Next Article in Journal
A Single Source Switched-Capacitor 13-Level Inverter with Triple Voltage Boosting and Reduced Component Count
Next Article in Special Issue
Throughput Analysis for Wireless Full-Duplex Multi-Hop Networks with RTS/CTS-Based MAC
Previous Article in Journal
SORT-YM: An Algorithm of Multi-Object Tracking with YOLOv4-Tiny and Motion Prediction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions

1
Sydney International School of Technology and Commerce, Sydney, NSW 2000, Australia
2
School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad 44000, Pakistan
3
School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia
4
Australian Institute of Higher Education, Sydney, NSW 2000, Australia
5
College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
6
School of Information Technology, Whitireia Community Polytechnic, Auckland 1010, New Zealand
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(19), 2320; https://doi.org/10.3390/electronics10192320
Submission received: 28 July 2021 / Revised: 11 September 2021 / Accepted: 12 September 2021 / Published: 22 September 2021
(This article belongs to the Special Issue Network Protocols for Wireless Sensor Networks)

Abstract

:
The Internet of Things (IoT) is aimed to provide efficient and seamless connectivity to a large number of low-power and low-cost embedded devices, consequently, the routing protocols play a fundamental role in achieving these goals. The IETF has recently standardized the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) for LLNs (i.e., Low-power and Lossy Networks) and is well-accepted among the Internet community. However, RPL was proposed for static IoT devices and suffers from many issues when IoT devices are mobile. In this paper, we first present various issues that are faced by the RPL when IoT devices are mobile. We then carry out a detailed survey of various solutions that are proposed in the current literature to mitigate the issues faced by RPL. We classify various solutions into five categories i.e., ‘Trickle-timer based solutions’, ‘ETX based solutions’, ‘RSSI based solutions’, ‘Position-based solutions’, and ‘Miscellaneous solutions’. For each category of these solutions, we illustrate their working principles, issues addressed and make a thorough assessment of their strengths and weaknesses. In addition, we found several flaws in the performance analysis done by the authors of each of the solutions, e.g., nodes mobility, time intervals, etc., and suggest further investigations for the performance evaluations of these solutions in order to assess their applicability in real-world environments. Moreover, we provide future research directions for RPL supporting various real-time applications, mobility support, energy-aware, and privacy-aware routing.

1. Introduction

IoT is the connection of devices to the Internet where devices are able to communicate with each other and their users, such as cameras, medical sensors, light-bulbs, and smoke alarms [1]. IoT allows devices to assist daily routines, such as cars can be synced with calendars for appointment or meeting tracking to plan the best routes. According to the research done by IDC, there are already 13 billion connected devices in use worldwide in 2017 and the number could reach over 40 billion by 2025 [2]. Data among the network devices can be sent and received by the process called routing. In this process data packets are moved from one host to another across a network.
RPL is a Routing Protocol for Low Power and Lossy Networks (LLNs). LLN are devices with low power, low memory, and reduced processing resources and have a wide scope in areas such as industrial monitoring [3,4,5,6], health care [7,8,9,10], transport [11,12], building automation [13,14], urban sensor networks, assets tracking [15,16], connected home [17,18,19], and refrigeration [20]. RPL is designed by the IETF Routing Over Low power and Lossy network (ROLL) group [21]. RPL operates on the assumption that a network contains a sink node with greater power resources and computing capabilities as compared to the rest of the nodes in a network. RPL is based on calculating direction and distance to any link in the network. It was designed for static networks with minimum reactivity to mobility. Support for mobility is one of the fundamental issues found in RPL. Hence, the importance of this research is to find out the issues faced by RPL during IoT devices mobility and categorizing different solutions by mentioning their working principles, strengths, and weaknesses.
We note that there are other (representative) surveys conducted on RPL, e.g., [22,23,24,25,26,27], that focus on (or only mention) load balancing and further provide guidelines on reviewing and comparing the available research. Specifically, Ref. [22] provides a thorough analysis of LLNs and RPL for their limitations and drawbacks and points out the areas of improvements e.g., multiple-instance optimization, traffic patterns, evaluation in real testbeds, load balancing, and lack of applications in real-world scenarios. The authors in [23,24] respectively provide the areas of improvements for enhanced RPL (e.g., mobility, security, upward/downward routing, etc.) and challenges of RPL and various areas of improvements, such as energy consumption, mobility, quality of service, congestion control, and security. Similarly, Ref. [25] provides a comprehensive survey on RPL with the focus on various objective functions e.g., single or composite metrics, multipath routing, or fuzzy logic, and reviews their main methods, improvements, and shortcomings. In addition, the [26,27] reviews literature works for increased energy efficiency and performance in a load-balanced network.
Unlike these surveys that each focus on RPL, its key components, and its shortcomings for load balancing, the issues of RPL mobility and related problems were not the main focus of these surveys. The closest to our surveys are following: Ref. [28] compares a limited number of routing protocols for LLNs and assesses the impact of mobility on the network performance; Ref. [29] studies the performance of RPL and P2P-RPL protocols; and Ref. [30] presents a survey on RPncement focusing on network topology, mobility, and security. However, compared to these works, this survey presents a qualitative methodology to present various issues faced by RPL during mobility of IoT nodes; such as lack of identification of mobile nodes, issues with Trickle algorithm loops in the network, the delay caused by Expected Transmission Count (ETX) probing, lack of positioning information, increased handoff delays, issues with the rank of detached mobile nodes and the lack of sink-to-sink coordination. We identified 20 different variations of the RPL protocol suggested in the literature and classified them into five categories based on various criteria. For example, solutions based on 1. ‘Trickle-timer’ that address various issues such as frequent changes in topology due to nodes movement, slow DIO message probing, dynamic selection of various timers, and packet loss due to selection of preferred parents. 2. The `ETX-based solutions’ that deal with enhancing link quality, such as reduced communication delay, link stability during mobility, reducing the cost of making new network topology, and slow response to topology changes due to delays in ETX probing, unreachable destinations, and loops in the network. 3. `RSSI-based solutions’ that provide mobility and energy aware routing and address handoff delays for better link quality. 4. `Position-based solutions’ that address position inaccuracies and disconnections among static and mobile nodes by providing reliable routing, address frequent topolog changes and speed of mobile nodes, and 5. Miscellaneous solutions.
Following, for each category of these solutions, we illustrate the working principles, issues addressed, strengths, and weaknesses of each of the 20 RPL variations. Furthermore, we present comprehensive research directions for evaluating the performance of RPL mobility in the presence of various simulation parameters, such as node types, number of nodes, node mobility, intervals, simulation duration and area, and simulation environment, in addition to, energy consumption, packet loss, packet delivery ratio, and latency.
Following are the key contributions of this survey:
  • To analyze the issues faced by RPL when IoT devices are non-stationary;
  • To critically evaluate the solutions that are proposed in the current literature to mitigate the issues faced by RPL during mobility of IoT devices;
  • To categorize various solutions into different types and illustrate the working principle, strengths, and weaknesses of each solution; and
  • To propose future research directions that can be explored to propose better solutions to the issues faced by RPL during the mobility of IoT devices.
This survey paper is organized as follows: Section 2 presents the background knowledge and literature review. In Section 3, we describe the issues faced RPL during mobility. Section 4 provides the available solutions to those issues. In Section 5, we propose future research directions. Finally, we conclude our discussion in Section 6.

2. Background and Literature Review

In this section, we present an introduction to routing, RPL protocol and its working principle. Following, we present literature review of the articles that address mobility in RPL and describe the importance of the current research work.

2.1. Background

The WSN is a specific kind of Low-power Wireless Personal Area Network (LoWPAN) composed of several nodes that are equipped with sensors of various types e.g., temperature, humidity, etc. However, we note that due to the absence of IP communication infrastructure, the interoperability between the WSN and the Internet was limited, hence, several works were dedicated to proposing a structure that could provide the use of IP over LoWPAN [31,32]. Hence, the IETF proposed a working group called 6LoWPAN (IPv6 over Low-power Wireless Personal Area Networks) to propose the use of IPv6 over IEEE 802.15.4 networks, which suggested the use of an adaption layer in IP stack (i.e., it provides the fragmentation and defragmentation of IPv6 packets in IEEE 802.15.4 frames). Following, through the work of the 6LoWPAN working group, a new working group (i.e., Routing over Low-power and Lossy networks (RoLL)) was created to study solutions for the emerging LLNs [33]. This working group defined the routing requirements for urban LLNs [34], industrial LLNs [35], home automation LLNs [36], and building automation LLNs [37].
LLN network consists of embedded devices with limited power, memory, and processing resources interconnected by links such as IEEE 802.15.4 or low-power Wi-Fi [38]. Figure 1 depicts an example scenario of the Low Power and Lossy IoT networks. Routing is the process of selecting a route for traffic in a network or across multiple networks whereas the forwarding of packets is done based on routing tables which maintain the route record to various destinations. Protocols are defined by the set of rules used so that network devices can communicate with each other.
RPL is a distance-vector IPv6 routing protocol for low power and lossy networks that utilizes an optimized route to transmit traffic from a sink node. RPL provides a routing solution to low power and lossy networks and is highly adaptive in providing alternative routes during the inaccessibility of default routes. RPL organizes topology formation by making Destination-Oriented Directed Acyclic Graphs (DODAGs). DODAG has a DAG rooted at a single destination and has a DODAG root with no outing edges. DODAG root is responsible for several parameters’ configuration such as Trickle timer options, Path Control Size, Min Hop Rank Increase, and DODAG preference field. Identification of DODAG can be done by RPL Instance ID and a DODAG ID. RPL instance can be defined when one or more than one DODAGs share the same RPL instance ID. Each RPL Instance is implemented by a different Objective Function (https://tools.ietf.org/id/draft-ietf-roll-of0-14.html accessed on 1 September 2021) (OF) and a single RPL instance can have multiple DODAGs.
The rank of the nodes is defined by the individual position of nodes with respect to other nodes. Rank decreases in the up direction and increases in the down direction. Computation of rank is done by the OF. OF defines how nodes are selected and how routes are optimized in the RPL instance. OF can be identified by a parameter defined under the DIO message option known as Objective Code Point (OCP). OF performs several purposes along with a set of metrics. Furthermore, the selection of DODAG to be joined by a node is done by OF. An ordered list of parent’s computations and the number of peers as a parent in that DODAG is performed by OF [38]. There are mainly two types of OF. First is Objective Function Zero (OF0) which takes into account hop count as a routing metric. Second is the Minimum Rank with Hysteresis Objective Function (https://tools.ietf.org/id/draft-ietf-roll-minrank-hysteresis-of-08.html accessed on 1 September 2021) (MRHOF) [39] which works with ETX that is additive along a route. ETX is the average number of data frame transmission and necessary ACK frames for successful packet broadcasts.
RPL uses four main control messages to transfer information: First is the DODAG Information Object (https://datatracker.ietf.org/doc/html/rfc6550#section-6.3 accessed on 1 September 2021) (DIO) which permits the nodes to find RPL instances and select a DODAG parent set. Second, is DODAG Information Solicitation (https://datatracker.ietf.org/doc/html/rfc6550#section-6.2 accessed on 1 September 2021) (DIS) used to solicit the DIO message from RPL nodes [40]. The third is Destination Advertisement Object (https://datatracker.ietf.org/doc/html/rfc6550#section-6.4 accessed on 1 September 2021) (DAO) used to send destination information upwards to choose the parent in a storing mode and to the DODAG root in non-storing mode. In non-storing mode, data is sent by a node all the way up to the DODAG root by passing messages recursively to DIO parents. In storing mode, packets are passed to DIO parents by a node until it reaches an ancestor through which destination prefix is accessible. Fourth is DAO Acknowledgement (DAO-ACK) sent by a DAO parent in response to the DAO unicast message.
To reduce control messages overhead, RPL uses a Trickle timer by transmitting updates only when inconsistencies in the network are detected. A redundancy counter is incremented if the node hears DIO updates from a neighbor in a consistent state. The number of consistent updates exceeding the redundancy constant in a particular time interval, no transmission of updates are made by the node, and doubling of the listen period is done. However, upon hearing an inconsistent update, the timer gets reset and starts sending DIO messages more frequently so that propagation of updates is done through the rest of the network. During the stable network, fewer control messages are transmitted by the Trickle timer to save energy [40]. Trickle timer has three configuration parameters: The I m i n or the minimum interval size, I m a x or the maximum interval size, and a redundancy constant (k). I or the current interval size, time within the current interval t, and a counter (c) are other variables used in the Trickle timer. Each node has an individual interval. Interval starts at I m i n and finishes at I m a x . A major interval is divided into sub-intervals.
In Figure 2, root launches the creation of a DODAG by transferring a DIO message to its neighboring nodes that are governed by the Trickle algorithm to minimize the traffic overheads. The node receiving the DIO message computes its rank and advertises the graph using further DIO’s. If Node 3 (as mentioned in the figure) does not want to wait for the DIO message, it can send a DIS message triggering DIO transmission and resets the Trickle timer. The node transmits DAO for advertising its address to establishes a downward route. Two modes i.e., storing and non-storing modes are used for managing downward routing. Downward routing tables are stored by nodes in a storing mode. In non-storing mode, regular messages are sent because of the limited lifetime of advertised addresses [40]. RPL builds a logical topology by using three control messages and bi-directional paths are established between nodes and sinks with minimal overheads.   

