LOADng Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks



Similar documents
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

VOL. 4, NO. 5, August 2014 ISSN ARPN Journal of Systems and Software AJSS Journal. All rights reserved

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Figure 1. The Example of ZigBee AODV Algorithm

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

An Efficient AODV-Based Algorithm for Small Area MANETS

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

6LoWPAN Technical Overview

Study of Network Characteristics Incorporating Different Routing Protocols

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Fast Path Recovery Mechanism for MPLS Networks

II RELATED PROTOCOLS. Dynamic Source Routing (DSR)

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

A Link-state QoS Routing Protocol for Ad Hoc Networks

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Routing Protocol Comparison for 6LoWPAN

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

IJMIE Volume 2, Issue 7 ISSN:

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Robust protocols for the Industrial Internet of Things

Routing with Load Balancing in Wireless Ad hoc Networks

The Monitoring of Ad Hoc Networks Based on Routing

Customer Specific Wireless Network Solutions Based on Standard IEEE

An Extended AODV Protocol to Support Mobility in Hybrid Networks

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Modified AODV protocol for prevention of Denial of service attacks in wireless Ad hoc networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

A UBIQUITOUS PROTOCOL FOR ADDRESS DYNAMICALLY AUTO CONFIGURATION FOR MOBILE AD HOC NETWORKS

Keywords: DSDV and AODV Protocol

Routing in the Internet of Things

LIST OF FIGURES. Figure No. Caption Page No.

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Optimized Load Balancing Mechanism Using Carry Forward Distance

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

SBSCET, Firozpur (Punjab), India

Internet Connectivity for Ad hoc Mobile Networks

A Workload-Based Adaptive Load-Balancing Technique for Mobile Ad Hoc Networks

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Real-Time Traffic Support in Heterogeneous Mobile Networks

Control overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Performance comparison and analysis of routing strategies in Mobile ad hoc networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

ROUTING TECHNIQUES AND PROTOCOLS FOR INTERNET OF THINGS: A SURVEY

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

CAODV: Routing in Mobile Ad-hoc Cognitive Radio Networks

ZigBee IP Network Performance, Part I Unicast Messaging under SEP2.0 HAN Messaging Profile

Wireless Mesh Networks under FreeBSD

Consecutive Geographic Multicasting Protocol in Large-Scale Wireless Sensor Networks

Security Threats in Mobile Ad Hoc Networks

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Micro Mobility and Internet Access Performance for TCP Connections in Ad hoc Networks

Influence of Load Balancing on Quality of Real Time Data Transmission*

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Improvisation of The Quality Of Service In ZigBee Cluster Tree Network

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Efficient Load Balancing Routing in Wireless Mesh Networks

Abstract. 1 Introduction. Aleksandr Huhtonen Helsinki University of Technology Telecommunication Software and Multimedia Laboratory ahuhtone@cc.hut.

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

DAG based In-Network Aggregation for Sensor Network Monitoring

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004

Comparing the Performance of the Ad Hoc Network under Attacks on Different Routing Protocol

Thingsquare Technology

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Transcription:

