Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (12)

Search Parameters:
Keywords = IPv6 over Low Power Wireless Personal Area Networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
31 pages, 5142 KiB  
Article
A Secure and Lightweight Group Mobility Authentication Scheme for 6LoWPAN Networks
by Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan and Rami Ahmad
Sensors 2025, 25(5), 1458; https://doi.org/10.3390/s25051458 - 27 Feb 2025
Cited by 2 | Viewed by 891
Abstract
The integration of Internet Protocol version 6 over Low-Power Wireless Personal Area Networks (6LoWPANs) provided IP technologies within wireless sensor networks that dramatically increased the Internet of Things (IoT). Therefore, to facilitate efficient mobility management for resource-constrained IP-based sensor nodes, the Proxy Mobile [...] Read more.
The integration of Internet Protocol version 6 over Low-Power Wireless Personal Area Networks (6LoWPANs) provided IP technologies within wireless sensor networks that dramatically increased the Internet of Things (IoT). Therefore, to facilitate efficient mobility management for resource-constrained IP-based sensor nodes, the Proxy Mobile IPv6 (PMIPv6) standard has been introduced to reduce communication overhead. However, the standard has addressed security and mobility authentication challenges in 6LoWPANs, although recent solutions have yet to focus much on facilitating secure group handovers. Considering these issues, a Secure and Lightweight Group Mobility Authentication Scheme (SL_GAS) is proposed for 6LoWPAN’s highly constrained sensor nodes. SL_GAS innovatively utilizes one-time alias identities, temporary IDs, tickets, and an aggregated MAC with tags to ensure mutual authentication while maintaining sensor anonymity, providing a balanced security and privacy approach. SL_GAS’s robustness against a variety of security threats is validated through formal automated verification using the Scyther tool alongside SVO logic, while an informal analysis demonstrates its resilience to known attacks. Comparative analysis with existing schemes highlights SL_GAS’s advantages in reducing signal cost, transmission delay, communication, and computation overhead. SL_GAS stands out for its combination of security, privacy, and efficiency, making it a promising approach for enhancing IoT connectivity in resource-constrained settings. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

11 pages, 653 KiB  
Article
Routing Protocols Performance on 6LoWPAN IoT Networks
by Pei Siang Chia, Noor Hisham Kamis, Siti Fatimah Abdul Razak, Sumendra Yogarayan, Warusia Yassin and Mohd Faizal Abdollah
IoT 2025, 6(1), 12; https://doi.org/10.3390/iot6010012 - 10 Feb 2025
Cited by 1 | Viewed by 1519
Abstract
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect [...] Read more.
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect to the network using IPv6. This study focuses on examining the performance and power consumption of routing protocols in the context of 6LoWPAN, drawing insights from prior research and utilizing simulation techniques. The simulation involves the application of routing protocols, namely Routing Protocol for Low-power and Lossy (RPL) Networks, Ad hoc On-demand Distance Vector (AODV), Lightweight On-demand Ad hoc Distance-vector Next Generation (LOADng), implemented through the Cooja simulator. The simulation also runs in different network topologies to gain an insight into the performance of the protocols in the specific topology including random, linear, and eclipse topology. The raw data gathered from the tools including Powertrace and Collect-View were then analyzed with Python code to transfer into useful information and visualize the graph. The results demonstrate that the power consumption, specifically CPU power, Listen Power, and Total Consumption Power, will increase with the incremental of motes. The result also shows that RPL is the most power-efficient protocol among the scenarios compared to LOADng and AODV. The result is helpful because it brings insights into the performance, specifically power consumption in the 6LoWPAN network. This result is valuable to further implement these protocols in the testbed as well as provide an idea of the algorithmic enhancements. Full article
Show Figures

Figure 1

29 pages, 4830 KiB  
Article
Enabling Seamless Connectivity: Networking Innovations in Wireless Sensor Networks for Industrial Application
by Shathya Duobiene, Rimantas Simniškis and Gediminas Račiukaitis
Sensors 2024, 24(15), 4881; https://doi.org/10.3390/s24154881 - 27 Jul 2024
Cited by 1 | Viewed by 1761
Abstract
The wide-ranging applications of the Internet of Things (IoT) show that it has the potential to revolutionise industry, improve daily life, and overcome global challenges. This study aims to evaluate the performance scalability of mature industrial wireless sensor networks (IWSNs). A new classification [...] Read more.
The wide-ranging applications of the Internet of Things (IoT) show that it has the potential to revolutionise industry, improve daily life, and overcome global challenges. This study aims to evaluate the performance scalability of mature industrial wireless sensor networks (IWSNs). A new classification approach for IoT in the industrial sector is proposed based on multiple factors and we introduce the integration of 6LoWPAN (IPv6 over low-power wireless personal area networks), message queuing telemetry transport for sensor networks (MQTT-SN), and ContikiMAC protocols for sensor nodes in an industrial IoT system to improve energy-efficient connectivity. The Contiki COOJA WSN simulator was applied to model and simulate the performance of the protocols in two static and moving scenarios and evaluate the proposed novelty detection system (NDS) for network intrusions in order to identify certain events in real time for realistic dataset analysis. The simulation results show that our method is an essential measure in determining the number of transmissions required to achieve a certain reliability target in an IWSNs. Despite the growing demand for low-power operation, deterministic communication, and end-to-end reliability, our methodology of an innovative sensor design using selective surface activation induced by laser (SSAIL) technology was developed and deployed in the FTMC premises to demonstrate its long-term functionality and reliability. The proposed framework was experimentally validated and tested through simulations to demonstrate the applicability and suitability of the proposed approach. The energy efficiency in the optimised WSN was increased by 50%, battery life was extended by 350%, duplicated packets were reduced by 80%, data collisions were reduced by 80%, and it was shown that the proposed methodology and tools could be used effectively in the development of telemetry node networks in new industrial projects in order to detect events and breaches in IoT networks accurately. The energy consumption of the developed sensor nodes was measured. Overall, this study performed a comprehensive assessment of the challenges of industrial processes, such as the reliability and stability of telemetry channels, the energy efficiency of autonomous nodes, and the minimisation of duplicate information transmission in IWSNs. Full article
(This article belongs to the Special Issue IoT Sensors Development and Application for Environment & Safety)
Show Figures

Figure 1

17 pages, 309 KiB  
Article
Evaluation of 6LoWPAN Generic Header Compression in the Context of a RPL Network
by Thibaut Vandervelden, Diana Deac, Roald Van Glabbeek, Ruben De Smet, An Braeken and Kris Steenhaut
Sensors 2024, 24(1), 73; https://doi.org/10.3390/s24010073 - 22 Dec 2023
Cited by 3 | Viewed by 2649
Abstract
The Internet of Things (IoT) facilitates the integration of diverse devices, leading to the formation of networks such as Low-power Wireless Personal Area Networks (LoWPANs). These networks have inherent constraints that make header and payload compression an attractive solution to optimise communication. In [...] Read more.
The Internet of Things (IoT) facilitates the integration of diverse devices, leading to the formation of networks such as Low-power Wireless Personal Area Networks (LoWPANs). These networks have inherent constraints that make header and payload compression an attractive solution to optimise communication. In this work, we evaluate the performance of Generic Header Compression (6LoWPAN-GHC), defined in RFC 7400, for IEEE 802.15.4-based networks running the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). Through simulation and real-device experiments, we study the impact of 6LoWPAN-GHC on energy consumption and delays and investigate for which scenarios 6LoWPAN-GHC is beneficial. We show that all RPL control packets are compressible by 6LoWPAN-GHC, which reduces their transmission delay and as such their vulnerability to interference. However, for the devices under study transmitting at 250 kbit/s, the energy gain obtained from sending a compressed packet is outweighed by the energy needed to compress it. The use of 6LoWPAN-GHC causes an energy increase of between 2% and 26%, depending on the RPL packet type. When the range is more important than the bandwidth and a sub-GHz band is used at 10 kbit/s, an energy gain of 11% to 29% can be obtained, depending on the type of RPL control packet. Full article
(This article belongs to the Special Issue Feature Papers in the 'Sensor Networks' Section 2023)
Show Figures

