You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

19 October 2025

Routing Technologies for 6G Low-Power and Lossy Networks

and
Tianjin Key Laboratory of Wireless Mobile Communications and Power Transmission, Tianjin Normal University, Tianjin 300387, China
*
Author to whom correspondence should be addressed.
This article belongs to the Section Networks

Abstract

6G low-power and lossy network (6G LLN) is a kind of distributed network designed for IoT and edge computing scenarios of the sixth-generation mobile communication technology. Its routing technologies should fully consider characteristics of green and low carbon, constrained nodes, lossy links, etc. This paper proposes an improved routing protocol for low-power and lossy networks (I-RPL) to better suit the characteristics of 6G LLN and meet its application requirements. I-RPL has designed new context-aware routing metrics, which include the residual energy indicator, buffer utilization ratio, ETX, delay, and hop count to meet multi-dimensional network QoS requirements. The candidate parent and its preferred parent’s residual energy indicator and buffer utilization ratio are calculated recursively to reduce the effect of upstream parents. ETX and delay calculating methods are improved to ensure a better performance. Moreover, I-RPL has optimized the network construction process to improve energy and protocol efficiency. I-RPL has designed scientific multiple routing metrics evaluation theories (Lagrangian multiplier theories), proposed new rank computing and optimal route selecting mechanisms to simplify protocol, and optimized broadcast suppression and network reliability. Finally, theoretical analysis and experiment results show that the average end-to-end delay of I-RPL is 13% lower than that of RPL; the average alive node number increased 11% and so on. So, I-RPL can be applied well to the 6G LLN and is superior to RPL and its improvements.

1. Introduction

The 6G low-power and lossy network (6G LLN) [,] is a type of green and low-carbon network that enables intelligent interconnection and symbiotic coexistence among humans, machines, and things, contributing to the realization of the vision of “intelligent connection of all things and digital twins”. Due to its unstable links, limited bandwidth, and restricted processing capabilities of nodes, it is widely applied in smart city communications, disaster monitoring, smart grids, and national defense and the military, holding significant research and strategic value. The routing technology in 6G LLN is mainly responsible for the selection and forwarding of data transmission paths, which is crucial for ensuring efficient data transmission and network service quality. However, it faces numerous challenges in complex networking environments.
Therefore, this paper proposed an improved routing technology used for 6G LLN, which can better adapt to the characteristics of 6G LLN and ensure network QoS.
The main contributions presented in this paper are as follows:
(1)
An improved network topology construction process is proposed.
(2)
The new context-aware routing metrics, which include the residual energy indicator, buffer utilization ratio, ETX, delay, and hop, are proposed.
(3)
The recursive method is designed to calculate the candidate parent and its preferred parent’s residual energy indicator and buffer utilization ratio.
(4)
The ETX and delay calculating manner are improved.
(5)
Scientific multiple routing metric evaluation theories are designed.
(6)
A novel composite context-aware objective function (C-OF) is designed.
(7)
New rank computing and the optimal route selecting mechanisms are proposed.
The rest of this paper is organized in the following manner: Section 2 discusses the related works including the basic theory of 6G LLN and problems description. Section 3 details the new proposed routing technology (I-RPL). Section 4 gives the evaluation and analysis results of I-RPL and other algorithms. Finally, Section 5 concludes this paper.

3. Improved RPL Algorithm (I-RPL)

3.1. Outline of I-RPL

The main contributions of I-RPL can be structured as follows:
(1)
Improved network topology construction processes.
(2)
Proposed new context-aware routing metrics (C-RM).
  • Designed recursive method to evaluate the candidate parent and its preferred parent’s residual energy metric and buffer utilization ratio.
  • Improved ETX and delay calculating manner.
(3)
Designed new composite context-aware objective function (C-OF).
(4)
Proposed scientific multiple routing metric evaluation theories.
(5)
Designed new rank computing and the optimal route selection mechanisms.
In the following sections, I-RPL will be elaborated based on the five parts mentioned above.

3.2. Improved Network Topology Construction Processes

I-RPL improves the network construction process to optimize network construction efficiency, reduce control overhead, and save energy consumption, etc.

3.2.1. New Mechanisms of Network Construction Processes

(1)
In the initial stage of network construction, only roots broadcast DIO; other nodes are waiting to receive DIO without sending DIS, DIO, and DAO. In this way, the control overhead and energy consumption can be reduced.
(2)
In order to ensure the quality of candidate parents, I-RPL proposed that only nodes meeting certain constraint conditions can send DIO, since these nodes may become the preferred parent and transmit packets.
(3)
Figure 5 illustrates the improved network construction processes which can improve network construction efficiency and reduce control overhead and energy consumption effectively.
Figure 5. Improved DODAG construction process. (1–4 are 4 different nodes, ①–⑫ are transmission sequence of control message).
In Figure 5, the simplified DAO (SDAO), only one bit, is used for informing the corresponding node that the sending SDAO node is ready to join the network.

3.2.2. Improved Network Construction Processes

According to Figure 5, the improved network construction processes can be detailed as follows:
Step 1: Roots broadcast DIO to its neighbors. DIO contains the necessary information for network construction and maintenance. Others are waiting to receive DIO without sending DIS, DIO, and DAO.
Step 2: Neighbors, like node 1, which receive DIO, determine if they should select the root as its parent in accordance with the objective function. If so, it will uni-cast SDAO to the root, which means that node 1 is ready to join the network and selects the root as its parent.
Step 3: After receiving the SDAO1 sent by node 1, the root only needs to wait a certain period of time (T) to receive DAO (DAO1234), which contains the entire network routing and other related information. Meanwhile, node 1 re-broadcast DIO to its neighbors such as node 2. Then, node 2 performs the same operation as node 1.
Step 4: Other nodes such as node 3 perform the same operation, as above-mentioned.
Step 5: If node 4 has not received DIO from other nodes within a certain period of time, node 4 will broadcast DIS to solicit DIO from its neighbors to join the network.
Step 6: After node 4 joins the network, node 3 will uni-cast DAO34, which contains the updated routing information to its parent (node 2). Then, node 2 uni-casts DAO234 to node 1, and node 1 uni-casts DAO1234 to the root.
Repeat the steps stated above until the network extends coverage to all nodes.