2.2. Literature Review

We note that RPL was designed for static networks, so the introduction of mobility in the network has caused many issues in the functioning of RPL. Authors [28] have surveyed LLN under mobility. Authors have discussed various RPL mobility extensions such as DAG-based Multipath Routing (DMR) [41], Mobility Enhanced RPL (ME-RPL) [42], Co-RPL [43], Mobility Enhanced RPL [44], Modified RPL [45] for Vehicular ad hoc Networks (VANETS), and mRPL [46]. All these protocols supporting mobility properties are discussed such as their directions, metrics, constraints, and messages used for transmission. Furthermore, the discovery of the route, its maintenance and repair mechanism in terms of traffic types, messages trigger, and dissemination of all the protocols are discussed in detail. On the other hand, a survey on RPL enhancement focusing on topology, mobility, and security is done by authors [30]. Discussions are made on dealing with traffic patterns and improving the link quality estimation, in addition, the authors discuss single metric and composite metric OF is discussed.
Following, the security threats in RPL such as black and grey hole attacks, sinkhole attacks, Identity-based attacks, wormhole attacks, version number attacks are discussed along with their mitigation. Similarly, various mobility detection methods such as ETX probing, corona mechanism, Kalman filter of Mobility Enhanced RPL [44] are described and results are mentioned in terms of responsiveness and energy consumption. Another survey on attacks in RPL was performed by authors [47]. Various RPL attacks such as selective forwarding attack, Sybil attack, Clone ID attack, black hole attack, Wormhole attack, Denial of Service attack, alteration, sinkhole attack, and spoofing attack are discussed and their effects on network parameters are discussed. Methods to counter these attacks were mentioned, such as IDS solution, heartbeat protocol, the global and local repair mechanism of RPL. One more survey was done by authors [48] on security attacks and secure routing protocols in RPL. Classification of attacks was done namely attacks against resources including direct attacks namely flooding attacks, routing table overhead attacks, and indirect attacks comprising an increase in rank attacks, DAG inconsistency attacks, and attacks on the version number. Another classification was made on attacks in topology and attacks on traffic. Various attacks description was given and protocols which can address these attacks were mentioned, such as TRAIL, Markel tree authentication.
Another survey performed on RPL is by authors [49]. Different communication paradigms in RPL such as Multi-Point-to-Point, Point-To-Multi-Point, Point-To-Point were discussed. Following, the focus was made on several mechanisms for network management such as fault tolerance, QoS-aware routing, and security in RPL are described. Later RPL performance evaluation with respect to power consumption, packet delay, and packet loss was done by performing simulations. Authors [50] have surveyed various RPL protocols supported by the Contiki operating system. Protocols such as Contiki RPL, GT-RPL, SSCF, Tiny RPL, and DT-RPL are analyzed by performance metrics followed by these protocols; future research directions were also proposed. In addition, routing attacks were studied and security mechanisms proposed to be used in the Contiki network layer are discussed.
We note that most of the researchers have done a survey on security attacks on RPL and few of them have performed a survey on evaluating RPL performance under mobility of IoT devices. The authors [28,30] have proposed solutions for supporting node mobility in RPL but authors failed to classify the solutions into different categories. In addition, the authors have not discussed the strengths, weaknesses, and working principles of each solution. In this research, several issues faced by RPL under mobility are presented and various solutions to those issues are discussed. We categorize those solutions into various categories, discuss their strengths and weaknesses, and further provide detailed discussions over future research directions.

3. Issues Faced by RPL during Mobility

Following, we discuss the issues faced by the RPL when the devices are non-stationary.

3.1. Lack of Identification of Mobile IoT Nodes

In IoT, a node can either be stationary or mobile, so it is pertinent to identify both of these types. Mobile nodes result in a time-varying network topology that is most likely to cause invalid routes and link breakage in DAGs. However, traditional RPL has no mechanism to differentiate between stationary and non-stationary nodes [51]. This differentiation is important as it enables RPL to optimize routing in the existence of mobile nodes [24,38,52].

3.2. Issues with Trickle Algorithm

RPL uses a Trickle timer to control the overhead caused by the DIO messages. The value of this timer is increased if no topological changes are noticed in the network i.e, the network is in a stable state. This makes RPL an energy-efficient algorithm. However, a mobile node may move out of range of the existing parent and leave the DODAG which results in link breakage and packet loss. This issue is only noticed by RPL in the next Trickle period (i.e., 2.3 h [53]) which delays the route repair process. Note that a node has the choice to send a DIS message that enforces other neighboring nodes (already attached to the graph) to send DIO, however, the RPL specifications do not state how and when DIS should be sent [40]. Another issue is that the DIO period of all nodes is exponentially decreased after detecting any inconsistency in the network, which results in a large network overhead.

3.3. Loops in the Network

In RPL, the current rank of the mobile node is set to infinity when it disconnects from its parent. This allows the mobile nodes to attach with neighboring nodes even with those that have lower ranks (any rank is less than infinity). This mechanism of RPL results in a closed-loop if the detached mobile node selects the new parent that was previously its child [46].

3.4. Delay Caused by ETX Probing

In RPL, when a node discovers a new neighbor it schedules PING request messages to get the neighbor’s ETX value. The node then decides whether to change its parent by taking into account the ETX values of both the new neighbor and current parent [45]. This scheduling of ETX probing delays the selection of preferred parents and causes issues in highly mobile environments (e.g., VANETS) where nodes frequently change their ranks.

3.5. Lack of Positioning Information

To make the best routing decision for mobile nodes, the routing protocols should consider the position of nodes. We note that RPL does not take into account the positioning information of mobile nodes during routing decisions [54].

3.6. Increase in Hand-off Delays

Performing seamless hand-off is a major challenge in mobile IoT since performing a detailed analysis of whether a link will break or not or to select the best possible link will require many resources (e.g., bandwidth, energy) on resource-constrained mobile devices. RPL performs poorly during hand-off and results in larger hand-off delays [55].

3.7. Issues with the Rank of Detached Mobile Nodes

A mobile node that is disconnected from the graph can only change its current parent when it receives DIO that has a better rank than itself. A node can send DIS messages to receive new DIO messages, however, it stays disconnected if the rank in those DIO messages is worse than its own rank. This increases the time taken by the nodes to re-attach with the graph [41]. RPL does not specify how the inaccessible parent can be removed from the parent set. We note that RPL suggests some solutions for unreachability detection e.g., neighbor discovery, bidirectional forwarding detection, however, they are too complicated to use in practical environments.

3.8. Lack of Sink-to-Sink Cooperation

Multiple DODAGs in the network are maintained by each single sink node. Nodes at the end of sub DODAG are called border nodes. These nodes receive DIO messages from their own DODAG and neighboring DODAG. In RPL, because of the neighboring sink high rank or larger distance, these DIO messages from neighboring DODAG are not forwarded by the border nodes in their own DODAG [56]. This creates a lack of coordination among sinks.

4. Solutions to the Issues Faced by RPL during Mobility

In this section, we classify the current solutions into five different categories, as shown in Figure 3.

4.1. Trickle Timer-Based Solutions

A Trickle timer is used to exchange connectivity information with local nodes by broadcasting control messages. Messages transmission interval is constrained and it increases with the network stability. When the stability is compromised by a mobile node, the interval is reset to a minimum value. Proposed solutions use a lower Trickle timer to solve the issue of Trickle timer and lack of identification of mobile nodes.

4.1.1. Co-RPL

Authors [43] carry out several simulations with static nodes in an RPL-based network. Due to loss of connectivity, a high packet loss ratio of more than 20% was observed in the network. This number got worse in a Mobile Wireless Sensor Network (MWSN) when there is a continuous change in topology. Hence, the authors proposed a Co-RPL that addresses the Quality of Service (QoS) requirements of MWSNs. Co-RPL [43] works on the Corona mechanism which reduces frequent node failures by improving the localization of mobile nodes. Corona architecture divides the network area into Coronas. A Corona is made up of a central region centered with a DAG root in a certain radius which is equal to the maximum transmission range of a sensor node. The author considered mobile routers as nodes running with RPL protocol and there are four DAGs with each DAG associated with a Corona.
In RPL, DIO messages are sent by the Trickle timer mechanism for exchanging information with local nodes. Here transmission interval is bounded and is increased with the network stability. Hence, to be aware of the position of the nodes in real-time, the author proposed this mechanism where the DAG root sends DIO messages periodically. The interval between two DIO messages is based on the node’s speed. Furthermore, without waiting for the periodic timer expiration, neighboring nodes start sending DIO messages. DIS and DIO messages have been modified as control messages used in Co-RPL by adding flags that distinguishes standard control messages used in RPL: Bit F is used in DIS messages, if F = 0 , it is a standard RPL control message, when if F = 1 , it is from the Co-RPL node. Each Corona is assigned a corona ID (CID), which helps in detecting the mobility of a node and triggering neighbor discovery. DAG root as well as other nodes maintain a list of the Node ID, DAG ID, Corona ID, and the link quality by tracking its neighbors. Simulation results show a lower packet loss of 20% in Co-RPL as compared to 45% in standard RPL due to the Co-RPL forwarding strategy that uses Corona to detect mobile nodes and find alternative parents. The authors noticed that the energy consumption in Co-RPL was 50% less compared to the standard RPL, owing to the reason of high packet loss. In addition, it results in an average delay 2.5 s lower than standard RPL due to the forwarding mechanism in Co-RPL.

4.1.2. Enhanced Trickle Algorithm

According to the author [57], when the network is consistent, the DIO messages flow slower according to the Trickle timer algorithm. If a mobile node is moving to an alternative location it will not able to enter a network due to slow DIO messages transmission. Instead, this node will send a DIS message to its neighboring nodes from a new location to request a DIO message. Therefore, the node must wait until the DIO message is received from the neighboring router nodes or artificially re-configuring the Trickle timer. Hence, the authors [57] proposed an enhanced version of the Trickle algorithm to solve the increased latency problem occurring from a `listen-only’ period in the Trickle timer algorithm. The proposed algorithm supports node mobility by adjusting DIS message transmission period dynamically based on Doppler frequency which is used to measure mobile node moving speed and signal strength which is calculated to measure the distance between router node and the mobile node. When a mobile node wants to enter a network to find its parent node, it sends a DIS message to neighboring router nodes.
After receiving the DIS message from the mobile node, the neighboring router nodes transmit a DIO message to the mobile node. Upon receiving DIO, the mobile node stores an OF value and selected node ID for choosing the parent node from the parent list table. In addition, the mobile nodes save the information of neighboring routers as Preferable Parents (PPs) in the parent list table. When the mobile node moves from one location to another and its interval for selecting a new parent node expires, it selects a router node with the highest OF value as a new parent among the PPs, and parent entry is updated in the parent table list. Following, the mobile node evaluates the value of Doppler frequency and signal strength from the DIO message to determine the time interval dynamically. Subsequently, the mobile node sends a DAO message to a selected router node which becomes a new parent node once the selected time interval is initialized. The simulation results show 40.1% and 52.7% lower DIS message transmission count as compared to the original Trickle timer algorithm. In addition, the average packet loss rate for mobile node speed of 1.25 m/s in the proposed algorithm evaluates to 0.3% as compared to 19.4% of the original algorithm, in addition, 0% of E-Trickle algorithm [58], and 11.3% of ME-RPL algorithm [42]. The energy consumption of a mobile node evaluates to 72.5 mJ for the proposed algorithm compared to 78.9 mJ for the original algorithm, 79.2 mJ for the E-Trickle algorithm, and 77.5 mJ for the ME-RPL algorithm.

4.1.3. Mobility Enhanced RPL

Recall, that RPL faces many mobility issues such as lack of identification of mobile nodes, packet loss due to the selection of mobile node as a preferred parent, and mobile node getting detached from the DODAG due to Trickle timer interval issue. To cope with this, the authors [44] proposed Mobility Enhanced RPL to resolve the above-mentioned issues. For identifying mobile IoT nodes in the network, a node configured as mobile adds its mobility information in the DIO base object, e.g., the field mobility status is set to 1 in the DIO message if the node is configured as mobile otherwise it is set to 0. The second issue is resolved by not selecting the mobile nodes as Preferred Parents (PP) causing packet losses by checking the node mobility information in the DIO messages. Fixed nodes having lower ranks are considered as Preferred Parents. The authors consider the PP change as an inconsistency parameter for detecting the mobility of the nodes. In the proposed approach, the DIS messages are not only used to allow nodes to join the DODAG but also to update the routing information of a node experiencing more inconsistencies.
Subsequently, the Inter-DIS interval is computed based on the number of PP changes in the previous inter-DIS time period. If the number of PP changes are high, then it means that the nodes are in an unstable environment and likely to remain the same in the next time period. The next inter-DIS period is decremented so that nodes can refresh their routing information by sending it in a DIO message. On the other hand, if the PP remains unchanged for several inter-DIS periods, then the next inter-DIS period is incremented. The simulation results show the packet loss rate of ME-RPL is lower as compared to standard RPL. Route stability is defined as a valid routes percentage for effectively routing data information in the network, furthermore, ME-RPL shows higher stable routes as compared to basic RPL.

4.1.4. Elastic Trickle Timer Algorithm

The major issue found in the standard Trickle algorithm is the long `listen-only’ period where nodes only listen and receive messages instead of broadcasting the messages. Authors [59] propose an Elastic Trickle algorithm allowing dynamic selection of `listen-only’ period depending on the number of surrounding nodes. The number of neighboring nodes determination begins with I m i n during the start of the first sub-interval where the node sends a message to join a DODAG.
In the following sub-interval, the authors have proposed the number of neighbors as n 1 and the `listen-only’ period as p 1 . For neighbors n 2 , the `listen-only’ period is p 2 given that p 1 < p 2 < p 3 and n 1 < n 2 < n 3 i.e., the `listen-only’ period is shorter for a smaller number of neighbors helping in avoiding collisions. At the start of the main interval, the counter is set to zero. Listen time is utilized by the nodes to check their state. If the message is received by an unknown ID and the same message is swapped by the neighboring nodes, then the node is said to be consistent, otherwise, it is considered inconsistent if it receives a message from an ID less than the one exchanged by neighboring nodes. Node makes a comparison of counter value with k, if the value of the counter is less than k, the message is transmitted by the node, otherwise, the node goes into the waiting state until the end of the current sub-interval and doubling of the new sub-interval. Simulations results show, compared to basic RPL, that this algorithm converges in 76% less time for a network of 80 nodes. The average Packet Delivery Ratio (PDR) of 87% is obtained in a random topology and 85% for grid topology with 80 nodes.
Table 1 summarizes the working principle, issues addressed, strengths, and weaknesses of solutions under the `Trickle Timer-based Solutions’.

4.2. ETX-Based Solutions

ETX indicates the quality of the node-link and it is one of the prominent routing metrics in LLNs. Following solutions take ETX as a metric for measuring the quality of the link and for solving the issue of delay caused by ETX probing and increase in hand-off delay.

4.2.1. Fuzzy Logic Based Energy-Aware Routing Protocol (FLEA-RPL)

Authors [60] proposed Fuzzy Logic Based Energy Aware Routing Protocol (FLEA-RPL) whose routing metrics are based on load, Residual Energy (RER), and Expected Transmission count (ETX). The load is the amount of data traveling across the network for a specific instant of time. Residual energy represents the variation of initial and current energy in the node. ETX is a measure of the quality of a path between two nodes in a wireless packet data network. The input fuzzy set is a combination of different metric Loads, ETX, and RER. Terminologies used in fuzzy logic are the linguistic variable and membership function. A linguistic variable is a structure of language and belongs to a set of values between true and false. The linguistic variable is evaluated by the membership function to provide accurate input and output variables.
As an example, if the load is less than or equal to 3, the fuzzy subset of a node is Light and the membership value is 1. If the load is between 3 to 6, the membership value decreases to 0, and the linguistic variable as Heavy . Similarly, when RER is less than or equal to 75, the membership value is 1 and the fuzzy subset is Low and when RER is in the range of 25 to 75, the membership function is 0 and the linguistic variable is Average. For ETX values less than or equal to 10, membership is 1 and the fuzzy subset is Short. For selecting a quality neighbor node or preferred parent node linguistic variable contains seven sets namely awful, low bad, bad, good, very good, and excellent. By seeing a fuzzy set of Load, RER, and ETX, the quality of the linguistic variable is selected, which helps in selecting the preferred parent node. Simulation results show the number of parent changes per hour is 0.2 in basic RPL, 0.25 in MRHOF-RPL [39], 0.27 in FL-RPL, and 0.26 in FLEA-RPL [60] . The average end-to-end delay of a packet in RPL shows low latency in FLEA-RPL as compared to other protocols. FLEA-RPL with 6 packets per minute throughput shows the result of no packet loss up to a network size of 20.

4.2.2. Multi-Fuzzy Model (MI-FL)

Author [61] proposed a Multi-fuzzy model which overcomes the limitation of the fuzzy logic system in which individual metrics combination illustrates objective function to select the best parent. The multi-fuzzy model supports three metrics, i.e., node metrics, link-oriented metrics, and channel-oriented metrics. Node metrics include node energy, the number of neighbors connected, and ETX. Link-oriented metrics include link stability, mobility, and hop counts, whereas, the channel-oriented metric includes channel capacity.
Author [61] has enhanced BMRF (Bi-directional Multicast RPL Forwarding) [62], and the proposed algorithm used is (EBMRF) Enhanced BMRF in which duplicated packets are suppressed. The occurrence of duplicate packets is mainly because of packet forwarding to multiple nodes by the parent node. Parent node multicasts packets to the child nodes whereas packets from downward nodes are considered to be unicast. In this EBMRF, a unique ID is included in each multicast packet which will suppress duplicate packets by identifying the packet ID. In addition, the delay problem in which collisions were caused by the use of the same channel for sequential communication is solved by selecting the idle channel which is free for transmitting data.

4.2.3. A Congestion Avoidance Multipath Routing Protocol (CA-RPL)

Recall that RPL is a single path routing protocol where packets are transmitted by a node to a preferred parent and upon the failure of the existing path, the network selects new links to make a new topology, which creates unnecessary cost. RPL works on a single routing decision metric, hence, during network overload, large data traffic causes significant packet loss and latency due to network congestion. Therefore, the authors [63] proposed a Congestion Avoidance multipath routing protocol (CA-RPL) which minimizes the average delay towards DAG root. Each path weight is computed by metrics rank, ETX, the number of received packets, link reliability, the time factor, and load balance. Based on Contiki MAC radio duty and cycling protocol, the authors proposed a minimized delay metric where the node learns the wake-up phase of its parents and packets are sent to the first awaken parent. Therefore, it minimizes the time delay between DOAG root and DODAG nodes as it reduces the time the node takes to wait until the receiver wakes up. During network building, the number of packets received in a period of time is recorded by each node.
Subsequently, the node broadcasts its DIO message where fields like REC, RANK value, ETX, cycle time (CT), D E L A Y R O O T values, and wake-up phase are included. Upon receiving the DIO message by the child node from the parent node, it extracts REC value, RANK value, ETX, and then calculates the D E L A Y R O O T the minimized delay metric. Following, the child node computes the path weight from the parent node to the root node. The distinction of DIO messages from different parents is done by the child node by computing each path weight, ranks the parent nodes according to their weights, and a link table is formed in which the best two parent nodes are selected. As a result, the child node sends a DAO message to its selected parents by forming a link to the DAG root. The authors carry out a series of simulations: run-time 6 min, Interpacket interval is kept to 4 s. During the short inter-packet interval, the Packet Reception Ratio (PRN) in CA-RPL increases by 50% as compared to basic RPL, on the other hand, during network congestion when the network size is big, the PRN of CA-RPL increases by 20% compared to basic RPL. The packet loss rate reduces to 25% in CA-RPL as compared to basic RPL. Similarly, latency is less in CA-RPL as compared to RPL since, in CA-RPL, nodes avoid congestion links while sending packets and consider time factors for choosing the first-awake parent to receive packets.

4.2.4. Modified RPL

A vehicular ad hoc network (VANET) refers to ad hoc wireless networking between vehicles. It is seen that RPL has a slow response to topology changes due to delays in ETX probing, unreachable destinations, and loops in the network. Authors [45] have proposed a modified RPL VANET where ETX probing is performed immediately upon new neighbor discovery rather than following a periodic strategy so that new neighbors can be immediately considered as preferred parents. Loops in the network can result if the node selects a neighbor whose parent is the node itself as the rank of the neighboring node is less than the current node’s rank which is set to infinity. To avoid looping, a parent ID is sent in the DIO message so that if the parent ID matches the node ID, the node can discard the DIO messages, preventing loop formation. In addition, DIO and DAO messages are sent immediately to notify the new rank and parent routes to children ignoring Trickle timer delays. Simulation results show that, upon modifications, the modified RPL shows a better PDR of 90% for 10 nodes as compared to 80% shown by RPL. Similarly, they observe a throughput of 19 kbps for both basic and Modified RPLs, furthermore, an overall delay of 1.3 ms is observed in the modified RPL, compared to a 1.2 ms delay for RPL.

4.2.5. Multiple Sinks

A network consisting of a single sink causes scalability and energy efficiency issues. Author [55] proposed a solution by deploying multiple sinks in the network via virtual root with minimum complexity. In a single sink node, the average number of hop counts increases between sensor nodes and a sink node as the network size increases. This leads to more packet loss, consumption of high energy, and a decrease in sensor nodes’ lifetime. Therefore, deployment of multiple sinks provides a solution to all problems as the sensor nodes communicate to the nearest sink, reducing the average number of hops causing increased performance, and consume less power. Furthermore, the concept of virtual sink is proposed in which actual sinks behave as a child of common sink nodes in a wired network. A combination of two techniques is carried out: first in which packets are forwarded to the correct sinks having entries of a sensor node. Second, packet forwarding to all sink nodes in which packets are forwarded to all sinks and to the destination sensor nodes. A combination of both techniques is applied where the sink node sends a packet to the correct destination node having an entry in its routing table. Simulations results show that when nodes are positioned within the 20 m range, 32% packet loss is observed and when the number of hops increases to 3, 50% packet loss is observed.
Comparison of average ETX to a Preferred Parent of a node is done with the number of hops to the sink. With multiple sinks, the average number of hops gets reduced to more than 50%. Furthermore, packet loss is reduced due to the addition of more sinks, data started flowing in different directions resulting in fewer packet collisions. Similarly, the energy consumption is reduced due to decreases in the average number of hops to transmit a packet.
Table 2 summarizes the working principle, issues addressed, strengths, and weaknesses of solutions under the category `ETX-based Solutions’.

4.3. RSSI Based Solutions

The estimation of the expected connection quality is provided by the Received Signal Strength Indicator (RSSI) of the received packets. The following solutions measure the average RSSI value for selecting a preferred parent. The use of RSSI in the following proposed solutions helps in resolving multiple mobility issues faced by RPL, which are discussed further.