Figure 1

44 pages, 8626 KiB  
Review
A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things
by Taief Alaa Al-Amiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Iznan H. Hasbullah and Ziyad R. Alashhab
Sensors 2022, 22(9), 3400; https://doi.org/10.3390/s22093400 - 29 Apr 2022
Cited by 63 | Viewed by 6530
Abstract
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it [...] Read more.
The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate efficient routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). Limited resources of 6LoWPAN nodes make it challenging to secure the environment, leaving it vulnerable to threats and security attacks. Machine Learning (ML) and Deep Learning (DL) approaches have shown promise as effective and efficient mechanisms for detecting anomalous behaviors in RPL-based 6LoWPAN. Therefore, this paper systematically reviews and critically analyzes the research landscape on ML, DL, and combined ML-DL approaches applied to detect attacks in RPL networks. In addition, this study examined existing datasets designed explicitly for the RPL network. This work collects relevant studies from five major databases: Google Scholar, Springer Link, Scopus, Science Direct, and IEEE Xplore® digital library. Furthermore, 15,543 studies, retrieved from January 2016 to mid-2021, were refined according to the assigned inclusion criteria and designed research questions resulting in 49 studies. Finally, a conclusive discussion highlights the issues and challenges in the existing studies and proposes several future research directions. Full article
Show Figures

Figure 1

36 pages, 588 KiB  
Article
LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things
by Balkis Bettoumi and Ridha Bouallegue
Sensors 2021, 21(21), 7348; https://doi.org/10.3390/s21217348 - 4 Nov 2021
Cited by 10 | Viewed by 3079
Abstract
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy constraints. The Host Identity [...] Read more.
The high level of security requirements and low capabilities of constrained devices that are connected to the Internet of Things (IoT) constitute a new challenge in terms of proposing an authentication solution that deals with the problem of energy constraints. The Host Identity Protocol Diet EXchange (HIP DEX) is primarily designed to be suitable for constrained devices and designed to be resistant to Denial of Service (DoS) and man-in-the-middle (MITM) attacks. In this paper, we propose an efficient saving energy solution to secure end-to-end (E2E) communications based on the compression of the IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) header for HIP DEX packets. We implement our solution in an IoT based-WSN over Constrained Application Protocol (CoAP) in the application layer and Routing Protocol for Low power and lossy networks (RPL) in the routing layer. We also propose a novel distribution model that minimizes the number of signaling messages. Both proposed compression and distribution models for HIP DEX combined with an original implementation of an opportunistic association establishment of the handshake, constitute an efficient security solution for IoT. We called our solution Lightweight Compressed HIP DEX in the IoT (LC-DEX). Full article
(This article belongs to the Special Issue Wireless Sensor Networks in the IoT: New Challenges)
Show Figures

Figure 1

20 pages, 1670 KiB  
Article
Defragmenting the 6LoWPAN Fragmentation Landscape: A Performance Evaluation
by Amaury Bruniaux, Remous-Aris Koutsiamanis, Georgios Z. Papadopoulos and Nicolas Montavont
Sensors 2021, 21(5), 1711; https://doi.org/10.3390/s21051711 - 2 Mar 2021
Cited by 5 | Viewed by 3528
Abstract
The emergence of the Internet of Things (IoT) has made wireless connectivity ubiquitous and necessary. Extending the IoT to the Industrial Internet of Things (IIoT) places significant demands in terms of reliability on wireless connectivity. The Institute of Electrical and Electronics Engineers (IEEE) [...] Read more.
The emergence of the Internet of Things (IoT) has made wireless connectivity ubiquitous and necessary. Extending the IoT to the Industrial Internet of Things (IIoT) places significant demands in terms of reliability on wireless connectivity. The Institute of Electrical and Electronics Engineers (IEEE) Std 802.15.4-2015 standard was designed in response to these demands, and the IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) adaptation layer was introduced to address (among other issues) its payload size limitations by performing packet compression and fragmentation. However, the standardised method does not cope well with low link-quality situations and, thus, we present the state-of-the-art Forward Error Correction (FEC) methods and introduce our own contribution, Network Coding FEC (NCFEC), to improve performance in these situations. We present and analyse the existing methods as well as our own theoretically, and we then implement them and perform an experimental evaluation using the 6TiSCH simulator. The simulation results demonstrate that when high reliability is required and only low quality links are available, NCFEC performs best, with a trade-off between additional network and computational overhead. In situations where the link quality can be guaranteed to be higher, simpler solutions also start to be feasible, but with reduced adaptation flexibility. Full article
(This article belongs to the Special Issue Dependable IoT Networking)
Show Figures

