Shreyas 2021
Shreyas 2021
Shreyas 2021
https://doi.org/10.1007/s40860-021-00134-5
ORIGINAL ARTICLE
Abstract
Internet of Things is an increasing technology that has recently seen growth in the field of research. In a 6LoWPAN network,
congestion at nodes is caused by huge network traffic, which reduces the overall performance, as well as the quality of routing
metrics. Congestion in IoT network affects various performance measures such as energy inefficiency, decrease in throughput
and loss of data packets. Therefore, in this paper, congestion avoidance using fuzzy logic algorithm has been proposed to
avoid congestion by selecting the best parent in a tree-structured IoT network to find the optimal routing path. Fuzzy weighted
sum model is used to model the problem of parent selection into multi-attribute decision making based problem. Routing
metrics used are buffer occupancy, expected transmission count and routing metric (RtMetric). The objective function selects,
the parent based on the combination of these routing metrics. The proposed algorithm’s dynamic nature can identify the
congestion and then selects the non-congested path by selecting the best parent and thus creates a best routing path for the
packets. The algorithm has been implemented and simulated on Contiki OS and a comparison of performance is carried out
against optimization-based hybrid congestion alleviation (OHCA) and queue utilization-based RPL (QU-RPL) algorithms.
Simulation results indicate that the proposed algorithm has 15% more throughput, 10% more goodput, 4.5% less packets loss,
10.1% less energy use, and 19% less one-way delay over OHCA and QU-RPL algorithms.
Keywords Fuzzy logic (FL) · Internet of things (IoT) · Multi attribute decision making (MADM) · Optimization based hybrid
congestion alleviation (OHCA) · Soft computing (SC)
123
Journal of Reliable Intelligent Environments
ets generated by the fire alarm will not reach the sink node 2 Preliminaries
and hence action cannot be taken immediately. Thus, it is
required to use the optimistic measures of traffic engineering 2.1 Definitions
to address congestion in an IoT network.
The structure of a network is determined by it’s objec- 1. Network congestion: Network congestion occurs when a
tive function in routing protocol for low-power and lossy network route becomes completely occupied. It is a situa-
networks (RPL) [7]. It is separated from the network’s tion when there is overflowing traffic on a network route,
key protocol requirements and hence, allows the objec- leading to the loss of data packets. When large number of
tive function to easily design and implement the network data packets attempt to travel through a specific network
demands of the application. Objective function usually incor- route, the outcome is network congestion.
porates multiple routing metrics to generate a rank which
(a) Congestion alleviation: Reducing the network con-
is then broadcasted via control messages. The proposed
gestion to increase the quality of service is called
work combines three routing metrics and uses a multi-
congestion alleviation.
criteria decision-making method. The proposed algorithm
(b) Congestion control: These are techniques that help a
chooses a non-congested path from all available paths and
network recover from a congested state.
subsequently, settles the issue of parent selection during con-
(c) Congestion avoidance: These are techniques that help
gestion. A rank value is generated to select the parent with
a network to avoid getting into the congested state.
the combination of three metrics i.e. buffer occupancy (BO),
expected transmission count (ETX) and RtMetric. Congestion avoidance is a prevention mechanism while
One of the popular soft computing techniques is the fuzzy congestion control is an improvement mechanism.
logic which is used for representing fuzzy data, i.e the data 2. RPL: Routing protocol for low-power and lossy networks
which is not precise. It is a technique that closely represents (LLN) or RPL, is a mechanism to distribute data over a
the real world and can propose diverse non-direct control dynamically formed topology. It is a distance-vector rout-
arrangement. Fuzzy logic minimizes complex mathematical ing protocol which is extremely flexible around network
modeling and provides the ability to deal with greater inac- conditions and can recommend backup routes whenever
curacy and uncertainty [8]. Consequently, the utilization of default routes are unavailable. It supports different sorts
fuzzy logic in the proposed work upgrades the dynamic and of traffic flows such as point-to-multipoint, point-to-point
improves network performance. The proposed work con- and multipoint-to-point.
siders multiple parents while selecting the best parent. In 3. QU-RPL: In Queue Utilization-based Routing Protocol
doing so it takes different metrics which are then multiplied for Low-Power and Lossy Networks, every single node
with their respective weights and then added to create a rank. chooses its parent after considering the queue utilization
These ranks are generated for all possible parents and then the of its neighbouring nodes and their hop distances to the
one with least positive value is selected, hence the proposed LLN border router [9].
work normalize the whole parent set between the values 1– 4. OHCA: Optimization-based hybrid congestion allevia-
10,000 and compare them to find the best parent. This work tion is a hybrid solution achieved from the combination of
creates a fuzzy set from the ranks of the available parents in traffic as well as resource control strategies. It exerts the
the network and then determine the best parent. positives of each approach to utilize network resources
The main contributions included in the work are: [10].
5. Directed acyclic graph (DAG): It is directed and has no
1. Best parent is selected based on a composite routing met- cycles among its edges, i.e one cannot traverse the whole
ric, which is generated from different routing metrics i.e. graph starting at one edge. The graph is topological sort-
ETX, BO and RtMetric. ing, where each node is in a certain order.
2. The proposed work achieves network efficiency with 6. Destination oriented directed acyclic graph (DODAG):
complexity reduction embedded in the RPL protocol. The This a type of DAG, which is rooted at the sink.
proposed algorithm has a complexity of O(n) where n is 7. Sink node: This is the root node. It provides connectivity
the number of parents. to other nodes.
3. The proposed work selects the optimal path for routing by 8. Leaf node: These are end nodes, i.e they do not participate
applying fuzzy decision-making model. In the proposed in routing.
work the optimal path always represents a least congested 9. DODAG information object (DIO) message: This mes-
path. sage is fundamental in setting up and modifying the
4. The performance of the proposed CAFOR algorithm is DODAG. The building of a new DODAG is always
investigated by comparing against existing OHCA and initiated from the root and then continued from the inter-
QU-RPL algorithms. mediate node to the end node. The DIO is always the first
123
Journal of Reliable Intelligent Environments
protocol message that each node sends to all its neigh- Kashoash et al. [13] investigated the problem of con-
bouring nodes immediately after start-up. gestion alleviation in 6LowPAN network and proposed
10. Destination advertisement object (DAO) message: This congestion control framework based on game theory. In
message enables support of down traffic and propagates the proposed method, the non-cooperative framework is
destination information along the DODAG. formulated to solve the congestion problem. The Karush–
11. DODAG information solicitation (DIS) message: It is uti- Kulin–Tucker (KKT) conditions and Lagrange multipliers
lized to acknowledge or demand a DIO from the RPL are used to compute optimal game solution. The game the-
node. A node may utilize DIS to scan its neighbourhood ory algorithm is employed to set the application preference
for nearby DODAGs. and node preference to support requirements of IoT applica-
tion. The advised approach is implemented and tested using
Contiki 3.0 through cooja simulator. The results compared
2.2 Assumptions against duty cycle aware congestion and gripping technique
show considerably better outcomes in terms of end to end
Assumption 1: We assume that there is one case of delay and packet loss ratio.
Directed Acyclic Graph i.e. the network comprises of To alleviate congestion in low power and lossy network,
only one DODAG which changes based on the algorithm. Bhandari et al. [14] proposed congestion aware routing proto-
Assumption 2: The energy is initially assumed to be col as a solution. The proposed method combines the multiple
1Joule and the energy used for network formation is not routing matrix and selects a non-congested alternative parent
considered. node by employing multi-criteria decision-making tech-
nique. The alternative parent is selected in the propound work
to control the congestion in the 6LowPAN network. Further,
the proposed work adopts congestion detection mechanism
3 Related works to prevent the transient congestion situation of the affected
nodes within the network. The proposed work has been
Congestion control algorithms play an important part in implemented in Contiki 2.7 and simulation was carried out in
various IoT applications. There have been various works cooja simulator. The obtained results shows better outcome
attempted to identify and control IoT congestion. for throughput, packet delivery ratio and an end to end delay
Kim et al. [11] investigated the problem of congestion performance metrics.
and load balancing for IoT network. They have proposed To mitigate a congestion in 6LoWPAN networks Hellaoui
lightweight queue-based RPL method to attain the effective et al. [15] proposed congestion control technique based on
load balancing. The proposed method allows each node to bird flocking algorithm. The proposed algorithm employs a
consider its neighbours queue utilization and border routers swarm-based bird flocking algorithm to control and direct
hop distance to choose its parent node. The proposed method the packets flow through multipath to mitigate the prevail-
plays a crucial role in decreasing queue loss and increasing ing congestion situation. The proposed technique uses the
the packet delivery ratio. The proposed QU-RPL method has buffer occupancy method to identify the congestion node in
been implemented in a testbed of a multihop LLN over IEEE the network. It further suggests resource control mechanism
802.15.4. The results compared with traditional tiny RPL to avoid congestion by choosing a non-congested node to
indicates a higher end to end packet delivery ratio perfor- transfer the packet to the sink node. The proposed work has
mance by alleviating packet loss at queues. been implemented in Contiki and simulation carried out in
Sunitha et al. [12] put forward an energy-aware routing cooja simulation tool shows better outcome as far as of packet
technique to mitigate congestion in sensor networks. The delivery ratio, packet loss ratio and data latency compared to
proposed technique consists of three phases to overcome existing protocols.
extreme packet loss which results in severe energy consump- Musaddiq et al. [16] investigated the congestion problem
tion. In the first phase, the network region is classified into of heterogeneous IoT network and proposed queue and work-
various similar-sized zones. In the next phase, a node is com- load condition (QW-RPL) based protocol as a solution. The
pared against neighbour nodes based on minimum distance proposed work intends to maintain preferable overall per-
and minimum traffic in the zone. The node with minimum formance by selecting a reliable path for communication.
distance and traffic will be selected as a zone leader. The They proposed a new objective function in which it con-
zone leader will receive and forward the packets to neigh- siders the node’s congestion status using packet queue and
bour zone leaders. In the third phase, the zone leaders are link workload to identify congestion. The proposed QW-
classified as congested and non-congested zones. The result RPL model utilizes periodic workload information and the
obtained from network simulator 2 shows better outcomes in weighted queue to allocate the load effectively. The proposed
terms of end to end delay and packet delivery ratio. work is examined both in varying and fixed heterogeneous
123
Journal of Reliable Intelligent Environments
traffic patterns. The proposed work has been implemented 1. To avoid congestion using a proactive algorithm
in Contiki OS-and cooja simulator. The obtained simulation 2. To maintain the network in a steady state
result indicates the improved performance of QW-RPL in 3. To increase the throughput.
terms of jitter, delay and packet reception ratio. 4. To reduce data loss and energy consumption.
Chakravarthi et al. [17] proposed a new method to 5. To find a non-congested routing path.
detect and alleviate congestion for senor networks. The pro-
posed method initially detects congestion by considering a The proposed algorithm always keeps the network in the
correlation among packet inter-service time and packet inter- best possible state and hence reduces the chance of network
arrival time. The detected congestion is informed by implicit congestion rather than removing it after it happens. The traffic
congestion notification signalling. The proposed work fur- is always routed via the best possible path and hence it keeps
ther controls the transmission rate by using a fuzzy logic the network in steady state i.e. no one link/path is overloaded.
controller to reduce congestion. The proposed work has
been implemented in network simulator 2. The simulation
outcome shows better performance in terms of packet deliv- 5 6LoWPAN network setup using RPL
ery ratio and delays in comparison with existing baseline
approaches. Network topology among 6LoWPAN networks is created
The paper Kashoash et al. [10] proposed a congestion con- using RPL routing protocol i.e the formation of DODAG is
trol algorithm called OHCA which combines the benefits of done by RPL. In this network, there are three kinds of nodes
both resource control and traffic control methods. The pro- that are determined:
posed algorithm uses a MADM technique to apply resource
control strategy. If the resource control technique cannot 1. Leaf nodes: These are at the edge of the network, i.e they
be applied, then the traffic control technique is used. The are terminating nodes and do not participate in routing of
proposed method uses a gray relational analysis (GRA) tech- data packets from other nodes.
nique for the selection of parents when congestion occurs and 2. Intermediate nodes: These are nodes that are intermedi-
forwards packets through non-congested parents. The pro- atory to leaf and sink nodes. They lie in between the
posed work has been implemented in Contiki and simulation network. They simply forward both theirs as well as
carried out in cooja simulation tool. However, the proposed other’s data to sink nodes.
method introduces substantial overheads in the network. 3. Sink nodes: These can be viewed as the root of the
network. Sink nodes connect the whole system to the
internet. They are responsible for providing connectivity
4 Problem description to different networks.
The standard existing routing protocols of 6LowPAN net- Directed acyclic graph method is the foundation of con-
works is based on objective functions and there are two major structing the network topology. The selection of a parent node
objective functions, objective function 0 (OF0) and mini- in DAG by a neighbour node depends on the rank of the objec-
mum rank with hysteresis (MRHOF). Both of these OFs have tive function. Multiple routing metrics are combined to form
major setbacks for example both of them always consider a an objective function. The nodes are organized as DODAG
single parameter while deciding the rank. OF0 decides the using RPL and network topology is created by DODAG
rank based on the number of hop counts to the destination where sink node will act as a root of DODAG. The DODAG’s
node and hence doesn’t care about the traffic in the network. root i.e. sink keeps broadcasting a control message known as
MRHOF is comparatively newer than OF0 and works with DODAG Information Object message at regular intervals to
additive metrics along a route. MRHOF depends on metric all nodes within the network. The DODAG is formed when
which is present in the metric container of DIO message, the intermediate node receives a DODAG Information Object
if it is set to minimum-latency then it finds the route with message and sends a reply to the sink node with Destination
minimum latency otherwise it defaults to minimum-ETX. Advertisement Object. The intermediate nodes then broad-
MRHOF can only work with additive metrics and hence can’t cast the DIO message until it has reached all leaf nodes. A
grasp the condition of the network efficiently. As we can see node may receive DIO messages from multiple neighbours
that both of these OFs can work with a single routing metric but the best parent is chosen dependent on rank. The parent
and while doing so they can’t effectively avoid congestion. node is the node with the best rank. On the off chance that a
Hence, it is required to propose a method over objective node has not got a DIO message within the time limit, then
function MRHOF to avoid congestion by finding the opti- DODAG information solicitation message is sent to all of its
mal routing path in 6LoWPAN networks The objectives of neighbour upon the request of a DIO message, as shown in
the proposed work are: Fig. 1.
123
Journal of Reliable Intelligent Environments
123
Journal of Reliable Intelligent Environments
2. RtMetric: There are multiple paths available between two forwarded at a steady rate. This buffer is limited to some
nodes in a network. Every node make it’s own rout- packets. When congestion occurs at a node, the buffer
ing choices which lead to different congestion levels overflows and the incoming packets are dropped. This
in the network i.e. one path might get more loaded in parameter helps to indicate the level of congestion at a
terms of traffic than the other. The RPL decides the best node in the network. The working flow of the proposed
route among the paths that are available. A route metric model is shown in Fig. 4.
is a value associated with each route. Routing protocol
chooses the path with the best metric available. RtMet-
6.1 Fuzzy weighted sum model (FWSM)
ric allows routing protocol to select a path between two
nodes. The choice of RtMetric is affected by its proper-
The weighted sum model (WSM) is applied to a single-
ties. Routing protocol can select a path with minimum
dimensional value set, which is a multi-attribute decision-
hop-count. It is a source of information about the rank of
making approach. Decision-makers are used with the prob-
a node in the network which is calculated based on vari-
lems when there are multiple but conflicting ideas and these
ous parameters. It helps to choose the preferred parent in
problems can vary from, being as simple as to buy which car
between available neighbors using rank.
or smartphone to selecting the best parent in the network.
3. Buffer Occupancy (BO): A node comprises of many
One such model is when there are Y alternative options and
physical things and one of them is buffer, buffer helps in
X parameters then the average weighted sum model can be
storage and forwarding of packets during transmission.
calculated as:
Buffer is given since each node has distinctive arrival and
transmission rates. BO is the total number of packets that
are stored in the node’s buffer waiting to be retransmit-
X
AW S M = W j ai j , for i = 1, 2, 3, . . . , Y (2)
ted. It helps in controlling the rate of the packets being j=1
123
Journal of Reliable Intelligent Environments
In Eq. (2), A W S M is the rank that is calculated for deci- and their correlation numbers were lower as compared with
sion making between the parents, ai j represents the various the other parameters, hence they were best fit to determine
parameters (i.e. ETX, RtMetric and BO) and W represents the condition of a node at any given point of time that is why
the weight that each of these parameters has. The rank is cal- we selected these three parameters. There is a weight which
culated in such a manner that lower the value better the parent is associated with each routing metric and can be represented
is for transmission. Equation (2) can also be represented as a by a weight vector W = {w j , j = 1, 2, 3}. The process of
simple matrix multiplication where the base value ai j is mul- multi-attribute decision-making for parent selection problem
tiplied with jth value of the weight matrix. Let us assume that can be demonstrated in terms of a decision matrix, where the
P = {Pi , i = 1, 2, 3, . . . , n} is a list of candidates i.e. par- decision matrix (N × 3) is a matrix whose elements repre-
ents for a given node and Q = {Q j , j = 1, 2, 3} be the list sents the value of jth routing metric for the ith parent for
of routing metrics for each candidate. Routing metrics taken all i = (1, 2, 3, . . . .N ) and j = (1, 2 and 3). Therefore
into consideration are ETX, BO and RtMetric. The reason for decision matrix M can be written as:
selecting only these parameters is that they are very diverse
123
Journal of Reliable Intelligent Environments
⎡ ⎤
Q 1 (P1 ) Q 2 (P1 ) Q 3 (P1 ) 3. Processing the values to determine a rank for each alter-
⎢ Q 1 (P2 ) Q 2 (P2 ) Q 3 (P2 )⎥ native: To get WSM value of each parent the decision
⎢ ⎥
⎢ . . . ⎥
M =⎢
⎢ .
⎥ (3) matrix, M is multiplied with weight vector W as shown
⎢ . . ⎥ ⎥ in Eq. (10).
⎣ . . . ⎦
Q 1 (Pn ) Q 2 (Pn ) Q 3 (Pn ) AW S M = M ∗ W (9)
123
Journal of Reliable Intelligent Environments
123
Journal of Reliable Intelligent Environments
8 Performance evaluation more than one performance aspect. However, the monotonic-
ity property of the composite routing metric has to hold for
The suggested algorithm was executed with multiple network the routing protocol to be loop-free [18].We have kept ETX
typologies and states via simulation using Cooja Simulator as our primary metric and then we calculated the correlation
and Contiki OS 3.0 [21]. All motes which are used in the of ETX with other metrics. For the calculation of correlation,
simulation are Tmore sky, hence the generated outputs are the respective values of each metric are extracted from many
built on Tmote sky and Cooja Simulator. The specification simulations over a period of time. We tried the following
used for the implementation of proposed work is shown in three different metrics with ETX:
Table 1.
1. ETX vs BO: The correlation value calculated for these
8.1 Metrics selection two metrics was 0.7892.
2. ETX vs QD: The correlation value calculated for these
There are many routing metrics to select from like ETX, BO, two metrics was 0.2759.
Hop Count, QD, RtMetric and many more. Objective func- 3. ETX vs RtMetric: The correlation value calculated for
tion defines how to use these metrics to calculate the rank. these two metrics was 0.8801.
In the proposed work we have defined a composite metric
for OF because the combination of multiple primary routing The correlation between ETX and BO, ETX and RtMetric is
metrics into a composite one can lead to the optimization of strongly positive correlation, which means they are directly
123
Journal of Reliable Intelligent Environments
proportional. However, the correlation between ETX and QD From Eqs. 13 and 14 we can infer that
is quite weak and hence it is relatively less additive than other
two. The additive nature of metrics is important to acheive E T X = 0.2 ∗ Rt Metric + 42.76 ∗ B O + c (15)
monotonicity and hence we decided to use the following three
metrics: This equation represents ETX which is 0.2 times of RtMet-
ric and 42.76 times of BO, here c is a constant which can
1. ETX be ignored while considering the weights. This is how the
2. BO weights are calculated. This shows that all the attributes
3. RtMetric belong to different information regions and the algorithm is
more adaptable and responsive to the changes in the network.
123
Journal of Reliable Intelligent Environments
123
Journal of Reliable Intelligent Environments
123
Journal of Reliable Intelligent Environments
Fig. 17 Comparison of end-to-end delay Fig. 18 Comparison of energy consumption per successful packet
End to end delay is evaluated between the sink node and the
leaf node. The delay is calculated by the absolute difference
between the time stamp when the packet was received on
the sink node and the time when the packet was created. For
observation, we calculated the average delay for packets dur-
ing a time range. The plot can be seen in Fig. 17. The Average
delay in CAFOR is 7.34 seconds, whereas QU-RPL is 16.84
seconds and OHCA is 9.07 seconds. It can be concluded that
CAFOR has 19% lower average end to end delay compared
to OHCA. This is because CAFOR consumes less time in
network formation and parent selection. This, in turn, leads
to reduced waiting time for packets in CAFOR than OHCA.
CAFOR shows higher route optimization and reduced delays. Fig. 19 Energy remaining in the network (mJ)
To reduce end to end delay we need the routing metric to be
reliable and choose the lowest RtMetric. This means that a
lower value of ETX and BO is also expected to minimise end
to end delay. spent in retransmissions will be less. A lower BO will also
lead to a reduction in energy while retransmitting the pack-
8.3.6 Energy consumption ets.
123
Journal of Reliable Intelligent Environments
9 Conclusion
123
Journal of Reliable Intelligent Environments
2. Shreyas J, Singh H, Bhutani J, Pandit S, Srinidhi NN, Dilip Kumar 14. Bhandari K, Hosen A, Cho G (2018) Coar: congestion-aware rout-
SM (2019) Congestion Aware Algorithm using Fuzzy Logic to Find ing protocol for low power and lossy networks for iot applications.
an Optimal Routing Path for IoT Networks. In: International Con- Sensors 18(11):3838. https://doi.org/10.3390/s18113838
ference on Computational Intelligence and Knowledge Economy 15. Hellaoui H, Koudil M (2015) Bird flocking congestion control for
(ICCIKE), IEEE, pp. 141–145 coap/rpl/6lowpan networks. In: Proceedings of the 2015 workshop
3. Shreyas J, Jumnal A, Dilip Kumar SM, Venugopal KR (2020) on IoT challenges in mobile and industrial systems. ACM, pp 25–
Application of computational intelligence techniques for internet 30
of things: an extensive survey. International Journal of Computa- 16. Musaddiq A, Zikria Y, Nain Z, Kim SW (2020) Routing protocol for
tional Intelligence Studies 9, 3:234–288 low-power and lossy networks for heterogeneous traffic network.
4. Yang Z, Chang CH (2019) 6LoWPAN Overview and Implementa- EURASIP J Wirel Commun Netw 2020:01
tions. In: International Conference on Embedded Wireless Systems 17. Chakravarthi R, Gomathy C (2011) Internet of things: a survey on
and Networks (EWSN) 2019 25–27 February, Beijing, China, pp. the security of IoT frameworks. Indian J Comput Sci Eng (IJCSE)
357–361 3(3):476–483
5. Peres B, Santos BP, Otavio AO, Goussevskaia O, Vieira MA, Vieira 18. Karkazis P et al (2012) Design of primary and composite rout-
LF, Loureiro AA (2018) Matrix: Multihop address allocation and ing metrics for RPL-compliant wireless sensor networks. In 2012
dynamic any-to-any routing for 6lowpan. Comput Netw 140:28–40 international conference on telecommunications and multimedia
6. Qiu Y, Ma M (2018) Secure group mobility support for 6lowpan (TEMU), IEEE, pp 13–18
networks. IEEE Internet Things J 5(2):1131–1141 19. Shen H, Bai G, Zhao L, Ge J, Tang Z (2015) L2or: low-cost
7. Raoof A, Matrawy A, Lung C-H (2018) Routing attacks and lowcomplexity opportunistic routing for wireless sensor networks.
mitigation methods for RPL-based Internet of Things. IEEE Com- Wirel Personal Commun 82(1):401–422
munications Surveys & Tutorials 21, no. 2 pp 1582–1606 20. Lamaazi H, Benamar N, Imaduddin MI, Jara AJ (2015) Perfor-
8. Chan CO, Lau HC, Fan Y (2018) Iot data acquisition in fashion mance assessment of the routing protocol for low power and lossy
retail application: Fuzzy logic approach. In: 2018 international con- networks. In: 2015 international conference on wireless networks
ference on artificial intelligence and big data (ICAIBD). IEEE, pp and mobile communications (WINCOM). IEEE, pp 1–8
52–56 21. Rathod V, Jeppu N, Sastry S, Singala S, Tahiliani MP (2019)
9. Kim H, Paek J, Bahk S (2015) Qu-rpl: Queue utilization based rpl CoCoA++: Delay gradient based congestion control for Internet
for load balancing in large scale industrial applications. 06 of Things. J. abb title 100:1053–1072
10. Al-Kashoash H (2020) Optimization-based hybrid congestion alle-
viation. In: Congestion Control for 6LoWPAN Wireless Sensor
Networks: Toward the Internet of Things, Springer, Cham, pp 135–
Publisher’s Note Springer Nature remains neutral with regard to juris-
156
dictional claims in published maps and institutional affiliations.
11. Kim H, Kim H, Paek J, Bahk S (2017) Load balancing under heavy
traffic in RPL routing protocol for low power and lossy networks.
IEEE Trans Mob Comput 16(4):964–979
12. Sunitha G, Kumar SD, Kumar BV (2017) Energy balanced zone
based routing protocol to mitigate congestion in wireless sensor
networks. Wirel Pers Commun 97(2):2683–2711
13. Hassan R, Jubair AM, Azmi K, Bakar A (2016) Adaptive conges-
tion control mechanism in coap application protocol for internet of
things (Iot). In: 2016 international conference on signal processing
and communication (ICSC). IEEE, pp 121–125
123