4.3.1. Mobility and Energy-Aware Routing Protocol (ME-RPL)

Authors [42] proposed Mobility and Energy-Aware RPL (ME-RPL), which considers ETX, Battery Depletion Index (BDI), and routing metrics RSSI. For the route selection, the participant nodes choose the parent from the DODAG only when it is within the RSSI range. Calculation from link metric (ETX) and node metric (BDI) selects Preferred Parent based on the rank. ME-RPL follows the additive property and considers the minimal value of root cost, adapts the ContikiMAC/6LowPAN MAC protocol; simulations are done in Contiki-207. Node CC2420 is considered and the RSSI value range is from −50 dBm (100% quality) to −100 dBm (0% quality). Simulation duration is 24 h, radio environment is UDGM while the data packet timer is set to 60 s. It is observed that the composite routing metric used in ME-RPL proposed protocol improves the packet delivery ratio to 92% and energy consumption to 1.2 MJ/min as compared to basic RPL with a packet delivery ratio of 42% and energy consumption of 2.8 MJ/min for health care applications. For animal tracking applications ME-RPL provided a packet delivery ratio of 80% as compared to 35% provided by RPL. In addition, the authors observe that the energy consumption in ME-RPL is reduced to 1.1 MJ/min as compared to basic RPL, consuming more energy of 2.8 MJ/min for animal tracking applications.

4.3.2. Game-Theoretic Optimization of RPL (GTM-RPL)

The authors [38] proposed a game theoretic based mobile RPL (GTM-RPL) using a transmission rate as a variable to achieve a higher packet delivery ratio (PDR). In a GTM game formulation, a network is assumed to consist of a static sink node, static nodes for providing better coverage, and mobile sensor nodes. While playing mobile management games, players representing sensor nodes in a network within the same collision space compete to send data packets to sink nodes in a selfish manner. The utility function of other players is affected by the action of a player in which actions include changes in data rate, Trickle timer settings, transmission power, and parent node. To send data at high transmission rates, a lower cost for energy consumption is assumed in nodes having higher priorities. The mobile intensity in an application is reflected by nodes sharing applications with specific mobility metrics. In addition, to compute the link quality, nodes measure the RSSI of each message at the MAC layer.
The cost of a node to send data to the sink node in a mobile environment at a specific rate is defined as the Payoff function. Strategies are defined as possible actions performed by each node. Measurement of cost in mobility presence is defined by mobility function. Similarly, the optimal strategy is chosen according to the game designed to maximize the Payoff function to find an optimal solution of a game. The outcome is the optimum transmission rate, which is the Nash Equilibrium for a node; this means that a player reaches an optimal strategy with no incentive to changes in its strategy while other players maintaining their current strategy. Optimum transmission rate changes with the changes in node movement, which means that the RSSI is affected or when the transmission rate of any other node changes affecting Link Quality Indicator (LQI). Changes in the value of RSSI are used as a mobility detection parameter. Simulation results show that GTM-RPL achieves a PDR of 88% for mobile nodes as compared to RPL with 44% PDR and 78% for mobile RPL (mRPL) [46]. Similarly, an improvement of 16% energy consumption is shown by GTM-RPL as compared to mRPL, furthermore, GTM-RPL takes a 15% lower average delay compared to mRPL.

4.3.3. MoMoRo

The authors [64] proposed a mobility support layer MoMoRo enabling mobility support and is applicable to existing data collection protocols. MoMoRo supports two operations: first is reconstructing the default root and notifying the unavailability of root to non-root destination. Second, gathering neighborhood information while reconstructing default routes and passing this information to fuzzy estimator for identification of links good for route selection by the routing layer. The link quality estimations are done by collecting information on the number of transmission attempts. MoMoRo is notified during the failure of packet transmission to a node and sends a unicast packet to reach the node by suppressing additional overheads.
We note that MoMoRo does not take any action if the acknowledgment is received. However, if in a specific time period, the acknowledgment is not received then MoMoRo checks if the node is in the default route and if it is, reconstruction of default route starts, otherwise, the route is broken to the missing destination node, following, the packet’s final destination search is made. Node identifies a lost default route and repair of data collection tree is needed. A quick broadcast message is sent by MoMoRo to its neighborhood and a unicast reply is sent by nodes who heard the broadcast. Computation of link ETX, average Received Signal Strength (RSS) on the link, and Symbol Error Rate (SER) variation is done by using the received replies. The simulation results show PRR for downward traffic to and from mobile nodes by MoMoRO is 90% whereas it significantly degrades in the case of RPL. MoMoRO provides large overheads per node by taking aggressive actions and reacting back to link disconnections caused by mobile nodes as compared to RPL showing a minor increase in packet overheads.

4.3.4. Enhanced Hand-Off Mechanism

Authors [65] proposed an Enhanced Hand-off based stable route selection. DIS and DIO messages in RPL are used as a beacon message. In this mechanism, the mobile IoT node transmits the frame width, a variable is used for measuring the link quality from the number of packets needed in a defined time period, a DIO message is received as a unicast acknowledgment packet encompassing average received signal strength (ARSSI) level which helps in filtering asymmetric links. Mobile nodes continue with data transmission by detecting the justifiable quality. Neighbourhood Discovery (ND) is initiated if the ARSSI link is degraded and data transmissions are resumed once the ARSSI level is suitable. For examining the best parent node, mobile nodes do a comparison of ARSSI present in the DIO messages of individual nodes with the predefined threshold level. In case ARSSI is less than the threshold, the mobile nodes continue broadcasting DIS messages at defined intervals. Alternatively, if ARSSI is above the threshold, the process of network discovery stops and mobile nodes connect to the best route with an updated parent node for performing data communications. The simulation results show that with an increase in traffic burst interval of 2 s, 85% PDR is achieved by this mechanism. Furthermore, the increase in traffic impacts the parent node discovery so for data traffic interval of 2 s, the hand-off and route formation delay rise to 60 ms. Similarly, the traffic overhead is estimated by the control messages sent for selecting the best path; for traffic intervals of 2 s, an overhead of 18% is obtained.

4.3.5. mRPL

Recall that RPL faces issues related to the disconnection of mobile nodes and making closed loops as the mobile nodes may select the neighbor as a new parent, which previously was the child of the current mobile node. Hence, the authors [46] proposed a Smart-Hop algorithm, which has two main phases i.e., the data transmission phase and the discovery phase. In the first phase, a reliable link is assumed between Mobile Node (MN) and an Access Point (AP). Upon receiving reply packets from AP, MN monitors the link quality. AP replies back with the average RSSI value of the packets received in a given window. AP takes no action if no data packets are received, which can lead to disconnection. In mRPL approach, reply packets in unicast DIO message is received immediately after transmission of predefined data packets. Filtering of asymmetric links is done by the DIO message containing the average RSSI level.
The data transmission phase is processed by the MN upon detecting the good quality of the link. The Discovery phase is initiated upon detection of the ARSSI degradation. After finding the better AP, connections with the serving AP are resumed. A burst of DIS messages are broadcasted to assess the potential parents. The average RSSI value embedded in the DIO message is compared with the threshold level by the MN. If the ARSSI value is below the threshold, MN continues broadcasting DIS burst and if the ARSSI value is above the threshold, the discovery phase stops and data communication with the new Preferred Parent starts. Loops are avoided in the network after getting all replies from all neighboring APs and ignoring messages from previous child nodes. Therefore, child nodes are excluded from the set after creating alternative parents sets. The simulation results show that mRPL guarantees connectivity by providing a reliable hand-off process. Within 80-xxx83 ms mRPL detects and performed the hand-off which is much faster than RPL. Similarly, 100% PDR is provided by mRPL because of the fast hand-off process; high data rates of 30 pkts/s mRPL show higher overheads as compared to RPL.

4.3.6. Energy and Mobility Aware Routing (EMA-RPL)

We note that RPL does not provide suitable performances for time-constrained real-time healthcare applications where data is captured by attaching sensor nodes to a mobile patient and faces issues of data loss and disconnections of mobile nodes. The authors [66] proposed EMA-RPL consisting of three phases i.e., the `mobility detection phase’, the `reaction and prediction phase’, and finally the `notification phase’. In the detection phase, an Associated Mode (AN) that is a static node computes the average RSSI value from the data information obtained from Mobile Node (MN). MN is assumed to be away from the coverage area by AN if the RSSI value is less than the predefined threshold, hence, the mobility is detected. In the handover process, the AN keeps probing MN to send data packets till RSSI reaches a predetermined threshold value. Following, in the second phase, a new AN prediction is done based on the RSSI parameter. This phase is performed by the current AN before the MN disconnects to provide continuous MN connectivity.
In the final `notification phase’, path routes update is done. Current AN informs the new node that it is a predicted AN, following, the predicted AN sends a unicast DIO message to MN to make an attachment. Parameters such as PP, rank, and default route are updated by the MN and two DAO messages are sent to the current and predicted AN for backward path route updates. Therefore, MN establishes a new attachment to the predicted AN before disconnecting from its previous AN avoiding data losses and disconnections in the network.
EMA-RPL has shown a handover delay of 156.25 ms as compared to 1639.06 ms by mRPL and 45,737 s by basic RPL. A PDR of approximately 100% is achieved by EMA-RPL as compared to 27% by basic RPL and 70% by mRPL.

4.3.7. DAG-Based Multipath Routing (DMR)

We note that the RPL faces many open issues based on DODAG construction, DODAG maintenance, and its repair both locally and globally, and computation of rank. To address these problems, the authors [41] proposed DAG-based Multipath Routing Protocol (DMR), which uses rank information and Link Quality Indication (LQI) for constructing DODAG. This approach is adaptable to frequent mobile sensor network topology changes. DIS message is broadcasted by a source node to the sink node to construct a DODAG. After receiving the DIS message, DODAGID is increased by one by the sink node and rank value is initialized to zero. Following, the sink node broadcasts the DIO message for the formation of a new DODAG. After the node receives the DIO message, the node compares its DODAGID with the sender DODAGID. DIO message is regarded for new DODAG construction only if sender DODAGID is greater than receiver DODAGID. To assign the sender as the parent node, the node increases its rank by sender’s rank+1 and replaces its DODAGID with sender DODAGID.
In addition, the LQI information is computed based on the RSSI value received from the DIO message for the determination of priority among the same rank nodes. The DODAGID, rank, senders ID, and LQI information are saved in the Parent Sibling list (PS-list). Then DIO message is broadcasted which includes rank and DODAGID information. Loop creation is avoided if the senders rank is greater than node rank and senders DODAGID is lesser than node receiver DODAGID. After a predetermined period, the constructed DODAG expires. In a DODAG repair process, PS-list is checked by the node to determine the next node to which data packet should be forwarded. A node with a lower rank and high LQI is chosen as the next node. DODAG node consists of information of the parent node as well as the sibling nodes in the routing table. Following, if the parent node becomes invalid of an intermediate node then reliable data delivery can be maintained by forwarding data packets to sibling nodes. However, when both parent and sibling nodes are not available in the PS-list, the DODAG can be reconstructed by broadcasting a DIS message, hence, broken routes can be repaired both locally and globally. The simulation results show that routing load in DMR is reduced to 65% and data delivery ratio to 97%. The DMR per node reduces average energy consumption by 25% and is the most energy-efficient routing scheme.
Table 3 shows the working principles, issues addressed, strengths, and weaknesses of solutions under the category `RSSI-based Solutions’.

4.4. Position-Based Solutions

Sensors are attached to workers, goods, and equipment that require robust communication with the base station. Hence, during these scenarios, the position of nodes must be considered by routing protocols as the best routing decision based on their particular locations. The following proposed solutions consider the position information of mobile nodes for reliable routing and help in resolving the issue of lack of positioning information.

4.4.1. Kalman Positioning RPL (KP-RPL)

The RPL provides energy-efficient routing strategies having a slow response to topology changes making it inefficient in keeping up-to-date routes in presence of mobile nodes due to high signaling cost. Hence, the authors [54] proposed Kalman Positioning RPL (KP-RPL) considering position inaccuracies and disconnections among static and mobile nodes by providing reliable routing. The proposed Kalman filter takes into account the velocity estimates by enhancing mobile node position accuracies resulting in better routing decisions. A position-based approach is followed for the routing of static and mobile nodes. A confidence region is generated by a mobile node using RSSI measurements from static nodes. Then mobile nodes define their most likely position by considering the location with the highest probability in the confidence region. Further, the position is refined using Kalman filtering by combining velocity estimates. Before making a routing decision, a blacklist is generated by mobile nodes to discard unreachable nodes due to positioning errors.
Similarly, blacklisting provides robustness to inevitable mobile node positioning errors due to RSSI measurement and velocity estimates inaccuracies. It helps in avoiding disconnection because of positioning errors. Finally, the best routing paths are selected by nodes in each transmission slot using end-to-end ETX estimates. Simulation results show KP-RPL is robust to channel conditions and provides reliable routing. The average ETX of KP-RPL with Kalman filtering increases the reliability of the network to 25% as compared to KP-RPL without Kalman filtering. The large density of static nodes increases network reliability and enhances the positioning accuracy of mobile nodes but also increases infrastructure costs. So, KP-RPL helps in reducing the number of static nodes, thus lowering infrastructure costs. KP-RPL helps in enhancing the energy consumption of the overall network because of its high reliability. Hence increasing the lifetime of both static and mobile nodes.

4.4.2. Mobility Prediction Based RPL (MP-RPL)

RPL poorly adapts to mobility scenarios as the routes are not updated as fast as they are updated in the case of static sensor nodes. Authors [67] have proposed a mobility prediction model known as sensor node speed classifier (SNSC) which classifies sensor nodes in different speed or velocity classes using the Maximum Likelihood Estimation (MLE) classification technique. Average Encounter Rate (AER) is computed by each node in SNSC in a time period T with a given velocity value. To predict the one-hop neighborhood, Hellos beacons short frames are broadcasted periodically for correctly estimating AER. Validation of the SNSC model is implemented in the Cooja simulator. 50 nodes are simulated and have a velocity value between 1 to 10 m/s. The result shows that the error prediction rate of SNSC is 4% sustaining the proposed speed classification technique accuracy.
Authors [67] have proposed a Mobility prediction-based RPL (MP-RPL) where authors have exploited the SNSC model for accurate prediction of speed classes of sensor nodes. Velocity value is periodically estimated using SNSC and are injected in the DIOs messages. In each Trickle period, these DIOs messages are broadcasted which helps in making nodes aware of their neighbor’s velocities. MP-RPL transmits the network traffic via the least-mobile nodes by making stable routes in the DODAG. Neighbors having increasing order of speed values are sorted by sensor nodes upon receiving DIOs. Neighbors that have minimum speed values are eligible preferred parents hence routes to the sink via the least mobile (LM) nodes are ensured. Routes can break quickly in the case of LM with high-speed values creating a high packet loss rate. To solve this problem authors have proposed intermediate nodes (IN) between preferred parents of LM and high-speed descendants lengthening routes to the sink. Working principles, issues addressed, strengths and weaknesses of solutions under the category of Position-based solutions are discussed in Table 4.

4.5. Miscellaneous Solutions

Following, we discuss two solutions, which we classify as Miscellaneous solutions, that discuss the issues of lack of sink-to-sink coordination and the rank of detached mobile nodes.

4.5.1. Sink-to-Sink Coordination Framework (SSCF)

The authors [56] proposed a Sink-to-Sink Coordination Framework (SSCF) in which multiple sinks are considered in the network. Therefore, a single DAG consists of multiple DODAG and each DODAG has a different sink ID that is included in the control messages. A node receiving DIO messages from sub-DODAG is said to be border node.
In this framework, border nodes receive and process the Network Optimization Metric (NOM) values used for coordination among sink nodes in the DIO message. Network Coordination Interval (NCI) is included in this framework in which every border node updates its sink node about the NOM value of its neighboring sub-DODAG. NOMs information is saved in the parent table of the border nodes. Sub-DODAG ID and NOM values are sent in DAO messages by the border node to its respective sink node. The sink node checks the version number to detect the latest DAO sent by the border node. In case, border router does not receive any DIO message from its neighboring sub-DODAG in three consecutive DIO intervals, the sub-DODAG is removed from its parent table and informs the sink node about the unavailability of sub-DODAG. Sink nodes are required to save NOM values of neighboring DODAGs and this information is saved in Network Optimization Metric Table (NOMT). Similarly, the `Stale’ timer is used i.e., defining maximum time after which the entry is considered as out of date and is equal to three DIO intervals.
The simulation results show that data in RPL is sent by event reporting nodes to their nearest sink nodes, packet drop is seen as the paths getting congested as traffic converges at nodes near the sink. However, the event traffic is distributed among both sinks in SCCF by forming different paths with lesser congestion and lower traffic loads. Hence, throughput observed at SCCF is higher than the basic RPL by approximately 2.0 Kbps for packet intervals of 0.5 s, 1 s, 2 s, 4 s, 6 s, and 8 s. The packet drop ratio of RPL is observed as more than SSCF since the congestion is more severe in basic RPL resulting in high packet drops. The latency of both the protocols are high as nodes spent most of the time in sleep mode as compared to active mode. Energy consumption is slightly higher in SCCF as, we note that, RPL does not drop many packets if the packet interval is high and the data rate is low, therefore, energy consumption per bit is low in lower packet generation intervals.

4.5.2. Downward Path Construction Mechanism

Author [68] has described issues with downward route cancellation in which nodes send No-path DAO messages, which means that DAO message with lifetime zero to parents to cancel the path to a specific node. The packet from the no-path message is delivered to all parents informing them about the cancellation of the downward route to the original node. Issues such as the old downward path still exist until the expiry of the route lifetime due to no-path DAO message is not reached because of packet loss or when the mobile node is not reachable to the old parent, causing inconsistent routing states. Another problem is node deleting the old parent but it is out of reach of the new parent selected from the neighbor list resulting in loss of connectivity.
The authors proposed a modification in the cancellation mechanism for downward routes in which a common ancestor of old and new routes send a no-path DAO message instead of a mobile node upon receiving an updated DAO message. This no-path message is forwarded to the old parent downward. Therefore, packets stored between the mobile node and common ancestor can be used by the mobile node as the old downward path still exists until the installation of the new downward route. In addition, lost no-path DAO packets will not result in the state of inconsistency as the route is removed in the sub-DODAG of the old parent path to the mobile node in the proposed mechanism.
Table 5 illustrates the working principles, issues addressed, strengths, and weaknesses of the solutions under the category `Miscellaneous Solutions’.

5. Future Work

This section suggests some research directions for the performance enhancement of RPL by addressing various issues and further (along with further research directions) presents flaws within the performance evaluations of various RPL extensions presented and evaluated in the literature (discussed above); some of the main future research areas are summarized as follows.

5.1. Efficient Routing Protocol Supporting Various Traffic Patterns

We note that the LLNs applications require a stable routing support for various traffic patterns e.g., point-to-multipoint (MP2P), node-to-node (P2P), and P2MP (i.e., root to many nodes) with heterogeneous node capabilities [69]. It is also mentioned [29] that RPL optimizes the support for MP2P traffic patterns by efficiently constructing the DODAGs, however, other traffic patterns, such as P2P and P2MP, need to route the pre-established DAG. Hence, the RPL does not provide efficient routing support, in addition to, efficient data delivery from long delays and lossy links while attributing various traffic patterns. To provide an efficient routing support in RPL, it is vital to address coordination among various nodes in order to support various kinds of traffic pattern in a single network. Note that the asymmetric nature of wireless links and traffic patterns have a significant impact on the performance of routing protocols; the real-world deployment fails [70] if the routing protocols do not consider the asymmetric traffic patterns.
A major issue with the standard Trickle algorithm is the long `listen-only’ period where nodes only listen and receive messages instead of broadcasting the messages. Vital support for routing protocols is to address various issues, highlighted in Table 1, Table 2, Table 3, Table 4 and Table 5, under a single framework that has been addressed by various extensions of basic RPL. For example, the FLEA-RPL [60], CA-RPL [63], MI-FL [61], Modified RPL [45], Multiple-sinks [55], MoMoRo [64], Enhanced hand-off mechanism [65], and mRPL [46] address the issue with longer delay, either cause by ETX probing or hand-off delays, however, they fail to address the basic issue with Trickle timer algorithm.

5.2. Mobility Support

We note that RPL has been designed for static nodes within the networks while the majority of the LLN applications require mobility support within the routing protocols in order to improve the performance of RPL for nodes mobility [71,72,73]. A particular scenario is the unavailability of a node’s preferred parent node that drastically decreases the transmission loss and delay due to switching and resuming communication with the preferred parent. As highlighted in Table 3, the ME-RPL [44] and GTM-RPL [38] address the lack of identification of mobile nodes, however as addressed by the KP-RPL [54] and MP-RPL [67] proposals, these protocols do not address the issue of lack of positioning information of mobile nodes. Therefore it is important to efficiently address the mobile node’s positioning information in coordination with identifying the mobile nodes. In addition, as highlighted in Table 2 and Table 3, there are certain RPL extensions, e.g., Enhanced hand-off mechanism [65], that incorporate the nodes’ mobility and deals with reduced handoff delays. Hence, it is important to propose a comprehensive framework that would use such RPL extensions in combination in order to collect positioning information while identifying the parent mobile nodes, which reduces the hand-off delays and enhance throughput during nodes mobility. Following, the basic RPL with these enhancements could be applied to support a wide range of real-time and non-real-time (e.g., simple data/file transfer) applications with necessary modifications and enhancements.

5.3. Energy-Efficient Routing

As noticed, the primary goal of any routing protocol for LLNs is to conserve power and a reliable data delivery [74,75,76]. As highlighted in Table 2, the energy-aware routing, FLEA-RPL [60] is based on load, residual energy, and ETX. However, we note that in a lossy environment, lack of sink-to-sink coordination [56] and detached mobile nodes [68] lead to duplicate transmission and hence, unnecessarily high energy consumption. Hence, it is important to address issues with `node coordination’ and `detached mobile nodes’ in a comprehensive framework. We note that Opportunistic Routing (OR) [77] improves the network reliability with reduced retransmission, furthermore, the network coding [78,79] has been proved to be efficient for data collection applications in dynamic and lossy networks [80]. Therefore, these techniques can be used for RPL to propose energy-efficient routing due to sink-to-sink coordination and detached mobile nodes.

5.4. Privacy-Aware Routing

Researchers have addressed the information security issues in a number of works that address false data injection, authentication failure, and other security attacks over data confidentiality and integrity [30,48,81,82,83,84,85,86]. However, there is very negligible work available for privacy-aware routing. We note that the that the RPL nodes exchange, besides the data transmission, metadata to establish routing paths and communicate data e.g., communication endpoints, message timing, parent node’s location/ID, load information, rate of energy usage, etc. Furthermore, it is noted that this information can be extracted from the content of the network traffic [87], which demands additional efforts to protect the privacy of individual nodes within the network.

5.5. Exhaustive List of Experimental Parameters

Table 6 presents various sets of possible parameters for the performance evaluation of, in addition to future research over the applicability of RPL frameworks in real-time evaluation, various RPL extensions both for simulations and experimentations in a mobile environment; the `X’ means that the authors did not mention about these parameters. For example, as shown in Table 6, we note that Co-RPL [43] used Tmote Sky (Tmote Sky is an ultra-low-power IEEE 802.15.4 compliant wireless sensor module. https://insense.cs.st-andrews.ac.uk/files/2013/04/tmote-sky-datasheet.pdf accessed on 1 September 2021) sensor, which is the most commonly used sensor in IoT networks, in addition to other parameters, such as, 10–100 nodes, 1–3 ms node speed, 2.5 s latency, simulation duration of 3600 s, Contiki OS, and a transmission range 50 m; whereas this evaluation does not mention the `Minimum DIO Interval’, `DIO Interval Doubling’, `Power Consumption’, `Packet Delivery Ratio’, and `Simulation area’. Hence, in order to closely observe the performance of Co-RPL [43], other sensor nodes that support mobility with a variable set of capabilities and an extensive set of parameters for simulation or experimentations could be considered for future evaluation.
Moreover, we note that the majority of the RPL extensions were evaluated in smaller transmission ranges, ranging from 10 m to 50 m; e.g., mRPL [46] considers only 10 m of transmission range in order to achieve better network performance. However, it is important to consider bigger transmission ranges, which will have an impact on transmission and communication range specifically during communication broadcast. In addition, it will have an impact on the selection of parent nodes, path construction, detached nodes, handoff delay, loop within the network, and the mobility of the nodes themselves. In combination with the transmission ranges, it is also important to consider wider simulation areas so as to simulate a real environment.
Likewise, an important parameter is the speed of sensor nodes, as indicated in Table 6, we note that the majority of the RPL extensions did not mention the `node speed’ parameter, such as Mobility Enhanced RPL [44], Elastic Trickle Timer [59], FLEA-RPL [60], MI-FL [61], Multiple Sinks [55], GTM-RPL [38], MoMoRo [64], Enhanced Hand-Off Mechanism [65], and SSCF [56]. The other extensions, except Modified RPL [45] that takes 25, 45, and 65 mph, consider very low node speed. Hence, it is vital to evaluate the performance of these protocol extensions in a mobile environment with various node speeds (e.g., from nomadic (e.g., a patient move with the hospital premises) to high speed (e.g., an ambulance moving in a metropolitan area)) before it is used in an actual environment.
In addition to the above important parameters, it also requires to take into consideration other parameters, such as `Minimum DIO Interval’, `DIO Interval Doubling’, `Power Consumption’, `Packet Loss Rate’, `Packet Delivery Ratio’, and `Latency’. Furthermore, a comparative analysis over these sets of variables can be carried out to present a complete picture of the performance evaluation of the RPL extension.

