Next Article in Journal
An Experimental Study on the Thermal Insulation Properties of Concrete Containing Wood-Based Biochar
Next Article in Special Issue
IbiboRPLChain II: A Blockchain-Enhanced Security Framework for Mitigating Routing Attacks in IoT-RPL Networks
Previous Article in Journal
Analysis of the Influence of RTK Observations on the Accuracy of UAV Images
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhancing IoT-LLN Security with IbiboRPLChain Solution: A Blockchain-Based Authentication Method

School of Computing, Engineering & Digital Technologies, Teesside University, Middlesbrough TS1 3BQ, UK
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(19), 10557; https://doi.org/10.3390/app151910557
Submission received: 28 August 2025 / Revised: 18 September 2025 / Accepted: 25 September 2025 / Published: 29 September 2025

Abstract

The security of Internet of Things (IoT)–Low-Power and Lossy Networks (LLNs) is crucial for their widespread adoption in various applications. The standard routing protocol for IoT-LLNs, IPv6 Routing Protocol over Low-Power and Lossy Networks (RPL), is susceptible to insider attacks, such as the version number attack (VNA), decreased rank attack (DRA), and increased rank attack (IRA). These attacks can significantly impact network performance and resource consumption. To address these security concerns, we propose the IbiboRPLChain Solution, a secure blockchain-based authentication method for RPL nodes. The proposed solution introduces an additional blockchain layer to the RPL architecture, enabling secure authentication of communication links between the routing layer and the sensor layer. The IbiboRPLChain Solution utilises smart contracts to trigger immediate authentication upon detecting routing attacks initiated by malicious nodes in an IoT-LLN environment. The evaluation of the proposed solution demonstrates its superior performance in mitigating insider attacks and enhancing IoT-LLN security compared to existing methods. The proposed solution effectively mitigates insider attacks by employing blockchain technology to authenticate communication links between routing and sensor nodes. This prevents malicious nodes from manipulating routing information and disrupting network operations. Additionally, the solution enhances IoT-LLN security by utilising smart contracts to trigger immediate authentication upon detecting suspicious activity, ensuring prompt action against potential threats. The findings of this research have significant implications for the development and deployment of secure IoT-LLNs.

