Review Article
Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends
Table 4
Routing protocols in IoT domain: features and characteristics.
| Routing protocol name | RPL | P2P-RPL | CORPL | CARP | LOADng |
| Strategy | Proactive | Reactive | Proactive | Reactive | Reactive |
| Traffic type | MP2P, P2P & P2MP | P2P | MP2P, P2P & P2MP | MP2P, P2P & P2MP | P2P |
| Mechanism | Energy-aware metrics & multipath routing | Energy-aware metrics | Energy-aware metrics & multipath routing | Energy-aware metrics & multipath routing | Energy-aware metrics |
| Algorithm | (i) Distance vector (ii) Source routing | (i) Distance vector (ii) Source routing | Distance vector | Link state | Distance Vector |
| IPv6 support | Yes | Yes | Yes | Yes | Yes |
| loT Routing challenges met | (i) Local and global repairs (ii) Energy usage low (iii) Mobility (iv) High scalability (v) Low memory usage | (i) Local and global repairs (ii) Energy usage low (iii) Mobility (iv) High scalability | (i) Data management (ii) Server technologies | (i) Data management (ii) Storage management | (i) Energy usage low (ii) Mobility (iii) High scalability (iv) Low memory usage |
| Main features | (i) Loop detection and avoidance (ii) Self-configuration (iii) Timer management | Discovers the best-quality route for any source-destination pair | Opportunistic forwarding approach based on RPL | (i) Link quality selection for packet forwarding (ii) High packet delivery ratio for increasing traffic | (i) A lightweight variation of AODV (ii) Suitable for a more general traffic pattern |
| Disadvantages | No security | (i) No security (ii) High memory usage | (i) No security (ii) No storage management | (i) No security (ii) No server technologies (iii) No reusability of previously collected data | (i) No security (ii) No local repair (iii) High delay in the route discovery |
|
|