3.2.3. Comparison and Analysis

Suppose that there are five nodes in the network, and the time required to transmit the control message (DIO, DAO, DIS, DAO-ACK, and SDAO) are the same and both are t (t > 0). According to Figure 4 and Figure 5, the time required for the original and improved network construction processes can be designed as shown in Equation (2).
15 t + 10 t ,       o r i g i n a l 12 t + 4 t ,       i m p r o v e d
In Equation (2), 10t and 4t are the time required to replay DAO-ACK to DAO senders. Therefore, the following conclusions can be drawn:
(1)
Constructing a network with five nodes, the improved construction processes can save 3t + 6t time. And that the more nodes in the network, the more time can be saved. So, the energy consumption can be effectively reduced, and the network construction efficiency can be significantly improved.
(2)
The improved network construction processes can significantly reduce the control overhead by reducing the DAOs (and DAO-ACKs) number. And that the more nodes in the network, the more control overhead can be saved.
(3)
The time for the root to wait to receive the DAO containing the network routing and other related information can be considered as Timproved:
T i m p r o v e d = T o r i g i n a l 3 t + ε ,                                     n o   D A O - A C K T o r i g i n a l ( 3 t + 6 t ) + ε ,       w i t h   D A O - A C K
In Equation (3), Toriginal is the time required to construct the network with five nodes using the original processes. ε is a small positive number. So, the network construction efficiency can also be optimized. And the more nodes in the network, the more the network construction efficiency can be improved.

3.3. New Context-Aware Routing Metrics (C-RM)

To satisfy the application requirements of 6G LLN, the new composite context-aware routing metric (C-RM), which simultaneously considers the residual energy indicator, buffer utilization ratio, expected transmission count (ETX), delay, and hop count, is proposed. C-RM recursively calculates the candidate parent and its preferred parent’s residual energy metric and buffer utilization ratio to reduce the effect of upstream parents, since further paths are evaluated. Meanwhile, C-RM optimizes ETX and the delay calculating method through a comprehensive application sum and the mean and standard deviation of ETX and delay to ensure a better performance. In the following, routing metrics used in C-RM are designed. Suppose node c has n candidate parents.

3.3.1. Residual Energy Indicator (REI)

REI is the residual energy indicator of nodes and can be calculated based on Equation (4).
η 1 ( i ) = R E I ( i ) = E i n i t i a l ( i ) E c u r r e n t ( i ) E i n i t i a l ( i )                                             i = r o o t M a x ( E i n i t i a l ( i ) E c u r r e n t ( i ) E i n i t i a l ( i ) ,   η 1 ( i p ) × τ 1 )     i r o o t ,   i = 1 , 2 , , n ,       0 η 1 ( i ) 1
In Equation (4), Einitial(i) and Ecurrent(i) are the initial and current energy of candidate parent i. ip is the preferred parent (the next hop) of candidate parent i. τ1, the adjustment parameter, is used for reducing the energy condition of parents so that the energy consumption effect does not go farther than some degree. Its value is a random number in [0, 1]. REI(i) is the residual energy indicator of the candidate parent (neighbor) i and its preferred parent ip. In other words, REI(i) evaluates the remaining energy of nodes recursively. And the impact of the parent node’s remaining energy becomes weaker as it moves farther down the path. Therefore, REI can be used to avoid choosing paths with low remaining energy to transmit packets.

3.3.2. Buffer Utilization Ratio (BUR)

Buffer utilization ratio represents the buffer occupancy of nodes and can be evaluated according to Equation (5). Q(i) is the buffer usage indicator and can be calculated based on Equation (6). ip is the preferred parent of candidate parent i. τ2, the adjustment parameter, is used for reducing the buffer utilization condition of parents so that the buffer utilization effect does not go farther than some degree. Its value is a random number in [0, 1]. BUR(i) reflects the buffer utilization ratio of candidate parent i and its preferred parent ip. In other words, BUR(i) evaluates the buffer utilization ratio of nodes recursively. And the effect of parent buffer utilization is less when it gets farther down the path. Therefore, BOR can be used to relieve congestion and balance the load.
η 2 ( i ) = B U R ( i ) = Q ( i )                                                                     i = r o o t M a x ( Q ( i ) ,   η 2 ( i p ) × τ 2 )     i r o o t ,   i = 1 , 2 , , n 0 η 2 ( i ) 1
Q ( i ) = p a c k e t s   n u m b e r   i n   n o d e   ( i )   b u f f e r t o t a l   b u f f e r   s i z e   o f   n o d e   ( i ) ,   0 Q ( i ) 1

3.3.3. ETX

According to Equation (1), the ETX of a link can be calculated, and then the total ETX of a path can be obtained through summing all the links’ ETX. When transmitting data packets, the optimal path can be selected as the one with the smallest ETX. But the optimal path may include a long single hop, which is a bottleneck of the whole network. Therefore, C-RM proposes using the sum, mean, and standard deviation of ETX comprehensively. First, suppose that σ E T X ( i ) ,   E T X ( i ) , E T X ¯ ( i ) are the ETX standard deviation, sum, and mean of links in the path from node c through candidate parent i to the root and can be calculated based on Equation (7). hi is the hop count of path Pi from node c through candidate parent i to the root. Then, the specific usage rules of ETX are as follows:
Step 1: Calculating σ E T X ( i ) ,   E T X ( i ) ,   E T X ¯ ( i ) of path Pi.
Step 2: Arranging ETX(i) values in ascending order, then combining the paths corresponding to the minimum first three ETX(i) values into the alternative path set. If less than three paths, then all of them are selected into the alternative path set.
Step 3: The path with the minimum σ E T X ( i ) will be selected as the optimal path. For instance, suppose σ E T X ( f ) is the minimum value, then the path Pf (the path from node c through candidate parent f to the root) is the optimal one. So, f is the preferred parent of c.
Clearly, using the sum, mean, and standard deviation of ETX in a comprehensive manner not only ensures link quality but also avoids choosing the optimal path with high-ETX links. Normalization is required to facilitate the integration of ETX and other routing metrics, which is shown in Equation (8).
σ E T X ( i ) = 1 h i 1 k = 1 h i ( E T X k E T X ¯ i ) 2 E T X ¯ ( i ) = E T X i h i E T X ( i ) = E T X 1 + E T X 2 + , , + E T X h i
η 3 ( i ) = 0                                   i = r o o t σ E T X ( i ) n o r m a l i z a t i o n       i r o o t ,     σ E T X ( i ) n o r m a l i z a t i o n = σ E T X ( i ) i = 1 n σ E T X ( i ) ,   0 σ E T X ( i ) n o r m a l i z a t i o n 1 ,   ( i = 1 , 2 , , n )