6. Conclusions

RPL suffers from many issues when IoT devices are mobile e.g., lack of sink-to-sink cooperation, issues with the rank of detached mobile nodes, increase in hand-off delays, lack of positioning information, delay caused by ETX probing, loops in the network, in addition to, issues with Trickle algorithm such as link breakage and packet loss due to nodes movement. Moreover, we present various solutions proposed in the existing literature that address these mobility issues faced by RPL. We classify these solutions into five categories i.e., Trickle timer-based solutions, ETX-based solutions, RSSI-based solutions, Position-based solutions, and Miscellaneous solutions. All these solutions are critically evaluated in terms of their strengths and weaknesses along with their working principles and issues addressed. Various research directions are also proposed in this survey that will enable future researchers to propose better solutions to mitigate the mobility issues in RPL.

Author Contributions

Conceptualization: Z.S., A.L. & I.U.; Methodology: K.K., J.A. & S.S; Investigation: Z.S., A.L. & K.K.; Resources: I.U. & J.A.; Writing—original draft preparation: Z.S., A.L. & I.U.; Writing—review and editing: K.K., J.A. and S.S.; Supervision: Z.S. All authors have read and agreed to the published version of the manuscript..

Funding

There are no internal or external funds available for this research work. We further declare that the corresponding author will fully pay the APC charges.

Informed Consent Statement

This submission does not include human or animal research.

Data Availability Statement

There is no data associated with this article.

Conflicts of Interest

The authors do not declare any conflict of interests.

References

  1. Madakam, S.; Ramaswamy, R.; Tripathi, S. Internet of Things (IoT): A Literature Review. J. Comput. Commun. 2015, 3, 164–173. [Google Scholar] [CrossRef] [Green Version]
  2. IoT Growth Demands Rethink of Long-Term Storage Strategies, Says IDC. Available online: https://www.idc.com/getdoc.jsp?containerId=prAP46737220 (accessed on 28 December 2020).
  3. Raza, S. Medium Access Control Protocols for Reliable Communication in Low-Power Industrial Applications. Ph.D. Thesis, Otto-von-Guericke-Universität Magdeburg, Magdeburg, Germany, 2020. [Google Scholar]
  4. Farag, H. Enabling Industrial IoT Applications: Supporting Reliable and Real-Time Data Delivery. Ph.D. Thesis, Mid Sweden University, Östersund, Sweden, 2020. [Google Scholar]
  5. Kim, S.; Kim, C.; Cho, H.; Jung, K. A Hierarchical Routing Graph for Supporting Mobile Devices in Industrial Wireless Sensor Networks. Sensors 2021, 21, 458. [Google Scholar] [CrossRef] [PubMed]
  6. Bharat, B.; Gadadhar, S. Requirements, protocols, and security challenges in wireless sensor networks: An industrial perspective. In Handbook of Computer Networks and Cyber Security; Springer: Berlin/Heidelberg, Germany, 2020; pp. 683–713. [Google Scholar]
  7. Azadeh, Z. Remote Patient Monitoring: Health Status Detection and Prediction in IoT-Based Health Care. In IoT in Healthcare and Ambient Assisted Living; Springer: Berlin/Heidelberg, Germany, 2021; pp. 89–102. [Google Scholar]
  8. Wu, T.-Y.; Wang, T.; Lee, Y.-Q.; Zheng, W.; Kumari, S.; Kumar, S. Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System. Secur. Commun. Netw. 2021, 2021, 1–16. [Google Scholar]
  9. Kavita, J.; Veena, A. A Survey on IoT-Based Healthcare System: Potential Applications, Issues, and Challenges. In Advances in Biomedical Engineering and Technology; Springer: Berlin/Heidelberg, Germany, 2021; pp. 459–471. [Google Scholar]
  10. Doshi, H.; Shankar, A. Wireless Sensor Network Application for IoT-Based Healthcare System. In Data Driven Approach towards Disruptive Technologies: Proceedings of MIDAS; Springer: Singapore, 2020; pp. 287–307. [Google Scholar]
  11. Haque, H.M.U.; Zulfiqar, H.; Ahmed, A.; Ali, Y. A context-aware framework for modelling and verification of smart parking systems in urban cities. Concurr. Comput. Pract. Exp. 2019, 33, 5401. [Google Scholar]
  12. Ma, X.; Hu, X.; Weber, T.; Schramm, D. Experiences with Establishing a Simulation Scenario of the City of Duisburg with Real Traffic Volume. Appl. Sci. 2021, 11, 1193. [Google Scholar] [CrossRef]
  13. Frenken, M.; Flessner, J.; Hurka, J. Building Automation and Control Systems for Healthcare in Smart Homes. In Handbook of Large-Scale Distributed Computing in Smart Healthcare; Springer: Berlin/Heidelberg, Germany, 2017; pp. 87–119. [Google Scholar]
  14. Wibhada, N.; Ridnarong, P.; Aimaschana, N. Remote air conditioning control system based on ZigBee Wireless Sensor Network for building. In Proceedings of the IEEE 2015 International Computer Science and Engineering Conference (ICSEC), Chiang Mai, Thailand, 23–26 November 2015; pp. 1–6. [Google Scholar]
  15. Admire, M.; Muthoni, M. Implementation of middleware for internet of things in asset tracking applications: In-lining approach. In Proceedings of the 2015 IEEE 13th international conference on industrial informatics (INDIN), Cambridge, UK, 22–24 July 2015; pp. 460–469. [Google Scholar]
  16. Mhlaba, A.M.; Masinde, M. An Integrated Internet of Things Based System for Tracking and Monitoring Assets–the case of the Central University of Technology. In Proceedings of the IST-Africa 2015 Conference Proceedings, Lilongwe, Malawi, 6–8 May 2015. [Google Scholar]
  17. Choudhary, P.; Bhargava, L.; Suhag, A.K.; Choudhary, M.; Singh, S. An Era of Internet of Things Leads to Smart Cities Initiatives Towards Urbanization. In Digital Cities Roadmap: IoT-Based Architecture and Sustainable Buildings; Wiley: Hoboken, NJ, USA, 2021; pp. 319–350. [Google Scholar]
  18. Huang, X.; Yi, J.; Zhu, X.; Chen, S. A Semantic Approach with Decision Support for Safety Service in Smart Home Management. Sensors 2016, 16, 1224. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  19. Ghabar, O. An Investigation into Context-Aware Automated Service in Smart Home Facilities: Search Engine and Machine Learning with Smartphone. Ph.D. Thesis, University of Huddersfield, Huddersfield, UK, 2018. [Google Scholar]
  20. Sanaboina, C.S.; Sanaboina, P. Impact of mobility on power consumption in RPL. i-Managers J. Wirel. Commun. Netw. 2018, 6, 23. [Google Scholar]
  21. Winter, T.; (Ed.) RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Internet Engineering Task Force (IETF), ISSN: 2070-1721, RFC: 6550. March 2012. Available online: https://datatracker.ietf.org/doc/html/rfc6550 (accessed on 1 September 2021).
  22. Ghaleb, B.; Al-Dubai, A.Y.; Ekonomou, E.; Alsarhan, A.; Nasser, Y.; Mackenzie, L.M.; Boukerche, A. A survey of limitations and enhancements of the IPv6 routing protocol for low-power and lossy networks: A focus on core operations. IEEE Commun. Surv. Tutor. 2018, 21, 1607–1635. [Google Scholar] [CrossRef] [Green Version]
  23. Kim, H.-S.; Ko, J.; Culler, D.E.; Paek, J. Challenging the IPv6 routing protocol for low-power and lossy networks (RPL): A survey. IEEE Commun. Surv. Tutor. 2017, 19, 2502–2525. [Google Scholar] [CrossRef]
  24. Kharrufa, H.; Al-Kashoash, H.A.; Kemp, A.H. RPL-based routing protocols in IoT applications: A review. IEEE Sens. 2019, 19, 5952–5967. [Google Scholar] [CrossRef] [Green Version]
  25. Lamaazi, H.; Benamar, N. A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function. Ad Hoc Netw. 2020, 96, 102001. [Google Scholar] [CrossRef]
  26. Sebastian, A.; Sivagurunathan, S. A survey on load balancing schemes in RPL based internet of things. Int. J. Sci. Res. Netw. Secur. Commun. 2018, 6, 43–49. [Google Scholar]
  27. Pancaroglu, D.; Sen, S. Load balancing for RPL-based Internet of Things: A review. Ad Hoc Netw. 2021, 116, 102491. [Google Scholar] [CrossRef]
  28. Oliveira, A.; Vazão, T. Low-power and lossy networks under mobility: A survey. Comput. Netw. 2016, 107, 339–352. [Google Scholar] [CrossRef]
  29. Zhao, M.; Kumar, A.; Chong, P.H.J.; Lu, R. A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities. Appl. Peer-to-Peer Netw. 2017, 10, 1232–1256. [Google Scholar] [CrossRef]
  30. Kamgueu, P.O.; Nataf, E.; Ndie, T.D. Survey on RPL enhancements: A focus on topology, security and mobility. Comput. Commun. 2018, 120, 10–21. Available online: http://www.sciencedirect.com/science/article/pii/S0140366417308241 (accessed on 1 September 2021). [CrossRef]
  31. Rodrigues, J.; Neves, P.A.C.S. A survey on IP-based wireless sensor network solutions. Int. J. Commun. Syst. 2010, 23, 963–981. [Google Scholar] [CrossRef]
  32. Latif, K.; Javaid, N.; Ullah, I.; Kaleem, Z.; Malik, Z.A.; Nguyen, L.D.; Abbas, Z. DIEER: Delay-Intolerant Energy-Efficient Routing with Sink Mobility in Underwater Wireless Sensor Networks. Sensors 2020, 20, 3467. [Google Scholar] [CrossRef]
  33. Ko, J.; Terzis, A.; Dawson-Haggerty, S.; Culler, D.E.; Hui, J.W.; Levis, P. Connecting low-power and lossy networks to the internet. IEEE Commun. Mag. 2011, 49, 96–101. [Google Scholar]
  34. Dohler, M.; Watteyne, T.; Winter, T.; Barthel, D. Routing Requirements for Urban Low-Power and Lossy Networks. RFC 5548. 2009. Available online: https://datatracker.ietf.org/doc/html/rfc5548 (accessed on 1 September 2021).
  35. Pister, K.; Thubert, P.; Dwars, S.; Phinney, T. Industrial Routing Requirements in Low-Power and Lossy Networks. Citeseer. 2009. Available online: https://datatracker.ietf.org/doc/rfc5673/ (accessed on 1 September 2021).
  36. Porcu, G.; Buron, J.; Brandt, A. Home Automation Routing Requirements in Low-Power and Lossy Networks; RFC 5826; IETF Secretariat: Fremont, CA, USA, 2010. [Google Scholar]
  37. Martocci, J.; Mil, P.; Riou, N.; Vermeylen, W. Building Automation Routing Requirements in Low-Power and Lossy Networks; RFC 5867; IETF Secretariat: Fremont, CA, USA, 2010. [Google Scholar]
  38. Kharrufa, H.; Al-Kashoash, H.; Kemp, A.H. A Game Theoretic Optimization of RPL for Mobile Internet of Things Applications. IEEE Sens. J. 2018, 18, 2520–2530. [Google Scholar] [CrossRef]
  39. Gnawali, O.; Levis, P. The Minimum Rank with Hysteresis Objective Function. Internet Engineering Task Force (IETF) RFC: 6719. 2012. Available online: https://datatracker.ietf.org/doc/html/rfc6719 (accessed on 1 September 2021).
  40. Cobarzan, C.; Montavont, J.; Noel, T. Analysis and performance evaluation of RPL under mobility. In Proceedings of the 2014 IEEE Symposium on Computers and Communications (ISCC), Madeira, Portugal, 23–26 June 2014; pp. 1–6. [Google Scholar]
  41. Hong, K.; Choi, L. DAG-based multipath routing for mobile sensor networks. In Proceedings of the ICTC 2011, Seoul, Korea, 28–30 September 2011; pp. 261–266. [Google Scholar] [CrossRef]
  42. Sankar, S.; Srinivasan, P. Mobility and Energy Aware Routing Protocol for Healthcare IoT Application. Res. J. Pharm. Technol. 2018, 11, 3139. [Google Scholar] [CrossRef]
  43. Gaddour, O.; Koubäa, A.; Rangarajan, R.; Cheikhrouhou, O.; Tovar, E.; Abid, M. Co-RPL: RPL routing for mobile low power wireless sensor networks using corona mechanism. In Proceedings of the 9th IEEE International Symposium on Industrial Embedded Systems (SIES 2014), Pisa, Italy, 18–20 June 2014; pp. 200–209. [Google Scholar]
  44. El Korbi, I.; Brahim, M.B.; Adjih, C.; Saidane, L.A. Mobility enhanced RPL for wireless sensor networks. In Proceedings of the 2012 Third International Conference on the Network of the Future (NOF), Gammarth, Tunisie, 21–23 November 2012; pp. 1–8. [Google Scholar]
  45. Lee, K.C.; Sudhaakar, R.; Ning, J.; Dai, L.; Addepalli, S.; Vasseur, J.; Gerla, M. A Comprehensive Evaluation of RPL under Mobility. Int. J. Veh. Technol. 2012, 2012, 1–10. [Google Scholar] [CrossRef] [Green Version]
  46. Fotouhi, H.; Moreira, D.; Alves, M. mRPL: Boosting mobility in the Internet of Things. Ad Hoc Netw. 2015, 26, 17–35. [Google Scholar] [CrossRef]
  47. Pongle, P.; Chavan, G. A survey: Attacks on RPL and 6lowpan in IoT. In Proceedings of the 2015 International Conference on Pervasive Computing (ICPC), Pune, India, 8–10 January 2015; pp. 1–6. [Google Scholar]
  48. Kamble, A.; Malemath, V.S.; Patil, D. Security attacks and secure routing protocols in RPL-based internet of things: Survey. In Proceedings of the 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), Pune, India, 3–5 February 2017; pp. 33–39. [Google Scholar]
  49. Gaddour, O.; Koubâa, A. RPL in a nutshell: A survey. Comput. Netw. 2012, 56, 3163–3178. Available online: http://www.sciencedirect.com/science/article/pii/S1389128612002423 (accessed on 1 September 2021). [CrossRef]
  50. Zikria, Y.B.; Afzal, M.K.; Ishmanov, F.; Kim, S.W.; Yu, H. A survey on routing protocols supported by the Contiki Internet of things operating system. Futur. Gener. Comput. Syst. 2018, 82, 200–219. Available online: http://www.sciencedirect.com/science/article/pii/S0167739X17324299 (accessed on 1 September 2021). [CrossRef]
  51. Lamaazi, H.; Benamar, N.; Jara, A.J. RPL-based networks in static and mobile environment: A performance assessment analysis. J. King Saud Univ.—Comput. Inf. Sci. 2018, 30, 320–333. [Google Scholar] [CrossRef]
  52. Kharrufa, H.; Al-Kashoash, H.; Al-Nidawi, Y.; Mosquera, M.Q.; Kemp, A.H. Dynamic RPL for multi-hop routing in IoT applications. In Proceedings of the 2017 13th Annual Conference on Wireless On-Demand Network Systems and Services (WONS), Jackson Hole, WY, USA, 21–24 February 2017; pp. 100–103. [Google Scholar]
  53. Falk, J.; Kucherawy, M. Creation and Use of Email Feedback Reports: An Applicability Statement for the Abuse Reporting Format (ARF). RFC 6650. June 2012. Available online: https://datatracker.ietf.org/doc/html/rfc6650 (accessed on 1 September 2021).
  54. Barcelo, M.; Correa, A.; Vicario, J.L.; Morell, A.; Vilajosana, X. Addressing Mobility in RPL with Position Assisted Metrics. IEEE Sens. J. 2015, 16, 2151–2161. [Google Scholar] [CrossRef]
  55. Carels, D.; Derdaele, N.; de Poorter, E.; Vandenberghe, W.; Moerman, I.; Demeester, P. Support of multiple sinks via a virtual root for the RPL routing protocol. EURASIP J. Wirel. Commun. Netw. 2014, 2014, 91. [Google Scholar] [CrossRef]
  56. Khan, M.; Lodhi, M.; Rehman, A.; Khan, A.; Hussain, F. Sink-to-Sink Coordination Framework Using RPL: Routing Protocol for Low Power and Lossy Networks. J. Sens. 2016, 2016, 1–11. [Google Scholar] [CrossRef]
  57. Park, J.; Kim, K.-H.; Kim, K. An algorithm for timely transmission of solicitation messages in RPL for energy-efficient node mobility. Sensors 2017, 17, 899. [Google Scholar] [CrossRef] [Green Version]
  58. Ghaleb, B.; Al-Dubai, A.; Ekonomou, E. E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. In Proceedings of the IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, Liverpool, UK,, 26–28 October 2015; pp. 1123–1129. [Google Scholar]
  59. Yassein, M.B.; Aljawarneh, S.; Masa’deh, E. A new elastic trickle timer algorithm for internet of things. J. Netw. Comput. Appl. 2017, 89, 38–47. [Google Scholar] [CrossRef]
  60. Sankar, S.; Srinivasan, P. Fuzzy Logic Based Energy Aware Routing Protocol for Internet of Things. Int. J. Intell. Syst. Appl. 2018, 10, 11–19. [Google Scholar] [CrossRef]
  61. Aljarrah, E. Deployment of multi-fuzzy model based routing in RPL to support efficient IoT. Int. J. Commun. Netw. Inf. Secur. 2017, 9, 457–465. [Google Scholar]
  62. Lorente, G.G.; Lemmens, B.; Carlier, M.; Braeken, A.; Steenhaut, K. BMRF: Bidirectional Multicast RPL Forwarding. Ad Hoc Netw. 2017, 54, 69–84. [Google Scholar] [CrossRef] [Green Version]
  63. Tang, W.; Ma, X.; Huang, J.; Wei, J. Toward Improved RPL: A Congestion Avoidance Multipath Routing Protocol with Time Factor for Wireless Sensor Networks. J. Sens. 2016, 2016, 8128651. [Google Scholar] [CrossRef] [Green Version]
  64. Ko, J.; Chang, M. MoMoRo: Providing Mobility Support for Low-Power Wireless Applications. IEEE Syst. J. 2014, 9, 585–594. [Google Scholar] [CrossRef]
  65. Sneha, K.; Prasad, B.G. An efficient hand-off optimization based RPL routing protocol for optimal route selection in mobility enabledllns. In Proceedings of the 2016 International Conference on Global Trends in Signal Processing, Information Computing and Communication (ICGTSPICC), Jalgaon, India, 22–24 December 2016; pp. 130–137. [Google Scholar]
  66. Bouaziz, M.; Rachedi, A.; Belghith, A.; Berbineau, M.; Al-Ahmadi, S. EMA-RPL: Energy and mobility aware routing for the Internet of Mobile Things. Future Gener. Comput. Syst. 2019, 97, 247–258. [Google Scholar] [CrossRef]
  67. Somaa, F.; el Korbi, I.; Saidane, L.A. Mobility support over RPL using sensor nodes speed classification. In Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco, 29 November–2 December 2016; pp. 1–6. [Google Scholar]
  68. Carels, D.; de Poorter, E.; Moerman, I.; Demeester, P. RPL Mobility Support for Point-to-Point Traffic Flows towards Mobile Nodes. Int. J. Distrib. Sens. Netw. 2015, 11, 470349. [Google Scholar] [CrossRef] [Green Version]
