Next Article in Journal
Zero-Shot Classification of Illicit Dark Web Content with Commercial LLMs: A Comparative Study on Accuracy, Human Consistency, and Inter-Model Agreement
Previous Article in Journal
Novel Tight Jensen’s Inequality-Based Performance Analysis of RIS-Aided Ambient Backscatter Communication Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Routing Technologies for 6G Low-Power and Lossy Networks

Tianjin Key Laboratory of Wireless Mobile Communications and Power Transmission, Tianjin Normal University, Tianjin 300387, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(20), 4100; https://doi.org/10.3390/electronics14204100 (registering DOI)
Submission received: 13 September 2025 / Revised: 8 October 2025 / Accepted: 14 October 2025 / Published: 19 October 2025
(This article belongs to the Section Networks)

Abstract

6G low-power and lossy network (6G LLN) is a kind of distributed network designed for IoT and edge computing scenarios of the sixth-generation mobile communication technology. Its routing technologies should fully consider characteristics of green and low carbon, constrained nodes, lossy links, etc. This paper proposes an improved routing protocol for low-power and lossy networks (I-RPL) to better suit the characteristics of 6G LLN and meet its application requirements. I-RPL has designed new context-aware routing metrics, which include the residual energy indicator, buffer utilization ratio, ETX, delay, and hop count to meet multi-dimensional network QoS requirements. The candidate parent and its preferred parent’s residual energy indicator and buffer utilization ratio are calculated recursively to reduce the effect of upstream parents. ETX and delay calculating methods are improved to ensure a better performance. Moreover, I-RPL has optimized the network construction process to improve energy and protocol efficiency. I-RPL has designed scientific multiple routing metrics evaluation theories (Lagrangian multiplier theories), proposed new rank computing and optimal route selecting mechanisms to simplify protocol, and optimized broadcast suppression and network reliability. Finally, theoretical analysis and experiment results show that the average end-to-end delay of I-RPL is 13% lower than that of RPL; the average alive node number increased 11% and so on. So, I-RPL can be applied well to the 6G LLN and is superior to RPL and its improvements.

1. Introduction

The 6G low-power and lossy network (6G LLN) [1,2] is a type of green and low-carbon network that enables intelligent interconnection and symbiotic coexistence among humans, machines, and things, contributing to the realization of the vision of “intelligent connection of all things and digital twins”. Due to its unstable links, limited bandwidth, and restricted processing capabilities of nodes, it is widely applied in smart city communications, disaster monitoring, smart grids, and national defense and the military, holding significant research and strategic value. The routing technology in 6G LLN is mainly responsible for the selection and forwarding of data transmission paths, which is crucial for ensuring efficient data transmission and network service quality. However, it faces numerous challenges in complex networking environments.
Therefore, this paper proposed an improved routing technology used for 6G LLN, which can better adapt to the characteristics of 6G LLN and ensure network QoS.
The main contributions presented in this paper are as follows:
(1)
An improved network topology construction process is proposed.
(2)
The new context-aware routing metrics, which include the residual energy indicator, buffer utilization ratio, ETX, delay, and hop, are proposed.
(3)
The recursive method is designed to calculate the candidate parent and its preferred parent’s residual energy indicator and buffer utilization ratio.
(4)
The ETX and delay calculating manner are improved.
(5)
Scientific multiple routing metric evaluation theories are designed.
(6)
A novel composite context-aware objective function (C-OF) is designed.
(7)
New rank computing and the optimal route selecting mechanisms are proposed.
The rest of this paper is organized in the following manner: Section 2 discusses the related works including the basic theory of 6G LLN and problems description. Section 3 details the new proposed routing technology (I-RPL). Section 4 gives the evaluation and analysis results of I-RPL and other algorithms. Finally, Section 5 concludes this paper.

2. Related Works

2.1. Basic Theory of 6G LLN

2.1.1. The 6G LLN Architecture

The 6G network [3] will achieve seamless global coverage including land, sea, air, and space, serving as the foundation for intelligent self-generation, ubiquitous connection, multi-domain integration, and integrated computing and networking. It is an important basis for future economic and social development. Its network architecture is shown in Figure 1, consisting of a central network and distributed Subnets. The central network meets the requirements for wide-area coverage and universal new services such as intelligence and awareness. Distributed Subnets mainly meet specific requirements in various scenarios such as satellite networks, 6G LLN, and personalized Subnets for individual services. The 6G network architecture is designed with characteristics such as flexibility, on-demand, and intelligence, reflecting the link relationships and networking forms among distributed Subnets.
As shown in Figure 2, the system architecture and key technologies of 6G are still in the exploration stage. Potential architecture-based technologies such as decentralized hierarchical networks with centralized and distributed collaboration, intelligent autonomous distributed management mechanisms, digital twin technology, space–ground integration, intelligent self-generation, secure self-generation, and network programmability will be integrated organically to jointly achieve the self-organization and self-evolution of 6G networks. Among them, the 6G low power and lossy network is one of the key technologies for achieving integration, wide coverage, intelligence, and greenness.
The 6G low power and lossy network (LLN) [4,5] is a new type of network architecture for future Internet of Things and edge computing scenarios, aiming to solve the problem of efficient communication in resource-constrained environments. The 6G LLN, a kind of distributed network, is composed of resource-constrained nodes (such as sensors [6], wearable devices, smart terminals, etc.), which should achieve high energy efficiency and robustness in data transmission through 6G technologies (such as terahertz communication, AI-driven optimization, intelligent awareness, etc.), suitable for complex and harsh environments (such as smart cities, remote healthcare, etc.). The core characteristics of 6G LLN are low power consumption, high tolerance for lossy transmission, intelligent network topology, heterogeneous connections, edge intelligence and collaborative computing, and improvement in spectral efficiency, etc. And it can be widely used in Industry 4.0, smart agriculture, disaster rescue, smart healthcare, etc. Compared with LLN, NB-IoT, or LoRa, 6G LLN has significant improvements in energy efficiency, intelligence, and spectrum utilization and is particularly suitable for sustainable communication in complex and harsh environments.
Figure 3 shows an example of 6G LLN topology [7], which can be composed of tree-type and hybrid-type networks. Root 1–4 represent 4 different roots, 1–16 are identifiers for different nodes, DODAG 1–4 are 4 different directed non-cyclic graphs, instance 1–4 are 4 different network instances. Nodes and links in this topology are constrained in terms of computing, storage, and bandwidth; therefore, green, efficient, and reliable routing algorithms and communication mechanisms need to be designed to ensure its reliability and effectiveness.

2.1.2. Differences Between 6G LLN and LLN

The 6G LLN and LLN [8] share the same core goals in low power and lossy, but 6G technology introduces revolutionary enhancements. The key differences between them are listed in Table 1.
In a word, 6G LLN is not a simple upgrade but a triple breakthrough through “intelligence + high spectrum + ultra-heterogeneous”. Therefore, its routing technology needs to be deeply optimized based on core differences such as energy efficiency, distributed autonomous decision-making, multi-dimensional routing metric evaluation strategy, broadcast suppression, protocol simplification, and intelligence. The key points that need to be focused on for 6G LLN routing technology [9,10] are shown in Table 2.
According to the characteristics of 6G LLN, this paper focuses on its routing technology. The routing protocol for low power and lossy network (RPL) [11,12], standardized by the Internet Engineering Task Force (IETF), is mainly designed for LLN but is not suitable for 6G LLN. And key points listed in Table 2 should be given priority in study, since RPL was not specifically designed for 6G LLN. Therefore, in order to optimize energy consumption, improve topology flexibility, achieve multi-dimensional network QoS guarantee, set broadcast suppression conditions, simplify routing protocols, and enhance the protocol efficiency, this paper proposes an improved RPL (I-RPL) algorithm which can adapt to the characteristics of 6G LLN and meet its application requirements.

2.2. Problems Description

At present, the RPL urgently needs to improve the following problems to promote the innovation of routing technology for 6G LLN.

2.2.1. Network Topology Construction and Maintenance Technology

At present, there are relatively few technologies for researching network topology construction and maintenance. Most of them adopt the traditional LLN routing technologies construction schemes [13] (as shown in Figure 4). However, this construction scheme may encounter high control overhead, energy consumption, and low construction efficiency. Moreover, any node can become a preferred parent through broadcast DIO, but its quality may be too poor to deliver packets, which will waste energy, cache resources, and reduce the reliability of the network. In Figure 4, DIO, DIS, and DAO are control messages [14,15]; the detailed explanations are shown in Table 3.

2.2.2. Energy-Aware Routing Technologies

Routing technologies based on energy awareness can effectively prolong the network’s lifetime. Therefore, it is necessary to enhance the energy-aware and processing capabilities, provide differentiated services based on different user requirements, energy consumption prediction, and the multi-attribute decision optimization of 6G LLN routing technologies. For instance, in [16], authors integrated the Energy Efficient Multipath Routing Protocol (EM-RPL) with the Load-Based Energy Efficient RPL (EM-RPL) to address energy bottlenecks. In [17,18], they combine residual energy and several other routing metrics to determine whether the candidate parent has the ability to be the preferred parent. Each routing metric’s importance level is decided by the relevant weighting coefficient. In [19], authors proposed the QFS-RPL (Q-learning and Fisheye State RPL, QFS-RPL) algorithm, which simplifies the data transmission process to reduce the energy consumption and balance load to extend the network lifetime. In [20], authors proposed the CB-ED-RPL (Coordinator-Based Energy-Efficient Dynamic RPL, CB-ED-RPL) algorithm. CB-ED-RPL adopted a network energy-saving dynamic routing mechanism through the coordinator to achieve the efficient utilization of network energy. In addition, there are many studies, such as [21,22], that conduct research on energy consumption and the reliability of 6G LLN. However, most of them lack the scientific multi-routing metric evaluation theory and are unable to predict the energy consumption of nodes in real time. Moreover, there is no efficient and scientific method for determining the importance level of each metric.

2.2.3. Resource-Constrained Routing Technologies

In 6G LLN, nodes have limited resources in terms of storage, computing, energy, and unstable links, as well as limited bandwidth resources. Therefore, resource-constrained-oriented routing technologies should be adopted to ensure network performance. In [23], authors proposed the RT-Ranked (Resiliency TSCH/RPL Ranked, RT-Ranked) algorithm. RT-Ranked can support unexpected traffic surges to reduce control messages and load. In [24], authors proposed the TLR (Traffic-Aware Load-Balancing Routing, TLR), which can fully take into account the limitation of the cache and adopt an active path selection strategy to achieve efficient load balancing and a high throughput. In [25], authors integrated the network load and congestion conditions by an adaptive fuzzy multi-criteria decision-making approach, combining fuzzy analytic process and TOPSIS to optimize network performance. In [26], authors adopt the balancing model and ant colony algorithm to effectively balance the load and congestion. In [27], authors proposed an NIAP routing metric, which can balance the load and extend the network’s lifetime by evaluating the average energy consumption at the network interface. In [28], authors proposed the DCRL-RPL to evaluate the distance between the nodes and roots and the residual energy and load influence index to balance the load and extend the network’s lifetime.
These improvements took into account the limited network resources to a certain extent. They saved resources such as the cache and energy consumption to enhance network performance through improving routing technologies. However, some of them only focus on limited resources while neglecting the guarantee of other performance indicators. Some improvements lack the scientific theoretical framework for evaluating multi-routing metrics.

2.2.4. Calculation Method of ETX

ETX, calculated based on Equation (1), is the needed number of transmissions (re-transmissions) the node expects to successfully transmit and acknowledge a packet. In Equation (1), Df and Dr are the probability of successfully receiving and acknowledging a packet, respectively. The path ETX is equal to the sum of link ETX.
E T X = 1 D f × D r
Through evaluating ETX, the path with poor quality can be effectively avoided by selecting it as the optimal one and will improve the network reliability. At present, there are many studies about ETX, but its calculation method is rarely studied and is basically unchanged. In [29,30], authors proposed that ETX should be integrated with other routing metrics, aiming to improve the performance of network. These improvements can improve the network reliability through the in-depth study of ETX. However, some of them only focus on evaluating ETX without considering other routing metrics. Some improvements have no scientific and reasonable theoretical basis and can be used to determine the weight coefficient of each routing metric when evaluating multiple routing metrics. So, the network performance would be limited, and it is worth further study and discussion.

2.2.5. Calculation Method of Delay

A path’s delay is equivalent to the sum of the delays associated with its links. The path with high delay can be effectively avoided by selecting it as the optimal one and improving the real-time performance. At present, there are many studies about delay, but its calculation method is rarely studied and is basically unchanged. In [31], authors considered queuing and link delays by reliable and delay-efficient multi-path RPL algorithms. In [32], authors defined an extension to the Babel routing protocol that measures the round-trip time (RTT) between routers. In [33], authors selected the residual energy divided by the product of ETX and delay as the new routing metric. In [34], authors list the current research status of delay and other aspects. Although these improvements optimize the real-time performance, most of them are not evaluating other routing metrics comprehensively, lacking scientific and reasonable methods to evaluate multiple routing metrics synthetically. These problems still deserve further study and discussion.

2.2.6. Objective Function and Multiple Routing Metric Evaluation Theories

The objective function serves to define the way in which several routing metrics should be combined and converted into rank, selecting the optimal routes. In [35], authors proposed to construct the objective function by combining multiple routing metrics in lexical or additive methods. In most cases, the additive method delivers better network performance than the lexical method. However, it is a challenging task to ascertain the weighting coefficients for routing metrics when using the additive method. And most of them are based on experts’ personal subjective experiences. In [36], authors proposed an entropy-based weighted approach to assign the weights of routing metrics in the objective function. In [37], authors selected the fuzzy method to construct an objective to improve the network performance. It can be seen that weight method and fuzzy logic method are widely adopted in objective function currently. These improvements are either too subjective to objectively consider the network’s actual operation or too objective to take into account the human factors of users, control centers, etc. Meanwhile, intelligent adaptive adjustment, distributed autonomy, and QoS cannot be guaranteed. Therefore, there is no scientific, low carbon, and intelligence multiple routing metrics evaluation theory used in objective functions.

2.2.7. Preferred Parent Selection Method

At present, most of the current studies adopt the following preferred parent selection methods [38]: The node’s rank is calculated based on the objective function, and the node with the minimum (or maximum) rank can be selected as the preferred parent. If there are two or more candidate parents that have the same minimum (or maximum) rank, another different selection criteria (routing metric) will be used, or one will randomly be selected as the preferred parent. However, this random selection method may be selecting the candidate parent with a large child number or small candidate parent set as the preferred parent. In this way, the preferred parent may be heavily loaded or limit its next hop selection to some extent.
In short, the recent improvements of RPL used in 6G LLN encounter large control overhead, high energy consumption, and a lack of scientific multiple routing metric evaluation theories. Therefore, this paper proposed an improved RPL (I-RPL) algorithm to solve these problems. I-RPL designs new context-aware routing metrics, which include the residual energy indicator, buffer utilization ratio, ETX, delay, and hop. Meanwhile, the candidate parent and its preferred parent’s residual energy metric and buffer utilization ratio are calculated recursively to reduce the effect of upstream parents. And the ETX and delay calculating method are improved to ensure a better performance. Moreover, I-RPL has optimized the network construction process and designed scientific multiple routing metrics evaluation theories—Lagrangian multiplier theories, proposed new rank computing, and optimal route-selecting mechanisms. Eventually, I-RPL can select the best candidate parent as the preferred parent, acquiring major enhancements in network performance.

3. Improved RPL Algorithm (I-RPL)

3.1. Outline of I-RPL

The main contributions of I-RPL can be structured as follows:
(1)
Improved network topology construction processes.
(2)
Proposed new context-aware routing metrics (C-RM).
  • Designed recursive method to evaluate the candidate parent and its preferred parent’s residual energy metric and buffer utilization ratio.
  • Improved ETX and delay calculating manner.
(3)
Designed new composite context-aware objective function (C-OF).
(4)
Proposed scientific multiple routing metric evaluation theories.
(5)
Designed new rank computing and the optimal route selection mechanisms.
In the following sections, I-RPL will be elaborated based on the five parts mentioned above.

3.2. Improved Network Topology Construction Processes

I-RPL improves the network construction process to optimize network construction efficiency, reduce control overhead, and save energy consumption, etc.

3.2.1. New Mechanisms of Network Construction Processes

(1)
In the initial stage of network construction, only roots broadcast DIO; other nodes are waiting to receive DIO without sending DIS, DIO, and DAO. In this way, the control overhead and energy consumption can be reduced.
(2)
In order to ensure the quality of candidate parents, I-RPL proposed that only nodes meeting certain constraint conditions can send DIO, since these nodes may become the preferred parent and transmit packets.
(3)
Figure 5 illustrates the improved network construction processes which can improve network construction efficiency and reduce control overhead and energy consumption effectively.
In Figure 5, the simplified DAO (SDAO), only one bit, is used for informing the corresponding node that the sending SDAO node is ready to join the network.

3.2.2. Improved Network Construction Processes

According to Figure 5, the improved network construction processes can be detailed as follows:
Step 1: Roots broadcast DIO to its neighbors. DIO contains the necessary information for network construction and maintenance. Others are waiting to receive DIO without sending DIS, DIO, and DAO.
Step 2: Neighbors, like node 1, which receive DIO, determine if they should select the root as its parent in accordance with the objective function. If so, it will uni-cast SDAO to the root, which means that node 1 is ready to join the network and selects the root as its parent.
Step 3: After receiving the SDAO1 sent by node 1, the root only needs to wait a certain period of time (T) to receive DAO (DAO1234), which contains the entire network routing and other related information. Meanwhile, node 1 re-broadcast DIO to its neighbors such as node 2. Then, node 2 performs the same operation as node 1.
Step 4: Other nodes such as node 3 perform the same operation, as above-mentioned.
Step 5: If node 4 has not received DIO from other nodes within a certain period of time, node 4 will broadcast DIS to solicit DIO from its neighbors to join the network.
Step 6: After node 4 joins the network, node 3 will uni-cast DAO34, which contains the updated routing information to its parent (node 2). Then, node 2 uni-casts DAO234 to node 1, and node 1 uni-casts DAO1234 to the root.
Repeat the steps stated above until the network extends coverage to all nodes.

