSE.2009.126
[A.6.3]
J. H. Kim, R. Haw and C. S. Hong: Development of a framework to support network-based mobility of 6LoWPAN sensor device for mobile healthcare system, Digest of Technical Papers International Conference on Consumer Electronics (ICCE10), Jan. 2010; DOI: 10.1109/ICCE.2010.5418817
[A.6.4]
A. J. Jara, M. A. Zamora and A. F. G. Skarmeta: An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN (HWSN6), Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.1, Sep. 2010
[A.6.5]
A. J. Jara, M. A. Zamora, and A. F.G. Skarmeta: Intra-mobility for Hospital Wireless Sensor Networks based on 6LoWPAN , 6th International Conference on Wireless and Mobile Communications (ICWMC), Sep. 2010; DOI: 10.1109/ICWMC.2010.54
[A.6.6]
H. Alemdar, C. Ersoy: „Wireless sensor networks for healthcare: A survey“, Computer Networks Vol. 54, 2010 ; doi :10.1016/j.comnet.2010.05.003
[A.6.7]
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao and V. C. M. Leung: „Body area networks: a survey“, Mobile Networks and Applications, Vol. 16(2), Apr. 2011; DOI:10.1007/s11036-010-0260-8
[A.6.8]
João M. L. P. Caldeira, Joel J. P. C. Rodrigues and Pascal Lorenz: Toward Ubiquitous Mobility Solutions for Body Sensor Networks on HealthCare, IEEE Communications Magazine, Vol. 50(5), May 2012
[A.6.9]
S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman and K. Kwak; „A Comprehensive Survey of Wireless Body Area Networks - On PHY, MAC, and Network Layers Solutions“, Journal of Medical Systems, Vol. 36(3), June 2012; DOI: 10.1007/s10916-0109571-3
[A.6.10] S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith and A. Jamalipour: „Wireless Body Area Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol. 16(3), 2014 [A.6.11] A. Rghioui, A. L’aarje, F. Elouaai and M. Bouhorma: Protecting E-healthcare Data Privacy for Internet of Things Based Wireless Body Area Network, Research Journal of Applied Sciences, Engineering and Technology, Vol. 9(10), Apr. 2015; DOI: 10.19026/rjaset.9.2638 [A.6.12] S. M. R. Islam, D. Kwak, MD. H. Kabir, M. Hossain and K.-S. Kwak: „The Internet of Things for Health Care: A Comprehensive Survey“, IEEE Access, Vol. 3, June 2015; DOI: 10.1109/ACCESS.2015.2437951
4
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
[A.6.13] S. B. Jadhav and L. P. Bhamare: “A Survey: Wireless Sensor Networks for Personal Health and Structural Health Monitoring”, International Journal of Modern Trends in Engineering and Research (IJMTER), Vol. 2, Nov. 2015 [A.6.14] S. R. Moosavia, T. N. Gia, E. Nigussie, A. M. Rahmania, S. Virtanen, H. Tenhunena, J. Isoaho: Endto-End Security Scheme for Mobility Enabled Healthcare Internet of Things, Future Generation Computer Systems 64, Mar. 2016; DOI: 10.1016/j.future.2016.02.020 [A.6.15] N. S. Nafi, K. Ahmed, M. A. Gregory and M. Datta: “A survey of smart grid architectures, applications, benefits and standardization”, Journal of Network and Computer Applications, Vol. 76, Dec. 2016; https://doi.org/10.1016/j.jnca.2016.10.003 [A.6.16] A. M. Rahmani, T. N. Gia, B. Negash, A. Anzanpour, I. Azimi, M. Jiang and P. Liljeberg: "Exploiting Smart E-Health Gateways at the Edge of Healthcare Internet-of-Things: A Fog Computing Approach", Future Generation Computer Systems, Feb. 2017; DOI: 10.1016/j.future.2017.02.014
B:
General Problems and Aspects of the Routing in IoT
[B.1]
M. Younis, M. Youssef, K. Arisha: Energy-Aware Routing in Cluster-Based Sensor Networks, 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems ( MASCOTS) 2002. Proceedings, Oct. 2002
[B.2]
J. N. Al-Karaki and A. E. Kamal: „Routing Techniques in Wireless Sensor Networks: A Survey“, IEEE Wireless Communications, Vol. 11(6), Dec. 2004: DOI: 10.1109/MWC.2004.1368893
[B.3]
K. Kim and K. G. Shin: On Accurate Measurement of Link Quality in Multi-hop Wireless Mesh Networks, Proc. International Conference on Mobile Computing and Networking (MobiCom 06), Sep. 2006.
[B.4]
R. Fonseca, O. Gnawali, K. Jamieson and P. Levis: Four-Bit Wireless Link Estimation, SING Technical Report SING-07-00, 2007
[B.5]
draft-daniel-6lowpan-hilow-hierarchical-routing-01: Hierarchical Routing over 6LoWPAN (HiLow), June 2007
[B.6]
draft-ietf-roll-protocols-survey-07: Overview of Existing Routing Protocols for Low Power and Lossy Networks, Apr. 2009, draft expired
[B.7]
T. Kavitha and D. Sridharan: “Security Vulnerabilities in Wireless Sensor Networks: A Survey”, Journal of Information Assurance and Security Vol. 5 (1), 2010
[B.8]
S. Dawson-Haggerty, A. Tavakoli, D. Culler: “Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks”, Proceedings of the First IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2010
[B.9]
J. G. Ko, A. Terzis, S. Dawson-Haggerty, D. E. Culler, J. W. Hui and P. Levis: Connecting LowPower and Lossy Networks to the Internet, IEEE Communications Magazine, Apr. 2011
[B.10]
T. Watteyne, A. Molinaro, M. G. Richichi and M. Dohler: From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols, IEEE Communications Surveys & Tutorials, Vol. 13(4), 2011; DOI: 10.1109/SURV.2011.082710.00092
[B.11]
F. Ren, T. He, S. Das and C. Lin: Traffic-Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 9, Sep. 2011
[B.12]
E. Baccelli, M. Philipp and M. Goyal: “The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments”, Proceedings of the 16th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Sep. 2011
[B.13]
B. Pavkovic, F. Theoleyre, A. Duda: Multipath Opportunistic RPL Routing over IEEE 802.15.4, The Proceedings of the 14th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Oct. 2011
[B.14]
N. Janicijevic, M. Lukic and I. Mezei: Routing Protocol for Low-Power and Lossy Wireless Sensor Networks, The Proceedings of the 19th IEEE Telecommunications Forum (TELFOR),
[B.15]
J. Ko, J. Eriksson, N. Tsiftes, S. Dawson-Haggerty, J. P. Vasseur, M. Durvy, A. Terzis, A. Dunkels and D. Culler: “Beyond Interoperability: Pushing the Performance of Sensor Network IP Stacks”, Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, SenSys 2011, Nov. 2011
5
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
[B.16]
L. M.L. Oliveira, A. F. de Sousa and J. J.P.C. Rodrigues: Routing and mobility approaches in IPv6 over LoWPAN mesh networks , International Journal of Communication Systems (IJCS), Vol. 24, Nov. 2011
[B.17]
W. Xiaonan, Z. Shan, Z. Rong: A mobility support scheme for 6LoWPAN, Computer Communications, Vol.35(3), Feb. 2012
[B.18]
C. Zhu, C. Zheng, L. Shu and G. Han: A survey on coverage and connectivity issues in wireless sensor networks. Journal of Network and Computer Applications, Vol. 35(2), Mar. 2012
[B.19]
N. Baccour, A. Koubâa, L. Mottola, M. A. Zuniga, H. Youssef, C. A. Boano, and M. Alves: “Radio link quality estimation in wireless sensor networks: a survey”, ACM Transactions on Sensor Networks (TOSN), Vol. 8, No. 4, 2012
[B.20]
O. Landsiedel, E. Ghadimi, S. Duquennoy and M. Johansson: “Low Power, Low Delay: Opportunistic Routing meets Duty Cycling”, IPSN'12 - ACM/IEEE Proceedings of the 11th International Conference on Information Processing in Sensor Networks, Apr. 2012
[B.21]
S. Ehsan and B. Hamdaoui: A Survey on Energy-Efficient Routing Techniques with QoS Assurances for Wireless Multimedia Sensor Networks, IEEE Communications Surveys & Tutorials, Vol. 14(2), 2012; DOI: 10.1109/SURV.2011.020211.00058
[B.22]
J. Kim, R. Haw, E. Cho, C. Hong and S. Lee: A 6LoWPAN Sensor Node Mobility Scheme Based on Proxy Mobile IPv6, IEEE Transactions on Mobile Computing, Vol. 11(12) Dec. 2012; DOI: 10.1109/TMC.2011.240