  69. Levis, P.; Tavakoli, A.; Dawson-Haggerty, S. Overview of Existing Routing Protocols for Low Power and Lossy Networks. Internet Engineering Task Force, Internet-Draft Draftietf-Roll-Protocols-Survey-07. 2009. Available online: https://datatracker.ietf.org/doc/html/draft-ietf-roll-protocols-survey (accessed on 1 September 2021).
  70. Misra, P.; Ahmed, N.; Ostry, D.; Jha, S. Characterization of Asymmetry in Low-Power Wireless Links: An Empirical Study; Springer: Berlin/Heidelberg, Germany, 2011; pp. 340–351. [Google Scholar]
  71. Dong, M.; Ota, K.; Yang, L.T.; Chang, S.; Zhu, H.; Zhou, Z. Mobile agent-based energy-aware and user-centric data collection in wireless sensor networks. Comput. Netw. 2014, 74, 58–70. [Google Scholar] [CrossRef]
  72. Safdar, V.; Bashir, F.; Hamid, Z.; Afzal, H.; Pyun, J.Y. A hybrid routing protocol for wireless sensor networks with mobile sinks. In Proceedings of the 7th IEEE International Symposium on Wireless and Pervasive Computing (ISWPC), Dalian, China, 3–4 July 2012; pp. 1–5. [Google Scholar]
  73. Tunca, C.; Isik, S.; Donmez, M.Y.; Ersoy, C. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey. IEEE Commun. Surv. Tutor. 2012, 16, 877–897. [Google Scholar] [CrossRef]
  74. Gormus, S.; Tosato, F.; Fan, Z.; Bocus, Z.; Kulkarni, P. Opportunistic RPL for reliable AMI mesh networks. Wirel. Netw. 2014, 20, 2147–2164. [Google Scholar] [CrossRef]
  75. Dong, M.; Ota, K.; Liu, A.; Guo, M. Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2016, 27, 225–236. [Google Scholar] [CrossRef] [Green Version]
  76. Pavkovic, B.; Theoleyre, F.; Duda, A. IEEE 802.15. 4 and RPL crossoptimization for reliable opportunistic routing in wsn. In Proceedings of the ACM International Conference on Modeling, Analysis and Simulation ofWireless and Mobile Systems (MSWiM), Miami, FL, USA, 31 October–4 November 2011. [Google Scholar]
  77. Biswas, S.; Morris, R. Exor: Opportunistic multi-hop routing for wireless networks. ACM SIGCOMM Comput. Commun. Rev. 2005, 35, 133–144. [Google Scholar] [CrossRef]
  78. Chachulski, S.; Jennings, M.; Katti, S.; Katabi, D. Trading structure for randomness in wireless opportunistic routing. ACM SIGCOMM Comput. Commun. Rev. 2007, 37, 169–180. [Google Scholar] [CrossRef] [Green Version]
  79. Chen, Y.B.; Hou, K.M.; Chanet, J.P.; El Gholami, K. A RPL based Adaptive and Scalable Data-collection Protocol module for NS-3 simulation platform. In Proceedings of the NICST 2013 New Information Communication Science and Technology for Sustainable Development: France-China International Workshop, Clermont-Ferrand, France, 17 September 2013. [Google Scholar]
  80. Pfletschinger, S.; Navarro, M.; Ibars, C. Energy-efficient data collection in wsn with network coding. In Proceedings of the 2011 IEEE GLOBECOM Workshops (GC Wkshps), Houston, TX, USA, 5–9 December 2011; pp. 394–398. [Google Scholar]
  81. Razali, M.F.; Rusli, M.E.; Jamil, N.; Ismail, R.; Yussof, S. The authentication techniques for enhancing the RPL security mode: A survey. In Proceedings of the 6th International Conference on Computing &, Informatics, Kuala Lumpur, Malaysia, 25–27 April 2017; pp. 735–743. [Google Scholar]
  82. Airehrour, D.; Gutierrez, J.; Ray, S.K. Securing RPL routing protocol from blackhole attacks using a trust-based mechanism. In Proceedings of the 2016 26th International Telecommunication Networks and Applications Conference (ITNAC), Dunedin, New Zealand, 7–9 December 2016; pp. 7–9. [Google Scholar]
  83. Mardini, W.; Ebrahim, M.; Al-Rudaini, M. Comprehensive performance analysis of RPL objective functions in IoT networks. Int. J. Commun. Netw. Inf. Secur. 2017, 9, 323–332. [Google Scholar]
  84. Mayzaud, A.; Badonnel, R.; Chrisment, I. A taxonomy of attacks in RPL-based internet of thing. Int. J. Netw. Secur. 2016, 18, 459–473. [Google Scholar]
  85. Sharma, D.; Mishra, I.; Jain, S. A detailed classification of routing attacks against RPL in internet of things. Int. J. Adv. Res. Ideas Innov. Technol. 2017, 3, 692–703. [Google Scholar]
  86. Karthik, V.K.; Pushpalatha, M. Addressing attacks and security mechanism in the RPL based IoT. Int. J. Comput. Sci. Eng. Commination 2017, 5, 1715–1721. [Google Scholar]
  87. Staudemeyer, R.C.; Pöhls, H.C.; Wójcik, M. The Road to Privacy in IoT: Beyond Encryption and Signatures, Towards Unobservable Communication. In Proceedings of the IEEE 19th International Symposium on A World ofWireless, Mobile and Multimedia Networks (WoWMoM), Chania, Greece, 12–15 June 2018; pp. 14–20. [Google Scholar]
Figure 1. Low Power and Lossy IoT Network.
Figure 1. Low Power and Lossy IoT Network.
Electronics 10 02320 g001
Figure 2. DODAG Construction process [40].
Figure 2. DODAG Construction process [40].
Electronics 10 02320 g002
Figure 3. Classification of Solutions.
Figure 3. Classification of Solutions.
Electronics 10 02320 g003
Table 1. Summary of Trickle Timer-based Solutions.
Table 1. Summary of Trickle Timer-based Solutions.
CategoryWorking PrincipleIssues AddressedAdvantagesDisadvantages
Co-RPL [43]Reduces frequent node failures by improving localization of mobile nodes.Issues with the Trickle timer.Compared to basic RPL, Co-RPL has a lower loss rate of 20%, 50% less energy consumption, and 2.5 sec avg delay.The effect of sink mobility on network performance is not discussed for Co-RPL.
Enhanced Trickle Algorithm [57]Supports nodes mobility by dynamically adjusting DIS message broadcasts based on Doppler frequency.Issues with the Trickle timer.Helps in lowering DIS message count to 52.7%, packet loss rate of 0.3%, and energy consumption of 72.5 mJ.Solutions to high PLR due to mobile nodes not matching time intervals for selecting parent nodes are not discussed.
ME-RPL [44]Mobility information is added in the DIO message of mobile IoT to differentiate static and mobile nodes.Lack of facility of identifying mobile nodes.ME-RPL shows lower PLR and higher stable routes as compared to RPL.No discussion provided for mobile nodes selected as Preferred Parent and its effect on network performance.
Elastic Trickle Timer Algorithm [59]The `listen-only’ period is dynamically selected based on the number of neighboring nodes.Issues with the Trickle timer.76% convergence time, power consumption of 1.5MJ is obtained with R x value of 20% and average PDR of 87%.The effects of diverse I m i n and I m a x intervals over its performance evaluation have not been discussed.
Table 2. Summary of ETX-based Solutions.
Table 2. Summary of ETX-based Solutions.
CategoryWorking PrincipleIssues AddressedAdvantagesDisadvantages
FLEA-RPL [60]Applies fuzzy logic over metrics such as ETX and RER to select the best route for data transmission.Delay caused by ETX probing.Shows maximum delay of 2.9 s for 10 hops as compared to RPL, which has 3.8 s.To perform efficient unicast routing, fuzzy logic is not suitable as it considers only a few metrics.
MI-FL [61]Used for unicast transmission from a child node to root node in order to minimize delay and suppresses duplicate packets.Delay caused by ETX probing.It consumes 8% less power and provides a 90% packet delivery ratio with a packet loss rate of 4%.Simulations are done just for the static nodes (mobility of nodes is not introduced).
CA-RPL [63]Dynamically adjusts the path selection scheme and balances the network load.Increase in hand-off delay.Minimizes the average delay towards DAG root and the packet loss rate reduces to 25% as compared to RPL.As the devices are battery-operated, network lifetime measurements are not evaluated.
Modified RPL [45]Performs immediate ETX probing and avoids loops by introducing parent ID in the DIO messages.Delay caused by ETX probing and loops in the network.Shows a high PDR of 90%, high throughput of 19 kbps, and average delay of 1.3 ms.It causes longer delays as compared to RPL, solutions to overcome these longer delays are not discussed.
Multiple Sinks [55]Packets are delivered by the sensor node to the nearest sink reducing average hop count.Increase in hand-off delay.Less packet loss, reduced energy consumption, and increased packet reception ratio.Simulations are done in a wired network, so it is difficult to examine how multiple sinks would work in a wireless network.
Table 3. Summary of RSSI-based Solutions.
Table 3. Summary of RSSI-based Solutions.
CategoryWorking PrincipleIssues AddressedAdvantagesDisadvantages
ME-RPL [42]Parent node from DODAG is selected when it is within the RSSI range.Lack of identification of mobile nodes.Improved PDR to 92% and energy consumption to 1.2 MJ/min.Details over nodes variations to obtain the desired results are missing.
GTM-RPL [38]Uses mobility and density metric parameters.Lack of identification of mobile nodes.GTM-RPL achieves better QoS compared to mRPL.Only few protocol comparison is done.
MoMoRo [64]Detects and notifies route disconnectivity for the reconstruction process.Increase in hand-off delay.PRR for downward traffic to and from mobile nodes by MoMoRo is 90%.An adequate information on achieving low PRR is not discussed given.
Enhanced Hand-off Mechanism [65]Average RSSI level of each neighboring node is used for selecting the best route.Increase in hand-off delay, Loop in the network.Achieves better performance when traffic burst interval is increased.Solution to overhead by control messages during DODAG formation is not discussed.
mRPL [46]Uses RSSI; neighboring nodes within the child set are ignored to avoid loops.Increase in hand-off delay, Loop in the network.100% PDR is provided by mRPL because of the fast hand-off process.Solution to the overhead caused due to high traffic is not discussed.
EMA-RPL [66]RSSI of a mobile node is used for connectivity of a mobile node in a network.Issue with the rank of detached mobile nodes.EMA-RPL reduces signaling cost, energy, and handover delay compared to RPL.None of the scenarios are discussed in which mobile node can be chosen as preferred parent.
DMR [41]Uses rank information and LQI.Loops in-network, issue with the rank of detached mobile nodes.DMR reduces average per node energy consumption by 25%.To reconstruct a DODAG using DMR broadcasts is not thoroughly discussed.
Table 4. Summary of Position-based Solutions.
Table 4. Summary of Position-based Solutions.
CategoryWorking PrincipleIssues AddressedAdvantagesDisadvantages
KP-RPL [54]Kalman filter takes into account the velocity estimates by enhancing mobile node position accuracies resulting in better routing decisions.Lack of positioning information.Robust to channel conditions, and reliable routing, which increases the network reliability by 25% as compared to KP-RPL without Kalman filtering.Routing among the mobile nodes alone and how it will affect the positioning information is not discussed.
MP-RPL  [67]MP-RPL uses the SNSC model to detect node movements and constructs DODAG by selecting the least mobile nodes as Preferred Parents to ensure route stability.Lack of positioning information.This approach provides scalability as the gap between MP-RPL and RPL PDD remains unchanged even if the node number increases.The effect of parameters such as energy consumption, throughput, and PDR are not discussed.
Table 5. Summary of Miscellaneous Solutions.
Table 5. Summary of Miscellaneous Solutions.
CategoryWorking PrincipleIssues AddressedAdvantagesDisadvantages
SSCF [56]Sink coordination is used to exchange network-defined parameters such as network size and sink mobility.Lack of sink-to-sink coordination.Achieved higher PDR of 22% and 26% in random and grid topologies.Latency of RPL and SSCF is high.
Downward path construction mechanism [68]The downward routes allow ancestors of old and new routes to send no-path DAO messages upon receiving updated DAO messages.Issues with a rank of detached mobile nodes.Improves PDR from 20–80%, and also reduces overall overhead without using location information.Packet losses may occur if the mobile node is no longer reachable to the old parent; we note that the cancellation of the old route is still not done by the new DAO.
Table 6. Comparison of Various Solutions in terms of Different Parameters.
Table 6. Comparison of Various Solutions in terms of Different Parameters.
Categorized SolutionsNodeDIO IntervalsSimulation Parameters
CategoriesProposalNode TypeNodesSpeedMin IntervalInterval DoublingDurationArea
Trickle-Timer BasedCo-RPL [43]Tmote sky10–1001–3 m/sXX3600 sX
Enhanced Trickle Algorithm [57]X6–721.25–2.5 m/sXXXX
Mobility Enhanced RPL [44]X9XXXXX
Elastic Trickle Timer [59]X20–80XXX900 a1000 m2
ETX BasedFLEA-RPL [60]Tmote sky100X12 s10 s48 h600 m2
MI-FL [61]X40XXX100 s500 m2
CA-RPL [63]Tmote sky201–5 m/sXX360 s100 m2
Modified RPL [45]Car1025–65 mphXXXX
Multiple Sinks [55]Tmote sky30XXX3600 s20 m2
RSSI BasedME-RPL [42]CC2420250–2 m/sXX24 h150 m2
GTM-RPL [38]Tmote sky12X863600 s1600 m2
MoMoRo [64]Tmote sky30XXXXX
Enhanced Hand-Off [65]Tmote skyXXXXXX
mRPL [46]Tmote skyX2 m/sX0.256 sXX
EMA-RPL [66]XX2 m/s180 msX900 sX
DMR [41]X1002–10 m/sXX200 s500 m2
Position BasedKP-RPL [54]IRIS motes1002 m/sXXX150 m2
MP-RPL [67]Cooja Tmote501–10 m/sXX900 s600 m2
MiscellaneousSSCF [56]Sky mote2–8X4 s17.5 min600 sX
Downward PathTmote sky375–20 km/hXX1800 s375 m2
Construction Mechanism [68]
Categorized SolutionsCharacteristicsSystem Parameters
CategoriesProposalPower ComsumptionPacket LossPDRLatencyOperating SystemTx
Trickle-Timer BasedCo-RPL [43]X20%X2.5 sContiki50 m
Enhanced Trickle Algorithm [57]7.10%XXXMATLAB20 m
Mobility Enhanced RPL [44]X10%XXContikiX
Elastic Trickle Timer [59]1.5 mJX87%XCooja 2.730 m
ETX BasedFLEA-RPL [60]X1–7%XXContiki 2.7X
MI-FL [61]8%4%90%XWindows 7200 m
CA-RPL [63]X20%X5 sContiki 2.640 m
Modified RPL [45]XX90%1.3 msQuainet 4.5250 m
Multiple Sinks [55]XXXXOffice Testbed25 m
RSSI BasedME-RPL [42]1.2 MJX92%XContiki50 m
GTM-RPL [38]55 mJ/pktX88%5 sContiki20 m
MoMoRo [64]XX84.65%XIndoor TestbedX
Enhanced Hand-Off [65]XX85%60 msInstant Contiki 2.6X
mRPL [46]XX99.77%92.7 msContiki 2.610 m
EMA-RPL [66]1 mWX100%156.25 msContiki IPv650 m
DMR [41]XX97%XNS 2.34X
Position BasedKP-RPL [54]0.056 WX65%XMATLABX
MP-RPL [67]X28.7%X750 msContiki 2.650 m
SSCF [56]20%XX600 sContikiX
MiscellaneousDownward PathXX60–78%50–100 msContiki 2.7100 m
Construction Mechanism [68]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shah, Z.; Levula, A.; Khurshid, K.; Ahmed, J.; Ullah, I.; Singh, S. Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions. Electronics 2021, 10, 2320. https://doi.org/10.3390/electronics10192320

AMA Style

Shah Z, Levula A, Khurshid K, Ahmed J, Ullah I, Singh S. Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions. Electronics. 2021; 10(19):2320. https://doi.org/10.3390/electronics10192320

Chicago/Turabian Style

Shah, Zawar, Andrew Levula, Khawar Khurshid, Jawad Ahmed, Imdad Ullah, and Sushmita Singh. 2021. "Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions" Electronics 10, no. 19: 2320. https://doi.org/10.3390/electronics10192320

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop