{"id":"https://openalex.org/W4411949781","doi":"https://doi.org/10.1109/iwcmc65282.2025.11059680","title":"Assessing Contiki-NG\u2019s Reliability for RPL-based Trickle Algorithm in IoT Networks","display_name":"Assessing Contiki-NG\u2019s Reliability for RPL-based Trickle Algorithm in IoT Networks","publication_year":2025,"publication_date":"2025-05-12","ids":{"openalex":"https://openalex.org/W4411949781","doi":"https://doi.org/10.1109/iwcmc65282.2025.11059680"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc65282.2025.11059680","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc65282.2025.11059680","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061121632","display_name":"Mohammed Mahyoub","orcid":"https://orcid.org/0000-0002-5728-1814"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mohammed Mahyoub","raw_affiliation_strings":["Carleton University,System and Computer Engineering Department,Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University,System and Computer Engineering Department,Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084063982","display_name":"Ashraf Mahmoud","orcid":"https://orcid.org/0000-0001-9043-2568"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ashraf Mahmoud","raw_affiliation_strings":["KFUPM,Computer Engineering Department,Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"KFUPM,Computer Engineering Department,Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061121632"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":1.5567,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.85532295,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"78"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9677000045776367,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6890183687210083},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6221224069595337},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6108198761940002},{"id":"https://openalex.org/keywords/trickle","display_name":"TRICKLE","score":0.5744075775146484},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.2710903584957123},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.05804133415222168},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.052008599042892456}],"concepts":[{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6890183687210083},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6221224069595337},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6108198761940002},{"id":"https://openalex.org/C2779317670","wikidata":"https://www.wikidata.org/wiki/Q7671345","display_name":"TRICKLE","level":2,"score":0.5744075775146484},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.2710903584957123},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.05804133415222168},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.052008599042892456},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc65282.2025.11059680","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc65282.2025.11059680","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1995973276","https://openalex.org/W2096059127","https://openalex.org/W2135912631","https://openalex.org/W2150611047","https://openalex.org/W2325877089","https://openalex.org/W2777551158","https://openalex.org/W2791258732","https://openalex.org/W2795014448","https://openalex.org/W3097979548","https://openalex.org/W3123679444","https://openalex.org/W3173901672","https://openalex.org/W4225147756","https://openalex.org/W4289912948","https://openalex.org/W4294863976","https://openalex.org/W4312349588","https://openalex.org/W4389897662","https://openalex.org/W4391656869"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2901370662","https://openalex.org/W2982411806","https://openalex.org/W2386960216","https://openalex.org/W4255868170","https://openalex.org/W2032940098","https://openalex.org/W4289912948","https://openalex.org/W2591403465"],"abstract_inverted_index":{"The":[0,131],"IPv6":[1],"Routing":[2],"Protocol":[3],"for":[4,19,78,128,176],"LLNs":[5],"(RPL)":[6],"is":[7,31],"fundamental":[8],"to":[9,37,52,95,180],"the":[10,26,32,39,50,62,65,68,83,97,100,104,134,141,146,155,163,166,181],"Internet":[11],"of":[12,28,41,64,71,85,91,99,103,113,136,150,157,165,184],"Things":[13],"(IoT),":[14],"providing":[15],"essential":[16],"routing":[17],"capabilities":[18],"devices":[20],"operating":[21],"in":[22,144,170],"constrained":[23],"environments.":[24],"At":[25],"heart":[27],"RPL\u2019s":[29],"efficiency":[30],"Trickle":[33],"Algorithm":[34],"(TA),":[35],"designed":[36],"optimize":[38],"dissemination":[40],"control":[42],"messages":[43],"across":[44],"networks,":[45],"balancing":[46],"timely":[47],"updates":[48],"with":[49,88],"imperative":[51],"conserve":[53],"bandwidth":[54],"and":[55,118,139,148],"energy.":[56],"This":[57],"paper":[58],"focuses":[59],"on":[60],"validating":[61],"implementation":[63,138],"TA":[66,105],"within":[67],"Latest":[69],"version":[70],"Contiki-OS":[72],"(Contiki-NG),":[73],"a":[74,110,125,174],"leading":[75],"experimental":[76],"platform":[77],"IoT":[79,129,151,167,185],"networks.":[80,186],"By":[81,153],"comparing":[82],"results":[84],"theoretical":[86,116],"models":[87],"practical":[89],"simulations":[90],"Contiki-NG,":[92],"we":[93],"aim":[94],"determine":[96],"reliability":[98,156],"Contiki-NG":[101,137,172],"representation":[102],"behaviour.":[106],"Our":[107],"analysis":[108],"reveals":[109],"high":[111],"degree":[112],"agreement":[114],"between":[115],"expectations":[117],"simulated":[119],"results,":[120],"underscoring":[121],"Contiki-NG\u2019s":[122],"robustness":[123],"as":[124,173],"simulation":[126],"tool":[127],"research.":[130],"findings":[132],"affirm":[133],"precision":[135],"highlight":[140],"platform\u2019s":[142],"value":[143],"facilitating":[145],"development":[147],"testing":[149],"protocols.":[152],"ensuring":[154],"these":[158],"simulations,":[159],"our":[160],"work":[161],"strengthens":[162],"confidence":[164],"research":[168],"community":[169],"using":[171],"foundation":[175],"exploring":[177],"innovative":[178],"solutions":[179],"unique":[182],"challenges":[183]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