[B.23]
S. P: Tushar, M. P. Mayur, N. D. Ladumor, I.P. Ankit, P. D. Piyusha: A Classification and mobility metrics of various mobility models, Research Journal of Engineering Sciences, Vol. 2(1), Jan. 2013
[B.24]
J. Tripathi and J. C. de Oliveira: Proactive versus reactive revisited: IPv6 routing for Low Power Lossy Networks, 47th Annual Conference on Information Sciences and Systems (CISS 2013), Mar. 2013
[B.25]
N. A. Pantazis, S. A. Nikolidakis and D. D. Vergados: „Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol. 15(2), Second Quarter 2013¸ DOI: 10.1109/SURV.2012.062612.00084
[B.26]
A. Berguiga and H. Youssef: Efficient Mobility Management in 6LoWPAN Wireless Sensor Networks, Ninth International Conference on Wireless and Mobile Communications (ICWMC), July 2013
[B.27]
L. Deru, S. Dawans, M. Ocaña, B. Quoitin and O. Bonaventure: Redundant Border Routers for Mission-Critical 6LoWPAN Networks, Fifth Workshop on Real-World Wireless Sensor Networks, Sep. 2013; DOI: 10.1007/978-3-319-03071-5_20
[B.28]
Z. Sheng, S. Yang, Y. Yu, A. V. Vasilakos, J. A. Mccann and K. K. Leung: “A Survey on the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities”, IEEE Wireless Communications, Vol. 20(6), Dec. 2013; DOI:10.1109/MWC.2013.6704479
[B.29]
RFC 7102: Terms Used in Routing for Low-Power and Lossy Networks, Jan. 2014
[B.30]
M. Youssef, M. Ibrahim, M. Abdelatif, L. Chen and A.V. Vasilakos: „Routing Metrics of Cognitive Radio Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol.16(1), 2014; DOI:10.1109/SURV.2013.082713.00184
[B.31]
B. Pavkovic, A. Duda, W.-J. Hwang, F. Theoleyre: Efficient Topology Construction for RPL over IEEE 802.15. 4 in Wireless Sensor Networks, Ad Hoc Networks, Vol. 15, 2014
[B.32]
J. Yi and T. Clausen: Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks, International Journal of Distributed Sensor Networks, Vol. 2014, Mar. 2014; DOI: 10.1155/2014/352421
[B.33]
R. A. Khan and A. H. Mir: A Review of Network Based Mobility Management Schemes, WSN Mobility in 6LoWPAN Domain and Open Challenges , International Journal of Future Generation Communication and Networking, Vol. 7, No. 5, 2014; DOI: 10.14257/ijfgcn.2014.7.5.08
[B.34]
R. A. Khan and A. H. Mir: A Study of Network Based Mobility Management Schemes, 6LoWPAN Mobility, Open Issues and Proposed Solutions, arXiv:1408.2632, Aug. 2014; http://arxiv.org/abs/1408.2632
6
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
[B.35]
G. S. Matharu, P. Upadhyay and L. Chaudhary: „The Internet of Things: Challenges & Security Issues“, International Conference on Emerging Technologies (ICET), Dec. 2014; DOI: 10.1109/ICET.2014.7021016
[B.36]
J. Tripathi, J. C. De Oliveira, J.P. Vasseur: „Proactive versus reactive routing in low power and lossy networks: Performance analysis and scalability improvements“¸ Ad Hoc Networks, Vol.23, Dec. 2014; https://doi.org/10.1016/j.adhoc.2014.06.007
[B.37]
M. Devi and D. Deka: A Survey on Routing Protocols for Cognitive Radio Networks, International Journal of Engineering Research & Technology (IJERT), Vol. 4(4), Apr. 2015
[B.38]
draft-thubert-6lo-backbone-router-03: IPv6 Backbone Router, Nov. 2015, draft expired
[B.39]
T. Meng, F. Wu, Z. Yang, G. Chen and A.V. Vasilakos: Spatial Reusability-Aware Routing in MultiHop Wireless Networks. IEEE Transactions on Computers, Vol. 65(1), Jan. 2016; DOI:10.1109/TC.2015.2417543
[B.40]
