{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:32:28Z","timestamp":1775579548951,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811358258","type":"print"},{"value":"9789811358265","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_49","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"628-639","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoT"],"prefix":"10.1007","author":[{"given":"A. S. Joseph","family":"Charles","sequence":"first","affiliation":[]},{"given":"Kalavathi","family":"Palanisamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"49_CR1","first-page":"29","volume":"4","author":"TH Bharat","year":"2017","unstructured":"Bharat, T.H.: Network routing protocols in IoT. Int. J. Adv. Electron. Comput. Sci. 4, 29\u201333 (2017)","journal-title":"Int. J. Adv. Electron. Comput. Sci."},{"key":"49_CR2","unstructured":"Salman, T., Jain, R.: Networking Protocols for Internet of Things, pp. 1\u201328 (2013)"},{"key":"49_CR3","unstructured":"Atalay, E.W., Anastasi, P.G.: Design and Analysis of Routing Protocol for IPv6 Wireless Sensor Networks (2015)"},{"key":"49_CR4","doi-asserted-by":"crossref","unstructured":"Xin, H.-M., Yang, K.: Routing protocols analysis for Internet of Things. In: 2015 2nd International Conference on Information Science and Control Engineering, no. i, pp. 447\u2013450 (2015)","DOI":"10.1109\/ICISCE.2015.104"},{"key":"49_CR5","unstructured":"Winter, T., et al.: RPL: IPv6 routing protocol for low-power and lossy networks. IETF RFC 6550 (2012)"},{"key":"49_CR6","unstructured":"Levis, P., Patel, N., Culler, D., Shenker, S.: Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks. In: Proceedings of the First Symposium on Networked Systems Design and Implementation, pp. 15\u201328 (2004)"},{"issue":"14","key":"49_CR7","doi-asserted-by":"publisher","first-page":"3163","DOI":"10.1016\/j.comnet.2012.06.016","volume":"56","author":"O Gaddour","year":"2012","unstructured":"Gaddour, O., Koub\u00e2a, A.: RPL in a nutshell: a survey. Comput. Netw. 56(14), 3163\u20133178 (2012)","journal-title":"Comput. Netw."},{"key":"49_CR8","unstructured":"Vasseur, J.P., Kim, M., Pister, K., Dejean, N., Barthe, D.: Routing metrics used for path calculation in low-power and lossy networks. RFC 6551, Internet Engineering Task Force RFC 6551, March 2012"},{"key":"49_CR9","unstructured":"Al-dubai, A.Y., Altwassi, H., Qasem, M., Yassein, M.B., Al-dubai, A.: Performance evaluation of RPL objective functions performance evaluation of RPL objective functions. In: International Workshop on Internet of Things Smart Spaces: Applications, Challenges and Future Trends in conjunction with 14th IEEE International Conference on Ubiquitous Computing and Communication (IUCC 2015), Liverpool, UK, September 2015"},{"key":"49_CR10","unstructured":"Ali, H.: A performance evaluation of RPL in Contiki, pp. 1\u201391. Master Thesis (2012)"},{"key":"49_CR11","unstructured":"Becker, M.: Evaluation of an algorithm used in routing and service discovery protocols of wireless sensor networks\u2009\u2212\u2009the Trickle algorithm IETF protocol stack for wireless sensor networks routing protocol for low power and lossy networks, October 2012"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Djamaa, B., Richardson, M., Djamaa, B., Richardson, M.: The Trickle Algorithm: issues and solutions the Trickle algorithm: issues and solutions, January 2015","DOI":"10.1109\/LCOMM.2015.2408339"},{"key":"49_CR13","doi-asserted-by":"crossref","unstructured":"Ghaleb, B., Al-dubai, A., Ekonomou, E.: E-Trickle: enhanced Trickle algorithm for low-power and lossy networks. In: Proceedings of the 15th IEEE International Conference on Computing and Information Technology (CIT 2015), 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, pp. 1123\u20131129 (2015)","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.168"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Ghaleb, B., Al-dubai, A., Ekonomou, E., Paechter, B., Qasem, M.: Trickle-Plus: elastic Trickle algorithm for low-power networks and Internet of Things, no. MEIoT, pp. 1\u20136 (2016)","DOI":"10.1109\/WCNCW.2016.7552683"},{"issue":"5","key":"49_CR15","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/LCOMM.2015.2408339","volume":"19","author":"B Djamaa","year":"2015","unstructured":"Djamaa, B., Richardson, M.: Optimizing the Trickle algorithm. IEEE Commun. Lett. 19(5), 819\u2013822 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"49_CR16","doi-asserted-by":"publisher","first-page":"1846","DOI":"10.1109\/ACCESS.2017.2654356","volume":"5","author":"Muhammad Asif","year":"2017","unstructured":"Asif, M., Khan, S., Ahmad, R., Sohail, M., Singh, D.: Quality of service of routing protocols in wireless sensor networks: a review. IEEE Access 5(c), 1846\u20131871 (2017)","journal-title":"IEEE Access"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Vucinic, M., Tourancheau, B., Duda, A.: Performance comparison of the RPL and LOADng routing protocols in a home automation scenario performance comparison of the RPL and LOADng routing protocols in a home automation scenario, pp. 1974\u20131979 (2014)","DOI":"10.1109\/WCNC.2013.6554867"},{"key":"49_CR18","doi-asserted-by":"crossref","unstructured":"Hendrawan, I.N.R.: Zolertia Z1 energy usage simulation with Cooja simulator, pp. 147\u2013152 (2017)","DOI":"10.1109\/ICICOS.2017.8276353"},{"key":"49_CR19","unstructured":"Mehmood, T.: COOJA network simulator: exploring the infinite possible ways to compute the performance metrics of IOT based smart devices to understand the working of IOT based compression & routing protocols (2017)"},{"key":"49_CR20","doi-asserted-by":"crossref","unstructured":"Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15.4-based networks, pp. 5\u201320. RFC 6282 (2011)","DOI":"10.17487\/rfc6282"},{"key":"49_CR21","doi-asserted-by":"crossref","unstructured":"Pradeska, N., Najib, W., Kusumawardani, S.S.: Performance analysis of objective function MRHOF and OF0 in routing protocol RPL IPV6 over low power wireless personal area networks (6LoWPAN). In: Performance Analysis of Objective Function MRHOF and OF0 in Routing Protocol RPL IPV6 Over Low Power Wireless Personal Area Net, October 2016, pp. 0\u20135 (2016)","DOI":"10.1109\/ICITEED.2016.7863270"}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:53:16Z","timestamp":1558396396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_49","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}