3.3.4. Delay (D)

As shown in Section 2.2.5, it is problematic to calculate the delay of a path in a summation manner. The reason is that the ultimately selected path may include one or more links experiencing a large delay. Therefore, this paper proposes to comprehensively use the sum, mean, and standard deviation of each link’s delay in a path. First, suppose that σ D ( i ) ,   D ( i ) ,   D ¯ ( i )   are the delay standard deviation, sum, and mean of links in the path from node c through candidate parent i to the root and can be calculated based on Equation (9). hi is the hop count of path Pi from node c through candidate parent i to the root. Then, the specific usage rules of delay are as follows:
Step 1: Calculating σ D ( i ) ,   D ( i ) ,   D ¯ ( i ) of path Pi.
Step 2: Arranging D(i) values in ascending order, then combine the paths corresponding to the minimum first three D(i) values into the alternative path set. If the number of paths is fewer than three, all such paths should be incorporated into the alternative path set.
Step 3: The path with the minimum σ D ( i ) will be selected as the optimal path. For instance, suppose σ D ( f ) is the minimum value, then the path Pf (the path from node c through candidate parent f to the root) is the optimal one. So, f is the preferred parent of c.
It is obvious that comprehensively using the sum, mean, and standard deviation of delay not only ensures delay performance but also avoids selecting the optimal path with high delay links. For the convenience of combining delay with other routing metrics, normalization is required, as shown in Equation (10).
σ D ( i ) = 1 h i 1 k = 1 h i ( D k D ¯ i ) 2 D ( i ) = D 1 + D 2 + , , + D h i D ¯ ( i ) = D i h i
η 4 ( i ) = 0                           i = r o o t σ D ( i ) n o r m a l i z a t i o n     i r o o t ,     σ D ( i ) n o r m a l i z a t i o n = σ D ( i ) i = 1 n σ D ( i ) ,   0 σ D ( i ) n o r m a l i z a t i o n 1 ,   ( i = 1 , 2 , , n )

3.3.5. Hop Count

Hop count refers to the number of hops between a candidate parent and the root. It helps avoid choosing candidate parents with more hops to transmit packets. As the hop count has been incorporated into the calculation of ETX and delay standard deviation, the hop count is not considered separately in this paper.
In a word, C-RM recursively evaluates REI and BOR, using the ETX and delay sum, mean, and standard deviation to ensure a better performance of 6G LLN.

3.4. New Composite Context-Aware Objective Function (C-OF)

The composite objective function can be designed as Equation (11). It combines REI, BOR, ETX, and D in an additive method. And w1, w2, w3, and w4 are weighting coefficients, which are used to adjust the importance of each routing metric. n is the number of candidate parents and F ( i ) C o m p o s i t i o n is the composite objective function of the i-th candidate parent.
F ( i ) C o m p o s i t i o n = j = 1 m w j η j ( i ) ,   s . t .   j = 1 m w j = 1 0 w j 1 ,   ( i = 1 , 2 , , n )
Then, C-OF can be designed as the minimum value of F ( i ) C o m p o s i t i o n , as illustrated in Equation (12).
C P - O F = min F ( i ) C o m p o s i t i o n   m e t r i c = min ( j = 1 m w j η j ( i ) ) ,   s . t .   j = 1 m w j = 1 0 w j 1 ,   ( i = 1 , 2 , , n )
It can be seen that C-OF can comprehensively evaluate the REI, BOR, ETX, and D of candidate parents. And the weighting coefficients can be used to adjust the importance of corresponding routing metrics to further affect the evaluation results. Therefore, it is a key problem to determine the weight coefficients of routing metrics reasonably and effectively. I-RPL proposes Lagrangian multiplier theories to determine the weighting coefficients of routing metrics. Lagrangian multiplier theories synthesize the subjective (Fuzzy Analytic Hierarchy Process, FAHP) and objective (entropy method) weighting coefficient determination methods. This scientific multiple routing metrics evaluation theory comprehensively applied the advantage of the subjective and objective weighting method and can select the most suitable candidate parent as the preferred parent. Thus, the network performance can be significantly improved.

3.5. Novel Scientific Multiple Routing Metric Evaluation Theories

Supposing that node c has n candidate parents, xij is the value of the j-th routing metric for the i-th candidate parent. Then, the sample set of each routing metric value at every candidate parent is { x i j i = 1 , 2 , , n ;   j = 1 , 2 , , m } . It can be represented as initial matrix X.
X = x 11 x 12 x 13 x 1 m x 21 x 22 x 23 x 2 m x n 1 x n 2 x n 3 x n m
Then, according to Equation (11), the comprehensive evaluation function of candidate parents can be designed as Equation (14).
F ( i ) = j = 1 m w j η j ( i ) = j = 1 m w j × x i j s . t .   j = 1 m w j = 1 0 w j 1 ,   x i j = η j ( i ) ,   i = 1 , 2 , , n ,   m = 4
Therefore, according to the reasonable and scientific weighting coefficients of routing metrics, the comprehensive evaluation results of candidate parents (F(i)) can be obtained. Then, the one with the minimum value of Equation (14) can be chosen as the preferred parent. I-RPL proposed scientific multiple routing metric evaluation theories—Lagrangian multiplier theories, which synthetically utilize the subjective (FAHP) and objective (entropy method) weighting methods to select the optimal path.

