Computer Vision Conference (CVC) 2026
16-17 April 2026
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 16 Issue 4, 2025.
Abstract: The security and efficiency of Internet of Things (IoT) networks depend on optimizing the routing protocol for low-power, lossy networks (LPNs) to manage various challenges, including expected number of transmissions (ETX), latency and energy consumption. This study proposes an advanced meta-heuristic optimization framework integrating several algorithms, including Particle Swarm Optimization (PSO), Mixed Integer Linear Programming (MILP), Adaptive Random Search with two-step Adjustment (ARS2A) and Simulated Annealing (SA), to improve the performance of RPL-based IoT networks under attack scenarios. Our methodology focuses on secure routing by integrating dynamic anomaly detection and adaptive optimization mechanisms to mitigate network threats such as Blackhole, Sinkhole, and Wormhole attacks.Simulations were carried out on large-scale IoT networks with 100 and 150 nodes to evaluate the performance of the proposed algorithms. Experimental results indicate that ARS2A and MILP offer the best compromise between security and performance, achieving minimal ETX (1.28), reduced latency (0.12 ms) and optimized energy consumption (0.85 J) in dense networks. Furthermore, simulated annealing demonstrates high adaptability to mitigate routing attacks while guaranteeing stable energy efficiency. The comparative analysis highlights the strengths and weaknesses of each algorithm, underscoring the need for hybrid optimization strategies that balance computational cost and real-time adaptability. This work establishes a secure and scalable optimization framework for IoT networks, contributing to the development of intelligent, resilient and energy-efficient routing solutions.
Mansour Lmkaiti, Maryem Lachgar, Ibtissam Larhlimi, Houda Moudni and Hicham Mouncif, “Secure Optimization of RPL Routing in IoT Networks: Analysis of Metaheuristic Algorithms in the Face of Attacks” International Journal of Advanced Computer Science and Applications(IJACSA), 16(4), 2025. http://dx.doi.org/10.14569/IJACSA.2025.01604113
@article{Lmkaiti2025,
title = {Secure Optimization of RPL Routing in IoT Networks: Analysis of Metaheuristic Algorithms in the Face of Attacks},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2025.01604113},
url = {http://dx.doi.org/10.14569/IJACSA.2025.01604113},
year = {2025},
publisher = {The Science and Information Organization},
volume = {16},
number = {4},
author = {Mansour Lmkaiti and Maryem Lachgar and Ibtissam Larhlimi and Houda Moudni and Hicham Mouncif}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.