Routing Protocol Evaluation for Bidirectional Data flow in AMI Mesh Networks Saida ELYENGUI, Riadh BOUHOUCHI 2, Tahar EZZEDINE 3.2.3 Communication System Laboratory Sys'Com, National Engineering School of Tunis, University Tunis El Manar Abstract This research work denotes a novel evaluation of the routing protocol for Wireless Sensor Network. The protocol implementation is a part of ITU-T G.993 recommendation based on the framework of the LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation () proposed by IETF specified by the IETF Internet-Draft draft-clausen-lln-loadng- and currently still in its design phase. is a reactive on demand distance vector routing protocol derived from the Ad hoc On-demand distance vector protocol proposed by IETF. This work was motivated by the need for a novel protocol implementation for smart metering applications providing better performance and less complexity than the Routing Protocol for Low power and lossy networks and adapted to (LLNs) requirements and constraints. Our implementation was successfully integrated into the communication layer of Contiki OS the Wireless Sensor Network operating system and evaluated through extensive simulations for AMI Mesh Networks. Keywords Smart Metering; ; ; ; Performance; Simulation; Contiki OS; Cooja. I. INTRODUCTION Smart metering is expected to be an integral part of the smart grid, since advanced metering infrastructure is the foundation of the power grid, providing the connection between customer s premises and neighbor area networks (NAN) in order to transport metering and configuration data with bidirectional traffic flow to and from the information systems of energy providers. The main purpose of automated metering is to enable real time access to metering data in order to improve management and production of energy and the configuration of smart meters in real time [2]. In this context, one of the prime challenges is providing scalable communication for bidirectional data flow to collect and manage large amount of data for distribution domain. Therefore the choice of a suitable routing protocol providing robust and scalable performance for different types of data traffic is mandatory. This paper describe the evaluation of a novel routing protocol [] which is still in the design phase by IETF to realize smart metering communications. Results from extensive simulations carried out on cooja the contiki OS simulator on a realistic network topology are presented to demonstrate the efficiency of our proposed solution on the network latency, Packet delivery Ratio and control traffic overhead. In this manuscript we make the following contributions: We evaluate our implementation of protocol and compare it to protocol and protocol for bidirectional scenarios in AMI mesh networks architecture. We provide analytical results for the network end-to-end delay, PDR, overhead and show how our implemented solution can improve bidirectional data flow scalability. The paper is organized as follows: Section II provides an overview about protocol for AMI mesh networks and highlights the prime issues raised that motivated us to its implementation. Section III provides a detailed overview of protocol. Section IV presents detailed performance evaluation and analytical results, in section V we conclude. II. LOADNG PROTOCOL The LLN on-demand ad hoc distance vector routing protocol next generation is a reactive routing protocol for Wireless Sensor Networks. It is a simplified version of ad hoc on-demand routing protocol originally developed for use in IEEE 82.5.4 based devices in 6LoWPANs and LLNs [2]. This protocol may be used at layer 3 as a route-over routing protocol or at layer 2 as a mesh-under protocol. Therefore, algorithm is characterized by its simplicity and its low memory storage needs. Thus, it would be ideal and suitable solution for AMI mesh networks [9,, ]. As it was originally developed to WSNs and Low Power and Lossy Networks (LLNs), it should be adapted to their requirements and constraints. A. Motivation Mesh network for smart metering application can be considered as trees of nodes rooted to different concentrators creating a neighbor area networks. 37

Each concentrator is serving tree of smart meters in the same neighborhood collecting data and transmitting it threw different gateways to the utility information systems. Such scenario requires a bidirectional dataflow between nodes and concentrator in frequent way for real time metering and energy load management. Different routing protocols were developed for LLNs [4] the most famous is the routing protocol for low power and lossy networks standardized by IETF [5, 3, 4] supporting and optimized for most of LLNs traditional scenarios where MP2P and P2P communication traffic patterns are the most frequent and where traffic from concentrator to sensors are rare occurrence. Whereas, other P2MP scenarios should be also considered for study in AMI mesh networks. Where appropriate and predominant bidirectional dataflow scenarios are MP2P and P2MP traffic patterns. So our motivation for implementation came from the need for a novel protocol suitable for AMI. B. Specification describes four types of packets: Route Request (RREQ): The RREQ is generated by a router the <originator>, when a data packet in available to a destination, RREQ packet is with no valid route and with a specific destination address. Route Reply (RREP): The RREP is generated by a router, upon a RREQ reception and processing with destination address in its routing set. Route Reply Acknowledgement (RREP-ACK): The RREP-ACK is generated by a router after a reception of RREP, as an indication to the neighbor source of the RREP that the RREP was successfully received. Route Error (RERR): the RERR is generated by a router when the router detects a broken route to the destination. inherited basic operations of, including generation and forwarding of Route Request RREQs to discover a route to a specific destination as shown in Fig. Fig.. RREQ forwarding in Upon receiving this message, only the terminator (Node C) can reply by a RREP and forward it on unicast, hop-byhop to the source as detailed in Fig 2. Fig. 2. RREP unicast forwarding in. When intermediate nodes receive the RREP, they will unicast a proper RREP ACK to the neighbor from which they received the RREP, in order to notify that the link is bidirectional. If a route is detected broken, an error message can be returned to the source of that data packet. 38