3.5.1. Subjective Weighting Method

AHP compares the importance degree, possibility degree, and preference degree of attributes of evaluators through the scale, quantifies the processing, establishes the mathematical model, and solves it. FAHP [] is a decision-making method based on AHP. It introduces the fuzzy consistency matrix for the fuzziness of people’s judgment on complex things. FAHP solves the consistency problem of the AHP judgment matrix well. But this method is too subjective. Before introducing FAHP, the following definitions are given:
Definition 1.
For matrix  R = ( r i j ) n × m , if  0 r i j 1 , then R is the fuzzy matrix.
Definition 2.
For matrix  R = ( r i j ) n × m , if  r i j + r j i = 1 , then R is the fuzzy complementary matrix.
Definition 3.
For fuzzy matrix  R = ( r i j ) n × m ,  g , if  r i j = r i g r j g + 0.5 , then R is the fuzzy consistency matrix.
The specific steps of the subjective weighting method based on FAHP are as follows:
Step 1: Constructing the evaluation hierarchy analysis model.
Figure 6 illustrates the hierarchical evaluation model. The objective layer, at the top of the hierarchical evaluation model, is the ultimate decision-making goal. The criterion layer, at the middle of the hierarchical evaluation model, consists of several evaluation criterion, which are need to be considered (routing metrics). The scheme layer, at the bottom of the hierarchical evaluation model, consists of evaluated objects (candidate parents).
Figure 6. AHP hierarchical evaluation model.
Step 2: Calculating the weight vector.
(a) Constructing the fuzzy judgment matrix R = ( r i j ) n × m .
In R = ( r i j ) n × m , rij represents the correlation degree of the fuzzy relationship between the i-th element and j-th element. In order to quantitatively describe the relative importance between any two routing metrics, this paper adopts the scale of 0.1–0.9, as shown in Table 4.
Table 4. Scale of 0.1–0.9.
(b) Calculating the fuzzy consistency matrix R’.
The fuzzy consistency matrix R’ can be calculated by Equations (15) and (16). Moreover, the consistency checks during the matrix change processes can be avoided by Equation (15).
ξ i = j = 1 m r i j ;   i = 1 , 2 , , n
ξ i j = ξ i ξ j 2 n + 0.5
(c) Calculating the weight vector.
The row sum normalization of the fuzzy consistency matrix R’ can be calculated based on Equation (17), and then the weight vector w F A H P = ( w 1 F A H P ,   w 2 F A H P , ,   w m F A H P ) can be obtained.
w i F A H P = ( j = 1 m r i j ) / i = 1 n j = 1 m r i j
According to the above-mentioned steps of FAHP, the concrete operations of calculating routing metrics’ subjective weight coefficients can be summarized as follows:
Operation 1.
Constructing the fuzzy judgment matrix R.
According to Figure 7 and Table 3, the fuzzy judgment matrix R can be constructed as shown in Equation (18).
                                          R E I     B O R   E T X   D R = R E I B O R E T X D 0.5 0.4 0.3 0.7 0.6 0.5 0.4 0.7 0.7 0.6 0.5 0.8 0.3 0.3 0.2 0.5
Operation 2.
Calculating the fuzzy consistency matrix R’.
According to Equations (15) and (16), the fuzzy consistency matrix R’ can be calculated as shown in Equation (19).
R = 0.5 0.4625 0.4125 0.575 0.5375 0.5 0.45 0.6125 0.5875 0.55 0.5 0.6625 0.425 0.3875 0.3375 0.5
Operation 3.
Calculating the weight vector.
According to Equation (17), the weight coefficients of routing metrics can be obtained, as shown in Equation (20).
w F A H P = ( w 1 F A H P ,   w 2 F A H P , ,   w m F A H P ) = ( 0.24375 ,   0.2625 ,   0.2875 ,   0.20625 )
Operation 4.
Calculating C-OF in the FAHP method.
According to Equation (12), the objective function (C-OF) value of candidate parent i in the FAHP method can be represented as follows:
N O F F A H P = min ( j = 1 4 w j F A H P η j ( i ) )                           = min ( 0.24375 η 1 ( i ) +   0.2625 η 2 ( i )   +   0.2875 η 3 ( i ) + 0.20625 η 4 ( i ) )
Then, the candidate parent with the minimum value of Equation (21) can be selected as the preferred parent.

3.5.2. Objective Weighting Method

The entropy method [,] calculates weighting coefficients by extracting the information entropy value of the indicator change based on the concept of entropy in information theory. Its basic idea is calculating the weight coefficient of each indicator according to relative importance of indicators, concept, and nature of entropy. If the information entropy of an indicator is small, the variation degree of this indicator is relatively large, which contains a large amount of information, plays a greater role, and a larger weighting coefficient should be allocated. On the contrary, if the information entropy of an indicator is large, a smaller weighting coefficient should be allocated. The entropy method is not affected by the subjective factors of evaluators and can reflect the relationship between indicator change and indicator weight well. It is an ideal objective weighting method. The concrete steps of calculating indicator weight by entropy method are as follows:
Step 1: Calculating proportion Pij of the indicator value for the i-th evaluated object at the j-th indicator in the initial matrix (Equation (13)), based on Equation (22).
P i j = x i j i = 1 n x i j ,   i = 1 , 2 , , n ,   j = 1 , 2 , , m
In Equation (22), n is the number of candidate parents of node c, m = 4 is the number of evaluated routing metrics.
Step 2: Calculating the entropy value Ej of the j-th indicator (routing metric), according to Equation (23).
E j = k i = 1 n p i j L n p i j ,   k = 1 ln n ,   0 E j 1
Step 3: Calculating the difference coefficient dj of the j-th indicator, based on Equation (24).
d j = 1 E j
Step 4: Normalizing dj according to Equation (25) and then obtaining the weighting coefficients of routing metrics w j e n t r o p y .
w j e n t r o p y = d j j = 1 m d j
Then, according to Equation (12), the C-OF value of the candidate parent i in the entropy method can be designed as follows:
N - O F e n t r o p y = min ( j = 1 4 w j e n t r o p y η j ( i ) )
Then by the entropy method, the candidate parent with the minimum value of Equation (26) can be selected as the preferred parent.

3.5.3. Lagrangian Multiplier Theories

I-RPL synthesizes the entropy method and FAHP to realize the complementary advantages of subjective and objective methods and obtain a better performance. In order to obtain scientific multiple routing metric evaluation results, it is necessary to calculate the influence of the entropy method and FAHP according to certain methods. I-RPL proposed Lagrangian multiplier theories. And the detailed steps of synthesizing the entropy method and FAHP through Lagrangian multiplier theories are as follows:
Step 1: Constructing the synthesized weight mathematical model.
The synthesized weight mathematical model can be constructed as Equation (27). wj is the synthesized weight of the j-th routing metric. w j ( k ) is the weight of the j-th routing metric by the k-th weighting determination method. α k is weighting coefficient of the weight determined by the k-th weighting determination method.
w j = α 1 w j ( 1 ) + α 2 w j ( 2 ) + + α k w j ( k ) = τ = 1 k α τ w j ( τ ) s . t . τ = 1 k α τ 2 = 1
Step 2: Constructing the fitness function.
According to Equation (14), the fitness function f(i) can be constructed as shown in Equation (28). f(i) is the fitness function value of the i-th candidate parent. xij is the normalized value of the j-th routing metric of the i-th candidate parent.
f ( i ) = 1 1 + F ( i )   = 1 1 + j = 1 m x i j × [ τ = 1 k α τ × w j τ ]
Step 3: Constructing the linear programming model and optimization model.
According to Equation (28), the linear programming model of F(i) can be constructed as Equation (29).
min F ( i ) = ( F ( 1 ) ,     F ( 2 ) , , F ( n ) ) s . t . a τ > 0 τ = 1 k a τ 2 = 1
The optimization model can be constructed as Equation (30).
min F = A [ B ( α w ) T ] = 1 1 1 n × 1 T × x 11 x 12 x 1 m x 21 x 22 x 2 m x n 1 x n 2 x n m α 1 α 2 α k T × w 1 ( 1 ) w 2 ( 1 ) w m ( 1 ) w 1 ( 2 ) w 2 ( 2 ) w m ( 2 ) w 1 ( k ) w 2 ( k ) w m ( k ) T s . t . a τ > 0 ,   ( τ = 1 ,   2 , ,   k ) τ = 1 k a τ 2 = 1
Step 4: Calculating α τ and λ through constructing a function based on Lagrangian multiplier theories.
(a) Constructing a function based on Lagrangian multiplier theories.
The constructed function based on Lagrangian multiplier theories is shown in Equation (31).
L = f ( α τ ,   λ ) = A [ B ( α w ) T ] 1 2 λ τ = 1 k α τ 2 1
(b) Calculating partial derivatives of α τ and λ in Equation (31), the corresponding expressions are as follows:
f α 1 = i = 1 n j = 1 m x i j × w j ( 1 ) λ α 1 = 0
f α 2 = i = 1 n j = 1 m x i j × w j ( 2 ) λ α 2 = 0
f α k = i = 1 n j = 1 m x i j × w j ( k ) λ α k = 0
f λ = τ = 1 k α τ 2 1 = 0
(c) Calculating α τ ,   ( τ = 1 ,   2 , , k ) .
As shown in Equation (36), α τ 2 can be calculated through summing the squares of derivative functions of α τ , such as Equations (32)–(34).
α τ 2 = i = 1 n j = 1 m x i j w j ( τ ) 2 λ 2
Then, Equation (37) can be derived based on Equation (36).
τ = 1 k α τ 2 = τ = 1 k i = 1 n j = 1 m x i j w j ( τ ) 2 λ 2
After that, based on Equations (35) and (37), (38) can be derived.
τ = 1 k α τ 2 1 = τ = 1 k i = 1 n j = 1 m x i j w j ( τ ) 2 λ 2 1 = 0
So α τ can be represented as Equation (39).
α τ = i = 1 n j = 1 m x i j w j ( τ ) λ
(d) Normalizing α τ .
As shown in Equation (40), α τ * is the normalized expression of α τ .
α τ * = i = 1 n j = 1 m x i j w j ( τ ) τ = 1 k i = 1 n j = 1 m x i j w j ( τ )
Step 5: Calculating the synthesized weight.
According to Equations (27) and (40), the synthesized weight can be calculated.
There are two kinds of weight determination methods (FAHP and entropy) designed in I-RPL, so k = 2, supposing that α 1 * = α F A H P * and α 2 * = α e n t r o p y * . Therefore, the expression of synthesized weight can be constructed as Equation (41).
w j = α 1 * w j ( 1 ) + α 2 * w j ( 2 ) = α F A H P * w j F A H P + α e n t r o p y * w j e n t r o p y α 1 * = α F A H P * = i = 1 n j = 1 4 x i j w j ( F A H P ) i = 1 n j = 1 4 x i j w j ( F A H P ) + i = 1 n j = 1 4 x i j w j ( e n t r o p y ) α 2 * = α e n t r o p y * = i = 1 n j = 1 4 x i j w j ( e n t r o p y ) i = 1 n j = 1 4 x i j w j ( F A H P ) + i = 1 n j = 1 4 x i j w j ( e n t r o p y )

3.5.4. Multiple Routing Metrics Evaluation Theories

The specific processes of calculating the fitness function and C-OF by multiple routing metric evaluation theories can be summarized as follows:
Process 1: Calculating the subjective weight.
FAHP is designed to be used as a subjective weighting method to calculate the weighting coefficients of routing metrics. Its concrete operations are listed in “Section 3.5.1”.
Process 2: Calculating the objective weight.
The entropy method is designed to be used as the objective weighting method to calculate the weighting coefficients of routing metrics. Its concrete operations are listed in “Section 3.5.2”.
Process 3: Calculating the synthesized weighting coefficients.
The synthesized weighting coefficient α τ can be calculated based on Lagrangian multiplier theories, and the concrete operations are listed in “Section 3.5.3”. Then the normalized combination weighting coefficients α τ can be obtained.
Process 4: Calculating the synthesized weight wj.
The synthesized weight wj can be obtained through Equation (41).
Process 5: Calculating the fitness function and C-OF.
According to Equation (41), the fitness function and C-OF of the candidate parent i can be calculated as Equations (42) and (43).
f ( i ) = 1 1 + F ( i ) = 1 1 + j = 1 m x i j × w j     = 1 1 + j = 1 4 x i j × ( α F A H P * w j F A H P + α e n t r o p y * w j e n t r o p y )
N - O F = min F ( i ) C o m p o s i t i o n   m e t r i c = min ( j = 1 m w j η j ( i ) ) = min ( j = 1 4 ( α F A H P * w j F A H P + α e n t r o p y * w j e n t r o p y ) × η j ( i ) )
In Equations (42) and (43), α F A H P * and α e n t r o p y * can be obtained depending on Equation (41), and w j F A H P and w j e n t r o p y can be obtained depending on Equations (20) and (25). So, the one with the maximum value of Equation (42) or the minimum value of Equation (43) can be selected as the preferred parent. Therefore, I-RPL can acquire major enhancements in network performance.
In a word, multiple routing metric evaluation theories synthesize the advantages of subjective and objective weighting methods. It not only overcomes the problem that the subjective weighting method cannot consider the objective application requirements of 6G LLN but also solves the problem that the objective weighting method cannot consider the subjective preference factors of users. Therefore, I-RPL can significantly improve network performance. In addition, this theory provides a certain theoretical basis for multiple routing metric evaluations in the 6G LLN routing algorithm and other fields which need to evaluate multiple indicators.

3.6. Complexity Analysis of N-OF

The computational complexity of OF is influenced by multiple key factors together, such as candidate parent number, dimension of the optimization problem and convergence criterion, and so on.
Suppose that n is the candidate parent number, m = 4 is the dimension of the optimization problem, then the computational complexity of OF in I-RPL can be represented as O(nm). Due to the low value of m, its complexity is approximately O(n). It can be seen that the computational complexities of I-RPL and RPL improvements are mainly related to the candidate parent number and the dimension of optimization problem and are basically the same. Therefore, I-RPL can ensure network performances without incurring additional computational complexity.

3.7. Novel Rank Calculating Method

A node’s rank represents where it is located in relation to the root. In order to avoid loop, rank strictly increases in the Down direction (the direction from the root towards the leaf nodes) and decreases in the Up direction (the direction from the leaf nodes to the root). The rank of a node can be calculated based on OF. In I-RPL, we proposed a novel rank calculated method based on C-OF.
In I-RPL, the rank of the root is set 1.0. For other non-root nodes such as node c, the calculating method is based on Equation (44).
R c ( i ) = R c p ( i ) + R ( i ) ,   R ( i ) = F ( i ) + 1
In Equation (44), Rcp(i), advertised by candidate parent i through DIO, is the rank of i. R(i) is the C-OF value of the link which is from c to the candidate parent i. Rc(i) is the rank of c, which is based on the route from c through candidate parent i to the root.
According to Equation (44), the values of { R c ( 1 ) ,   R c ( 2 ) , ,   R c ( n ) } can be obtained. If min { R c ( 1 ) ,   R c ( 2 ) , ,   R c ( n ) } = R c ( f ) , then f can be selected as the preferred parent.

3.8. Novel Preferred Parent Selection Method

According to Section 3.7, it can be seen that candidate parent f with the minimum value of Equation (44) can be selected as the preferred parent. However, this preferred parent selection method is not applicable to all cases. For example, if two or more candidate parents have the same and minimum rank, it is difficult to select the preferred parent, according to Section 3.7. Therefore, the novel preferred parent selecting mechanism is proposed:
(1)
If the rank of a candidate parent is equal to or less than that of current preferred parent, but the difference between them is less than replacing the preferred parent threshold, then the current preferred parent will not be replaced. This operation can guarantee the topology stability of 6G LLN without affecting the network performance.
(2)
If the rank of a candidate parent, calculated according to Equation (44), is less than 1.0 or greater than the node number in 6G LLN, then this candidate parent must be eliminated from the candidate parent set. Since the quality of this candidate parent is so bad, it is unable to deliver any packets or its rank is calculated incorrectly and it needs to be rejoined to the candidate parent set or become a leaf.
(3)
When conducting preferred parent selection, if ranks of two or more candidate parents are equal and minimum, then the one whose candidate parent set is the largest will be selected to serve as the preferred parent. If there are multiple candidate parents whose candidate parent sets are the largest and equal, then one is randomly selected as the preferred parent. Because the larger the candidate parent set is, the larger the preferred parent selection range is, and the more likely it is to select the optimal one as the preferred parent.
(4)
If the candidate parent set of c has only 1 node, then c waits for a period of time so that more nodes may join its candidate parent set. Then, if the candidate parent set of c is greater than or equal to 2, c selects its preferred parent by executing the I-RPL algorithm. Otherwise, c directly chooses this candidate parent as its preferred parent without executing the I-RPL algorithm, and the rank of c is equal to the rank of this candidate parent plus 1.

4. Performance Evaluation

To quantitatively evaluate and compare the new proposed I-RPL algorithm and several popular improvements of RPL, such as ETXOF, AHP, entropy, and OF0, we carry out a series of experiments by OPNET14.5.

4.1. The Selected Statistic Metrics

This paper selects seven important statistic metrics, as illustrated in Table 5, to comprehensively evaluate and compare the performance of I-RPL and its several popular improvements.
Table 5. The selected statistic metrics.

4.2. Setting Simulation Parameters

Assume that nodes are randomly deployed within the 400 m × 400 m network area and the arrival distribution of data packets follows the Poisson distribution, the nodes’ initial energy is a random value between 0.5 J and 1.5 J. If the node’s residual energy is less than 5% of its initial energy, the node is considered dead. The IRS and ISAC number, working frequency band, and other parameters used in I-RPL are illustrated in Table 6. In Table 6, E(v,d) [] can be computed as follows:
E ( v , d ) = 2 E e l e c × v + ε a m p × v × d 2                                     d < d 0 2 E e l e c × v + ε f s × v × d 4                                             d > d 0
Table 6. Simulation parameters.
The parameters used in Equation (45) are explained in Table 7.
Table 7. Parameters used in E(v, d).

4.3. Simulation Results and Analysis

4.3.1. Control Overhead

The control overhead of the I-RPL, ETXOF, HC, FAHP, and entropy is shown in Figure 7. It can be seen that, in the initial stage of network construction, the control overhead of each algorithm is relatively high. After 3000 s, the network gradually stabilizes, and the control overhead reaches a stable state. In addition, the control overhead of I-RPL is significantly lower than that of the ETXOF, HC, FAHP and entropy during the whole network operation period, because I-RPL improves the network construction process and reduces the number of control messages sent. Therefore, it can significantly reduce the control overhead and improve network construction efficiency.
Figure 7. Control overhead.

4.3.2. Average Packet Delivery Ratio

Figure 8 shows the average packet delivery ratio of I-RPL, ETXOF, HC, FAHP, and entropy. It can be seen that, in the initial stage, the packet delivery ratio of each algorithm is unstable; it gradually reaches a stable state after 2000 s. And the average packet delivery ratio of I-RPL is obviously higher than that of ETXOF, HC, FAHP, and entropy, because I-RPL proposed using the recursive method to evaluate the REI and BOR of the candidate parent and comprehensively use the sum, mean and standard deviation of ETX and delay. The context-aware composite routing metric and C-OF are proposed. The scientific multiple routing metrics theories are designed. So, I-RPL can select the optimal path to deliver packets. Therefore, the packet delivery ratio of I-RPL is significantly better than that of other algorithms.
Figure 8. Average packet delivery ratio.

4.3.3. Average End-to-End Delay

Figure 9 shows the average end-to-end delay of I-RPL, ETXOF, HC, FAHP, and entropy. The end-to-end delay of I-RPL is obviously lower than that of other algorithms. I-RPL proposed new a network construction process to improve network construction efficiency. Moreover, the delay routing metric is evaluated in the manner of the sum, mean and standard deviation, etc. Therefore, the I-RPL can significantly improve end-to-end delay.
Figure 9. Average end-to-end delay.

4.3.4. Average Hop Count

Average hop count experiment results are shown in Figure 10. It is clear to see that I-RPL and HC are the minimum values. Since HC only selects the next hop based on the hop metric, the candidate parent with the minimum hop to destination will be selected as the preferred parent. The I-RPL can significantly reduce the hop count from source to destination based on the context-aware composite routing metric and C-OF, etc. Therefore, the hop count performance of I-RPL and HC are the best.
Figure 10. Average hop count.

4.3.5. Network Lifetime

Average remaining energy and average alive node number can estimate the network’s lifetime effectively. Figure 11 and Figure 12 show the I-RPL, ETXOF, HC, FAHP, and entropy of these two statistic metrics. It is clear to see that these two statistic metrics of I-RPL are much higher than that of ETXOF, HC, FAHP, and entropy. Since I-RPL reduces the control overhead by improving the DODAG build process—comprehensively evaluating REI, BOR, ETX, and D of the candidate parent—it designs scientific multiple routing metric evaluation theories. Therefore, I-RPL can significantly reduce energy consumption, save network resources, and prolong the network’s life.
Figure 11. Average remaining energy.
Figure 12. Average alive node number.

