Trust-based Neighbor Unreachability Detection for RPL

被引:0
作者
Guclu, Sila Ozen [1 ]
Ozcelebi, Tanir [1 ]
Lukkien, Johan J. [1 ]
机构
[1] Eindhoven Univ Technol, Dept Math & Comp Sci, Eindhoven, Netherlands
来源
2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN) | 2016年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The IETF ROLL working group developed Routing Protocol for Low Power and Lossy Networks (RPL) for packet routing within Low power and Lossy Networks (LLNs) formed by resource constrained devices. RPL handles LLN issues such as unreachable parent and routing loops by triggering reconstruction of routing tree. For unreachable neighbor detection, RPL requires an external mechanism with very low communication overhead. This rules out the use of proactive mechanisms that employ keep-alive messages. Instead, RPL suggests to use IPv6 Neighbor Unreachability Detection (NUD), which is a reactive mechanism maintaining timers that trigger control messages. However, due to the use of fixed timeout intervals, NUD suffers from frequent premature timeouts and the communication overhead of NUD is still substantial. We propose a cross layer trust-based NUD mechanism, which adapts its timeout intervals based on network traffic without the need for explicit coordination among nodes. The proposed mechanism takes advantage of overhearing at the link layer and uses the statistics about packets that are not sent to the node itself, i.e. that would otherwise be discarded. Our evaluation shows that the proposed mechanism decreases the number of control messages significantly, while the packet delivery rate remains comparable to classical NUD.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] TRUST-BASED THEORIES OF PROMISING
    Bruno, Daniele
    PHILOSOPHICAL QUARTERLY, 2020, 70 (280) : 443 - 463
  • [42] Performance of trust-based governance
    Vanneste, Bart S.
    Yoo, Onesun Steve
    JOURNAL OF ORGANIZATION DESIGN, 2020, 9 (01)
  • [43] The failure of trust-based retributivism
    Daniel Korman
    Law and Philosophy, 2003, 22 (6) : 561 - 575
  • [44] A logic of trust-based beliefs
    Jiang, Junli
    Naumov, Pavel
    SYNTHESE, 2024, 204 (02)
  • [45] Trust-Based Selection of Partners
    Urbano, Maria Joana
    Rocha, Ana Paula
    Oliveira, Eugenio
    E-COMMERCE AND WEB TECHNOLOGIES, 2011, 85 : 221 - 232
  • [46] Trust-based environmental regulation
    Lange, Bettina
    Gouldson, Andy
    SCIENCE OF THE TOTAL ENVIRONMENT, 2010, 408 (22) : 5235 - 5243
  • [47] Trust-based community assessment
    Gutierrez, Patricia
    Osman, Nardine
    Roig, Carme
    Sierra, Carles
    PATTERN RECOGNITION LETTERS, 2015, 67 : 49 - 58
  • [48] Trust-based collaborative filtering
    Lathia, Neal
    Hailes, Stephan
    Capra, Licia
    TRUST MANAGEMENT II, 2008, 263 : 119 - 134
  • [49] Trust-based behaviors detection model for open enterprise computing environment
    Shen, Li-Min
    Li, Feng
    Sun, Peng-Fei
    Niu, Jing-Chun
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2013, 19 (01): : 217 - 223
  • [50] DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET
    Poongodi, M.
    Hamdi, Mounir
    Sharma, Ashutosh
    Ma, Maode
    Singh, Pradeep Kumar
    IEEE ACCESS, 2019, 7 : 183532 - 183544