3.2.3. Comparison and Analysis

Suppose that there are five nodes in the network, and the time required to transmit the control message (DIO, DAO, DIS, DAO-ACK, and SDAO) are the same and both are t (t > 0). According to Figure 4 and Figure 5, the time required for the original and improved network construction processes can be designed as shown in Equation (2).
15 t + 10 t ,       o r i g i n a l 12 t + 4 t ,       i m p r o v e d
In Equation (2), 10t and 4t are the time required to replay DAO-ACK to DAO senders. Therefore, the following conclusions can be drawn:
(1)
Constructing a network with five nodes, the improved construction processes can save 3t + 6t time. And that the more nodes in the network, the more time can be saved. So, the energy consumption can be effectively reduced, and the network construction efficiency can be significantly improved.
(2)
The improved network construction processes can significantly reduce the control overhead by reducing the DAOs (and DAO-ACKs) number. And that the more nodes in the network, the more control overhead can be saved.
(3)
The time for the root to wait to receive the DAO containing the network routing and other related information can be considered as Timproved:
T i m p r o v e d = T o r i g i n a l 3 t + ε ,                                     n o   D A O - A C K T o r i g i n a l ( 3 t + 6 t ) + ε ,       w i t h   D A O - A C K
In Equation (3), Toriginal is the time required to construct the network with five nodes using the original processes. ε is a small positive number. So, the network construction efficiency can also be optimized. And the more nodes in the network, the more the network construction efficiency can be improved.

3.3. New Context-Aware Routing Metrics (C-RM)

To satisfy the application requirements of 6G LLN, the new composite context-aware routing metric (C-RM), which simultaneously considers the residual energy indicator, buffer utilization ratio, expected transmission count (ETX), delay, and hop count, is proposed. C-RM recursively calculates the candidate parent and its preferred parent’s residual energy metric and buffer utilization ratio to reduce the effect of upstream parents, since further paths are evaluated. Meanwhile, C-RM optimizes ETX and the delay calculating method through a comprehensive application sum and the mean and standard deviation of ETX and delay to ensure a better performance. In the following, routing metrics used in C-RM are designed. Suppose node c has n candidate parents.

3.3.1. Residual Energy Indicator (REI)

REI is the residual energy indicator of nodes and can be calculated based on Equation (4).
η 1 ( i ) = R E I ( i ) = E i n i t i a l ( i ) E c u r r e n t ( i ) E i n i t i a l ( i )                                             i = r o o t M a x ( E i n i t i a l ( i ) E c u r r e n t ( i ) E i n i t i a l ( i ) ,   η 1 ( i p ) × τ 1 )     i r o o t ,   i = 1 , 2 , , n ,       0 η 1 ( i ) 1
In Equation (4), Einitial(i) and Ecurrent(i) are the initial and current energy of candidate parent i. ip is the preferred parent (the next hop) of candidate parent i. τ1, the adjustment parameter, is used for reducing the energy condition of parents so that the energy consumption effect does not go farther than some degree. Its value is a random number in [0, 1]. REI(i) is the residual energy indicator of the candidate parent (neighbor) i and its preferred parent ip. In other words, REI(i) evaluates the remaining energy of nodes recursively. And the impact of the parent node’s remaining energy becomes weaker as it moves farther down the path. Therefore, REI can be used to avoid choosing paths with low remaining energy to transmit packets.

3.3.2. Buffer Utilization Ratio (BUR)

Buffer utilization ratio represents the buffer occupancy of nodes and can be evaluated according to Equation (5). Q(i) is the buffer usage indicator and can be calculated based on Equation (6). ip is the preferred parent of candidate parent i. τ2, the adjustment parameter, is used for reducing the buffer utilization condition of parents so that the buffer utilization effect does not go farther than some degree. Its value is a random number in [0, 1]. BUR(i) reflects the buffer utilization ratio of candidate parent i and its preferred parent ip. In other words, BUR(i) evaluates the buffer utilization ratio of nodes recursively. And the effect of parent buffer utilization is less when it gets farther down the path. Therefore, BOR can be used to relieve congestion and balance the load.
η 2 ( i ) = B U R ( i ) = Q ( i )                                                                     i = r o o t M a x ( Q ( i ) ,   η 2 ( i p ) × τ 2 )     i r o o t ,   i = 1 , 2 , , n 0 η 2 ( i ) 1
Q ( i ) = p a c k e t s   n u m b e r   i n   n o d e   ( i )   b u f f e r t o t a l   b u f f e r   s i z e   o f   n o d e   ( i ) ,   0 Q ( i ) 1

3.3.3. ETX

According to Equation (1), the ETX of a link can be calculated, and then the total ETX of a path can be obtained through summing all the links’ ETX. When transmitting data packets, the optimal path can be selected as the one with the smallest ETX. But the optimal path may include a long single hop, which is a bottleneck of the whole network. Therefore, C-RM proposes using the sum, mean, and standard deviation of ETX comprehensively. First, suppose that σ E T X ( i ) ,   E T X ( i ) , E T X ¯ ( i ) are the ETX standard deviation, sum, and mean of links in the path from node c through candidate parent i to the root and can be calculated based on Equation (7). hi is the hop count of path Pi from node c through candidate parent i to the root. Then, the specific usage rules of ETX are as follows:
Step 1: Calculating σ E T X ( i ) ,   E T X ( i ) ,   E T X ¯ ( i ) of path Pi.
Step 2: Arranging ETX(i) values in ascending order, then combining the paths corresponding to the minimum first three ETX(i) values into the alternative path set. If less than three paths, then all of them are selected into the alternative path set.
Step 3: The path with the minimum σ E T X ( i ) will be selected as the optimal path. For instance, suppose σ E T X ( f ) is the minimum value, then the path Pf (the path from node c through candidate parent f to the root) is the optimal one. So, f is the preferred parent of c.
Clearly, using the sum, mean, and standard deviation of ETX in a comprehensive manner not only ensures link quality but also avoids choosing the optimal path with high-ETX links. Normalization is required to facilitate the integration of ETX and other routing metrics, which is shown in Equation (8).
σ E T X ( i ) = 1 h i 1 k = 1 h i ( E T X k E T X ¯ i ) 2 E T X ¯ ( i ) = E T X i h i E T X ( i ) = E T X 1 + E T X 2 + , , + E T X h i
η 3 ( i ) = 0                                   i = r o o t σ E T X ( i ) n o r m a l i z a t i o n       i r o o t ,     σ E T X ( i ) n o r m a l i z a t i o n = σ E T X ( i ) i = 1 n σ E T X ( i ) ,   0 σ E T X ( i ) n o r m a l i z a t i o n 1 ,   ( i = 1 , 2 , , n )

3.3.4. Delay (D)

As shown in Section 2.2.5, it is problematic to calculate the delay of a path in a summation manner. The reason is that the ultimately selected path may include one or more links experiencing a large delay. Therefore, this paper proposes to comprehensively use the sum, mean, and standard deviation of each link’s delay in a path. First, suppose that σ D ( i ) ,   D ( i ) ,   D ¯ ( i )   are the delay standard deviation, sum, and mean of links in the path from node c through candidate parent i to the root and can be calculated based on Equation (9). hi is the hop count of path Pi from node c through candidate parent i to the root. Then, the specific usage rules of delay are as follows:
Step 1: Calculating σ D ( i ) ,   D ( i ) ,   D ¯ ( i ) of path Pi.
Step 2: Arranging D(i) values in ascending order, then combine the paths corresponding to the minimum first three D(i) values into the alternative path set. If the number of paths is fewer than three, all such paths should be incorporated into the alternative path set.
Step 3: The path with the minimum σ D ( i ) will be selected as the optimal path. For instance, suppose σ D ( f ) is the minimum value, then the path Pf (the path from node c through candidate parent f to the root) is the optimal one. So, f is the preferred parent of c.
It is obvious that comprehensively using the sum, mean, and standard deviation of delay not only ensures delay performance but also avoids selecting the optimal path with high delay links. For the convenience of combining delay with other routing metrics, normalization is required, as shown in Equation (10).
σ D ( i ) = 1 h i 1 k = 1 h i ( D k D ¯ i ) 2 D ( i ) = D 1 + D 2 + , , + D h i D ¯ ( i ) = D i h i
η 4 ( i ) = 0                           i = r o o t σ D ( i ) n o r m a l i z a t i o n     i r o o t ,     σ D ( i ) n o r m a l i z a t i o n = σ D ( i ) i = 1 n σ D ( i ) ,   0 σ D ( i ) n o r m a l i z a t i o n 1 ,   ( i = 1 , 2 , , n )

3.3.5. Hop Count

Hop count refers to the number of hops between a candidate parent and the root. It helps avoid choosing candidate parents with more hops to transmit packets. As the hop count has been incorporated into the calculation of ETX and delay standard deviation, the hop count is not considered separately in this paper.
In a word, C-RM recursively evaluates REI and BOR, using the ETX and delay sum, mean, and standard deviation to ensure a better performance of 6G LLN.

3.4. New Composite Context-Aware Objective Function (C-OF)

The composite objective function can be designed as Equation (11). It combines REI, BOR, ETX, and D in an additive method. And w1, w2, w3, and w4 are weighting coefficients, which are used to adjust the importance of each routing metric. n is the number of candidate parents and F ( i ) C o m p o s i t i o n is the composite objective function of the i-th candidate parent.
F ( i ) C o m p o s i t i o n = j = 1 m w j η j ( i ) ,   s . t .   j = 1 m w j = 1 0 w j 1 ,   ( i = 1 , 2 , , n )
Then, C-OF can be designed as the minimum value of F ( i ) C o m p o s i t i o n , as illustrated in Equation (12).
C P - O F = min F ( i ) C o m p o s i t i o n   m e t r i c = min ( j = 1 m w j η j ( i ) ) ,   s . t .   j = 1 m w j = 1 0 w j 1 ,   ( i = 1 , 2 , , n )
It can be seen that C-OF can comprehensively evaluate the REI, BOR, ETX, and D of candidate parents. And the weighting coefficients can be used to adjust the importance of corresponding routing metrics to further affect the evaluation results. Therefore, it is a key problem to determine the weight coefficients of routing metrics reasonably and effectively. I-RPL proposes Lagrangian multiplier theories to determine the weighting coefficients of routing metrics. Lagrangian multiplier theories synthesize the subjective (Fuzzy Analytic Hierarchy Process, FAHP) and objective (entropy method) weighting coefficient determination methods. This scientific multiple routing metrics evaluation theory comprehensively applied the advantage of the subjective and objective weighting method and can select the most suitable candidate parent as the preferred parent. Thus, the network performance can be significantly improved.

3.5. Novel Scientific Multiple Routing Metric Evaluation Theories

Supposing that node c has n candidate parents, xij is the value of the j-th routing metric for the i-th candidate parent. Then, the sample set of each routing metric value at every candidate parent is { x i j i = 1 , 2 , , n ;   j = 1 , 2 , , m } . It can be represented as initial matrix X.
X = x 11 x 12 x 13 x 1 m x 21 x 22 x 23 x 2 m x n 1 x n 2 x n 3 x n m
Then, according to Equation (11), the comprehensive evaluation function of candidate parents can be designed as Equation (14).
F ( i ) = j = 1 m w j η j ( i ) = j = 1 m w j × x i j s . t .   j = 1 m w j = 1 0 w j 1 ,   x i j = η j ( i ) ,   i = 1 , 2 , , n ,   m = 4
Therefore, according to the reasonable and scientific weighting coefficients of routing metrics, the comprehensive evaluation results of candidate parents (F(i)) can be obtained. Then, the one with the minimum value of Equation (14) can be chosen as the preferred parent. I-RPL proposed scientific multiple routing metric evaluation theories—Lagrangian multiplier theories, which synthetically utilize the subjective (FAHP) and objective (entropy method) weighting methods to select the optimal path.

3.5.1. Subjective Weighting Method

AHP compares the importance degree, possibility degree, and preference degree of attributes of evaluators through the scale, quantifies the processing, establishes the mathematical model, and solves it. FAHP [39] is a decision-making method based on AHP. It introduces the fuzzy consistency matrix for the fuzziness of people’s judgment on complex things. FAHP solves the consistency problem of the AHP judgment matrix well. But this method is too subjective. Before introducing FAHP, the following definitions are given:
Definition 1.
For matrix  R = ( r i j ) n × m , if  0 r i j 1 , then R is the fuzzy matrix.
Definition 2.
For matrix  R = ( r i j ) n × m , if  r i j + r j i = 1 , then R is the fuzzy complementary matrix.
Definition 3.
For fuzzy matrix  R = ( r i j ) n × m ,  g , if  r i j = r i g r j g + 0.5 , then R is the fuzzy consistency matrix.
The specific steps of the subjective weighting method based on FAHP are as follows:
Step 1: Constructing the evaluation hierarchy analysis model.
Figure 6 illustrates the hierarchical evaluation model. The objective layer, at the top of the hierarchical evaluation model, is the ultimate decision-making goal. The criterion layer, at the middle of the hierarchical evaluation model, consists of several evaluation criterion, which are need to be considered (routing metrics). The scheme layer, at the bottom of the hierarchical evaluation model, consists of evaluated objects (candidate parents).
Step 2: Calculating the weight vector.
(a) Constructing the fuzzy judgment matrix R = ( r i j ) n × m .
In R = ( r i j ) n × m , rij represents the correlation degree of the fuzzy relationship between the i-th element and j-th element. In order to quantitatively describe the relative importance between any two routing metrics, this paper adopts the scale of 0.1–0.9, as shown in Table 4.
(b) Calculating the fuzzy consistency matrix R’.
The fuzzy consistency matrix R’ can be calculated by Equations (15) and (16). Moreover, the consistency checks during the matrix change processes can be avoided by Equation (15).
ξ i = j = 1 m r i j ;   i = 1 , 2 , , n
ξ i j = ξ i ξ j 2 n + 0.5
(c) Calculating the weight vector.
The row sum normalization of the fuzzy consistency matrix R’ can be calculated based on Equation (17), and then the weight vector w F A H P = ( w 1 F A H P ,   w 2 F A H P , ,   w m F A H P ) can be obtained.
w i F A H P = ( j = 1 m r i j ) / i = 1 n j = 1 m r i j
According to the above-mentioned steps of FAHP, the concrete operations of calculating routing metrics’ subjective weight coefficients can be summarized as follows:
Operation 1.
Constructing the fuzzy judgment matrix R.
According to Figure 7 and Table 3, the fuzzy judgment matrix R can be constructed as shown in Equation (18).
                                          R E I     B O R   E T X   D R = R E I B O R E T X D 0.5 0.4 0.3 0.7 0.6 0.5 0.4 0.7 0.7 0.6 0.5 0.8 0.3 0.3 0.2 0.5
Operation 2.
Calculating the fuzzy consistency matrix R’.
According to Equations (15) and (16), the fuzzy consistency matrix R’ can be calculated as shown in Equation (19).
R = 0.5 0.4625 0.4125 0.575 0.5375 0.5 0.45 0.6125 0.5875 0.55 0.5 0.6625 0.425 0.3875 0.3375 0.5
Operation 3.
Calculating the weight vector.
According to Equation (17), the weight coefficients of routing metrics can be obtained, as shown in Equation (20).
w F A H P = ( w 1 F A H P ,   w 2 F A H P , ,   w m F A H P ) = ( 0.24375 ,   0.2625 ,   0.2875 ,   0.20625 )
Operation 4.
Calculating C-OF in the FAHP method.
According to Equation (12), the objective function (C-OF) value of candidate parent i in the FAHP method can be represented as follows:
N O F F A H P = min ( j = 1 4 w j F A H P η j ( i ) )                           = min ( 0.24375 η 1 ( i ) +   0.2625 η 2 ( i )   +   0.2875 η 3 ( i ) + 0.20625 η 4 ( i ) )
Then, the candidate parent with the minimum value of Equation (21) can be selected as the preferred parent.

3.5.2. Objective Weighting Method

The entropy method [40,41] calculates weighting coefficients by extracting the information entropy value of the indicator change based on the concept of entropy in information theory. Its basic idea is calculating the weight coefficient of each indicator according to relative importance of indicators, concept, and nature of entropy. If the information entropy of an indicator is small, the variation degree of this indicator is relatively large, which contains a large amount of information, plays a greater role, and a larger weighting coefficient should be allocated. On the contrary, if the information entropy of an indicator is large, a smaller weighting coefficient should be allocated. The entropy method is not affected by the subjective factors of evaluators and can reflect the relationship between indicator change and indicator weight well. It is an ideal objective weighting method. The concrete steps of calculating indicator weight by entropy method are as follows:
Step 1: Calculating proportion Pij of the indicator value for the i-th evaluated object at the j-th indicator in the initial matrix (Equation (13)), based on Equation (22).
P i j = x i j i = 1 n x i j ,   i = 1 , 2 , , n ,   j = 1 , 2 , , m
In Equation (22), n is the number of candidate parents of node c, m = 4 is the number of evaluated routing metrics.
Step 2: Calculating the entropy value Ej of the j-th indicator (routing metric), according to Equation (23).
E j = k i = 1 n p i j L n p i j ,   k = 1 ln n ,   0 E j 1
Step 3: Calculating the difference coefficient dj of the j-th indicator, based on Equation (24).
d j = 1 E j
Step 4: Normalizing dj according to Equation (25) and then obtaining the weighting coefficients of routing metrics w j e n t r o p y .
w j e n t r o p y = d j j = 1 m d j
Then, according to Equation (12), the C-OF value of the candidate parent i in the entropy method can be designed as follows:
N - O F e n t r o p y = min ( j = 1 4 w j e n t r o p y η j ( i ) )
Then by the entropy method, the candidate parent with the minimum value of Equation (26) can be selected as the preferred parent.