4.3.6. Average Number of Preferred Parent Changes

The average frequency of preferred parent changes is a reflection of the network topology stability, and it can be applied to coordinate network performance with the stability of the network topology. Figure 13 shows the average number of preferred parent changes in I-RPL, ETXOF, HC, FAHP, and entropy. It can be seen that, at the initial stage, the metric values of each algorithm are relatively large. After 2400 s, reaching the stable network state, the number of preferred parent changes in I-RPL are much lower than that of ETXOF, HC, FAHP, and entropy. Therefore, I-RPL can effectively improve network performance under the premise of ensuring network topology stability.
Figure 13. Average Number of Preferred Parent Changes.

4.3.7. Weight Coefficients (w1, w2, w3, and w4)

Figure 14 shows the relationship between weight factors (w1, w2, w3, and w4) and simulation time. In this paper, the variation law of the weight coefficient of node 6 (corresponding to (a)), node 38 (corresponding to (b)), node 54 (corresponding to (c)), and node 92 (corresponding to (d)) are randomly selected. It is obvious that the I-RPL can dynamically adjust values of w1, w2, w3, and w4 according to the network’s actual objective operation, users, control centers, and other subjective factors.
Figure 14. Relationship between weight factors (w1, w2, w3, and w4) and simulation time.

5. Conclusions

In this paper, I-RPL is proposed to better adapt to 6G LLN. I-RPL designed new context-aware routing metrics which evaluate the residual energy index, buffer occupancy ratio, ETX, delay, and hop comprehensively to guarantee multi-dimensional network QoS. Among them, the candidate parent and its preferred parent’s residual energy indicator and buffer utilization ratio are calculated recursively to reduce the effect of upstream parents. ETX and delay calculating manners are improved to ensure a better performance. Moreover, the I-RPL has optimized the network construction process, designed scientific multiple routing metric evaluation theories (Lagrangian multiplier theories), and proposed new rank computing and optimal route selecting mechanisms to improve network construction efficiency, energy consumption efficiency, broadcast suppression, network reliability, and so on. Finally, simulation experiments demonstrate that I-RPL is superior to other improvements.
In terms of future work, we plan to conduct more in-depth research into the 6G LLN routing algorithm and segment routing technology.

Author Contributions

Conceptualization, Y.C. and G.Z.; methodology, Y.C.; software, Y.C.; validation, Y.C. and G.Z.; formal analysis, G.Z.; investigation, Y.C.; resources, Y.C.; data curation, Y.C.; writing—original draft preparation, Y.C.; writing—review and editing, G.Z.; visualization, G.Z.; supervision, Y.C.; project administration, Y.C.; funding acquisition, Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

This manuscript is supported by Tianjin Key Laboratory of Wireless Mobile Communications and Power Transmission. During the preparation of this manuscript, the author(s) used [opnet, 14.5] for the purposes of [experiment]. The authors have reviewed and edited the output and take full responsibility for the content of this publication.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the decision to publish the results.

References

  1. Wang, C.X.; You, X.H.; Gao, X.Q.; Zhu, X.; Li, Z.; Zhang, C.; Wang, H.; Huang, Y.; Chen, Y.; Haas, H.; et al. On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds. IEEE Commun. Surv. Tutor. 2023, 25, 905–974. [Google Scholar] [CrossRef]
  2. Prajapati, A.K.; Pilli, E.S.; Battula, R.B.; Varadharajan, V.; Verma, A.; Joshi, R. A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things. Comput. Electr. Eng. 2025, 123, 110071. [Google Scholar] [CrossRef]
  3. Soyak, E.G.; Ercetin, O. Effective networking: Enabling effective communications towards 6G. Comput. Commun. 2024, 215, 1–8. [Google Scholar] [CrossRef]
  4. Yang, C.S.; Liao, Y.J.; Kuo, C.H.; Hwang, C.-H.; Wu, W.-D.; Liao, P.-K.; Fu, I.-K.; Sébire, G.; Frost, T.; Tenny, N. Toward 6G Sustainable Mobile Communications. IEEE Wirel. Commun. 2025, 32, 44–50. [Google Scholar] [CrossRef]
  5. Lakhlef, I.E.; Djamaa, B.; Senouci, M.R.; Bradai, A. Enhanced Multicast Protocol for Low-Power and Lossy IoT Networks. IEEE Sens. J. 2024, 24, 15393–15408. [Google Scholar] [CrossRef]
  6. Bono, F.M.; Polinelli, A.; Radicioni, L.; Benedetti, L.; Castelli-Dezza, F.; Cinquemani, S.; Belloli, M. Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment. Future Internet 2025, 17, 29. [Google Scholar] [CrossRef]
  7. Parizi, M.N.; Ghafouri, S.H.; Hajmohammadi, M.S. TARRP: Trust Aware RPL Routing Protocol for IoT. Int. J. Commun. Syst. 2025, 38, e6124. [Google Scholar] [CrossRef]
  8. Dey, D.; Ghosh, N. iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning. Ad Hoc Netw. 2024, 163, 103586. [Google Scholar] [CrossRef]
  9. Zhu, X.Q.; Liu, J.Q.; Lu, L.Y.; Zhang, T.; Qiu, T.; Wang, C.; Liu, Y. Enabling Intelligent Connectivity: A Survey of Secure ISAC in 6G Networks. IEEE Commun. Surv. Tutor. 2025, 27, 748–781. [Google Scholar] [CrossRef]
  10. Lakhlef, I.E.; Djamaa, B.; Senouci, M.R.; Bradai, A.; Cherif, Y.M. PIM-LLN: Protocol Independent Multicast for Low-Power and Lossy Networks. IEEE Trans. Mob. Comput. 2025, 24, 3809–3825. [Google Scholar] [CrossRef]
  11. RFC9010; Thubert, P.; Richardson, M. Routing for RPL (Routing Protocol for Low-Power and Lossy Networks) Leaves. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2021.
  12. RFC9008; Robles, M.I.; Richardson Thubert, P. Using RPI Option Type, Routing Header for Source Routes, and IPv6-in-IPv6 Encapsulation in the RPL Data Plane. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2021.
  13. RFC6550; Winter, T.; Thubert, P.; Brandt, A.; Alexander, R.; Vasseur, J.P.; Hui, J.; Pister, K.; Levis, P.; Struik, R.; Kelsey, R. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2012.
  14. RFC8036; Winget, N.C.; Hui, J.; Popa, D. Applicability Statement for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Advanced Metering Infrastructure (AMI) Networks. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2017.
  15. Mohajerani, J.; Ghanatghestani, M.M.; Hashemipour, M. MCTE-RPL: A multi-context trust-based efficient RPL for IoT. Netw. Comput. Appl. 2024, 229, 103937. [Google Scholar] [CrossRef]
  16. Dinesh, P.S.; Palanisamy, C. Reliable Data Delivery and Load Balancing in Improved Energy Efficient RPL Routing Protocol for Low Power and Lossy Networks. Int. J. Commun. Syst. 2025, 38, e6106. [Google Scholar] [CrossRef]
  17. Vidhya, S.S.; Mathi, S.; Ananthanarayanan, V.; Iyer, G.N. IP-RPL: An Intelligent Power-Aware Routing Protocol for Next-Generation Low-Power Networks. IEEE Sens. J. 2025, 25, 3640–3648. [Google Scholar] [CrossRef]
  18. Hussain, S.J.; Roopa, M. BE-RPL: Balanced-load and Energy-efficient RPL. Comput. Syst. Sci. Eng. 2023, 45, 785–801. [Google Scholar] [CrossRef]
  19. Alilou, M.; Sangar, A.B.; Majidzadeh, K.; Masdari, M. QFS-RPL: Mobility and Energy Aware Multi Path Routing Protocol for The Internet of Mobile Things Data Transfer Infrastructures. Telecommun. Syst. 2024, 85, 289–312. [Google Scholar] [CrossRef]
  20. Ghosh, S. CB-ED-RPL: Coordinator-Based Energy-Efficient Dynamic RPL for IoT Networks. Wirel. Pers. Commun. 2023. [Google Scholar] [CrossRef]
  21. Rady, M.; Lampin, Q.; Barthel, D.; Watteyne, T. Bringing Life Out of Diversity: Boosting Network Lifetime Using Multi-PHY Routing in RPL. Trans. Emerg. Telecommun. Technol. 2022, 33, e4592. [Google Scholar] [CrossRef]
  22. Dharmalingaswamy, A.; Pitchai, L. Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things. Int. Arab. J. Inf. Technol. 2023, 20, 954–964. [Google Scholar] [CrossRef]
  23. Vieira Junior, I.F.; Granjal, J.; Curado, M. RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments. Netw. Syst. Manag. 2024, 32, 19. [Google Scholar] [CrossRef]
  24. Tabouche, A.; Djamaa, B.; Senouci, M.R.; Ouakaf, O.E.; Elaziz, A.G. TLR: Traffic-Aware Load-Balanced For Industrial IoT. Internet Things 2024, 25, 101093. [Google Scholar] [CrossRef]
  25. Maheshwari, A.; Panneerselvam, K. Optimizing RPL for Load Balancing and Congestion Mitigation in IoT Network. Wirel. Pers. Commun. 2024, 136, 1619–1636. [Google Scholar] [CrossRef]
  26. Royaee, Z.; Mirvaziri, H.; Bardsiri, A.K. Designing a context-aware model for RPL load balancing of low power and lossy networks in the internet of things. Ambient. Intell. Humaniz. Comput. 2020, 12, 2449–2468. [Google Scholar] [CrossRef]
  27. Pereira, H.; Moritz, G.L.; Souza, R.D.; Munaretto, A.; Fonseca, M. Increased Network Lifetime and Load Balancing Based on Network Interface Average Power Metric for RPL. IEEE Access 2020, 8, 48686–48696. [Google Scholar] [CrossRef]
  28. Kumar, A.; Hariharan, N. DCRL-RPL: Dual context-based routing and load balancing in RPL for IoT networks. IET Commun. 2020, 14, 1869–1882. [Google Scholar] [CrossRef]
  29. Hadaya, N.N.; Alabady, S.A. Proposed RPL routing protocol in the IoT applications. Concurr. Comput.-Pract. Exp. 2022, 34, e6805. [Google Scholar] [CrossRef]
  30. Alotaibi, M.A.; Alwakeel, S.S.; Alyahya, A.N. A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol. CMC-Comput. Mater. Contin. 2025, 82, 3467–3497. [Google Scholar]
  31. Mishra, S.N.; Khatua, M. Reliable and Delay Efficient Multi-Path RPL for Mission Critical IoT Applications. IEEE Trans. Mob. Comput. 2024, 23, 6983–6996. [Google Scholar] [CrossRef]
  32. RFC9616; Jonglez, B.; Chroboczek, J. Delay-Based Metric Extension for the Babel Routing Protocol. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2024.
  33. Behrad, B.V.; Abolfazl, T.H. Brad-OF: An Enhanced Energy-Aware Method for Parent Selection and Congestion Avoidance in RPL Protocol. Wirel. Pers. Commun. 2020, 114, 783–812. [Google Scholar] [CrossRef]
  34. Hanane, L.; Nabil, B. A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function. Ad Hoc Netw. 2020, 96, 102001. [Google Scholar]
  35. Anita, C.S.; Sasikumar, R. Learning automata and lexical composition method for optimal and load balanced RPL routing in IoT. Int. J. Ad Hoc Ubiquitous Comput. 2022, 40, 288–300. [Google Scholar] [CrossRef]
  36. Kamble, S.; Chandavarkar, B.R. EWRPL: Entropy-based weighted RPL. Wirel. Netw. 2025, 31, 613–622. [Google Scholar] [CrossRef]
  37. Kamble, S.; Bhilwar, P.; Chandavarkar, B.R. Novel Fuzzy-based Objective Function for routing protocol for low power and lossy networks. Ad Hoc Netw. 2023, 144, 103150. [Google Scholar] [CrossRef]
  38. RFC6719; Gnawali, O.; Levis, P. The Minimum Rank with Hysteresis Objective Function. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2012.
  39. Srisomboon, K.; Wasayangkool, K.; Lee, W. Trilateral Smart Switching Algorithm for Improving Smart Meters Efficiency in Advanced Metering Infrastructure (AMI) Network. IEEE Access 2024, 12, 194973–194988. [Google Scholar] [CrossRef]
  40. Shen, A.; Li, Y.; Noman, K.; Wang, D.; Peng, Z.; Feng, K. Multiscale fluctuation-based symbolic dynamic entropy: A novel entropy method for fault diagnosis of rotating machinery. Struct. Health Monit.-Int. J. 2025, 24, 402–420. [Google Scholar] [CrossRef]
  41. Xiong, Z.C.; Hu, J.Y.; Li, N. Comprehensive quality evaluation method of ultrasound tomography algorithms based on entropy method. Meas. Sci. Technol. 2024, 35, 115403. [Google Scholar] [CrossRef]
  42. Cao, Y.N.; Yuan, H. A novel context-aware RPL algorithm based on a triangle module operator. Front. Inf. Technol. Electron. Eng. 2021, 22, 1583–1597. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.