نتایج جستجو برای: dodag

تعداد نتایج: 17  

Journal: :International Journal of Advanced Computer Science and Applications 2021

The magical buzzword Internet of Things (IoT) connects any objects which are diverse in nature. restricted capacity, heterogeneity and large scale implementation the IoT technology tend to have lot security threats networks. RPL is routing protocol for constraint devices like nodes. ICMPv6 plays a major role constructing tree-like topology called DODAG. It vulnerable several attacks. Version Nu...

Journal: :Journal of communications software and systems 2022

The Objective Function (OF) can be used by the Routing protocol for low power lossy networks (RPL) to construct a Destination Oriented Directed Acyclic Graph (DODAG) based on routing metrics. standard OFs suffer from long hops when selecting route, which may cause consume node's energy faster. In this paper, we suggest an improvement of RPL OF that considers three results show proposed increase...

2016
Nabil Djedjig Djamel Tandjaoui Faiza Medjek Imed Romdhani

Establishing trust relationships between nodes participating in constructing the routing paths represents a primary security milestone to have reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new scheme for RPL (Routing Protocol for Low-power and Lossy Networks) named: Metric-based RPL Trustworthiness Scheme (MRTS) to enhance RPL security and deal w...

Journal: :Wireless Personal Communications 2021

The Internet of Things, also known as the IoT, refers to billions devices around world that are now connected Internet, collecting and sharing data. amount data collected through IoT sensors must be completely securely controlled. To protect information by sensors, a lightweight method called Discover Flooding Attack-RPL (DFA-RPL) has been proposed. proposed DFA-RPL identifies intrusive nodes i...

Journal: :IEEE Communications Letters 2022

The 6TiSCH standard provides minimum latency and reliability in mission-critical IoT applications. To optimize resource allocation during network formation, IETF released the minimal configuration (6TiSCH-MC) standard. 6TiSCH-MC considered IETF’s IPv6 Routing Protocol for Low power Lossy (RPL) as a routing protocol both upward downward routing. In RPL, new joining nodes or joined transmit DODAG...

Journal: :Computing 2022

RPL is the IETF standardized IPv6 Routing Protocol for Low-power and lossy networks (LLNs). The major effort therefore made on handling low data rate traffic. Meanwhile, Internet of Multimedia Things emerged as one hot topic Things. In LLNs, providing a descent quality service (QoS) along with user experience (QoE) multimedia applications challenging. High bandwidth significant computation capa...

Journal: :Europan journal of science and technology 2021

In today, Internet of Things (IoT) has a wide usage area and makes easier our lives with smart objects that can communicate each other without human intervention. However, as Wireless Sensor Networks, IoT networks bring new risks. These risks reaching worrying levels cause some significant issues such security, privacy, energy in the network topology. The IPv6 Routing Protocol for Low-Power Los...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید