{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:51:58Z","timestamp":1775541118260,"version":"3.50.1"},"reference-count":162,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Research Funds of Kyungdong University, in 2021"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/access.2026.3678365","type":"journal-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T19:52:07Z","timestamp":1774641127000},"page":"49000-49031","source":"Crossref","is-referenced-by-count":0,"title":["Trickle Algorithm Implementation in Routing Protocol for LLNs: A Survey"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2058-2311","authenticated-orcid":false,"given":"Khadak Singh","family":"Bhandari","sequence":"first","affiliation":[{"name":"Smart Computing Department, Kyungdong University, Goseong, Gangwon, South Korea"}]},{"given":"Ju Phil","family":"Cho","sequence":"additional","affiliation":[{"name":"Department of Integrated IT and Communication Engineering, Kunsan National University, Kunsan, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5336-5252","authenticated-orcid":false,"given":"Zubaer Ibna","family":"Mannan","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, East West University, Dhaka, Bangladesh"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2879189"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/sym12101674"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3555308"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3430368"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2973314"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3250849"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2011.5741163"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s22062087"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100721"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4919"},{"key":"ref11","volume-title":"Transmission of IPv6 Packets Over IEEE 802.15.4 Networks","author":"Montenegro","year":"4944"},{"key":"ref12","volume-title":"Compression Format for IPv6 Datagrams Over IEEE 802.15.4-based Networks","author":"Hui","year":"2011"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6775","volume-title":"Neighbor Discovery Optimization for IPv6 Over Low-power Wireless Personal Area Networks (6LoWPANs)","author":"Shelby","year":"2012"},{"key":"ref14","volume-title":"Routing Over Low Power and Lossy Networks (ROLL)","year":"2025"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5826","volume-title":"Home Automation Routing Requirements in Low-power and Lossy Networks","author":"Brandt","year":"2010"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5673","volume-title":"Industrial Routing Requirements in Low-power and Lossy Networks","author":"Pister","year":"2009"},{"key":"ref17","doi-asserted-by":"crossref","volume-title":"Building Automation Routing Requirements in Low-power and Lossy Networks.","author":"Martocci","DOI":"10.17487\/rfc5867"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5548","volume-title":"Routing Requirements for Urban Low-power and Lossy Networks","author":"Dohler","year":"2009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6550"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103476"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6551","volume-title":"Routing Metrics Used for Path Calculation in Low Power and Lossy Networks","author":"Vasseur","year":"2012"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.102001"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6552","volume-title":"Objective Function Zero for the Routing Protocol for Low-power and Lossy Networks (RPL)","author":"Thubert","year":"2012"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6719","volume-title":"The Minimum Rank With Hysteresis Objective Function","author":"Gnawali","year":"2012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.082710.00092"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2016.1600397cm"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/su12187358"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijin.2024.09.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3011968"},{"key":"ref30","volume-title":"The Trickle Algorithm","author":"Levis","year":"2012"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2755980"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.24138\/jcomss-2024-0094"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4605095"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2874356"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/network4010001"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3022793"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100741"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.3390\/s19112567"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3732776"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10907-y"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/794326"},{"issue":"3","key":"ref42","first-page":"459","article-title":"A taxonomy of attacks in RPL-based Internet of Things","volume":"18","author":"Mayzaud","year":"2016","journal-title":"Int. J. Network Secur."},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110996"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102096"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10192365"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8414503"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3494524"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2751617"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1504\/ijwmc.2023.131315"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5167"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2019.2910881"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.06.016"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.045"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2022.3159241"},{"key":"ref55","first-page":"37","article-title":"Trickle: A self-regulating algorithm for code propagation and maintenance in wireless sensor networks","volume-title":"Proc. 1st USENIX\/ACM Symp. Networked Syst. Design Implement.","volume":"25","author":"Levis"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1364782.1364804"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.09.023"},{"key":"ref58","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7731","volume-title":"Multicast Protocol for Low-Power and Lossy Networks (MPL)","author":"Hui","year":"2016"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2529988"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27139-2_7"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/lcn.2004.38"},{"key":"ref62","article-title":"The trickle algorithm: issues and solutions","author":"Djamaa","year":"2015"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15582-1_12"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2591981"},{"key":"ref65","doi-asserted-by":"crossref","DOI":"10.17487\/rfc4443","volume-title":"Internet Control Message Protocol (ICMPV6) for the Internet Protocol Version 6 (IPV6) Specification","author":"Conta","year":"2006"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3196693"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/SustainIT.2013.6685187"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2017.2787584"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.168"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2018.8615408"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254531"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2015.2408339"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3040160"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.5220\/0007780004300437"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2018.81814"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/icemis.2016.7745314"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2016.7552683"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.024"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2995794"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108241"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.3390\/su141912417"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v11i3.pp2569-2576"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06792-2"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3084217"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/wispnet.2017.8299829"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2650318"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/wf-iot.2015.7389098"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2862364"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3080735"},{"key":"ref90","volume-title":"Minimal Ipv6 Over the Tsch Mode of Ieee 802.15","author":"Vilajosana"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.15"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3390\/s140711993"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/wowmom.2015.7158134"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2015.7158155"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s11134-015-9438-x"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2012.111612.121232"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/pimrc.2015.7343618"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30422-4_10"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2022.101089"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/meco49872.2020.9134251"},{"key":"ref101","first-page":"59","article-title":"Synchronizing trickle intervals","volume-title":"Proc. 11th Eur. Conf. Wireless Sensor Netw. (EWSN)","author":"Eriksson"},{"key":"ref102","volume-title":"Modeling and analyzing the trickle algorithm","author":"Meyfroyt","year":"2013"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-5826-5_49"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-9618-7_16"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3430380"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3265717"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.3390\/s18103556"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2023.3341426"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103026"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.11.015"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2018.2828835"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2011.61"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-012-0419-2"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-008-0146-x"},{"key":"ref115","article-title":"Multicast forwarding using trickle: Draft-ietf-roll-trickle-mcast-01","volume-title":"Proc. Internet-Draft IETF","author":"Hui"},{"key":"ref116","article-title":"Multicast and flooding in ad hoc networks","author":"Colin de Verdiere","year":"2014"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/iucc-cit-dsci-smartcns55181.2021.00049"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/icct.2013.6820439"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1250-5"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.10.004"},{"key":"ref121","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7731","volume-title":"Multicast Protocol for Low-power and Lossy Networks (MPL)","author":"Hui","year":"2016"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11040625"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10121484"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ictc52510.2021.9621062"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.3390\/s20154158"},{"key":"ref126","doi-asserted-by":"crossref","DOI":"10.17487\/rfc6997","volume-title":"Reactive Discovery of Point-to-point Routes in Low-power and Lossy Networks","author":"Goyal","year":"2013"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110105"},{"issue":"5","key":"ref128","article-title":"F-RPL: An optimized RPL routing protocol","volume":"11","author":"Hu","year":"2017","journal-title":"ICIC Express Letters, ICIC Int."},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01181-w"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.01.020"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/904308"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.10.009"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3088346"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/iscc.2014.6912471"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1504\/ijahuc.2022.123526"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.042"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3426020.3426138"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3571156"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108771"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8091023"},{"key":"ref141","volume-title":"The IoT Lab","year":"2025"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/mass.2011.80"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2872443"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-019-00861-2"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12071639"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/comsnets.2013.6465581"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.3390\/s21113904"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1016\/0140-3664(95)93446-b"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.3390\/s20123508"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.3390\/s18113838"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100314"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12183834"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/wons.2017.7888753"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.3390\/s17040899"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2018.2794762"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102491"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2016.2585107"},{"key":"ref158","volume-title":"Optimization of parent-node selection in RPL-based networks","author":"Hou","year":"2017"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-023-01075-5"},{"key":"ref160","article-title":"Mobility support in fog-assisted IoT networks","author":"Rabet","year":"2022"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/icoin59985.2024.10572177"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2024.3386468"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/11323511\/11456930.pdf?arnumber=11456930","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T04:57:06Z","timestamp":1775537826000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11456930\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":162,"URL":"https:\/\/doi.org\/10.1109\/access.2026.3678365","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}