3.5.3. Lagrangian Multiplier Theories

I-RPL synthesizes the entropy method and FAHP to realize the complementary advantages of subjective and objective methods and obtain a better performance. In order to obtain scientific multiple routing metric evaluation results, it is necessary to calculate the influence of the entropy method and FAHP according to certain methods. I-RPL proposed Lagrangian multiplier theories. And the detailed steps of synthesizing the entropy method and FAHP through Lagrangian multiplier theories are as follows:
Step 1: Constructing the synthesized weight mathematical model.
The synthesized weight mathematical model can be constructed as Equation (27). wj is the synthesized weight of the j-th routing metric. w j ( k ) is the weight of the j-th routing metric by the k-th weighting determination method. α k is weighting coefficient of the weight determined by the k-th weighting determination method.
w j = α 1 w j ( 1 ) + α 2 w j ( 2 ) + + α k w j ( k ) = τ = 1 k α τ w j ( τ ) s . t . τ = 1 k α τ 2 = 1
Step 2: Constructing the fitness function.
According to Equation (14), the fitness function f(i) can be constructed as shown in Equation (28). f(i) is the fitness function value of the i-th candidate parent. xij is the normalized value of the j-th routing metric of the i-th candidate parent.
f ( i ) = 1 1 + F ( i )   = 1 1 + j = 1 m x i j × [ τ = 1 k α τ × w j τ ]
Step 3: Constructing the linear programming model and optimization model.
According to Equation (28), the linear programming model of F(i) can be constructed as Equation (29).
min F ( i ) = ( F ( 1 ) ,     F ( 2 ) , , F ( n ) ) s . t . a τ > 0 τ = 1 k a τ 2 = 1
The optimization model can be constructed as Equation (30).
min F = A [ B ( α w ) T ] = 1 1 1 n × 1 T × x 11 x 12 x 1 m x 21 x 22 x 2 m x n 1 x n 2 x n m α 1 α 2 α k T × w 1 ( 1 ) w 2 ( 1 ) w m ( 1 ) w 1 ( 2 ) w 2 ( 2 ) w m ( 2 ) w 1 ( k ) w 2 ( k ) w m ( k ) T s . t . a τ > 0 ,   ( τ = 1 ,   2 , ,   k ) τ = 1 k a τ 2 = 1
Step 4: Calculating α τ and λ through constructing a function based on Lagrangian multiplier theories.
(a) Constructing a function based on Lagrangian multiplier theories.
The constructed function based on Lagrangian multiplier theories is shown in Equation (31).
L = f ( α τ ,   λ ) = A [ B ( α w ) T ] 1 2 λ τ = 1 k α τ 2 1
(b) Calculating partial derivatives of α τ and λ in Equation (31), the corresponding expressions are as follows:
f α 1 = i = 1 n j = 1 m x i j × w j ( 1 ) λ α 1 = 0
f α 2 = i = 1 n j = 1 m x i j × w j ( 2 ) λ α 2 = 0
f α k = i = 1 n j = 1 m x i j × w j ( k ) λ α k = 0
f λ = τ = 1 k α τ 2 1 = 0
(c) Calculating α τ ,   ( τ = 1 ,   2 , , k ) .
As shown in Equation (36), α τ 2 can be calculated through summing the squares of derivative functions of α τ , such as Equations (32)–(34).
α τ 2 = i = 1 n j = 1 m x i j w j ( τ ) 2 λ 2
Then, Equation (37) can be derived based on Equation (36).
τ = 1 k α τ 2 = τ = 1 k i = 1 n j = 1 m x i j w j ( τ ) 2 λ 2
After that, based on Equations (35) and (37), (38) can be derived.
τ = 1 k α τ 2 1 = τ = 1 k i = 1 n j = 1 m x i j w j ( τ ) 2 λ 2 1 = 0
So α τ can be represented as Equation (39).
α τ = i = 1 n j = 1 m x i j w j ( τ ) λ
(d) Normalizing α τ .
As shown in Equation (40), α τ * is the normalized expression of α τ .
α τ * = i = 1 n j = 1 m x i j w j ( τ ) τ = 1 k i = 1 n j = 1 m x i j w j ( τ )
Step 5: Calculating the synthesized weight.
According to Equations (27) and (40), the synthesized weight can be calculated.
There are two kinds of weight determination methods (FAHP and entropy) designed in I-RPL, so k = 2, supposing that α 1 * = α F A H P * and α 2 * = α e n t r o p y * . Therefore, the expression of synthesized weight can be constructed as Equation (41).
w j = α 1 * w j ( 1 ) + α 2 * w j ( 2 ) = α F A H P * w j F A H P + α e n t r o p y * w j e n t r o p y α 1 * = α F A H P * = i = 1 n j = 1 4 x i j w j ( F A H P ) i = 1 n j = 1 4 x i j w j ( F A H P ) + i = 1 n j = 1 4 x i j w j ( e n t r o p y ) α 2 * = α e n t r o p y * = i = 1 n j = 1 4 x i j w j ( e n t r o p y ) i = 1 n j = 1 4 x i j w j ( F A H P ) + i = 1 n j = 1 4 x i j w j ( e n t r o p y )

3.5.4. Multiple Routing Metrics Evaluation Theories

The specific processes of calculating the fitness function and C-OF by multiple routing metric evaluation theories can be summarized as follows:
Process 1: Calculating the subjective weight.
FAHP is designed to be used as a subjective weighting method to calculate the weighting coefficients of routing metrics. Its concrete operations are listed in “Section 3.5.1”.
Process 2: Calculating the objective weight.
The entropy method is designed to be used as the objective weighting method to calculate the weighting coefficients of routing metrics. Its concrete operations are listed in “Section 3.5.2”.
Process 3: Calculating the synthesized weighting coefficients.
The synthesized weighting coefficient α τ can be calculated based on Lagrangian multiplier theories, and the concrete operations are listed in “Section 3.5.3”. Then the normalized combination weighting coefficients α τ can be obtained.
Process 4: Calculating the synthesized weight wj.
The synthesized weight wj can be obtained through Equation (41).
Process 5: Calculating the fitness function and C-OF.
According to Equation (41), the fitness function and C-OF of the candidate parent i can be calculated as Equations (42) and (43).
f ( i ) = 1 1 + F ( i ) = 1 1 + j = 1 m x i j × w j     = 1 1 + j = 1 4 x i j × ( α F A H P * w j F A H P + α e n t r o p y * w j e n t r o p y )
N - O F = min F ( i ) C o m p o s i t i o n   m e t r i c = min ( j = 1 m w j η j ( i ) ) = min ( j = 1 4 ( α F A H P * w j F A H P + α e n t r o p y * w j e n t r o p y ) × η j ( i ) )
In Equations (42) and (43), α F A H P * and α e n t r o p y * can be obtained depending on Equation (41), and w j F A H P and w j e n t r o p y can be obtained depending on Equations (20) and (25). So, the one with the maximum value of Equation (42) or the minimum value of Equation (43) can be selected as the preferred parent. Therefore, I-RPL can acquire major enhancements in network performance.
In a word, multiple routing metric evaluation theories synthesize the advantages of subjective and objective weighting methods. It not only overcomes the problem that the subjective weighting method cannot consider the objective application requirements of 6G LLN but also solves the problem that the objective weighting method cannot consider the subjective preference factors of users. Therefore, I-RPL can significantly improve network performance. In addition, this theory provides a certain theoretical basis for multiple routing metric evaluations in the 6G LLN routing algorithm and other fields which need to evaluate multiple indicators.

3.6. Complexity Analysis of N-OF

The computational complexity of OF is influenced by multiple key factors together, such as candidate parent number, dimension of the optimization problem and convergence criterion, and so on.
Suppose that n is the candidate parent number, m = 4 is the dimension of the optimization problem, then the computational complexity of OF in I-RPL can be represented as O(nm). Due to the low value of m, its complexity is approximately O(n). It can be seen that the computational complexities of I-RPL and RPL improvements are mainly related to the candidate parent number and the dimension of optimization problem and are basically the same. Therefore, I-RPL can ensure network performances without incurring additional computational complexity.

3.7. Novel Rank Calculating Method

A node’s rank represents where it is located in relation to the root. In order to avoid loop, rank strictly increases in the Down direction (the direction from the root towards the leaf nodes) and decreases in the Up direction (the direction from the leaf nodes to the root). The rank of a node can be calculated based on OF. In I-RPL, we proposed a novel rank calculated method based on C-OF.
In I-RPL, the rank of the root is set 1.0. For other non-root nodes such as node c, the calculating method is based on Equation (44).
R c ( i ) = R c p ( i ) + R ( i ) ,   R ( i ) = F ( i ) + 1
In Equation (44), Rcp(i), advertised by candidate parent i through DIO, is the rank of i. R(i) is the C-OF value of the link which is from c to the candidate parent i. Rc(i) is the rank of c, which is based on the route from c through candidate parent i to the root.
According to Equation (44), the values of { R c ( 1 ) ,   R c ( 2 ) , ,   R c ( n ) } can be obtained. If min { R c ( 1 ) ,   R c ( 2 ) , ,   R c ( n ) } = R c ( f ) , then f can be selected as the preferred parent.

3.8. Novel Preferred Parent Selection Method

According to Section 3.7, it can be seen that candidate parent f with the minimum value of Equation (44) can be selected as the preferred parent. However, this preferred parent selection method is not applicable to all cases. For example, if two or more candidate parents have the same and minimum rank, it is difficult to select the preferred parent, according to Section 3.7. Therefore, the novel preferred parent selecting mechanism is proposed:
(1)
If the rank of a candidate parent is equal to or less than that of current preferred parent, but the difference between them is less than replacing the preferred parent threshold, then the current preferred parent will not be replaced. This operation can guarantee the topology stability of 6G LLN without affecting the network performance.
(2)
If the rank of a candidate parent, calculated according to Equation (44), is less than 1.0 or greater than the node number in 6G LLN, then this candidate parent must be eliminated from the candidate parent set. Since the quality of this candidate parent is so bad, it is unable to deliver any packets or its rank is calculated incorrectly and it needs to be rejoined to the candidate parent set or become a leaf.
(3)
When conducting preferred parent selection, if ranks of two or more candidate parents are equal and minimum, then the one whose candidate parent set is the largest will be selected to serve as the preferred parent. If there are multiple candidate parents whose candidate parent sets are the largest and equal, then one is randomly selected as the preferred parent. Because the larger the candidate parent set is, the larger the preferred parent selection range is, and the more likely it is to select the optimal one as the preferred parent.
(4)
If the candidate parent set of c has only 1 node, then c waits for a period of time so that more nodes may join its candidate parent set. Then, if the candidate parent set of c is greater than or equal to 2, c selects its preferred parent by executing the I-RPL algorithm. Otherwise, c directly chooses this candidate parent as its preferred parent without executing the I-RPL algorithm, and the rank of c is equal to the rank of this candidate parent plus 1.

4. Performance Evaluation

To quantitatively evaluate and compare the new proposed I-RPL algorithm and several popular improvements of RPL, such as ETXOF, AHP, entropy, and OF0, we carry out a series of experiments by OPNET14.5.

4.1. The Selected Statistic Metrics

This paper selects seven important statistic metrics, as illustrated in Table 5, to comprehensively evaluate and compare the performance of I-RPL and its several popular improvements.

4.2. Setting Simulation Parameters

Assume that nodes are randomly deployed within the 400 m × 400 m network area and the arrival distribution of data packets follows the Poisson distribution, the nodes’ initial energy is a random value between 0.5 J and 1.5 J. If the node’s residual energy is less than 5% of its initial energy, the node is considered dead. The IRS and ISAC number, working frequency band, and other parameters used in I-RPL are illustrated in Table 6. In Table 6, E(v,d) [42] can be computed as follows:
E ( v , d ) = 2 E e l e c × v + ε a m p × v × d 2                                     d < d 0 2 E e l e c × v + ε f s × v × d 4                                             d > d 0
The parameters used in Equation (45) are explained in Table 7.

4.3. Simulation Results and Analysis

4.3.1. Control Overhead

The control overhead of the I-RPL, ETXOF, HC, FAHP, and entropy is shown in Figure 7. It can be seen that, in the initial stage of network construction, the control overhead of each algorithm is relatively high. After 3000 s, the network gradually stabilizes, and the control overhead reaches a stable state. In addition, the control overhead of I-RPL is significantly lower than that of the ETXOF, HC, FAHP and entropy during the whole network operation period, because I-RPL improves the network construction process and reduces the number of control messages sent. Therefore, it can significantly reduce the control overhead and improve network construction efficiency.

4.3.2. Average Packet Delivery Ratio

Figure 8 shows the average packet delivery ratio of I-RPL, ETXOF, HC, FAHP, and entropy. It can be seen that, in the initial stage, the packet delivery ratio of each algorithm is unstable; it gradually reaches a stable state after 2000 s. And the average packet delivery ratio of I-RPL is obviously higher than that of ETXOF, HC, FAHP, and entropy, because I-RPL proposed using the recursive method to evaluate the REI and BOR of the candidate parent and comprehensively use the sum, mean and standard deviation of ETX and delay. The context-aware composite routing metric and C-OF are proposed. The scientific multiple routing metrics theories are designed. So, I-RPL can select the optimal path to deliver packets. Therefore, the packet delivery ratio of I-RPL is significantly better than that of other algorithms.

4.3.3. Average End-to-End Delay

Figure 9 shows the average end-to-end delay of I-RPL, ETXOF, HC, FAHP, and entropy. The end-to-end delay of I-RPL is obviously lower than that of other algorithms. I-RPL proposed new a network construction process to improve network construction efficiency. Moreover, the delay routing metric is evaluated in the manner of the sum, mean and standard deviation, etc. Therefore, the I-RPL can significantly improve end-to-end delay.

4.3.4. Average Hop Count

Average hop count experiment results are shown in Figure 10. It is clear to see that I-RPL and HC are the minimum values. Since HC only selects the next hop based on the hop metric, the candidate parent with the minimum hop to destination will be selected as the preferred parent. The I-RPL can significantly reduce the hop count from source to destination based on the context-aware composite routing metric and C-OF, etc. Therefore, the hop count performance of I-RPL and HC are the best.

4.3.5. Network Lifetime

Average remaining energy and average alive node number can estimate the network’s lifetime effectively. Figure 11 and Figure 12 show the I-RPL, ETXOF, HC, FAHP, and entropy of these two statistic metrics. It is clear to see that these two statistic metrics of I-RPL are much higher than that of ETXOF, HC, FAHP, and entropy. Since I-RPL reduces the control overhead by improving the DODAG build process—comprehensively evaluating REI, BOR, ETX, and D of the candidate parent—it designs scientific multiple routing metric evaluation theories. Therefore, I-RPL can significantly reduce energy consumption, save network resources, and prolong the network’s life.

4.3.6. Average Number of Preferred Parent Changes

The average frequency of preferred parent changes is a reflection of the network topology stability, and it can be applied to coordinate network performance with the stability of the network topology. Figure 13 shows the average number of preferred parent changes in I-RPL, ETXOF, HC, FAHP, and entropy. It can be seen that, at the initial stage, the metric values of each algorithm are relatively large. After 2400 s, reaching the stable network state, the number of preferred parent changes in I-RPL are much lower than that of ETXOF, HC, FAHP, and entropy. Therefore, I-RPL can effectively improve network performance under the premise of ensuring network topology stability.

4.3.7. Weight Coefficients (w1, w2, w3, and w4)

Figure 14 shows the relationship between weight factors (w1, w2, w3, and w4) and simulation time. In this paper, the variation law of the weight coefficient of node 6 (corresponding to (a)), node 38 (corresponding to (b)), node 54 (corresponding to (c)), and node 92 (corresponding to (d)) are randomly selected. It is obvious that the I-RPL can dynamically adjust values of w1, w2, w3, and w4 according to the network’s actual objective operation, users, control centers, and other subjective factors.

5. Conclusions

In this paper, I-RPL is proposed to better adapt to 6G LLN. I-RPL designed new context-aware routing metrics which evaluate the residual energy index, buffer occupancy ratio, ETX, delay, and hop comprehensively to guarantee multi-dimensional network QoS. Among them, the candidate parent and its preferred parent’s residual energy indicator and buffer utilization ratio are calculated recursively to reduce the effect of upstream parents. ETX and delay calculating manners are improved to ensure a better performance. Moreover, the I-RPL has optimized the network construction process, designed scientific multiple routing metric evaluation theories (Lagrangian multiplier theories), and proposed new rank computing and optimal route selecting mechanisms to improve network construction efficiency, energy consumption efficiency, broadcast suppression, network reliability, and so on. Finally, simulation experiments demonstrate that I-RPL is superior to other improvements.
In terms of future work, we plan to conduct more in-depth research into the 6G LLN routing algorithm and segment routing technology.

Author Contributions

Conceptualization, Y.C. and G.Z.; methodology, Y.C.; software, Y.C.; validation, Y.C. and G.Z.; formal analysis, G.Z.; investigation, Y.C.; resources, Y.C.; data curation, Y.C.; writing—original draft preparation, Y.C.; writing—review and editing, G.Z.; visualization, G.Z.; supervision, Y.C.; project administration, Y.C.; funding acquisition, Y.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

This manuscript is supported by Tianjin Key Laboratory of Wireless Mobile Communications and Power Transmission. During the preparation of this manuscript, the author(s) used [opnet, 14.5] for the purposes of [experiment]. The authors have reviewed and edited the output and take full responsibility for the content of this publication.

Conflicts of Interest

The authors declare no conflicts of interest. The funders had no role in the decision to publish the results.

