Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
The advancement of novel technologies has positioned mobile wireless networks as the central focus of computer technology research. The selection process for the subsequent relay node in message forwarding holds paramount importance and is deemed critical. Drawing inspiration from Social Mobility theory, this paper presents a pioneering node classification model that categorizes all nodes into three distinct types. Furthermore, we introduce the concept of Active Entropy, where the numerical value of Active Entropy serves as a metric for message forwarding. Consequently, the routing algorithm transforms into a limited set of strategies between nodes belonging to different types. This routing algorithm offers numerous advantages including enhanced delivery rate, reduced network overhead ratio and decreased transmission delay. We evaluate and compare the performance of our proposed algorithm with that of DFDL algorithm and Prophet algorithm on the ONE simulation platform. Experimental results demonstrate that our proposed algorithm achieves a delivery rate at least 15% higher compared to the other two algorithms while also reducing overhead ratio.
The advancement of novel technologies has positioned mobile wireless networks as the central focus of computer technology research. The selection process for the subsequent relay node in message forwarding holds paramount importance and is deemed critical. Drawing inspiration from Social Mobility theory, this paper presents a pioneering node classification model that categorizes all nodes into three distinct types. Furthermore, we introduce the concept of Active Entropy, where the numerical value of Active Entropy serves as a metric for message forwarding. Consequently, the routing algorithm transforms into a limited set of strategies between nodes belonging to different types. This routing algorithm offers numerous advantages including enhanced delivery rate, reduced network overhead ratio and decreased transmission delay. We evaluate and compare the performance of our proposed algorithm with that of DFDL algorithm and Prophet algorithm on the ONE simulation platform. Experimental results demonstrate that our proposed algorithm achieves a delivery rate at least 15% higher compared to the other two algorithms while also reducing overhead ratio.
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibilities. This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the Hello Flood attack in mobile environments. Using four different group mobility models—the Column Mobility Model (CMM), Reference Point Group Mobility Model (RPGM), Nomadic Community Mobility Model (NCM), and Pursue Mobility Model (PMM)—within the Cooja simulator, this study uniquely investigates the Hello Flood attack in mobile settings, an area previously overlooked. Our systematic evaluation focuses on critical performance metrics, including the Packet Delivery Ratio (PDR), End-to-End Delay (E2ED), throughput, Expected Transmission Count (ETX), and Average Power Consumption (APC). The findings reveal several key insights: PDR decreases significantly, indicating increased packet loss or delivery failures; ETX values rise, necessitating more packet retransmissions and routing hops; E2ED increases, introducing delays in routing decisions and data transmission times; throughput declines as the attack disrupts data flow; and APC escalates due to higher energy usage on packet transmissions, especially over extended paths. These results underscore the urgent need for robust security measures to protect RPL-based IoT networks in mobile environments. Furthermore, our work emphasizes the exacerbated impact of the attack in mobile scenarios, highlighting the evolving security requirements of IoT networks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.