Compared to, intermediate nodes are not allowed to generate RREPs. As a result, reduces the size of control messages which is demanded in LLNs uses an alternative discovery scheme, denoted Smart RREQ; when receiving a RREQ, intermediate node looks in its routing table entries, if the demanded address exists and it is the next-hop, the RREQ is unicast to the next-hop instead of being broadcast. In routing discovery process, only the destination is permitted to respond with a RREP when it receives RREQ message with the same IP address. So, there is no more need to the sequence Number included in messages sent to requesting routers. Also, there is no more Gratuitous RREP; when an intermediate node has a usable route to the destination the router responds with a RREP on unicast to the source and notify the destination with this Gratuitous message. Thus, message size would be reduced which is definitely suitable to LLNs low-power and memory constraints [3]. In the other hand, nodes with protocol do not maintain a precursor list having the IP address for neighbors containing a next hop towards each destination as it is done with protocol, but they only care about the next hop to forward current packet to its destination. Control messages can include TLV (Type- Length-Value) elements, permitting protocol extensions to be developed [3]. C. Integration into the Contiki OS As we work with Contiki OS [8] and the modular Rime stack, we have replaced its main modules which are route and route discovery. When there is data to be sent, router discover a bi-directional route to any required destination in the network using the route discovery module. And maintain an active route as long as there is traffic to be sent with the protocol operations implemented in the route module. Each node that we call router has a number of parameters, an information base and can generate process and forward a message. D. Information Base In order to maintain the protocol state, the following information base sets are required: The Routing Set : The Routing Set stores tuples for each reachable node. The Destination Address Set : Destination Address Set records address for which the current router must respond with a RREP message. The Blacklist Neighbor Set: Blacklist neighbor set stores neighbors to which connectivity is unidirectional. The Pending Acknowledgment Set : that Contains information about transmitted RREP with a RREPrequirement Set. Local Interface Set: Records local interfaces. E. Route module : route.c & route.h Route module is the core of the router; it governs the routing table by updating, removing, adding and maintaining routes. In this module, we modified two files; the route protocol route.c and the route protocol header route.h. This module was correctly compiled and integrated into the Contiki OS Rime Stack. F. Route-discovery module: route-discovery.c & routedicovery.h Route-discovery module with route module permit to discover new routes and update routing sets, it uses mesh and uip-over-mesh libraries to enable routers to send and receive messages. In our case, it deals especially with rime module -using rime address- in order to achieve these functions. In this module, two files where modified; the route protocol code route-discovery.c and the route protocol header route-dicovery.h. The standard route discovery module of contiki OS was replaced by our modified module with respect to the specification in []. III. PERFORMANCE EVALUATION A. Simulations configuration In order to understand both the performance of and the performance impact of our implementation we evaluate the routing protocol in terms of packet Delivery ratio (PDR), latency in order to predict how it behave in larger networks, and Overhead to describe its power consumption and memory management. Simulations were completed in a field of meters, with variable amounts of routers positioned randomly as detailed in table 2. 39

P2MP PDR P2MP PDR International Journal of Emerging Technology and Advanced Engineering Table CONTIKI OS AND COOJA SIMULATOR PARAMETER SETUP Settings Transport layer UDP Wireless channel model Communication range Distance to the Concentrator Grid Size Value UDGM Model with Distance Loss 5m Variable [2-25] Meters * m2 Number of routers Variable [25/5/75//25/5] Mote type Tmote Sky Network layer μipv6 + 6LoWPAN MAC layer CSMA + ContikiMAC Radio interface CC242 2.4 GHz IEEE 82.5.4 Simulation time 8h The network scenarios are substance of two different traffic patterns: multipoint-to-point (MP2P), wherever all routers generate CBR traffic stream by periodic reporting of 52-byte data packet with 6 seconds interval and acknowledgment of each received frame in upward direction, for which the destination is always the sink. TABLE 2 TRAFFIC PATTERN OF NODES B. Simulations Results Point-to-multipoint (P2MP): Fig.4. shows the average packet delivery ratios function of variable distance to the concentrator and Fig.5. shows PDR function of variable nodes number, incurring from respectively, and. Fig.6. depicts the delivery ratio for P2MP traffic flow of three protocols; the ratios are close to %, regardless of number of nodes. Whereas according to Fig.4. performance decrease when the node distance to the concentrator is higher than 5 meters. However yields 6% higher data delivery ratios than does..9.8.7.6.5.4 P2MP PDR vs Distance to the Concentrator.3.2 5 5 2 25 Node Type Traffic Pattern Client MP2P traffic flow by periodic reporting with 5s interval and acknowledgment of each received frame in upward direction. Sink P2MP traffic with two messages types : Acknowledgment of data frames in downward direction every data arrival. Configuration data sent with Poisson process with average of a single arrival per interval of minutes in downward direction. And point-to- multipoint (P2MP) traffic with two messages types, acknowledgment of data frames in downward direction every data arrival and configuration data sent with Poisson process through average of a single arrival per interval of minutes in downward direction. We used two types; client s nodes and a single router node. 2.8.6.4.2.8.6.4.2 Fig. 3. Fig.4. P2MP PDR function of Distance P2MP PDR vs Nodes Number 5 5 4

MP2P PDR P2MP End-To-End Delay End-to-End Delay P2MP(ms) MP2P PDR International Journal of Emerging Technology and Advanced Engineering P2MP PDR function of Nodes Number MP2P PDR vs Distance to the Concentrator 8 6 4 P2MP End-to-End Delay vs Distance to the Concentrator.95.9.85.8 2 8 6 4 2 5 5 2 25 Fig. 4. P2MP End-to-End Delay function of Distance 3 25 2 5 5 P2MP End-To-End Delay vs Nodes Number 5 5 Fig. 5. P2MP End-to-End Delay function of Node Number Multipoint-to- Point (MP2P): For downward traffic, the Fig.8 shows that is very efficient in terms of average latency which is equal to 286 ms compared to 68 ms when the network is subject to variable distance to the concentrator and when the network is with increasing number of nodes is variable latency is equal to 463 ms and 2586 ms for and respectively..75.7.65.6.55.5 5 5 2 25 Fig. 6. MP2P PDR function of Distance On the other hand, we observe a very low average latency in the case of standard and it was equal to only 94 ms for both cases. As s control packets are significantly smaller than those of, control traffic overhead is considerably lower than. Fig.9 shows that a packet delivery ratio is % for and the degradation for the delivered packets for protocol in accordance with the increase of number of nodes; it reaches only 55% lower than which is equal to 75%. Whereas degradation for the delivered packets for protocol in accordance with the distance to the concentrator reaches only 65% lower than which is equal to 85%..9.8.7.6 MP2P PDR vs.5.4 5 5 Fig. 7. MP2P PDR function of Nodes Number 4

MP2P End-To-End Delay Overhead(Bytes/Sec) End-to-End Delay MP2P(ms) Number of Overhead Packets per Router International Journal of Emerging Technology and Advanced Engineering For upward traffic, Fig. shows that is better than in terms of average latency which is equal to 569 ms compared to 2884 ms when the network is subject to variable distance to the concentrator and when the network is with increasing number of nodes is variable latency is up to 62 ms and 3586 ms for and respectively. On the other hand, we observe a very low average latency in the case of standard is equal to only 96 ms for both cases. 8 7 6 5 4 3 Overhead 3 25 2 5 5 MP2P End-to-End Delay vs Distance to the Concentrator 2 5 6 7 8 9 2 3 4 5 25 2 Fig.. Number of overhead packets Overhead 5 5 2 25 Fig. 8. MP2P End-to-End Delay function of Distance 5 4 35 MP2P End-To-End Delay vs Nodes Number 5 3 25 2 5 5 5 5 Fig. 9. MP2P End-to-End Delay function of Node Number Fig.2 shows the number of overhead packets conducted by each router and Fig.3 depicts the Overhead bytes per second in the network incurring from respectively, and. protocol shows better performance than in both cases. 5 6 7 8 9 2 3 4 5 Fig.. Overhead bytes per second Our study reveals that the implementation harvests better performance than in all used metrics: higher data delivery ratios, lower delays and lower overhead. In all cases protocol performs better than our implementation but in other hand protocol represents a part of the ITU-T G.993 recommendation for smart metering applications. Its strength came from its simple processing compared to protocol, even though protocol extension should be developed to optimize its performance for AMI applications. 42