References

  1. Wang, C.X.; You, X.H.; Gao, X.Q.; Zhu, X.; Li, Z.; Zhang, C.; Wang, H.; Huang, Y.; Chen, Y.; Haas, H.; et al. On the Road to 6G: Visions, Requirements, Key Technologies, and Testbeds. IEEE Commun. Surv. Tutor. 2023, 25, 905–974. [Google Scholar] [CrossRef]
  2. Prajapati, A.K.; Pilli, E.S.; Battula, R.B.; Varadharajan, V.; Verma, A.; Joshi, R. A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things. Comput. Electr. Eng. 2025, 123, 110071. [Google Scholar] [CrossRef]
  3. Soyak, E.G.; Ercetin, O. Effective networking: Enabling effective communications towards 6G. Comput. Commun. 2024, 215, 1–8. [Google Scholar] [CrossRef]
  4. Yang, C.S.; Liao, Y.J.; Kuo, C.H.; Hwang, C.-H.; Wu, W.-D.; Liao, P.-K.; Fu, I.-K.; Sébire, G.; Frost, T.; Tenny, N. Toward 6G Sustainable Mobile Communications. IEEE Wirel. Commun. 2025, 32, 44–50. [Google Scholar] [CrossRef]
  5. Lakhlef, I.E.; Djamaa, B.; Senouci, M.R.; Bradai, A. Enhanced Multicast Protocol for Low-Power and Lossy IoT Networks. IEEE Sens. J. 2024, 24, 15393–15408. [Google Scholar] [CrossRef]
  6. Bono, F.M.; Polinelli, A.; Radicioni, L.; Benedetti, L.; Castelli-Dezza, F.; Cinquemani, S.; Belloli, M. Wireless Accelerometer Architecture for Bridge SHM: From Sensor Design to System Deployment. Future Internet 2025, 17, 29. [Google Scholar] [CrossRef]
  7. Parizi, M.N.; Ghafouri, S.H.; Hajmohammadi, M.S. TARRP: Trust Aware RPL Routing Protocol for IoT. Int. J. Commun. Syst. 2025, 38, e6124. [Google Scholar] [CrossRef]
  8. Dey, D.; Ghosh, N. iTRPL: An intelligent and trusted RPL protocol based on Multi-Agent Reinforcement Learning. Ad Hoc Netw. 2024, 163, 103586. [Google Scholar] [CrossRef]
  9. Zhu, X.Q.; Liu, J.Q.; Lu, L.Y.; Zhang, T.; Qiu, T.; Wang, C.; Liu, Y. Enabling Intelligent Connectivity: A Survey of Secure ISAC in 6G Networks. IEEE Commun. Surv. Tutor. 2025, 27, 748–781. [Google Scholar] [CrossRef]
  10. Lakhlef, I.E.; Djamaa, B.; Senouci, M.R.; Bradai, A.; Cherif, Y.M. PIM-LLN: Protocol Independent Multicast for Low-Power and Lossy Networks. IEEE Trans. Mob. Comput. 2025, 24, 3809–3825. [Google Scholar] [CrossRef]
  11. RFC9010; Thubert, P.; Richardson, M. Routing for RPL (Routing Protocol for Low-Power and Lossy Networks) Leaves. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2021.
  12. RFC9008; Robles, M.I.; Richardson Thubert, P. Using RPI Option Type, Routing Header for Source Routes, and IPv6-in-IPv6 Encapsulation in the RPL Data Plane. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2021.
  13. RFC6550; Winter, T.; Thubert, P.; Brandt, A.; Alexander, R.; Vasseur, J.P.; Hui, J.; Pister, K.; Levis, P.; Struik, R.; Kelsey, R. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2012.
  14. RFC8036; Winget, N.C.; Hui, J.; Popa, D. Applicability Statement for the Routing Protocol for Low-Power and Lossy Networks (RPL) in Advanced Metering Infrastructure (AMI) Networks. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2017.
  15. Mohajerani, J.; Ghanatghestani, M.M.; Hashemipour, M. MCTE-RPL: A multi-context trust-based efficient RPL for IoT. Netw. Comput. Appl. 2024, 229, 103937. [Google Scholar] [CrossRef]
  16. Dinesh, P.S.; Palanisamy, C. Reliable Data Delivery and Load Balancing in Improved Energy Efficient RPL Routing Protocol for Low Power and Lossy Networks. Int. J. Commun. Syst. 2025, 38, e6106. [Google Scholar] [CrossRef]
  17. Vidhya, S.S.; Mathi, S.; Ananthanarayanan, V.; Iyer, G.N. IP-RPL: An Intelligent Power-Aware Routing Protocol for Next-Generation Low-Power Networks. IEEE Sens. J. 2025, 25, 3640–3648. [Google Scholar] [CrossRef]
  18. Hussain, S.J.; Roopa, M. BE-RPL: Balanced-load and Energy-efficient RPL. Comput. Syst. Sci. Eng. 2023, 45, 785–801. [Google Scholar] [CrossRef]
  19. Alilou, M.; Sangar, A.B.; Majidzadeh, K.; Masdari, M. QFS-RPL: Mobility and Energy Aware Multi Path Routing Protocol for The Internet of Mobile Things Data Transfer Infrastructures. Telecommun. Syst. 2024, 85, 289–312. [Google Scholar] [CrossRef]
  20. Ghosh, S. CB-ED-RPL: Coordinator-Based Energy-Efficient Dynamic RPL for IoT Networks. Wirel. Pers. Commun. 2023. [Google Scholar] [CrossRef]
  21. Rady, M.; Lampin, Q.; Barthel, D.; Watteyne, T. Bringing Life Out of Diversity: Boosting Network Lifetime Using Multi-PHY Routing in RPL. Trans. Emerg. Telecommun. Technol. 2022, 33, e4592. [Google Scholar] [CrossRef]
  22. Dharmalingaswamy, A.; Pitchai, L. Additive Metric Composition-Based Load Aware Reliable Routing Protocol for Improving the Quality of Service in Industrial Internet of Things. Int. Arab. J. Inf. Technol. 2023, 20, 954–964. [Google Scholar] [CrossRef]
  23. Vieira Junior, I.F.; Granjal, J.; Curado, M. RT-Ranked: Towards Network Resiliency by Anticipating Demand in TSCH/RPL Communication Environments. Netw. Syst. Manag. 2024, 32, 19. [Google Scholar] [CrossRef]
  24. Tabouche, A.; Djamaa, B.; Senouci, M.R.; Ouakaf, O.E.; Elaziz, A.G. TLR: Traffic-Aware Load-Balanced For Industrial IoT. Internet Things 2024, 25, 101093. [Google Scholar] [CrossRef]
  25. Maheshwari, A.; Panneerselvam, K. Optimizing RPL for Load Balancing and Congestion Mitigation in IoT Network. Wirel. Pers. Commun. 2024, 136, 1619–1636. [Google Scholar] [CrossRef]
  26. Royaee, Z.; Mirvaziri, H.; Bardsiri, A.K. Designing a context-aware model for RPL load balancing of low power and lossy networks in the internet of things. Ambient. Intell. Humaniz. Comput. 2020, 12, 2449–2468. [Google Scholar] [CrossRef]
  27. Pereira, H.; Moritz, G.L.; Souza, R.D.; Munaretto, A.; Fonseca, M. Increased Network Lifetime and Load Balancing Based on Network Interface Average Power Metric for RPL. IEEE Access 2020, 8, 48686–48696. [Google Scholar] [CrossRef]
  28. Kumar, A.; Hariharan, N. DCRL-RPL: Dual context-based routing and load balancing in RPL for IoT networks. IET Commun. 2020, 14, 1869–1882. [Google Scholar] [CrossRef]
  29. Hadaya, N.N.; Alabady, S.A. Proposed RPL routing protocol in the IoT applications. Concurr. Comput.-Pract. Exp. 2022, 34, e6805. [Google Scholar] [CrossRef]
  30. Alotaibi, M.A.; Alwakeel, S.S.; Alyahya, A.N. A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol. CMC-Comput. Mater. Contin. 2025, 82, 3467–3497. [Google Scholar]
  31. Mishra, S.N.; Khatua, M. Reliable and Delay Efficient Multi-Path RPL for Mission Critical IoT Applications. IEEE Trans. Mob. Comput. 2024, 23, 6983–6996. [Google Scholar] [CrossRef]
  32. RFC9616; Jonglez, B.; Chroboczek, J. Delay-Based Metric Extension for the Babel Routing Protocol. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2024.
  33. Behrad, B.V.; Abolfazl, T.H. Brad-OF: An Enhanced Energy-Aware Method for Parent Selection and Congestion Avoidance in RPL Protocol. Wirel. Pers. Commun. 2020, 114, 783–812. [Google Scholar] [CrossRef]
  34. Hanane, L.; Nabil, B. A comprehensive survey on enhancements and limitations of the RPL protocol: A focus on the objective function. Ad Hoc Netw. 2020, 96, 102001. [Google Scholar]
  35. Anita, C.S.; Sasikumar, R. Learning automata and lexical composition method for optimal and load balanced RPL routing in IoT. Int. J. Ad Hoc Ubiquitous Comput. 2022, 40, 288–300. [Google Scholar] [CrossRef]
  36. Kamble, S.; Chandavarkar, B.R. EWRPL: Entropy-based weighted RPL. Wirel. Netw. 2025, 31, 613–622. [Google Scholar] [CrossRef]
  37. Kamble, S.; Bhilwar, P.; Chandavarkar, B.R. Novel Fuzzy-based Objective Function for routing protocol for low power and lossy networks. Ad Hoc Netw. 2023, 144, 103150. [Google Scholar] [CrossRef]
  38. RFC6719; Gnawali, O.; Levis, P. The Minimum Rank with Hysteresis Objective Function. Internet Engineering Task Force (IETF): Fremont, CA, USA, 2012.
  39. Srisomboon, K.; Wasayangkool, K.; Lee, W. Trilateral Smart Switching Algorithm for Improving Smart Meters Efficiency in Advanced Metering Infrastructure (AMI) Network. IEEE Access 2024, 12, 194973–194988. [Google Scholar] [CrossRef]
  40. Shen, A.; Li, Y.; Noman, K.; Wang, D.; Peng, Z.; Feng, K. Multiscale fluctuation-based symbolic dynamic entropy: A novel entropy method for fault diagnosis of rotating machinery. Struct. Health Monit.-Int. J. 2025, 24, 402–420. [Google Scholar] [CrossRef]
  41. Xiong, Z.C.; Hu, J.Y.; Li, N. Comprehensive quality evaluation method of ultrasound tomography algorithms based on entropy method. Meas. Sci. Technol. 2024, 35, 115403. [Google Scholar] [CrossRef]
