{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:48:21Z","timestamp":1726044501469},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319911458"},{"type":"electronic","value":"9783319911465"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-91146-5_3","type":"book-chapter","created":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T13:04:52Z","timestamp":1568811892000},"page":"49-95","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Failure Handling in RPL Implementations: An Experimental Qualitative Study"],"prefix":"10.1007","author":[{"given":"Agnieszka","family":"Paszkowska","sequence":"first","affiliation":[]},{"given":"Konrad","family":"Iwanicki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,19]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Boubekeur, F., Blin, L., Leone, R., Medagliani, P.: Bounding degrees on RPL. In: Q2SWinet\u00a0\u201915: Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 123\u2013130. ACM (2015). \n                    https:\/\/doi.org\/10.1145\/2815317.2815339","DOI":"10.1145\/2815317.2815339"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-40316-3_30","volume-title":"Internet of Things, Smart Spaces, and Next Generation Networking","author":"Agnieszka Brachman","year":"2013","unstructured":"Brachman, A.: RPL objective function impact on LLNs topology and performance. In: 13th International Conference on Internet of Things, Smart Spaces, and Next Generation Networking, NEW2AN 2013 and 6th Conference, ruSMART 2013, St. Petersburg, Russia, 28\u201330 August 2013, Proceedings, pp. 340\u2013351. Springer, Berlin, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-40316-3_30"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Clausen, T., Herberg, U., Philipp, M.: A critical evaluation of the IPv6 routing protocol for low power and lossy networks (RPL). In: 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 365\u2013372. IEEE (2011). \n                    https:\/\/doi.org\/10.1109\/WiMOB.2011.6085374","DOI":"10.1109\/WiMOB.2011.6085374"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Conta, A., Gupta, M.: Internet control message protocol (ICMPv6) for the Internet protocol version 6 (IPv6) specification. RFC 4443 (2006). \n                    https:\/\/doi.org\/10.17487\/RFC4443","DOI":"10.17487\/RFC4443"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"De\u00a0Couto, D.S.J., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. In: MobiCom\u00a0\u201903: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 134\u2013146. ACM (2003). \n                    https:\/\/doi.org\/10.1145\/938985.939000","DOI":"10.1145\/938985.939000"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Dunkels, A., Gronvall, B., Voigt, T.: Contiki\u2014a lightweight and flexible operating system for tiny networked sensors. In: 29th Annual IEEE International Conference on Local Computer Networks, pp. 455\u2013462. IEEE (2004). \n                    https:\/\/doi.org\/10.1109\/LCN.2004.38","DOI":"10.1109\/LCN.2004.38"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Duquennoy, S., Landsiedel, O., Voigt, T.: Let the tree bloom: scalable opportunistic routing with ORPL. In: SenSys\u00a0\u201913: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, pp. 2:1\u20132:14. ACM (2013). \n                    https:\/\/doi.org\/10.1145\/2517351.2517369","DOI":"10.1145\/2517351.2517369"},{"key":"3_CR8","unstructured":"Fonseca, R., Ratnasamy, S., Zhao, J., Ee, C.T., Culler, D., Shenker, S., Stoica, I.: Beacon vector routing: scalable point-to-point routing in wireless sensornets. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, NSDI\u00a0\u201905, pp. 329\u2013342. USENIX Association (2005)"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-00224-3_6","volume-title":"Lecture Notes in Computer Science","author":"Hannes Frey","year":"2009","unstructured":"Frey, H., Pind, K.: Dynamic source routing versus greedy routing in a testbed sensor network deployment. In: Proceedings of the 6th European Conference on Wireless Sensor Networks, EWSN\u00a0\u201909, pp. 86\u2013101. Springer (2009). \n                    https:\/\/doi.org\/10.1007\/978-3-642-00224-3_6"},{"issue":"14","key":"3_CR10","doi-asserted-by":"publisher","first-page":"3163","DOI":"10.1016\/j.comnet.2012.06.016","volume":"56","author":"Olfa Gaddour","year":"2012","unstructured":"Gaddour, O., Koub\u00e2a, A.: RPL in a nutshell: a survey. Comput. Netw. 56(14), 3163\u20133178 (2012). \n                    https:\/\/doi.org\/10.1016\/j.comnet.2012.06.016","journal-title":"Computer Networks"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Gaddour, O., Koub\u00e2a, A., Chaudhry, S., Tezeghdanti, M., Chaari, R., Abid, M.: Simulation and performance evaluation of DAG construction with RPL. In: Third International Conference on Communications and Networking, pp. 1\u20138. IEEE (2012). \n                    https:\/\/doi.org\/10.1109\/ComNet.2012.6217747","DOI":"10.1109\/ComNet.2012.6217747"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Gnawali, O., Levis, P.: The minimum rank with hysteresis objective function. RFC 6719 (2012). \n                    https:\/\/doi.org\/10.17487\/RFC6719","DOI":"10.17487\/RFC6719"},{"issue":"12","key":"3_CR13","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/MCOM.2013.6685769","volume":"51","author":"Dong Han","year":"2013","unstructured":"Han, D., Gnawali, O.: Performance of RPL under wireless interference. IEEE Commun. Mag. 51(12), 137\u2013143 (2013). \n                    https:\/\/doi.org\/10.1109\/MCOM.2013.6685769","journal-title":"IEEE Communications Magazine"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Heurtefeux, K., Menouar, H., AbuAli, N.: Experimental evaluation of a routing protocol for WSNs: RPL robustness under study. In: 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 491\u2013498 (2013). \n                    https:\/\/doi.org\/10.1109\/WiMOB.2013.6673404","DOI":"10.1109\/WiMOB.2013.6673404"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Hui, J., Vasseur, J.P.: The routing protocol for low-power and lossy networks (RPL) option for carrying RPL information in data-plane datagrams. RFC 6553 (2012). \n                    https:\/\/doi.org\/10.17487\/RFC6553","DOI":"10.17487\/RFC6553"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Iova, O., Theoleyre, F., Noel, T.: Stability and efficiency of RPL under realistic conditions in wireless sensor networks. In: 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 2098\u20132102. IEEE (2013). \n                    https:\/\/doi.org\/10.1109\/PIMRC.2013.6666490","DOI":"10.1109\/PIMRC.2013.6666490"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-319-15582-1_22","volume-title":"Lecture Notes in Computer Science","author":"Timofei Istomin","year":"2015","unstructured":"Istomin, T., Kiraly, C., Picco, G.P.: Is RPL ready for actuation? A comparative evaluation in a smart city scenario. In: 12th European Conference on Wireless Sensor Networks, EWSN 2015, Porto, Portugal, 9\u201311 February 2015, Proceedings, pp. 291\u2013299. Springer International Publishing (2015). \n                    https:\/\/doi.org\/10.1007\/978-3-319-15582-1_22"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Iwanicki, K.: RNFD: routing-layer detection of DODAG (root) node failures in low-power wireless networks. In: 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 13:1\u201313:12. IEEE (2016). \n                    https:\/\/doi.org\/10.1109\/IPSN.2016.7460720","DOI":"10.1109\/IPSN.2016.7460720"},{"key":"3_CR19","unstructured":"Iwanicki, K., van Steen, M.: On hierarchical routing in wireless sensor networks. In: Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, IPSN\u00a0\u201909, pp. 133\u2013144. IEEE Computer Society (2009)"},{"issue":"3","key":"3_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2240092.2240099","volume":"8","author":"Konrad Iwanicki","year":"2012","unstructured":"Iwanicki, K., van Steen, M.: A case for hierarchical routing in low-power wireless embedded networks. ACM Trans. Sens. Netw. 8(3):25:1\u201325:34 (2012). \n                    https:\/\/doi.org\/10.1145\/2240092.2240099","journal-title":"ACM Transactions on Sensor Networks"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Khelifi, N., Kammoun, W., Youssef, H.: Efficiency of the RPL repair mechanisms for low power and lossy networks. In: 2014 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 98\u2013103. IEEE (2014). \n                    https:\/\/doi.org\/10.1109\/IWCMC.2014.6906339","DOI":"10.1109\/IWCMC.2014.6906339"},{"key":"3_CR22","unstructured":"Kim, Y.J., Govindan, R., Karp, B., Shenker, S.: Geographic routing made practical. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, NSDI\u00a0\u201905, pp. 217\u2013230. USENIX Association (2005)"},{"key":"3_CR23","unstructured":"Ko, J., Eriksson, J., Tsiftes, N., Dawson-Haggerty, S., Terzis, A., Dunkels, A., Culler, D.: ContikiRPL and TinyRPL: happy together. In: Proceedings of the Workshop on Extending the Internet to Low power and Lossy Networks (IP+SN 2011) (2011)"},{"key":"3_CR24","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-30633-4_8","volume-title":"Dependable Networks and Services","author":"Kevin Dominik Korte","year":"2012","unstructured":"Korte, K.D., Sehgal, A., Sch\u00f6nw\u00e4lder, J.: A study of the RPL repair process using ContikiRPL. In: Dependable Networks and Services: 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012, Luxembourg, Luxembourg, 4\u20138 June 2012, Proceedings, pp. 50\u201361. Springer, Berlin, Heidelberg (2012). \n                    https:\/\/doi.org\/10.1007\/978-3-642-30633-4_8"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: Accurate and scalable simulation of entire TinyOS applications. In: SenSys\u00a0\u201903: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pp. 126\u2013137. ACM (2003). \n                    https:\/\/doi.org\/10.1145\/958491.958506","DOI":"10.1145\/958491.958506"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: An Operating System for Sensor Networks, pp. 115\u2013148. Springer, Berlin, Heidelberg (2005). \n                    https:\/\/doi.org\/10.1007\/3-540-27139-2_7","DOI":"10.1007\/3-540-27139-2_7"},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Levis, P., Clausen, T., Hui, J., Gnawali, O., Jo, K.: The Trickle algorithm. RFC 6206 (2011). \n                    https:\/\/doi.org\/10.17487\/RFC6206","DOI":"10.17487\/RFC6206"},{"key":"3_CR28","unstructured":"Mao, Y., Wang, F., Qiu, L., Lam, S.S., Smith, J.M.: S4: small state and small stretch routing protocol for large wireless sensor networks. In: Proceedings of the 4th USENIX Conference on Networked Systems Design & Implementation, NSDI\u00a0\u201907, pp. 8\u20138. USENIX Association, Berkeley, CA, USA (2007)"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Mohammad, M., Guo, X., Chan, M.C.: Oppcast: exploiting spatial and channel diversity for robust data collection in urban environments. In: 2016 15th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp. 19:1\u201319:12. IEEE (2016). \n                    https:\/\/doi.org\/10.1109\/IPSN.2016.7460681","DOI":"10.1109\/IPSN.2016.7460681"},{"key":"3_CR30","doi-asserted-by":"publisher","unstructured":"Narten, T., Nordmark, E., Simpson, W., Soliman, H.: Neighbor discovery for IP version 6 (IPv6). RFC 4861 (2007). \n                    https:\/\/doi.org\/10.17487\/RFC4861","DOI":"10.17487\/RFC4861"},{"key":"3_CR31","doi-asserted-by":"publisher","unstructured":"Osterlind, F., Dunkels, A., Eriksson, J., Finne, N., Voigt, T.: Cross-level sensor network simulation with COOJA. In: Proceedings of the 2006 31st IEEE Conference on Local Computer Networks, pp. 641\u2013648. IEEE (2006). \n                    https:\/\/doi.org\/10.1109\/LCN.2006.322172","DOI":"10.1109\/LCN.2006.322172"},{"key":"3_CR32","unstructured":"Radoi, I.E., Shenoy, A., Arvind, D.: Evaluation of routing protocols for Internet-enabled wireless sensor networks. In: ICWMC 2012: The Eighth International Conference on Wireless and Mobile Communications (2012)"},{"key":"3_CR33","doi-asserted-by":"publisher","unstructured":"Thubert, P.: Objective function zero for the routing protocol for low-power and lossy networks (RPL). RFC 6552 (2012). \n                    https:\/\/doi.org\/10.17487\/RFC6552","DOI":"10.17487\/RFC6552"},{"key":"3_CR34","doi-asserted-by":"publisher","unstructured":"Tripathi, J., de\u00a0Oliveira, J.C., Vasseur, J.P.: A performance evaluation study of RPL: routing protocol for low power and lossy networks. In: 2010 44th Annual Conference on Information Sciences and Systems (CISS), pp. 1\u20136. IEEE (2010). \n                    https:\/\/doi.org\/10.1109\/CISS.2010.5464820","DOI":"10.1109\/CISS.2010.5464820"},{"key":"3_CR35","doi-asserted-by":"publisher","unstructured":"Vasseur, J.P., Kim, M., Pister, K., Dejean, N., Barthel, D.: Routing metrics used for path calculation in low-power and lossy networks. RFC 6551 (2012). \n                    https:\/\/doi.org\/10.17487\/RFC6551","DOI":"10.17487\/RFC6551"},{"key":"3_CR36","doi-asserted-by":"publisher","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J.P., Alexander, R.: RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550 (2012). \n                    https:\/\/doi.org\/10.17487\/RFC6550","DOI":"10.17487\/RFC6550"}],"container-title":["Studies in Systems, Decision and Control","Mission-Oriented Sensor Networks and Systems: Art and Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91146-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T13:05:18Z","timestamp":1568811918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91146-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319911458","9783319911465"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91146-5_3","relation":{},"ISSN":["2198-4182","2198-4190"],"issn-type":[{"type":"print","value":"2198-4182"},{"type":"electronic","value":"2198-4190"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}