(IoT) with RPL

16 downloads 0 Views 518KB Size Report
[A.6.9] S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, ... draft-daniel-6lowpan-hilow-hierarchical-routing-01: Hierarchical Routing over ...
A Literature Collection on Routing in the Internet of Things (IoT) with RPL The Introduction Anatol Badach The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) has evolved into a very complex, upgradable "functional unit" which is being further developed and functionally enhanced. Therefore, the RPL is no longer just a single protocol, but a framework that integrates several functional modules. The issues that affect the RPL are presented in a large number of scientific articles. With the support of ResearchGate, I would like to make the list of RPL-related literature sources available to the broader research community. The list of literature sources presented here focuses on the following topics: A:

IoT Use Cases and Applications Requirements

B:

General Problems and Aspects of the Routing in IoT

C:

Different Security Aspects in IoT

The Structure and Topics of the presented Literature Collection

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

The further Parts of the Literature Collection and their Topics: Part 1:

RPL Framework

Part 2:

RPL Extensions

Part 3:

RPL Analysis and Evaluation

Part 4:

RPL Application – Concepts, Analysis and Evaluation

Part 5:

RPL Implementation – Concepts, Analysis and Evaluation

A:

IoT Use Cases and Applications Requirements

[A.1]

H. Chan and A. Perrig: Security and Privacy in Sensor Networks, Computer, Vol. 36(10), Oct. 2003; DOI: 10.1109/MC.2003.1236475

[A.2]

RFC 6568: Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs), Apr. 2012

[A.3]

M. R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. A. Grieco, G. Boggia and M. Dohler: Standardized Protocol Stack for the Internet of (Important) Things, IEEE Communications Surveys & Tutorials, Vol. 15(3), Third Quarter 2013; DOI: 10.1109/SURV.2012.111412.00158

[A.4]

Z. Sheng, S. Yang, Y. Yu, A. Vasilakos, J. Mccann and K. Leung: A Survey on the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities, IEEE Wireless Communications, Vol. 20(6), Dec. 2013; DOI: 10.1109/MWC.2013.6704479

A.1:

Home Automation, Smart Home

[A.1.1]

E. Callaway, P. Gorday, L. Hester, J. A. Gutierrez, M. Naeve, B. Heile and V. Bahl: „Home Networking with IEEE 802.15.4: A Developing Standard for Low-Rate Wireless Personal Area Networks“, IEEE Communications Magazine, Vol. 40(8), Aug. 2002

[A.1.2]

RFC 5826: Home Automation Routing Requirements in Low-Power and Lossy Networks, Apr. 2010

[A.1.3]

A. J. D. Rathnayaka, V. M. Potdar and S. J. Kuruppu: Evaluation of Wireless Home Automation Technologies, 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST), June 2011; DOI: 10.1109/DEST.2011.5936601

[A.1.4]

K. Islam, W. Shen and X. Wang: Security and Privacy Considerations for Wireless Sensor Networks in Smart Home Environments, IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD), May 2012; DOI: 10.1109/CSCWD.2012.6221884

[A.1.5]

M. R. Alam, M. B. I. Reaz and M. A. M. Ali: ‘‘A Review of Smart Homes - Past, Present, and Future’’, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, Vol. 42(6), Nov. 2012; DOI: 10.1109/TSMCC.2012.2189204

[A.1.6]

N. Langhammer and R. Kays: Performance Evaluation of Wireless Home Automation Networks in Indoor Scenarios, IEEE Transactions on Smart Grid, Vol. 3(4), Dec. 2012; DOI: 10.1109/TSG.2012.2208770

[A.1.7]

F. Viani, F. Robol, A. Polo, P. Rocca, G. Oliveri and A. Mass: Wireless Architectures for Heterogeneous Sensing in Smart Home Applications: Concepts and Real Implementation, Proceedings of the IEEE, Vol. 101(11), Nov. 2013; DOI: 10.1109/JPROC.2013.2266858

A.2:

Bulding Automation, Smart Bulding

[A.2.1]

RFC 5867: Building Automation Routing Requirements in Low-Power and Lossy Networks, June 2010

[A.2.2]

D. Dietrich, D. Bruckner, G. Zucker and P. Palensky: ‘‘Communication and Computation in Buildings: A Short Introduction and Overview’’, IEEE Transactions on Industrial Electronics, Vol. 57(11), Nov. 2010; DOI: 10.1109/TIE.2010.2046570

[A.2.3]

L. Krammer, D. Bunyai, W. Kastner: Hierarchical concept for IP-based resilient communication in building automation, IEEE 23rd International Symposium on Industrial Electronics (ISIE), June 2014; DOI: 10.1109/ISIE.2014.6865040

2

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

A.3:

Urban Networks, Smart City

[A.3.1]

RFC 5548: Routing Requirements for Urban Low-Power and Lossy Networks, May 2009

[A.3.2]

C. Harrison and I. A. Donnelly: A Theory of Smart Cities, Proceedings of the 55th Annual Meeting of the International Society for the Systems Sciences (ISSS), 2011.