  42. Cao, Y.N.; Yuan, H. A novel context-aware RPL algorithm based on a triangle module operator. Front. Inf. Technol. Electron. Eng. 2021, 22, 1583–1597. [Google Scholar] [CrossRef]
Figure 1. All technologies integrated to achieve 6G network architecture evolution.
Figure 1. All technologies integrated to achieve 6G network architecture evolution.
Electronics 14 04100 g001
Figure 2. Various technologies are integrated to realize the evolution of 6G architecture.
Figure 2. Various technologies are integrated to realize the evolution of 6G architecture.
Electronics 14 04100 g002
Figure 3. The 6G LLN topology instance.
Figure 3. The 6G LLN topology instance.
Electronics 14 04100 g003
Figure 4. Simple network construction processes. (1–4 are 4 different nodes, ①–⑮ are transmission sequence of control message).
Figure 4. Simple network construction processes. (1–4 are 4 different nodes, ①–⑮ are transmission sequence of control message).
Electronics 14 04100 g004
Figure 5. Improved DODAG construction process. (1–4 are 4 different nodes, ①–⑫ are transmission sequence of control message).
Figure 5. Improved DODAG construction process. (1–4 are 4 different nodes, ①–⑫ are transmission sequence of control message).
Electronics 14 04100 g005
Figure 6. AHP hierarchical evaluation model.
Figure 6. AHP hierarchical evaluation model.
Electronics 14 04100 g006
Figure 7. Control overhead.
Figure 7. Control overhead.
Electronics 14 04100 g007
Figure 8. Average packet delivery ratio.
Figure 8. Average packet delivery ratio.
Electronics 14 04100 g008
Figure 9. Average end-to-end delay.
Figure 9. Average end-to-end delay.
Electronics 14 04100 g009
Figure 10. Average hop count.
Figure 10. Average hop count.
Electronics 14 04100 g010
Figure 11. Average remaining energy.
Figure 11. Average remaining energy.
Electronics 14 04100 g011
Figure 12. Average alive node number.
Figure 12. Average alive node number.
Electronics 14 04100 g012
Figure 13. Average Number of Preferred Parent Changes.
Figure 13. Average Number of Preferred Parent Changes.
Electronics 14 04100 g013
Figure 14. Relationship between weight factors (w1, w2, w3, and w4) and simulation time.
Figure 14. Relationship between weight factors (w1, w2, w3, and w4) and simulation time.
Electronics 14 04100 g014
Table 1. Differences between 6G LLN and LLN.
Table 1. Differences between 6G LLN and LLN.
Indicator6G LLNLLN
Spectrum effectivenessTHz + RIS dynamic utilization of high-frequency resourcesSub-GHz or authorized frequency band
Energy consumption managementDynamic power consumption optimizationFixed sleep scheduling, simple energy harvesting
Topological flexibilityDynamic intelligent networkingStatic or low-speed self-organization
Damage resistance mechanismAI predicts channel state + federated learning optimizes redundancyRedundant transmission, simple retransmission strategy
DelayHigh delay
(second level)
Higher delay
(second level)
ReliabilityLowLower
Security mechanismPhysical layer security + block chain identity authentication + quantum key distributionLightweight encryption
Protocol stack and architectureAI-native protocol stack, network layer AI routing, and distributed edge intelligenceProtocol stack simplification, centralized gateway processes data
Failure recoverySelf-healing networkManually replace the faulty node or link
Application scenariosDigital twin, AR municipal inspection, cross-domain collaboration of deep-sea/space sensor networks, etc.Temperature and humidity monitoring, lamp control, forest fire warning, etc.
Table 2. Key points that should be considered for 6G LLN routing technology.
Table 2. Key points that should be considered for 6G LLN routing technology.
Indicator6G LLNLLN
Energy optimizationAI prediction, energy awarenessResidual energy priority
Topological flexibilityDynamic real-time decision-makingStatic or low-speed topology update
Multi-dimensional routing metric evaluation strategyDynamic adaptive objective functionLimited resources, crude multi-dimensional objective functions
Broadcast suppressionOpportunistic forwarding, set node forwarding conditions to reduce redundant transmissionNodes randomly broadcast
Protocol simplificationCompress signaling header, etc., to reduce transmission loadPartial signaling redundancy
ReliabilityOpportunistic forwarding, multi-dimensional routing metric evaluationDifficult multi-dimensional routing metric evaluation
Security mechanismPhysical layer security, block chain identity authentication, and quantum key distributionLightweight encryption
Protocol efficiencyHardware accelerated, ultra-minimalist signaling6LoWPAN
Table 3. Control message explanation.
Table 3. Control message explanation.
Control MessagesExplanation
DIOBroadcast by parents, contains information about instance and used for selecting parent set, maintaining DODAG, etc.
DISSolicits DIO from neighbors
DAOTransmits destination information upward, builds uplink routing
DAO-ACKSent by DAO receiver to acknowledge DAO
Table 4. Scale of 0.1–0.9.
Table 4. Scale of 0.1–0.9.
ScaleVariance Position
0.5Both elements are equally important
0.6One element is slightly more important than the other
0.7One element is more important than the other
0.8One element is strongly more important than the other
0.9One element is extremely more important than the other
0.1–0.4The counter comparison, if rij can be obtained through ri compared with rj, then 1-rij can be obtained through rj compared with ri
Table 5. The selected statistic metrics.
Table 5. The selected statistic metrics.
Statistic MetricsExplanationsFormula
Control overhead (CO)It is the total number of control messages sent by nodes. C O = D I O + D I S + D A O s i m u l a t i o n   t i m e
Packet delivery ratio (PDR)It is the ratio of the number of successfully received packets and the total number of sent packets. P D R ( % ) = n o .   o f   r e c e i v e d   p a c k e t s n o .   o f   s e n t   p a c k e t s
Network latencyIt is the average time required for a packet being sent to its destination. L a t e n c y = ( r e c e i v e t i m e s e n d t i m e ) n o .   o f   r e c e i v e d   p a c k e t s
Network lifetimeIt can be represented by the average residual energy of nodes or average alive node number.
Hop countIt is the average hops from source to destination. H o p = h o p s n o .   o f   n o d e s
Preferred parent changes (PPC)It is the average number of nodes’ preferred parent changes during their running in the network. P P C = n o .   o f   n o d e s   p p c   c h a n g e s n o .   o f   n o d e s
Weight coefficients (w1, w2, w3, w4)It reflects the changing law of weight coefficient with simulation time.
Table 6. Simulation parameters.
Table 6. Simulation parameters.
ParameterValue
Simulation scenario400 m × 400 m
Number of nodes100
Working frequency band28 GHz
MACCSMA/CA
Radio duty cycle (RDC)Adaptively determined by congestion degree and remaining energy
IRS number10
ISAC number4
Simulation time (s)3600
Traffic arrival rate (packet/min)30
Initial energy (J)0.5–1.5
Energy consumption of relaying v bit messageE(v,d)
Packet formatIPv6
Physical and data link layerIEEE 802.15.4 g
Size of packet (kbits)0.2
Maximum buffer size (packet number)20
Minimum buffer size (packet number)0
Queue typeFIFO
Transmission range (m)100
Table 7. Parameters used in E(v, d).
Table 7. Parameters used in E(v, d).
ParameterExplanationValue
EelecEnergy consumption of relaying 1 bit message50 nJ/bit
εampThe energy consumption of the transmission amplifier sending 1 bit message (d < d0)10 pJ/bit/m2
εfsThe energy consumption of the transmission amplifier sending 1 bit message (d > d0)0.0013 pJ/bit/m4
d0The threshold value87 m
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cao, Y.; Zhang, G. Routing Technologies for 6G Low-Power and Lossy Networks. Electronics 2025, 14, 4100. https://doi.org/10.3390/electronics14204100

AMA Style

Cao Y, Zhang G. Routing Technologies for 6G Low-Power and Lossy Networks. Electronics. 2025; 14(20):4100. https://doi.org/10.3390/electronics14204100

Chicago/Turabian Style

Cao, Yanan, and Guang Zhang. 2025. "Routing Technologies for 6G Low-Power and Lossy Networks" Electronics 14, no. 20: 4100. https://doi.org/10.3390/electronics14204100

APA Style

Cao, Y., & Zhang, G. (2025). Routing Technologies for 6G Low-Power and Lossy Networks. Electronics, 14(20), 4100. https://doi.org/10.3390/electronics14204100

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop