The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

DOI: 10.14569/IJACSA.2025.01604113
PDF

Secure Optimization of RPL Routing in IoT Networks: Analysis of Metaheuristic Algorithms in the Face of Attacks

Author 1: Mansour Lmkaiti
Author 2: Maryem Lachgar
Author 3: Ibtissam Larhlimi
Author 4: Houda Moudni
Author 5: Hicham Mouncif

International Journal of Advanced Computer Science and Applications(IJACSA), Volume 16 Issue 4, 2025.

  • Abstract and Keywords
  • How to Cite this Article
  • {} BibTeX Source

Abstract: The security and efficiency of Internet of Things (IoT) networks depend on optimizing the routing protocol for low-power, lossy networks (LPNs) to manage various challenges, including expected number of transmissions (ETX), latency and energy consumption. This study proposes an advanced meta-heuristic optimization framework integrating several algorithms, including Particle Swarm Optimization (PSO), Mixed Integer Linear Programming (MILP), Adaptive Random Search with two-step Adjustment (ARS2A) and Simulated Annealing (SA), to improve the performance of RPL-based IoT networks under attack scenarios. Our methodology focuses on secure routing by integrating dynamic anomaly detection and adaptive optimization mechanisms to mitigate network threats such as Blackhole, Sinkhole, and Wormhole attacks.Simulations were carried out on large-scale IoT networks with 100 and 150 nodes to evaluate the performance of the proposed algorithms. Experimental results indicate that ARS2A and MILP offer the best compromise between security and performance, achieving minimal ETX (1.28), reduced latency (0.12 ms) and optimized energy consumption (0.85 J) in dense networks. Furthermore, simulated annealing demonstrates high adaptability to mitigate routing attacks while guaranteeing stable energy efficiency. The comparative analysis highlights the strengths and weaknesses of each algorithm, underscoring the need for hybrid optimization strategies that balance computational cost and real-time adaptability. This work establishes a secure and scalable optimization framework for IoT networks, contributing to the development of intelligent, resilient and energy-efficient routing solutions.

Keywords: IoT Security; PSO; MILP; ARS2A; simulated annealing; RPL protocol; metaheuristic techniques; routing efficiency; ETX; latency; energy consumption; attack mitigation; blackhole; wormhole; grayhole; cyberattack

Mansour Lmkaiti, Maryem Lachgar, Ibtissam Larhlimi, Houda Moudni and Hicham Mouncif, “Secure Optimization of RPL Routing in IoT Networks: Analysis of Metaheuristic Algorithms in the Face of Attacks” International Journal of Advanced Computer Science and Applications(IJACSA), 16(4), 2025. http://dx.doi.org/10.14569/IJACSA.2025.01604113

@article{Lmkaiti2025,
title = {Secure Optimization of RPL Routing in IoT Networks: Analysis of Metaheuristic Algorithms in the Face of Attacks},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2025.01604113},
url = {http://dx.doi.org/10.14569/IJACSA.2025.01604113},
year = {2025},
publisher = {The Science and Information Organization},
volume = {16},
number = {4},
author = {Mansour Lmkaiti and Maryem Lachgar and Ibtissam Larhlimi and Houda Moudni and Hicham Mouncif}
}



Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

IJACSA

Upcoming Conferences

Computer Vision Conference (CVC) 2026

16-17 April 2026

  • Berlin, Germany

Healthcare Conference 2026

21-22 May 2025

  • Amsterdam, The Netherlands

Computing Conference 2025

19-20 June 2025

  • London, United Kingdom

IntelliSys 2025

28-29 August 2025

  • Amsterdam, The Netherlands

Future Technologies Conference (FTC) 2025

6-7 November 2025

  • Munich, Germany
The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org