[A.3.3]

Isabelle Augé-Blum, Khaled Boussetta, Hervé Rivano, Razvan Stanica and Fabrice Valois: „Capillary Networks: A Novel Networking Paradigm for Urban Environments“, ACM CoNext Workshop Urbane, Dec. 2012

[A.3.4]

A. Zanella, N. Bui, A. Castellani, L. Vangelista and M. Zorzi: Internet of Things for Smart Cities, IEEE Internet of Things Journal , Vol. 1(1), Feb. 2014; DOI: 10.1109/JIOT.2014.2306328

[A.3.5]

E. Avelar, L. Marques, D. dos Passos, R. Macedo, K. Dias and M. Nogueira: Interoperability issues on heterogeneous wireless communication for smart cities, Computer Communications, Vol. 58, March 2015; https://doi.org/10.1016/j.comcom.2014.07.005

A.4:

Industrial Networks, (Cognitive) M2M Commuicaion

[A.4.1]

RFC 5673: Industrial Routing Requirements in Low-Power and Lossy Networks, Oct. 2009

[A.4.2]

V. C. Gungor and G. P. Hancke: Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches, IEEE Transactions on Industrial Electronics, Vol. 56(10), Oct. 2009; DOI: 10.1109/TIE.2009.2015754

[A.4.3]

ETSI TS 102 689 v1.1.1: „Machine-to-Machine communications (M2M): M2M service requirements”, Aug. 2010

[A.4.4]

Y. Zhang, R. Yu, M. Nekovee, Y. Liu, S. Xie and S. Gjessing: “Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid“, IEEE Network, Vol. 26(3), May-June 2012; DOI: 10.1109/MNET.2012.6201210

[A.4.5]

A. Aijaz and A. H. Aghvami: „Cognitive Machine-to-Machine Communications for Internet-ofThings: A Protocol Stack Perspective“, IEEE Internet of Things Journal, Vol. 2(2), Apr. 2015; DOI: 10.1109/JIOT.2015.2390775

A.5:

Smart Grid, AMI Networks

[A.5.1]

A. Aggarwal, S. Kunta and P. K. Verma: A Proposed Communications Infrastructure for the Smart Grid, Conference: Innovative Smart Grid Technologies (ISGT), Jan. 2010; DOI: 10.1109/ISGT.2010.5434764

[A.5.2]

J. Tripathi, J. C. de Oliveira, J. P. Vasseur: Applicability Study of RPL with Local Repair in Smart Grid Substation Networks, First IEEE International Conference on Smart Grid Communications, Nov. 2010

[A.5.3]

J. Wang and V. C. M. Leung: A Survey of Technical Requirements and Consumer Application Standards for IP-based Smart Grid AMI Network, International Conference on Information Networking (ICOIN), Jan. 2011; DOI: 10.1109/ICOIN.2011.5723144

[A.5.4]

M. Daoud and X. Fernando: On the Communication Requirements for the Smart Grid, Energy and Power Engineering, Vol. 3(1), Feb. 2011; DOI:10.4236/epe.2011.31008

[A.5.5]

RFC 6272: Internet Protocols for the Smart Grid, June 2011

[A.5.6]

R. Yu, Y. Zhang, S. Gjessing, C. Yuen, S. Xie and M. Guizani: Cognitive Radio Based Hierarchical Communications Infrastructure for Smart Grid, IEEE Network, Vol. 25(5), Sep.-Oct. 2011; DOI: 10.1109/MNET.2011.6033030

[A.5.7]

W. Wang, Y. Xu, and M. Khanna: A survey on the communication architectures in smart grid. Computer Networks, Vol.55(15), Oct. 2011

[A.5.8]

N. Saputro, K. Akkaya and S. Uludag: A survey of routing protocols for smart grid communications, Computer Networks, Vol. 55(15), Oct. 2011

[A.5.9]

V.C. Güngör, D. Sahin, T. Kocak, S. Ergüt, C. Buccella, C. Cecati, and G. P. Hancke: “Smart Grid Technologies: Communication Technologies and Standards“, IEEE Transactions on Industrial Informatics, Vol. 7(4), Nov. 2011; DOI: 10.1109/TII.2011.2166794

[A.5.10] J. Gao, Y. Xiao, J. Liu, W. Liang and C.L. P. Chen: A survey of communication/networking in Smart Grids, Future Generation Computer Systems, Vol. 28(2), Feb. 2012

3

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

[A.5.11] H. Li, S. Gong, L. Lai, Z. Han, R. C. Qiu and D. Yang: Efficient and Secure Wireless Communications for Advanced Metering Infrastructure in Smart Grids, IEEE Transactions on Smart Grid, Vol. 3(3), Sep. 2012 [A.5.12] V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati and G. P. Hancke: A Survey on Smart Grid Potential Applications and Communication Requirements, IEEE Transactions on Industrial Informatics, Vol. 9(1), Feb. 2013; DOI: 10.1109/TII.2012.2218253 [A.5.13] Z. Fan, P. Kulkarni, S. Gormus, C. Efthymiou, G. Kalogridis, M. Sooriyabandara, Z. Zhu, S. Lambotharan and W. H. Chin: „Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities“, IEEE Communications Surveys & Tutorials, Vol.15(1), First Quarter 2013 [A.5.14] D. Baimel, S. Tapuchi and N. Baimel: Smart Grid Communication Technologies- Overview, Research Challenges and Opportunities, International Symposium on Power Electronics, Electrical Drives, Automation and Motion(SPEEDAM), June 2016; DOI: 10.1109/SPEEDAM.2016.7526014 [A.5.15] F. Dalipi and S. Y. Yayilgan: „Security and Privacy Considerations for IoT Application on Smart Grids: Survey and Research Challenges“, 4th International Conference on Future Internet of Things and Cloud Workshops, Aug. 2016; DOI: 10.1109/W-FiCloud.2016.28 [A.5.16] Y. Saleem, N. Crespi, M. H. Rehmani and R. Copeland: „Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions“, arXiv:1704.08977, Apr. 2017

A.6:

Smart Healthcare

[A.6.1]

A. Milenković, C. Otto and E. Jovanov: „Wireless sensor network for personal health monitoring: Issues and an implementationf“ , Computer Communications, Vol. 29, Aug. 2006

[A.6.2]

A. J. Jara, M. A. Zamora and A. F. G. Skarmeta: „HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management“, International Conference on Computational Science and Engineering, CSE ‘09, Vol. 2, Aug. 2009; DOI: 10.1109/CSE.2009.126

[A.6.3]

J. H. Kim, R. Haw and C. S. Hong: Development of a framework to support network-based mobility of 6LoWPAN sensor device for mobile healthcare system, Digest of Technical Papers International Conference on Consumer Electronics (ICCE10), Jan. 2010; DOI: 10.1109/ICCE.2010.5418817

[A.6.4]

A. J. Jara, M. A. Zamora and A. F. G. Skarmeta: An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN (HWSN6), Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.1, Sep. 2010

[A.6.5]

A. J. Jara, M. A. Zamora, and A. F.G. Skarmeta: Intra-mobility for Hospital Wireless Sensor Networks based on 6LoWPAN , 6th International Conference on Wireless and Mobile Communications (ICWMC), Sep. 2010; DOI: 10.1109/ICWMC.2010.54

[A.6.6]

H. Alemdar, C. Ersoy: „Wireless sensor networks for healthcare: A survey“, Computer Networks Vol. 54, 2010 ; doi :10.1016/j.comnet.2010.05.003

[A.6.7]

M. Chen, S. Gonzalez, A. Vasilakos, H. Cao and V. C. M. Leung: „Body area networks: a survey“, Mobile Networks and Applications, Vol. 16(2), Apr. 2011; DOI:10.1007/s11036-010-0260-8

[A.6.8]

João M. L. P. Caldeira, Joel J. P. C. Rodrigues and Pascal Lorenz: Toward Ubiquitous Mobility Solutions for Body Sensor Networks on HealthCare, IEEE Communications Magazine, Vol. 50(5), May 2012

[A.6.9]

S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman and K. Kwak; „A Comprehensive Survey of Wireless Body Area Networks - On PHY, MAC, and Network Layers Solutions“, Journal of Medical Systems, Vol. 36(3), June 2012; DOI: 10.1007/s10916-0109571-3

[A.6.10] S. Movassaghi, M. Abolhasan, J. Lipman, D. Smith and A. Jamalipour: „Wireless Body Area Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol. 16(3), 2014 [A.6.11] A. Rghioui, A. L’aarje, F. Elouaai and M. Bouhorma: Protecting E-healthcare Data Privacy for Internet of Things Based Wireless Body Area Network, Research Journal of Applied Sciences, Engineering and Technology, Vol. 9(10), Apr. 2015; DOI: 10.19026/rjaset.9.2638 [A.6.12] S. M. R. Islam, D. Kwak, MD. H. Kabir, M. Hossain and K.-S. Kwak: „The Internet of Things for Health Care: A Comprehensive Survey“, IEEE Access, Vol. 3, June 2015; DOI: 10.1109/ACCESS.2015.2437951

4

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

[A.6.13] S. B. Jadhav and L. P. Bhamare: “A Survey: Wireless Sensor Networks for Personal Health and Structural Health Monitoring”, International Journal of Modern Trends in Engineering and Research (IJMTER), Vol. 2, Nov. 2015 [A.6.14] S. R. Moosavia, T. N. Gia, E. Nigussie, A. M. Rahmania, S. Virtanen, H. Tenhunena, J. Isoaho: Endto-End Security Scheme for Mobility Enabled Healthcare Internet of Things, Future Generation Computer Systems 64, Mar. 2016; DOI: 10.1016/j.future.2016.02.020 [A.6.15] N. S. Nafi, K. Ahmed, M. A. Gregory and M. Datta: “A survey of smart grid architectures, applications, benefits and standardization”, Journal of Network and Computer Applications, Vol. 76, Dec. 2016; https://doi.org/10.1016/j.jnca.2016.10.003 [A.6.16] A. M. Rahmani, T. N. Gia, B. Negash, A. Anzanpour, I. Azimi, M. Jiang and P. Liljeberg: "Exploiting Smart E-Health Gateways at the Edge of Healthcare Internet-of-Things: A Fog Computing Approach", Future Generation Computer Systems, Feb. 2017; DOI: 10.1016/j.future.2017.02.014

B:

General Problems and Aspects of the Routing in IoT

[B.1]

M. Younis, M. Youssef, K. Arisha: Energy-Aware Routing in Cluster-Based Sensor Networks, 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems ( MASCOTS) 2002. Proceedings, Oct. 2002

[B.2]

J. N. Al-Karaki and A. E. Kamal: „Routing Techniques in Wireless Sensor Networks: A Survey“, IEEE Wireless Communications, Vol. 11(6), Dec. 2004: DOI: 10.1109/MWC.2004.1368893

[B.3]

K. Kim and K. G. Shin: On Accurate Measurement of Link Quality in Multi-hop Wireless Mesh Networks, Proc. International Conference on Mobile Computing and Networking (MobiCom 06), Sep. 2006.

[B.4]

R. Fonseca, O. Gnawali, K. Jamieson and P. Levis: Four-Bit Wireless Link Estimation, SING Technical Report SING-07-00, 2007

[B.5]

draft-daniel-6lowpan-hilow-hierarchical-routing-01: Hierarchical Routing over 6LoWPAN (HiLow), June 2007

[B.6]

draft-ietf-roll-protocols-survey-07: Overview of Existing Routing Protocols for Low Power and Lossy Networks, Apr. 2009, draft expired

[B.7]

T. Kavitha and D. Sridharan: “Security Vulnerabilities in Wireless Sensor Networks: A Survey”, Journal of Information Assurance and Security Vol. 5 (1), 2010

[B.8]

S. Dawson-Haggerty, A. Tavakoli, D. Culler: “Hydro: A Hybrid Routing Protocol for Low-Power and Lossy Networks”, Proceedings of the First IEEE International Conference on Smart Grid Communications (SmartGridComm), Oct. 2010

[B.9]

J. G. Ko, A. Terzis, S. Dawson-Haggerty, D. E. Culler, J. W. Hui and P. Levis: Connecting LowPower and Lossy Networks to the Internet, IEEE Communications Magazine, Apr. 2011

[B.10]

T. Watteyne, A. Molinaro, M. G. Richichi and M. Dohler: From MANET To IETF ROLL Standardization: A Paradigm Shift in WSN Routing Protocols, IEEE Communications Surveys & Tutorials, Vol. 13(4), 2011; DOI: 10.1109/SURV.2011.082710.00092

[B.11]

F. Ren, T. He, S. Das and C. Lin: Traffic-Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 9, Sep. 2011

[B.12]

E. Baccelli, M. Philipp and M. Goyal: “The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments”, Proceedings of the 16th IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Sep. 2011

[B.13]

B. Pavkovic, F. Theoleyre, A. Duda: Multipath Opportunistic RPL Routing over IEEE 802.15.4, The Proceedings of the 14th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Oct. 2011

[B.14]

N. Janicijevic, M. Lukic and I. Mezei: Routing Protocol for Low-Power and Lossy Wireless Sensor Networks, The Proceedings of the 19th IEEE Telecommunications Forum (TELFOR),

[B.15]

J. Ko, J. Eriksson, N. Tsiftes, S. Dawson-Haggerty, J. P. Vasseur, M. Durvy, A. Terzis, A. Dunkels and D. Culler: “Beyond Interoperability: Pushing the Performance of Sensor Network IP Stacks”, Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, SenSys 2011, Nov. 2011