Y. Qin, Q. Z. Sheng, N. J. G. Falkner, S. Dustdar, H. Wang and A. V. Vasilakos: „When Things Matter: A Survey on Data-Centric Internet of Things“, Journal of Network and Computer Applications Vol. 64, Feb. 2016; DOI: 10.1016/j.jnca.2015.12.016
[B.41]
Y. Yao, Q. Cao, A.V. Vasilakos: „EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks“ IEEE/ACM Transactions on Networking Vol. 23(3), June 2015; DOI: 10.1109/TNET.2014.2306592
[B.42]
draft-ietf-roll-applicability-template-09: ROLL Applicability Statement Template, May 2016, draft expired
[B.43]
M. Zhao, A. Kumar, P. H. J. Chong and R. Lu: “A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities”, Peer-to-Peer Networking and Applications, July 2016
[B.44]
S. M. Ghaleb, S. Subramaniam, Z. A. Zukarnain and A. Muhammed: „Mobility management for IoT: a survey“, EURASIP Journal onWireless Communications and Networking, Dec. 2016; DOI 10.1186/s13638-016-0659-4
[B.45]
draft-ietf-6lo-backbone-router: IPv6 Backbone Router, Jan. 2017
[B.46]
RFC 8138: IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Routing Header, Apr. 2017
[B.47]
I. M. Al-Joboury, E. H. Al-Hemiary: "Internet of Things (IoT): Readme", A Scientific Quarterly Refereed Journal Issued by Lebanese French University – Erbil – Kurdistan – Iraq, Vol. 2(1), April 2017; DOI: 10.25212/lfu.qzj.2.2.35
C:
Different Security Aspects in IoT
[C.1]
J. R. Douceur: The Sybil Attack, Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), Jan. 2002
[C.2]
A.D. Wood and J. A. Stankovic: Denial of Service in Sensor Networks, Computer, Vol. 35, No. 10, Oct. 2002; DOI: 10.1109/MC.2002.1039518
[C.3]
J. Undercoffer, S. Avancha, A. Joshi and J. Pinkston: Security for Sensor Networks, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, MD 21250, Symposium, 2002
[C.4]
C. Karlof and D. Wagner: “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, IEEE International Workshop on Sensor Network Protocols and Applications, May 2003; DOI: 10.1109/SNPA.2003.1203362
[C.5]
J. Newsome, E. Shi, D. Song, and A. Perrig: „The Sybil Attack in Sensor Networks: Analysis & Defenses“, 3rd International Symposium on Information Processing in Sensor Networks (IPSN’04), Apr. 2004; DOI: 10.1109/IPSN.2004.239019
[C.6]
Q. Zhang, P. Wang, D. S. Reeves and P. Ning: Defending against Sybil Attacks in Sensor Networks, 25th IEEE International Conference on Distributed Computing Systems, June 2005; DOI: 10.1109/ICDCSW.2005.57
7
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
[C.7]
L. Lazos, R. Poovendran, C. Meadows, P. Syverson and L. W. Chang: “Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach“, IEEE Wireless Communications and Networking Conference (WCNC’05), Vol. 2, Mar. 2005; DOI: 10.1109/WCNC.2005.1424678y
[C.8]
Y.-C. Hu, A. Perrig and D. B. Johnson: Wormhole Attacks in Wireless Networks, IEEE Journal on Selected Areas in Communications, Vol. 24(2), Feb. 2006; DOI: 10.1109/JSAC.2005.861394
[C.9]
E. C. H. Ngai, J. Liu and M. R. Lyu: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks, IEEE International Conference on Communications (ICC’06), Vol. 8, June 2006; DOI: 10.1109/ICC.2006.255595
[C.10]
B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour: A Survey of Routing Attacks in Mobile Ad Hoc Networks. IEEE Wireless Communications, Vol.14(5), Oct. 2007; DOI: 10.1109/MWC.2007.4396947
[C.11]
Y. Zhou, Y. Fang and Y. Zhang: „Securing Wireless Sensor Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol.10(3), 2008; DOI: 10.1109/COMST.2008.4625802
[C.12]
Z. Tun and A. Htein Maw: Worm hole Attack Detection in Wireless Sensor Networks, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering Vol.2(10), 2008
[C.13]
G. Padmavathi and D. Shanmugapriya: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, No. 1 & 2, 2009; arXiv:0909.0576
[C.14]
S. Raza, T. Chung, S. Duquennoy, D. Yazar, T. Voigt and U. Roedig: Securing Internet of Things with Lightweight IPsec, Technical Report T2010:08, SICS, 2010; ISSN:1100-315
[C.15]
W. Hu, H. Tan, P. Corke, W. C. Shih and S. Jha: Toward Trusted Wireless Sensor Networks, ACM Transactions on Sensor Networks (TOSN), Vol. 7(1), Aug. 2010; DOI: 10.1145/1806895.1806900
[C.16]
S. Raza, T. Voigt und U. Roedig: 6LoWPAN Extension for IPsec, Proceedings of the Interconnecting Smart Objects with the Internet Workshop, Prague, Jan. 2011
[C.17]
S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt and U. Roedig: Securing Communication in 6LoWPAN with Compressed IPsec, 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS’11), June 2011
[C.18]
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and Klaus Wehrle: Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, Vol. 61(3), Dec. 2011; DOI: 10.1007/s11277-011-0385-5
[C.19]
S. Prasanna and S. Rao: An Overview of Wireless Sensor Networks Applications and Security, International Journal of Soft Computing and Engineering (IJSCE), Vol. 2, May 2012
[C.20]
S. Raza, D. Trabalza and T. Voigt: 6LoWPAN Compressed DTLS for CoAP, 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS’12), May 2012; DOI: 10.1109/DCOSS.2012.55
[C.21]
G. Sharma, S. Bala, and A. K. Verma: Security Frameworks for Wireless Sensor Networks - Review, Procedia Technology, Vol. 6, 2012; https://doi.org/10.1016/j.protcy.2012.10.119
[C.22]
S. U. Khan, C. Pastrone, L. Lavagno and M A. Spirito: An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Networks, Procedia Computer Science, Vol. 10, 2012; https://doi.org/10.1016/j.procs.2012.06.144
[C.23]
L. Wallgren, S. Raza and T. Voigt: Routing Attacks and Countermeasures in the RPL-Based Internet of Things, International Journal of Distributed Sensor Networks, Article ID 794326, 2013
[C.24]
S. Raza, L. Wallgren and T. Voigt: „VELTE: Real-time Intrusion Detection in the Internet of Things“, Ad Hoc Networks, Vol. 11(8), May 2013; DOI: http://dx.doi.org/10.1016/j.adhoc.2013.04.014
[C.25]
Z. A. Khan, S. Ur Rehman and M. H. Islam: An analytical survey of state of the art wormhole detection and prevention techniques, International Journal of Scientific & Engineering Research, Vol. 4(6), June 2013
[C.26]
C. K. Marigowda and M. Shingadi: Security Vulnerability Issues in Wireless Sensor Networks: A Short Survey, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2(7), July 2013
[C.27]
draft-keoh-dtls-multicast-security-00: DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs), July 2013, draft expired
8
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
[C.28]
draft-garcia-core-security-06: Security Considerations in the IP-based Internet of Things, Sep. 2013, draft expired
[C.29]
M. Chowdhury, M. F. Kader and Asaduzzaman: “Security Issues in Wireless Sensor Networks: A Survey”, International Journal of Future Generation Communication and Networking, Vol.6(5), Oct. 2013; DOI: 10.14257/ijfgcn.2013.6.5.10
[C.30]
S. Raza, H. Shafagh, K. Hewage, R. Hummen and T. Voigt: „Lithe: Lightweight Secure CoAP for the Internet of Things“, IEEE Sensors Journal, Vol. 13(10), Oct. 2013
[C.31]
T. Kothmayr, C. Schmitt, W. Hu, M. Brunig and G. Carle: DTLS based Security and Two-Way Authentication for the Internet of Things, Ad Hoc Networks, Vol. 11(8), Nov. 2013; DOI: 10.1016/j.adhoc.2013.05.003
[C.32]
draft-keoh-dice-dtls-profile-iot-00: Profiling of DTLS for CoAP-based IoT Applications, Nov. 2013, draft expired
[C.33]
S. Raza: Lightweight Security Solutions for the Internet of Things, Swedish Institute of Computer Science(SICS), 2013, ISBN 978-91-7485-110-6
[C.34]
R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah and K. N. Qureshi: Security Issues and Attacks in Wireless Sensor Network, World Applied Sciences Journal Vol. 30(10), 2014; DOI: 10.5829/idosi.wasj.2014.30.10.334
[C.35]
draft-keoh-dice-multicast-security-08: DTLS-based Multicast Security in Constrained Environments, July 2014, draft expired
[C.36]
K. Zhang, X. Liang, R. Lu and X. Shen: Sybil Attacks and Their Defenses in the Internet of Things, IEEE Internet of Things Journal, Vol. 1(5), Oct. 2014; DOI: 10.1109/JIOT.2014.2344013
[C.37]
S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt: Secure Communication for the Internet of Things – A Comparison of Link-Layer Security and IPsec for 6LoWPAN, Security and Communication Networks, Vol. 7(12), Dec. 2014; DOI: http://dx.doi.org/10.1002/sec.406
[C.38]
Ch. Cervantes, D. Poplade, M. Nogueira and A. Santos: Detection of Sinkhole Attacks for SupportingSecure Routing on 6LoWPAN for Internet of Things, Conference: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, June 2015; DOI: 10.1109/INM.2015.7140344
[C.39]
P. B. Hari and S. N. Singh: Security Issues in Wireless Sensor Networks: Current Research and Challenges, International Conference on Advances in Computing, Communication, & Automation (ICACCA), Apr. 2016; DOI: 10.1109/ICACCA.2016.7578876
[C.40]
V. E. Ekong and U. O. Ekong: A Survey of Security Vulnerabilities in Wireless Sensor Networks, Nigerian Journal of Technology (NIJOTECH), Vol. 35(2), Apr. 2016
[C.41]
J. Granjal and E. Monteiro: End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices, IFIP Networking Conference and Workshops, May 2016; DOI: 10.1109/IFIPNetworking.2016.7497235
[C.42]
S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay and P. Kar: Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network, Journal of Computer Networks and Communications, Vol.2016, Oct. 2016, DOI: 10.1155/2016/3405264
[C.43]
F. Shahzad, M. Pasha and A. Ahmad: A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14(12), Dec. 2016
[C.44]
M. A. Ferrag, L. A. Maglaras, H. Janicke and J. Jiang: „Authentication Protocols for Internet of Things: A Comprehensive Survey“, arXiv, Dec. 2016
[C.45]
R. Stephen and Dr. L. Arockiam: An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment, International Journal of Computer Science (IJCSJournal), Vol. 5 (1), Jan. 2017
[C.46]
A. Sameer Hamood and S. B. Sadkhan: Cognitive Radio Network Security Status and Challenges , Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Mar. 2017; DOI: 10.1109/NTICT.2017.7976105
[C.47]
B. B. Zarpelão, R. S. Miani, C. T. Kawakani and S. C. de Alvarenga: A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, Vol. 84, Apr. 2017; https://doi.org/10.1016/j.jnca.2017.02.009
9
Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction
Dec. 2017
[C.48]
Pooja, Dr. R. K. Chauhan: Review on Security Attacks and Countermeasures in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science, Vol. 8(5), May-June 2017
[C.49]
draft-irtf-t2trg-iot-seccons: State-of-the-Art and Challenges for the Internet of Things Security, June 2017
The next part contains the literature collection on the RPL Framework.
10