IV. CONCLUSION The results in simulations reveal that the protocol is better than routing protocol in all cases. In AMI scenario, showed better memory management and power consumption. Also, it still has less implementation complexity compared to which is a crucial point. To sum up, many aspects remain interesting perspectives and future challenges: Evaluating performance in real experiment, testing its performance in other application domains in order to find how we can optimize flooding and route storage to maximize its performance. REFERENCES [] T. Clausen, A Colin, J Yi, A. Niktash, Y Igarashi, H Satoh, and U Herberg. The LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (), October, 23, INTERNET- DRAFT draft-clausen-lln-loadng-. K. Kim, S. Daniel Park, G. Montenegro, S. Yoo, and N Kushalnagar. 6LoWPAN Ad Hoc On- Demand Distance Vector Routing (LOAD). Internet-Draft draftdaniel-6lowpan-load-adhoc-routing-3,internet Engineering Task Force. [2] C. Perkins, E. Belding-Royer, and S. Das, Ad hoc On-Demand Distance Vector () Routing, Experimental RFC 356, July 23. [3] T.Clausen, A.Colin, J.Yi, A.Niktash, Y.Igarashi, H Satoh, and U.Herberg, INTERNET-DRAFT draft-clausen-lln-loadng-, The LLN On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (), January 22. [4] Sabbah, AI; El-Mougy, A; Ibnkahla, M., "A Survey of Networking Challenges and Routing Protocols in Smart Grids," Industrial Informatics, IEEE Transactions on, vol., no., pp.2,22, Feb. 24. [] T. Winter, P. Thubert, A. Brandt, T. Clausen, J. Hui, R. Kelsey, P. Levis, K. Pister, R. Struik, and J. Vasseur, : IPv6 routing protocol for low power and lossy networks, IETF, RFC 655, April 22. [2] P. Kulkarni, S. Gormus, Z. Fan, and B. Motz, A self-organising mesh networking solution based on enhanced for smart metering communications, in Proc. IEEE Hotmesh Workshop, Lucca, Italy, Jun.2. [3] T.Winter et al., : IPv6 Routing Protocol for LowPower and Lossy Networks, IETF ROLL WG RFC 655, 22. [4] Contiki: The operating system for connecting the next billion devices The Internet of things, Available: http://www.contikios.org/ [5] S. Subramani, Z. Fan, S. Gormus, P. Kulkarni, M. Sooriyabandara, andw. H. Chin, Wisemen: White space for smart metering, in Proc.IEEE Innov. Smart Grid Technol. (ISGT) Conf., Washington, DC, Jan. 22. [6] I. Akyildiz, X. Wang, and W. Wang, Wireless mesh networks: A survey, Comput. Netw., vol. 47, pp. 445 487, Mar. 25. [7] T. Iwao, K. Yamada, M. Yura, Y. Nakaya, A. Cardenas, S. Lee, and R. Masuoka, Dynamic data forwarding in wireless mesh networks, in Proc. IEEE Smart Grid Commun. Conf., Gaithersburg, MD, Oct. 2. [8] B. Lichtensteiger, B. Bjelajac, C. Muller, and C. Wietfeld, RF mesh systems for smart metering: System architecture and performance, in Proc. IEEE Smart Grid Commun. Conf., Gaithersburg, MD, Oct. 2. [9] D. Wang, Z. Tao, J. Zhang, and A. Abouzeid, based routing for advanced metering infrastructure in smart grid, in Proc. IEEE Int. Commun. Conf. (ICC), Cape Town, South Africa, May 2. [] J. Tripathi, J. Oliveira, and J. P. Vasseur, Performance evaluation of routing protocol for low power and lossy networks (), drafttripathi-roll-rpl-simulation-4, IETF ROLL WG, 2. AUTHORS S. Elyengui: is a PhD student in the department of communication systems at Tunisian National School of Engineering, University of Tunis El Manar Tunisia. She is a researcher in the area of smart grid communication and networking, SG networks security, AMI applications and M2M communications. She received her Computer Networks Engineer Diploma and a Master degree in new Technologies of Communication and Networking in 27 and 2 respectively. R. Bouhouchi received the Master degrees in communication systems from ENIT, the MBA degree s from Mediterranean School of Business, T.E graduated in 2 from ESPTT, and holds an engineering degree in computer sciences since 26, as he holds more than eight international certificates in advanced programming and management as ITIL (Information Technologies I 43