5

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

[B.16]

L. M.L. Oliveira, A. F. de Sousa and J. J.P.C. Rodrigues: Routing and mobility approaches in IPv6 over LoWPAN mesh networks , International Journal of Communication Systems (IJCS), Vol. 24, Nov. 2011

[B.17]

W. Xiaonan, Z. Shan, Z. Rong: A mobility support scheme for 6LoWPAN, Computer Communications, Vol.35(3), Feb. 2012

[B.18]

C. Zhu, C. Zheng, L. Shu and G. Han: A survey on coverage and connectivity issues in wireless sensor networks. Journal of Network and Computer Applications, Vol. 35(2), Mar. 2012

[B.19]

N. Baccour, A. Koubâa, L. Mottola, M. A. Zuniga, H. Youssef, C. A. Boano, and M. Alves: “Radio link quality estimation in wireless sensor networks: a survey”, ACM Transactions on Sensor Networks (TOSN), Vol. 8, No. 4, 2012

[B.20]

O. Landsiedel, E. Ghadimi, S. Duquennoy and M. Johansson: “Low Power, Low Delay: Opportunistic Routing meets Duty Cycling”, IPSN'12 - ACM/IEEE Proceedings of the 11th International Conference on Information Processing in Sensor Networks, Apr. 2012

[B.21]

S. Ehsan and B. Hamdaoui: A Survey on Energy-Efficient Routing Techniques with QoS Assurances for Wireless Multimedia Sensor Networks, IEEE Communications Surveys & Tutorials, Vol. 14(2), 2012; DOI: 10.1109/SURV.2011.020211.00058

[B.22]

J. Kim, R. Haw, E. Cho, C. Hong and S. Lee: A 6LoWPAN Sensor Node Mobility Scheme Based on Proxy Mobile IPv6, IEEE Transactions on Mobile Computing, Vol. 11(12) Dec. 2012; DOI: 10.1109/TMC.2011.240

[B.23]

S. P: Tushar, M. P. Mayur, N. D. Ladumor, I.P. Ankit, P. D. Piyusha: A Classification and mobility metrics of various mobility models, Research Journal of Engineering Sciences, Vol. 2(1), Jan. 2013

[B.24]

J. Tripathi and J. C. de Oliveira: Proactive versus reactive revisited: IPv6 routing for Low Power Lossy Networks, 47th Annual Conference on Information Sciences and Systems (CISS 2013), Mar. 2013

[B.25]

N. A. Pantazis, S. A. Nikolidakis and D. D. Vergados: „Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol. 15(2), Second Quarter 2013¸ DOI: 10.1109/SURV.2012.062612.00084

[B.26]

A. Berguiga and H. Youssef: Efficient Mobility Management in 6LoWPAN Wireless Sensor Networks, Ninth International Conference on Wireless and Mobile Communications (ICWMC), July 2013

[B.27]

L. Deru, S. Dawans, M. Ocaña, B. Quoitin and O. Bonaventure: Redundant Border Routers for Mission-Critical 6LoWPAN Networks, Fifth Workshop on Real-World Wireless Sensor Networks, Sep. 2013; DOI: 10.1007/978-3-319-03071-5_20

[B.28]

Z. Sheng, S. Yang, Y. Yu, A. V. Vasilakos, J. A. Mccann and K. K. Leung: “A Survey on the IETF Protocol Suite for the Internet of Things: Standards, Challenges, and Opportunities”, IEEE Wireless Communications, Vol. 20(6), Dec. 2013; DOI:10.1109/MWC.2013.6704479

[B.29]

RFC 7102: Terms Used in Routing for Low-Power and Lossy Networks, Jan. 2014

[B.30]

M. Youssef, M. Ibrahim, M. Abdelatif, L. Chen and A.V. Vasilakos: „Routing Metrics of Cognitive Radio Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol.16(1), 2014; DOI:10.1109/SURV.2013.082713.00184

[B.31]

B. Pavkovic, A. Duda, W.-J. Hwang, F. Theoleyre: Efficient Topology Construction for RPL over IEEE 802.15. 4 in Wireless Sensor Networks, Ad Hoc Networks, Vol. 15, 2014

[B.32]

J. Yi and T. Clausen: Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks, International Journal of Distributed Sensor Networks, Vol. 2014, Mar. 2014; DOI: 10.1155/2014/352421

[B.33]

R. A. Khan and A. H. Mir: A Review of Network Based Mobility Management Schemes, WSN Mobility in 6LoWPAN Domain and Open Challenges , International Journal of Future Generation Communication and Networking, Vol. 7, No. 5, 2014; DOI: 10.14257/ijfgcn.2014.7.5.08

[B.34]

R. A. Khan and A. H. Mir: A Study of Network Based Mobility Management Schemes, 6LoWPAN Mobility, Open Issues and Proposed Solutions, arXiv:1408.2632, Aug. 2014; http://arxiv.org/abs/1408.2632

6

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

[B.35]

G. S. Matharu, P. Upadhyay and L. Chaudhary: „The Internet of Things: Challenges & Security Issues“, International Conference on Emerging Technologies (ICET), Dec. 2014; DOI: 10.1109/ICET.2014.7021016

[B.36]

J. Tripathi, J. C. De Oliveira, J.P. Vasseur: „Proactive versus reactive routing in low power and lossy networks: Performance analysis and scalability improvements“¸ Ad Hoc Networks, Vol.23, Dec. 2014; https://doi.org/10.1016/j.adhoc.2014.06.007

[B.37]

M. Devi and D. Deka: A Survey on Routing Protocols for Cognitive Radio Networks, International Journal of Engineering Research & Technology (IJERT), Vol. 4(4), Apr. 2015

[B.38]

draft-thubert-6lo-backbone-router-03: IPv6 Backbone Router, Nov. 2015, draft expired

[B.39]

T. Meng, F. Wu, Z. Yang, G. Chen and A.V. Vasilakos: Spatial Reusability-Aware Routing in MultiHop Wireless Networks. IEEE Transactions on Computers, Vol. 65(1), Jan. 2016; DOI:10.1109/TC.2015.2417543

[B.40]

Y. Qin, Q. Z. Sheng, N. J. G. Falkner, S. Dustdar, H. Wang and A. V. Vasilakos: „When Things Matter: A Survey on Data-Centric Internet of Things“, Journal of Network and Computer Applications Vol. 64, Feb. 2016; DOI: 10.1016/j.jnca.2015.12.016

[B.41]

Y. Yao, Q. Cao, A.V. Vasilakos: „EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks“ IEEE/ACM Transactions on Networking Vol. 23(3), June 2015; DOI: 10.1109/TNET.2014.2306592

[B.42]

draft-ietf-roll-applicability-template-09: ROLL Applicability Statement Template, May 2016, draft expired

[B.43]

M. Zhao, A. Kumar, P. H. J. Chong and R. Lu: “A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities”, Peer-to-Peer Networking and Applications, July 2016

[B.44]

S. M. Ghaleb, S. Subramaniam, Z. A. Zukarnain and A. Muhammed: „Mobility management for IoT: a survey“, EURASIP Journal onWireless Communications and Networking, Dec. 2016; DOI 10.1186/s13638-016-0659-4

[B.45]

draft-ietf-6lo-backbone-router: IPv6 Backbone Router, Jan. 2017

[B.46]

RFC 8138: IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Routing Header, Apr. 2017

[B.47]

I. M. Al-Joboury, E. H. Al-Hemiary: "Internet of Things (IoT): Readme", A Scientific Quarterly Refereed Journal Issued by Lebanese French University – Erbil – Kurdistan – Iraq, Vol. 2(1), April 2017; DOI: 10.25212/lfu.qzj.2.2.35

C:

Different Security Aspects in IoT

[C.1]

J. R. Douceur: The Sybil Attack, Proceedings of 1st International Workshop on Peer-to-Peer Systems (IPTPS), Jan. 2002

[C.2]

A.D. Wood and J. A. Stankovic: Denial of Service in Sensor Networks, Computer, Vol. 35, No. 10, Oct. 2002; DOI: 10.1109/MC.2002.1039518

[C.3]

J. Undercoffer, S. Avancha, A. Joshi and J. Pinkston: Security for Sensor Networks, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, MD 21250, Symposium, 2002

[C.4]

C. Karlof and D. Wagner: “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, IEEE International Workshop on Sensor Network Protocols and Applications, May 2003; DOI: 10.1109/SNPA.2003.1203362

[C.5]

J. Newsome, E. Shi, D. Song, and A. Perrig: „The Sybil Attack in Sensor Networks: Analysis & Defenses“, 3rd International Symposium on Information Processing in Sensor Networks (IPSN’04), Apr. 2004; DOI: 10.1109/IPSN.2004.239019

[C.6]

Q. Zhang, P. Wang, D. S. Reeves and P. Ning: Defending against Sybil Attacks in Sensor Networks, 25th IEEE International Conference on Distributed Computing Systems, June 2005; DOI: 10.1109/ICDCSW.2005.57

7

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

[C.7]

L. Lazos, R. Poovendran, C. Meadows, P. Syverson and L. W. Chang: “Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach“, IEEE Wireless Communications and Networking Conference (WCNC’05), Vol. 2, Mar. 2005; DOI: 10.1109/WCNC.2005.1424678y