Figure 1

28 pages, 8150 KiB  
Article
Enhancing Energy Saving in Smart Farming through Aggregation and Partition Aware IoT Routing Protocol
by Karim Fathallah, Mohamed Amine Abid and Nejib Ben Hadj-Alouane
Sensors 2020, 20(10), 2760; https://doi.org/10.3390/s20102760 - 12 May 2020
Cited by 34 | Viewed by 4269
Abstract
Internet of things (IoT) for precision agriculture or Smart Farming (SF) is an emerging area of application. It consists essentially of deploying wireless sensor networks (WSNs), composed of IP-enabled sensor nodes, in a partitioned farmland area. When the surface, diversity, and complexity of [...] Read more.
Internet of things (IoT) for precision agriculture or Smart Farming (SF) is an emerging area of application. It consists essentially of deploying wireless sensor networks (WSNs), composed of IP-enabled sensor nodes, in a partitioned farmland area. When the surface, diversity, and complexity of the farm increases, the number of sensing nodes increases, generating heavy exchange of data and messages, and thus leading to network congestion, radio interference, and high energy consumption. In this work, we propose a novel routing algorithm extending the well known IPv6 Routing Protocol for Low power and Lossy Networks (RPL), the standard routing protocol used for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN). It is referred to as the Partition Aware-RPL (PA-RPL) and improves the performance of the standard RPL. In contrast to RPL, the proposed technique builds a routing topology enabling efficient in-network data aggregation, hence dramatically reducing data traffic through the network. Performance analysis of a typical/realistic precision agriculture case, considering the potato pest prevention from the well-known late blight disease, shows that PA-RPL improves energy saving up to 40 % compared to standard RPL. Full article
(This article belongs to the Special Issue Internet of Things for Smart Homes and Industrial Application)
Show Figures

Figure 1

23 pages, 745 KiB  
Article
S6AE: Securing 6LoWPAN Using Authenticated Encryption Scheme
by Muhammad Tanveer, Ghulam Abbas, Ziaul Haq Abbas, Muhammad Waqas, Fazal Muhammad and Sunghwan Kim
Sensors 2020, 20(9), 2707; https://doi.org/10.3390/s20092707 - 9 May 2020
Cited by 37 | Viewed by 4398
Abstract
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to [...] Read more.
IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) has an ample share in the Internet of Things. Sensor nodes in 6LoWPAN collect vital information from the environment and transmit to a central server through the public Internet. Therefore, it is inevitable to secure communications and allow legitimate sensor nodes to access network resources. This paper presents a lightweight Authentication and Key Exchange (AKE) scheme for 6LoWPAN using an authenticated encryption algorithm and hash function. Upon successful authentication, sensor nodes and the central server can establish the secret key for secure communications. The proposed scheme ensures header verification during the AKE process without using IP security protocol and, thus, has low communication and computational overheads. The logical correctness of the proposed scheme is validated through Burrows–Abadi–Needham logic. Furthermore, automatic security analyses by using AVISPA illustrate that the proposed scheme is resistant to various malicious attacks in 6LoWPANs. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

15 pages, 1327 KiB  
Article
DiRPL: A RPL-Based Resource and Service Discovery Algorithm for 6LoWPANs
by Luca Davoli, Mattia Antonini and Gianluigi Ferrari
Appl. Sci. 2019, 9(1), 33; https://doi.org/10.3390/app9010033 - 22 Dec 2018
Cited by 8 | Viewed by 5323
Abstract
The Internet of Things (IoT) will bring together billions of devices, denoted as Smart Objects (SOs), in an Internet-like architecture. Typically, SOs are embedded devices with severe constraints in terms of processing capabilities, available memory (RAM/ROM), and energy consumption. SOs tend to be [...] Read more.
The Internet of Things (IoT) will bring together billions of devices, denoted as Smart Objects (SOs), in an Internet-like architecture. Typically, SOs are embedded devices with severe constraints in terms of processing capabilities, available memory (RAM/ROM), and energy consumption. SOs tend to be deployed in environments in which the human intervention is not suitable or needs to be minimized (e.g., smart city maintenance). They must adapt to the surrounding environment by self-configuring: to this end, several mechanisms have been proposed (e.g., UPnP, ZeroConf, etc.). In this paper, we focus on IEEE 802.15.4 networks with IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) adaptation layer, where IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is the routing protocol of choice. In this context, we propose a lightweight RPL-based mechanism to Resource Discovery (RD) and Service Discovery (SD), denoted as DiRPL. In particular, DiRPL exploits the RPL handshake to detect new nodes in the network; resources are then simply discovered with a Constrained Application Protocol (CoAP) request and can thus be published in a local resource directory. A very attractive feature of the proposed DiRPL approach is that it builds on well-defined and well-known standard protocols. The performance of the proposed system is investigated with WisMote nodes deployed inside the Cooja simulator, running the Contiki operating system. Practical application scenarios to large-scale smart city monitoring, such as smart lighting and large-scale water consumption monitoring, are investigated. Full article
(This article belongs to the Special Issue IoT for Smart Cities)
Show Figures

Figure 1

18 pages, 805 KiB  
Article
Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach
by Ramon Sanchez-Iborra, Jesús Sánchez-Gómez, Salvador Pérez, Pedro J. Fernández, José Santa, José L. Hernández-Ramos and Antonio F. Skarmeta
Sensors 2018, 18(6), 1833; https://doi.org/10.3390/s18061833 - 5 Jun 2018
Cited by 72 | Viewed by 8648
Abstract
Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless [...] Read more.
Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN. Full article
(This article belongs to the Special Issue Security, Trust and Privacy for Sensor Networks)
Show Figures

Figure 1

19 pages, 1368 KiB  
Article
Experimental Study of 6LoPLC for Home Energy Management Systems
by Augustine Ikpehai, Bamidele Adebisi, Khaled M. Rabie, Russell Haggar and Mike Baker
Energies 2016, 9(12), 1046; https://doi.org/10.3390/en9121046 - 12 Dec 2016
Cited by 20 | Viewed by 6637
Abstract
Ubiquitous connectivity is already transforming residential dwellings into smart homes. As citizens continue to embrace the smart home paradigm, a new generation of low-rate and low-power communication systems is required to leverage the mass market presented by energy management in homes. Although Power [...] Read more.
Ubiquitous connectivity is already transforming residential dwellings into smart homes. As citizens continue to embrace the smart home paradigm, a new generation of low-rate and low-power communication systems is required to leverage the mass market presented by energy management in homes. Although Power Line Communication (PLC) technology has evolved in the last decade, the adaptation of PLC for constrained networks is not fully charted. By adapting some features of IEEE 802.15.4 and IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) into power lines, this paper demonstrates a low-rate, low-power PLC system over the IPv6 network (referred to as 6LoPLC), for Home Energy Management System (HEMS) applications. The overall idea is to provide a framework for assessing various scenarios that cannot be easily investigated with the limited number of evaluation hardware available. In this respect, a network model is developed in NS-3 (Version 21) to measure several important characteristics of the designed system and then validated with experimental results obtained using the Hanadu evaluation kits. Following the good agreement between the two, the NS-3 model is utilised to investigate more complex scenarios and various use-cases, such as the effects of impulsive noise, the number of nodes and packet size on the latency and Bit Error Rate (BER) performances. We further demonstrate that for different network and application configurations, optimal data sizes exist. For instance, the results reveal that in order to guarantee 99% system reliability, the HEMS application data must not exceed 64 bytes. Finally, it is shown that with impulsive noise in a HEMS network comprising 50 appliances, provided the size of the payload does not exceed 64 bytes, monitoring and control applications incur a maximum latency of 238.117 ms and 248.959 ms, respectively; both of which are within acceptable limits. Full article
(This article belongs to the Special Issue Smart Home Energy Management)
Show Figures

Figure 1

Back to TopTop