[C.8]

Y.-C. Hu, A. Perrig and D. B. Johnson: Wormhole Attacks in Wireless Networks, IEEE Journal on Selected Areas in Communications, Vol. 24(2), Feb. 2006; DOI: 10.1109/JSAC.2005.861394

[C.9]

E. C. H. Ngai, J. Liu and M. R. Lyu: On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks, IEEE International Conference on Communications (ICC’06), Vol. 8, June 2006; DOI: 10.1109/ICC.2006.255595

[C.10]

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour: A Survey of Routing Attacks in Mobile Ad Hoc Networks. IEEE Wireless Communications, Vol.14(5), Oct. 2007; DOI: 10.1109/MWC.2007.4396947

[C.11]

Y. Zhou, Y. Fang and Y. Zhang: „Securing Wireless Sensor Networks: A Survey“, IEEE Communications Surveys & Tutorials, Vol.10(3), 2008; DOI: 10.1109/COMST.2008.4625802

[C.12]

Z. Tun and A. Htein Maw: Worm hole Attack Detection in Wireless Sensor Networks, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering Vol.2(10), 2008

[C.13]

G. Padmavathi and D. Shanmugapriya: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, No. 1 & 2, 2009; arXiv:0909.0576

[C.14]

S. Raza, T. Chung, S. Duquennoy, D. Yazar, T. Voigt and U. Roedig: Securing Internet of Things with Lightweight IPsec, Technical Report T2010:08, SICS, 2010; ISSN:1100-315

[C.15]

W. Hu, H. Tan, P. Corke, W. C. Shih and S. Jha: Toward Trusted Wireless Sensor Networks, ACM Transactions on Sensor Networks (TOSN), Vol. 7(1), Aug. 2010; DOI: 10.1145/1806895.1806900

[C.16]

S. Raza, T. Voigt und U. Roedig: 6LoWPAN Extension for IPsec, Proceedings of the Interconnecting Smart Objects with the Internet Workshop, Prague, Jan. 2011

[C.17]

S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt and U. Roedig: Securing Communication in 6LoWPAN with Compressed IPsec, 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS’11), June 2011

[C.18]

T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and Klaus Wehrle: Security Challenges in the IP-based Internet of Things, Wireless Personal Communications, Vol. 61(3), Dec. 2011; DOI: 10.1007/s11277-011-0385-5

[C.19]

S. Prasanna and S. Rao: An Overview of Wireless Sensor Networks Applications and Security, International Journal of Soft Computing and Engineering (IJSCE), Vol. 2, May 2012

[C.20]

S. Raza, D. Trabalza and T. Voigt: 6LoWPAN Compressed DTLS for CoAP, 8th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS’12), May 2012; DOI: 10.1109/DCOSS.2012.55

[C.21]

G. Sharma, S. Bala, and A. K. Verma: Security Frameworks for Wireless Sensor Networks - Review, Procedia Technology, Vol. 6, 2012; https://doi.org/10.1016/j.protcy.2012.10.119

[C.22]

S. U. Khan, C. Pastrone, L. Lavagno and M A. Spirito: An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Networks, Procedia Computer Science, Vol. 10, 2012; https://doi.org/10.1016/j.procs.2012.06.144

[C.23]

L. Wallgren, S. Raza and T. Voigt: Routing Attacks and Countermeasures in the RPL-Based Internet of Things, International Journal of Distributed Sensor Networks, Article ID 794326, 2013

[C.24]

S. Raza, L. Wallgren and T. Voigt: „VELTE: Real-time Intrusion Detection in the Internet of Things“, Ad Hoc Networks, Vol. 11(8), May 2013; DOI: http://dx.doi.org/10.1016/j.adhoc.2013.04.014

[C.25]

Z. A. Khan, S. Ur Rehman and M. H. Islam: An analytical survey of state of the art wormhole detection and prevention techniques, International Journal of Scientific & Engineering Research, Vol. 4(6), June 2013

[C.26]

C. K. Marigowda and M. Shingadi: Security Vulnerability Issues in Wireless Sensor Networks: A Short Survey, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2(7), July 2013

[C.27]

draft-keoh-dtls-multicast-security-00: DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs), July 2013, draft expired

8

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

[C.28]

draft-garcia-core-security-06: Security Considerations in the IP-based Internet of Things, Sep. 2013, draft expired

[C.29]

M. Chowdhury, M. F. Kader and Asaduzzaman: “Security Issues in Wireless Sensor Networks: A Survey”, International Journal of Future Generation Communication and Networking, Vol.6(5), Oct. 2013; DOI: 10.14257/ijfgcn.2013.6.5.10

[C.30]

S. Raza, H. Shafagh, K. Hewage, R. Hummen and T. Voigt: „Lithe: Lightweight Secure CoAP for the Internet of Things“, IEEE Sensors Journal, Vol. 13(10), Oct. 2013

[C.31]

T. Kothmayr, C. Schmitt, W. Hu, M. Brunig and G. Carle: DTLS based Security and Two-Way Authentication for the Internet of Things, Ad Hoc Networks, Vol. 11(8), Nov. 2013; DOI: 10.1016/j.adhoc.2013.05.003

[C.32]

draft-keoh-dice-dtls-profile-iot-00: Profiling of DTLS for CoAP-based IoT Applications, Nov. 2013, draft expired

[C.33]

S. Raza: Lightweight Security Solutions for the Internet of Things, Swedish Institute of Computer Science(SICS), 2013, ISBN 978-91-7485-110-6

[C.34]

R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah and K. N. Qureshi: Security Issues and Attacks in Wireless Sensor Network, World Applied Sciences Journal Vol. 30(10), 2014; DOI: 10.5829/idosi.wasj.2014.30.10.334

[C.35]

draft-keoh-dice-multicast-security-08: DTLS-based Multicast Security in Constrained Environments, July 2014, draft expired

[C.36]

K. Zhang, X. Liang, R. Lu and X. Shen: Sybil Attacks and Their Defenses in the Internet of Things, IEEE Internet of Things Journal, Vol. 1(5), Oct. 2014; DOI: 10.1109/JIOT.2014.2344013

[C.37]

S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt: Secure Communication for the Internet of Things – A Comparison of Link-Layer Security and IPsec for 6LoWPAN, Security and Communication Networks, Vol. 7(12), Dec. 2014; DOI: http://dx.doi.org/10.1002/sec.406

[C.38]

Ch. Cervantes, D. Poplade, M. Nogueira and A. Santos: Detection of Sinkhole Attacks for SupportingSecure Routing on 6LoWPAN for Internet of Things, Conference: Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, June 2015; DOI: 10.1109/INM.2015.7140344

[C.39]

P. B. Hari and S. N. Singh: Security Issues in Wireless Sensor Networks: Current Research and Challenges, International Conference on Advances in Computing, Communication, & Automation (ICACCA), Apr. 2016; DOI: 10.1109/ICACCA.2016.7578876

[C.40]

V. E. Ekong and U. O. Ekong: A Survey of Security Vulnerabilities in Wireless Sensor Networks, Nigerian Journal of Technology (NIJOTECH), Vol. 35(2), Apr. 2016

[C.41]

J. Granjal and E. Monteiro: End-to-end transparent transport-layer security for Internet-integrated mobile sensing devices, IFIP Networking Conference and Workshops, May 2016; DOI: 10.1109/IFIPNetworking.2016.7497235

[C.42]

S. Mukherjee, M. Chattopadhyay, S. Chattopadhyay and P. Kar: Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network, Journal of Computer Networks and Communications, Vol.2016, Oct. 2016, DOI: 10.1155/2016/3405264

[C.43]

F. Shahzad, M. Pasha and A. Ahmad: A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures, International Journal of Computer Science and Information Security (IJCSIS), Vol. 14(12), Dec. 2016

[C.44]

M. A. Ferrag, L. A. Maglaras, H. Janicke and J. Jiang: „Authentication Protocols for Internet of Things: A Comprehensive Survey“, arXiv, Dec. 2016

[C.45]

R. Stephen and Dr. L. Arockiam: An Enhanced Sinkhole Attacker Node Identification Technique using Successful Link Ratio in IoT Environment, International Journal of Computer Science (IJCSJournal), Vol. 5 (1), Jan. 2017

[C.46]

A. Sameer Hamood and S. B. Sadkhan: Cognitive Radio Network Security Status and Challenges , Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), Mar. 2017; DOI: 10.1109/NTICT.2017.7976105

[C.47]

B. B. Zarpelão, R. S. Miani, C. T. Kawakani and S. C. de Alvarenga: A Survey of Intrusion Detection in Internet of Things, Journal of Network and Computer Applications, Vol. 84, Apr. 2017; https://doi.org/10.1016/j.jnca.2017.02.009

9

Anatol Badach: The Routing in the Internet of Things with RPL - A Literature Collection, The Introduction

Dec. 2017

[C.48]

Pooja, Dr. R. K. Chauhan: Review on Security Attacks and Countermeasures in Wireless Sensor Networks, International Journal of Advanced Research in Computer Science, Vol. 8(5), May-June 2017

[C.49]

draft-irtf-t2trg-iot-seccons: State-of-the-Art and Challenges for the Internet of Things Security, June 2017

The next part contains the literature collection on the RPL Framework.

10