1. Introduction

Recent studies from 2020 to 2025 continue to advance attack detection and mitigation for RPL-based IoT-LLNs, yet persistent gaps remain around insider/compound threats, decentralised trust, and reproducible evaluation at scale—precisely the space IbiboRPLChain targets. Comprehensive surveys map the breadth of RPL attacks and defences but repeatedly note that many proposals are validated only in simulations with simplified topologies and centralised trust assumptions, which undermines resilience under adversarial conditions and dense deployments [1,2] Empirical studies show that even “simple” internal attacks significantly degrade QoS, raise control overhead, and destabilise DODAGs, while hybrid attacks cause degradation of up to 80% in packet delivery and latency [3]. Targeted analyses of control-message exploits, such as Version Number Attacks, confirm that countermeasures either incur excessive overhead or fail under multi-attack scenarios [4,5]. Trust-oriented and cooperative schemes, such as THC-RPL, improve packet delivery and detect Sybil nodes but add significant routing overhead and remain vulnerable to composite insider strategies [6,7,8]. Machine and deep learning-based IDS models report strong detection accuracy (82–94%), yet they typically depend on centralised training, heavy feature extraction, and incur latency unsuited to constrained LLNs [9,10,11]. While new datasets, such as UOS_IOTSH_2024 for sinkhole attacks, enable benchmarking, few evaluate blockchain-backed enforcement within the routing loop [5]. Replay-centric evaluations further highlight RPL’s fragility to DAO/DIO reuse, with pronounced impacts on latency, reliability, and routing stability [12].
In contrast, IbiboRPLChain embeds real-time smart contract-based authentication directly between the routing and sensor layers, ensuring that validation is triggered immediately upon anomalous RPL behaviour rather than deferred to post hoc detection. This removes dependence on a single trusted sink node and aligns with decentralised trust models [13,14]. In our Contiki/Cooja evaluations with IEEE 802.15.4 Z1 motes, IbiboRPLChain reduced triggering instants by 50%, halved response time, achieved 100% consensus, quadrupled security performance (packet delivery, identity verification, attack isolation), and cut network computation time threefold (100 → 33 s), while stabilising propagation and time-evolution strength. These results compare favourably with trust-only or ML-only baselines that either suffer overhead or high detection-to-response latency [7,8,9,10,12]. Nonetheless, the following challenges remain which require further investigation: scaling the blockchain ledger to thousands of nodes risks storage and synchronisation issues; heterogeneous testbeds may expose new vulnerabilities; and robustness against zero-day or hybrid attack combinations, as well as adversarial manipulation of smart contracts [1,3,5,6,11].
Overall, these results substantiate the IbiboRPLChain Solution’s capacity to not only bridge theoretical gaps in blockchain-based IoT security but also deliver practical and scalable enhancements for LLN routing protocols. The integration of blockchain with event-triggered multiagent coordination, dynamic consensus, and real-time threat detection sets a new benchmark for future research in secure IoT systems, representing a clear advancement over state-of-the-art defences [13,14]. By addressing the core limitations of existing architectures, namely centralisation, computational inefficiency, narrow attack scope, and lack of empirical rigour, this study contributes significantly to the field of IoT security.
Despite numerous advances in RPL-based IoT-LLN security between 2020 and 2025, several persistent research gaps undermine the effectiveness of existing models. Current solutions are often over-reliant on centralised architectures [3,6], where attack detection depends on a sink node, creating a single point of failure that adversaries can exploit. Many studies also focus narrowly on isolated threats, such as Sybil [7,8] or version number attacks [4], without considering compound or hybrid strategies, even though empirical evaluations show that combined rank manipulation and replay attacks can degrade packet delivery and latency by up to 80% [2,11]. Furthermore, machine and deep learning-based IDS approaches, though accurate, impose heavy data collection, centralised training, and computational burdens that are unsuited to resource-constrained LLNs [9,10,12], while trust-based schemes incur additional latency from metric computation and are limited in scalability. Another gap lies in empirical validation: a large proportion of proposed frameworks remain conceptual or tested only in simplified simulations, with few studies stress-testing solutions under realistic network conditions such as lossy links, node mobility, or large-scale deployments [1,5]. Finally, most methods are reactive, depending on known signatures or labelled datasets, leaving networks vulnerable to zero-day and adaptive threats. The IbiboRPLChain Solution directly addresses these limitations by embedding a decentralised blockchain layer that removes dependence on any single trusted node, while lightweight smart contracts provide real-time, event-triggered authentication of anomalous RPL behaviour, dynamically mitigating insider and hybrid attacks without imposing prohibitive resource costs. Empirical results confirm its practical value: in Contiki/Cooja simulations using IEEE 802.15.4 Z1 motes, IbiboRPLChain reduced authentication delays by around 50%, cut network computation time threefold, improved security performance fourfold, and achieved 100% consensus while stabilising propagation and time-evolution metrics. Unlike existing ML-, trust-, or signature-based approaches, IbiboRPLChain’s emphasis on decentralised enforcement, low overhead, and adaptive anomaly validation bridges the gap between theoretical blockchain promise and real-world IoT-LLN constraints, offering a credible pathway towards scalable, resilient, and promptly reactive security.

1.1. Contributions

Our research makes the following contributions to the field of IoT security:
  • A novel blockchain-based authentication method for RPL.
  • A thorough evaluation of our proposed method using simulations.
  • We demonstrate that the proposed method can effectively mitigate routing attacks in IoT-LLNs.
  • Blockchain’s inherent immutability and transparency safeguard routing information from tampering and manipulation, preventing malicious nodes from disrupting network operations.
  • Smart contracts automate the authentication process, reducing the overhead associated with manual verification and expediting the response to potential threats.
  • Blockchain’s distributed architecture can accommodate a growing number of nodes without compromising performance, making it suitable for large-scale IoT-LLNs.
The rest of this paper is organised as follows. In Section 2, we discussed the related studies, and also we focused on the background on blockchain technology and RPL. In Section 3, we discussed proposed blockchain-based authentication methods. Section 4 presents our proposed routing protocol. In Section 5, we compare the performances with existing solutions. Section 6 provides the main conclusions.

1.2. Problem Statement

The widespread adoption of IoT devices has introduced new security challenges, particularly in the context of LLNs. LLNs, which form the backbone of many IoT applications, are often composed of resource-constrained devices with limited energy and computational capabilities. This inherent constraint makes LLNs particularly susceptible to routing attacks [10,11,12,13,14,15], which can disrupt network operations and compromise the security of IoT systems.
Traditional security solutions for LLNs are often impractical due to their complexity and overhead. The implementation of sophisticated security measures can be resource-intensive and may not be feasible for resource-constrained LLN devices. As a result, LLNs frequently lack adequate security measures, leaving them vulnerable to routing attacks.
Existing detection methods for RPL attacks often rely on end-point device data and routing information obtained at the collecting point [6,7,8,9,10,11,12,13,14]. However, these methods may not be effective in detecting all types of routing attacks, and they can introduce additional overhead and latency. Additionally, the reliance on the collecting point as a trusted device raises concerns about potential vulnerabilities in the collecting point itself.
The lack of a robust and scalable security solution for routing attacks in LLNs poses a significant threat to the security and reliability of IoT systems. A solution is needed that can effectively mitigate routing attacks while maintaining the efficiency and scalability of LLNs [12]. LLNs are particularly susceptible to routing attacks due to their resource-constrained nature. Traditional security solutions are often impractical for LLNs due to their complexity and overhead [13,14]. Existing detection methods for RPL attacks may not be effective in detecting all types of attacks. The reliance on the collecting point as a trusted device raises concerns about potential vulnerabilities.

1.3. Related Work

Several researchers have proposed various security solutions to address routing attacks in IoT-LLNs. These solutions can be broadly categorised into two groups: centralised architectures and distributed architectures. Centralised architectures rely on a central authority to manage and secure the routing process. This approach can provide strong security but may suffer from scalability and single point of failure issues. Dvir et al. proposed VeRA (Version-Number and Rank-Attack Resistance) [15] to protect against version number and rank attacks in RPL. VeRA utilises a hash chain technique to prevent malicious nodes from altering version numbers or ranks. However, VeRA has not been implemented in a real-world IoT environment. Another centralised approach proposed by [16] regulates the rate at which rank values can increase or decrease, employing one-way hashed functions like SHA-1 to prevent unauthorised rank modifications. While this method effectively mitigates rank attacks, it introduces additional computational overhead due to the use of hashing algorithms.
Distributed architecture aims to provide a more scalable and resilient security solution by distributing the responsibility of managing and securing the routing process among the nodes in the network. The author [17] applied blockchain technology which, with its decentralised and tamper-proof nature, has emerged as a promising approach for implementing distributed security solutions in IoT-LLNs. Zhong et al. proposed the Sprite technique [18,19] to support IoT device technology in ad hoc networks. Sprite utilises a distributed ledger to store routing information and maintain synchronisation among nodes. However, Sprite is susceptible to attacks by malicious nodes that can manipulate data to obtain rewards without actually delivering it. Researchers have also explored the use of blockchain technology to determine the optimal routing path from source to destination in LLNs. This approach can effectively mitigate black- and grey-hole attacks, but it may introduce additional overhead due to the blockchain consensus mechanism.
In addition to preventive security measures, intrusion detection and mitigation techniques play a crucial role in protecting LLNs from routing attacks. Ahmad et al. proposed an intrusion detection technique that utilises the historical connectivity behaviour of nodes to identify anomalies and potential attacks [20]. However, this method focuses primarily on DoS attacks and may not be effective against other types of routing attacks. Uddin et al. proposed a lightweight routing system that employs a bloom filter to provide privacy and protect end-node credentials while minimising the overhead of control messages [21]. However, this system may not provide adequate security against sophisticated routing attacks.
While this [22] offers a strong analysis of Sybil attacks in RPL-based IoT networks, it has a few limitations. It does not propose any new solution, and most of its findings are based on theory rather than real-world testing. The focus is mainly on Sybil attacks, without looking at how they might combine with other types of internal attacks. Also, it does not really address whether the suggested defences are practical for low-power IoT devices, or how much extra load they might add. Finally, there is no standard way used to compare the different defence methods, which makes it harder to judge which ones are truly effective.
The [23] presents a practical contribution by simulating key RPL-based attacks and generating a labelled multi-class dataset to support supervised machine learning research in IoT security. However, it falls short by covering only a limited range of attacks, offering minimal insight into the performance of learning models, and lacking evaluation benchmarks to assess the dataset’s effectiveness or realism. This [24] introduces a lightweight intrusion detection system tailored for detecting Sybil attacks in mobile RPL-based IoT networks, with a focus on low overhead and mobility support. However, its reliance on simulations, assumptions of node cooperation, and narrow focus on Sybil attacks limit its applicability and generalisability to broader IoT security challenges. The author [24] proposes a trust-based framework to detect and mitigate rank and version number attacks in RPL-based IoT networks, effectively improving routing stability and reliability. However, it lacks thorough performance evaluation, offers limited scalability analysis, and makes assumptions about node behaviour that may not hold in dynamic IoT environments.
Further research is needed to address the challenges and opportunities of integrating blockchain technology into various IoT-LLN applications. Researchers should explore more efficient and scalable consensus mechanisms for blockchain-based routing solutions, investigate lightweight cryptography techniques to reduce computational overhead, and develop comprehensive security analysis frameworks to evaluate the robustness of blockchain-based security solutions against emerging routing attacks.

2. Background

2.1. Routing Protocol for Low-Power and Lossy Networks (RPL)

RPL is a proactive distance-vector source routing mechanism that utilises Directed Acyclic Graphs (DAGs) to establish a tree-like network topology. In this topology, each node can associate with multiple parent nodes, providing redundancy and resilience to node failures. RPL groups nodes into Destination-Oriented DAGs (DODAGs), where the root of each DODAG serves as a gateway to the Internet. The DODAG root initiates the routing process by sending DIO (Destination Advertisement Object) messages to its neighbours, which in turn propagate these messages further down the network. Nodes wishing to join the DODAG send DIS (DODAG Information Solicitation) messages to the root node, and upon receiving these messages, the root node assigns ranks to the requesting nodes and establishes parent–child relationships.

2.1.1. Blockchain Technology Overview

Blockchain technology is a distributed ledger system that maintains a tamper-proof record of transactions. Each transaction in the blockchain is cryptographically secured and linked to the previous transaction, forming an immutable chain of blocks. Blockchain’s decentralised nature and inherent security make it a promising tool for various applications, including cryptocurrency, supply chain management, and healthcare data management.

2.1.2. Security Considerations in IoT-LLNs

The security of IoT-LLNs is crucial due to the sensitivity of the data they collect and transmit. RPL, as the primary routing protocol in IoT-LLNs, is susceptible to various attacks, such as sinkhole and blackhole attacks. Sinkhole attacks involve an attacker creating a node that appears to be a legitimate sink, attracting traffic and disrupting network communication. Blackhole attacks involve an attacker dropping all incoming traffic, effectively isolating a portion of the network.

2.1.3. Addressing Security Vulnerabilities in RPL

To address the security vulnerabilities in RPL, various security mechanisms have been proposed. These mechanisms can be broadly classified into two categories: trust-based mechanisms and cryptography-based mechanisms. Trust-based mechanisms rely on reputation systems to assess the trustworthiness of nodes, while cryptography-based mechanisms employ encryption and digital signatures to secure routing messages.
The integration of blockchain technology into RPL routing offers a promising approach to enhancing security in IoT-LLNs. By leveraging blockchain’s decentralised and immutable nature, RPL routing can be made more resilient to attacks and provide a more secure foundation for IoT data communication.

2.2. Blockchain

Blockchain technology has gained significant attention for its potential to enhance data authentication, security, privacy, and integrity. In the context of IoT networks, blockchain offers a promising solution to address concerns regarding data security and privacy. As highlighted in [25], blockchain technology can effectively improve data privacy and integrity while strengthening the overall security posture of IoT networks.
At its core, blockchain operates as a distributed, open, and secure transaction ledger system that maintains an immutable record of transactions. This immutable record is secured by a peer-to-peer (P2P) network of users who collectively participate in verifying and validating transactions. The verification process utilises cryptographic hashing to link each block of data to its predecessor, creating an unbreakable chain of records.
To update the blockchain ledger with new transactions, a broadcast mechanism is employed. This involves broadcasting the transaction details to the entire network, followed by a distributed consensus process. The consensus process ensures that all participating nodes agree on the validity of the transaction before it is added to the blockchain.
Blockchain’s decentralised nature offers several advantages in the context of IoT networks. The system’s resilience to node failures ensures continued operation even if individual nodes become unavailable. Additionally, distributed authentication across nodes safeguards against network intrusions by malicious actors. Even if a few nodes are compromised, the overall integrity of the blockchain remains intact [26].
The core functions of blockchain can be summarised as block generation, validation, and transaction processing. Each transaction initiated undergoes rigorous validation before being disseminated to the network.
Three primary types of blockchains exist as follows: public, private, and consortium blockchains. Public blockchains, as the name suggests, are open to participation by anyone without requiring permission. Miners, the individuals responsible for adding new transactions to the blockchain, must participate in the consensus process to validate transactions. In contrast, private blockchains grant read access to all participants but restrict write permissions to a centralised authority. Consortium blockchains, on the other hand, adopt a hybrid approach, where a designated organisation manages a majority of access rights.
For IoT applications, private blockchains offer several advantages, including enhanced privacy, lower latency, and reduced energy consumption.
A key advantage of blockchain technology lies in its ability to support the creation of smart contracts. Smart contracts are self-executing contracts that automatically enforce predefined conditions. This capability has significantly contributed to the widespread adoption of blockchain technology across various domains.

2.3. Smart Contracts for Routing Attack Detection

The proposed solution leverages smart contracts to effectively detect and mitigate routing attacks in IoT-LLNs. Smart contracts are self-executing agreements that automatically enforce predefined conditions. In the context of IbiboRPLChain, smart contracts are deployed to monitor network traffic and trigger immediate authentication upon detecting suspicious activity. This proactive approach ensures prompt action against potential threats, safeguarding the integrity of the routing process.

2.4. Blockchain for Enhanced RPL Security

Blockchain technology plays a pivotal role in enhancing the security of RPL routing in IoT-LLNs. Its decentralised and immutable nature provides a robust foundation for secure data authentication and storage. By leveraging blockchain’s inherent trustless architecture, IbiboRPLChain establishes a secure communication channel between the routing layer and the sensor layer, preventing malicious nodes from manipulating routing information. Additionally, blockchain’s tamper-proof nature ensures the integrity of routing data, further strengthening the network’s security posture.

3. RPL Security in IoT Environment

To bolster RPL security in IoT environments, a comprehensive approach encompassing thorough understanding of RPL vulnerabilities, blockchain-based authentication mechanisms, proactive threat detection, scalability, rigorous testing, resource optimisation, data privacy measures, continuous threat monitoring, and collaborative knowledge sharing is essential. By leveraging blockchain technology’s inherent security attributes, communication links between routing and sensor nodes can be safeguarded, preventing malicious manipulation of routing information and ensuring network integrity. Smart contracts can be employed to automate authentication checks, trigger immediate responses to suspicious activity, and proactively monitor network traffic for anomalies, enabling timely mitigation of potential threats. To accommodate large-scale IoT-LLNs, the blockchain-based authentication solution should be designed with scalability in mind, capable of handling a growing number of nodes without compromising performance. Rigorous testing and evaluation, including simulations, real-world deployments, and performance benchmarking, are crucial to validate the effectiveness of the security solution and ensure its suitability for resource-constrained IoT devices and networks. Additionally, data privacy and protection mechanisms must be integrated to safeguard sensitive information and comply with privacy regulations. Continuous monitoring of evolving threats and attack vectors, coupled with collaboration and knowledge sharing among researchers and industry experts, is paramount for maintaining the security posture of IoT-LLNs in the face of emerging challenges.

3.1. Security Attacks on 6LowPAN and RPL

6LowPAN, an adaptation layer protocol for IPv6 over IEEE 802.15.4 networks, enables communication for IoT applications. Due to the restricted data range of IEEE 802.15.4, data fragmentation is performed at the transmitter side, and defragmentation is handled at the receiver side by the network adaptation layer.
6LowPAN networks, often used for wireless sensor networks in IoT applications, are susceptible to security vulnerabilities during data transmission. Some common attacks include the following:

3.1.1. Version Number Attack (VNA)

In a version number attack, a malicious node replays old routing messages with a higher version number. This can cause other nodes to believe that the malicious node is more up-to-date, and they may start routing packets through it. This can disrupt the network and allow the malicious node to eavesdrop on traffic.

3.1.2. Decreased Rank Attack (DRA)

In a decreased rank attack, a malicious node sends a message to its neighbours that claims to have a lower rank than it actually does. This can cause the neighbours to elect the malicious node as their parent, which can give the malicious node control of the routing table. This can allow the malicious node to disrupt the network and redirect traffic to its own malicious destination.

3.1.3. Increased Rank Attack (IRA)

In an increased rank attack, a malicious node sends a message to its neighbours that claims to have a higher rank than it actually does. This can cause the neighbours to stop routing packets through the malicious node, which can effectively isolate the malicious node from the network. This can be used to prevent the malicious node from eavesdropping on traffic or disrupting the network.
The IbiboRPLChain Solution is a secure blockchain-based authentication method that can mitigate these insider attacks by authenticating communication links between routing and sensor nodes. This prevents malicious nodes from manipulating routing information and disrupting network operations. Additionally, the solution enhances IoT-LLN security by utilising smart contracts to trigger immediate authentication upon detecting suspicious activity, ensuring prompt action against potential threats.

4. The Proposed IbiboRPL Chain Solution

In the realm of the IoT, wireless sensor networks (WSNs) play a pivotal role in neighbour signal monitoring, control, and control strategies [26,27,28,29]. The distributed blockchain model facilitates a secure transaction system, complementing the primary activities of WSNs, such as computing time, communication processes, monitoring, and tracking.
Consider the experimental model:
A x + 1 = X p p + Y p W p  
In this model, A x + 1 represents the state of the system at time step x + 1 , X p , Y p are system matrices, and W p is an additional process.
To address the security concerns associated with IoT-LLNs, the IbiboRPLChain Solution emerges as a promising approach. This secure blockchain-based authentication method for RPL nodes effectively mitigates insider attacks and enhances IoT-LLN security. By introducing an additional blockchain layer to the RPL architecture, the IbiboRPLChain Solution enables secure authentication of communication links between the routing layer and the sensor layer.
The effectiveness of the IbiboRPLChain Solution lies in its utilisation of smart contracts to trigger immediate authentication upon detecting routing attacks initiated by adversarial nodes in an IoT-LLN environment. This proactive approach ensures prompt action against potential threats, safeguarding the integrity and reliability of the network.

4.1. Enhancing Security and Scalability with the IbiboRPLChain Solution

To further enhance the security of IoT-LLNs, consider the signal measurement concept:
X I p + 1   =   J I p + 1   X p + 1   +   R i
In this model, X I p + 1   represents the signal measurement vector, J I p + 1 is the derived vector measurement, and R i is the noise measurement value. By employing the IbiboRPLChain Solution, the measurement values can be securely transmitted to the monitoring zone, enabling a minimum variance estimation of the entire process.
The IbiboRPLChain Solution, a secure blockchain-based authentication method, effectively addresses the challenges associated with IoT-LLNs by providing a robust and scalable authentication mechanism. By introducing an additional blockchain layer to the RPL architecture, the IbiboRPLChain Solution enables secure communication between routing and sensor nodes, safeguarding the network from insider attacks and enhancing overall security.

4.2. Optimising Performance with Balanced Distributed Variance Estimation

To optimise the performance of IoT-LLNs, consider the following equations:
A x + 1   =   X p     p
Here, A ( x + 1 ) is the predicted next routing-state vector (same dimension as x ); A ( x + 1 ) i X ( p ) is the feature/design row assembled under the current policy (e.g., bias, rank, Δ rank, version, Δ version, parent-churn flag/rate, DIO/DAO/DIS rates, ETX); and p R d × n is the c o e f f i c i e n t   m a t r i x learned on benign data (least squares/RLS). Shape check: ( 1 × d ) ( d × n ) ( 1 × n ) . The r e s i d u a l   r k + 1 = x k + 1 A ( x + 1 ) feeds your anomaly score (with Q and a threshold) to decide when to trigger IbiboRPLChain’s on-chain check. (If you prefer time indexing, write A ( x k + 1 ) = X k p and note that X k depends on data at time k.)
Q x + 1 = X p     Q p + 1   X p T + Y p P p   Y p T
Here, Q x + 1 is the predicted state covariance; X p is the sensitivity (Jacobian) of the state with respect to. the parameter vector/matrix p , and Q x + 1 is the parameter covariance (small or zero if p is fixed; the RLS covariance if p adapts). The second term injects process/disturbance uncertainty: Y ( p ) maps disturbance channels into the state, while P p is their covariance (estimated from benign link/traffic variability). In the IbiboRPLChain, we use this Q x + 1   to scale residuals via a Mahalanobis score, so the event trigger fires on statistically significant anomalies rather than routine noise, keeping on-chain calls sparse and energy-efficient in LLNs.
B p + 1 = Q k + 1 1
where Q k + 1 is the predicted next-step state covariance and III is the identity (baseline) covariance. Thus, B p + 1 measures how uncertainty is inflating relative to baseline and can drive adaptive policy (e.g., tighter thresholds when t r ( B p + 1 )   is large). If state channels are on different scales, replace 1   with a diagonal baseline S   learned from benign data ( B p + 1   =   Q k + 1 S ); and if you need a weighting matrix, project B p + 1 to be S P D (e.g., add a small ridge or take its positive-part eigenvalues).
B k + 1 = Y p + 1     p + 1 ;
where Y p + 1 is a policy-dependent feature/basis map (features selected/normalised by the current policy) and p + 1 is the updated coefficient matrix; thus, ( n × d ) ( d × m )   ( n × m ) . This makes B adaptive to topology, link quality, and energy conditions while remaining linear and lightweight. If BBB is later used as a weighting in a quadratic form, ensure it is positive (semi)-definite (e.g., project to the S P D cone or construct B = ( Y p ) ( Y p ) ) ; if policy updates are synchronous with time, you may take p + 1 k + 1
Q + p + 1 = B 1 p + 1 + Q i p + 1 1
where 1   denotes a matrix inverse. Here, B 1 p + 1   is the prior/baseline covariance produced by the event-triggered estimator at the previous step, and each Q i p + 1 is a source covariance (e.g., neighbour consensus, rank/version/churn/burstiness feature blocks, or gateway summaries). The fused Q + p + 1 =   scales residuals, so the event trigger only fires on statistically significant anomalies, cutting false positives and thus reducing on-chain attestations key for LLN energy and airtime. For robustness, ensure all terms are SPD and compute with Cholesky solves (avoid explicit inverses); when uncertainty is high, the smart contract can temper mitigation severity, whereas low uncertainty justifies faster quarantine/blacklisting.
These equations represent the balanced distributed variance estimation process, which utilises multiagent propagation values and dynamic consensus blockchain to generate the computation time. This approach ensures optimal resource utilisation and efficient network operation.

4.3. The Role of Multiagents in IoT Applications

In the context of IoT applications, the average of a collective time difference neighbour signal plays a crucial role [20,30]. To achieve efficient IoT network operation, multiagents play a pivotal role in gathering neighbour signals, lifetime, and tracking information from various applications [21]. The coordination among multiagents participating in the mobile wireless network is essential for effective network management.
The dynamic consensus blockchain-based control system is proposed to maintain control strategies among multiagents [31,32]. These control strategies involve tracking neighbour signals and coordinating with the dynamic consensus blockchain system [33]. While most existing analyses have been conducted through static consensus, the dynamic consensus blockchain algorithm can now be effectively utilised to address the challenges associated with dynamic and distributed IoT networks. It is utilised in control strategies where agent allocation is distributed throughout the wireless network [34,35,36,37].

4.4. Proposed Objective: Tracking Multiagents with Multiple Locations

The proposed objective focuses on tracking multiagents with multiple locations instead of local following. The core concept involves following multi-location agent signals distributed throughout the wireless IoT network, where each agent is positioned at a different vector Vi with respect to the mobile location [38,39]
A three-layer communication approach is maintained for the multiagent system. According to the IbiboRPLChain Solution, multiagents are placed in all three communication layers [40,41]. The third layer is occupied by local followers, where multiagents are affected by neighbouring nodes [18,42]. The IbiboRPLChain Solution is responsible for tracking the control strategies [4,12].
The multiagent fulfils the IbiboRPLChain Solution control system with provided signal levels and a three-layer communication system [43,44].
The IbiboRPLChain Solution, a secure blockchain-based authentication method, effectively addresses the challenges associated with tracking multiagents with multiple locations. By introducing an additional blockchain layer to the RPL architecture, the IbiboRPLChain Solution enables secure communication between routing and sensor nodes, safeguarding the network from insider attacks and enhancing overall security. Moreover, the IbiboRPLChain Solution utilises smart contracts to trigger immediate authentication upon detecting routing attacks initiated by adversarial nodes. This proactive approach ensures prompt action against potential threats, maintaining the integrity and reliability of the multiagent system.
The IbiboRPLChain Solution provides a secure and tamper-proof communication channel between multiagents, preventing unauthorised access or manipulation of tracking data. The IbiboRPLChain Solution can efficiently handle a large number of multiagents and dynamic network changes, making it suitable for large-scale IoT deployments. The IbiboRPLChain Solution’s distributed consensus mechanism ensures that the system remains operational even in the presence of node failures or network disruptions.
In Figure 1, we propose a Distributed Adaptive Framework control for a dynamic event-triggered model. This novel strategy controls multiagent propagation values, enabling the proposed system to follow an optimisation technique. Multiagents are controlled by an adaptive controller, ensuring data storage within the wireless sensor network.
The consensus blockchain-based multiagent signal points are closer to higher values, which are considered to be farther away from the existing point. The multiagent propagation value initiates the dynamic event creator.

4.5. System Model and Multiagent Control

The system model elaborates on the concept of a multiagent leader, which provides commands to multiagent followers [34]. Following each successful communication with a follower, the evolution of the multiagent leader is described as follows:
M A n + 1 t =   E x n + 1 t ,
where E x n + 1 t ∈ Rn represents the revised evaluated multiagent leader.

Network Priority Signal Control

A critical challenge lies in controlling restricted network priority signals for multiagents [45,46]. Multiagent signals are collected to restrict signal controls from a two-layer system. This three-layer system introduces complexity to the free control system.
To enhance network coverage signals, the function of multiagents is considered based on their positions within the evaluated three-layer systems. Network controllers are assigned to middle-layer nodes, and followers are designed with different input levels to maintain the saturation level [47].

4.6. Multiagent Leader and Consensus-Based Signal Points

The three-layer system defines the multiagent leader as a zero-value point until the multiagent acquires a dynamic autonomous format [48,49]. The objective of the Internet of Things (IoT) controller is to maintain the saturation level of different assigned points within the system.
Consensus-based multiagent signal points are closer to the multiagent leader’s reach, while existing system scenarios consider signal points to be too far away [42]. The primary reason for positioning multiagents closer to the leader’s signal point is to maintain frequent transactions.

4.6.1. Proposed Approach: Bounded Area for Multiagent Saturation Point and Located Signal Point

To address this concept, we propose that the multiagent saturation point and located signal point be confined within a bounded area:
X n   R n ,   S   =   R n + 1
This approach ensures that multiagent signal points remain within a manageable range, enhancing network stability and preventing signal disruptions.

4.6.2. Dynamic Leaderless Following Protocol and Dynamic Distributed Adaptive Consensus

The dynamic leaderless following dynamic distributed adaptive consensus protocol tracks the follower signal time:
F s t   t i k ,   i ,
The dynamic variable value D r follows:
D r =   P t Q t t +   P t 1 Q t 1 t 1   P t n Q t n t n ,
where P t is a positive value of the matrix and Q t   are positive values in the constants to be assigned in the system.
The distributed triggering function for the proposed consensus adaptive protocol is given by:
U _ i ( t )   =   w _ I ( t )   K   [ _ j ^ n   K i j   ( x _ j ( t )     x _ i ( t )   +   D _ i ( x _ 0 ( t )     x _ i ( t ) ) ] ,
The formula U _ i ( t )   =   w _ I ( t )   K   [ _ j ^ n   K i j   ( x _ j ( t )     x _ i ( t )   +   D _ i ( x _ 0 ( t )     x _ i ( t ) ) ] , is a leader–follower consensus control with pinning and event-triggering. The neighbour term j K i j ( x j x i ) damps disagreement; the pinning term D i ( x 0 x i ) pulls agent iii towards the reference x 0 ; K maps error to input; and w i ( t ) [ 0,1 ] activates updates only when needed (event trigger), reducing traffic and computation. Larger K i j ,   o r   D i speed convergence but can increase actuation/noise sensitivity; connectivity plus at least one pinned node ensures convergence. In IbiboRPLChain, w i ( t ) is driven by the anomaly score/authentication status, so benign periods keep w i ( t ) 0 (saving airtime), while significant anomalies set w i ( t ) = 1 and can trigger on-chain attestation.
Where: D i   >   0 if there exists an edge from the leader to multiagent, otherwise D i   =   0 . The dynamic distributed adaptive consensus protocol follows the updates:
W i t =   P r o j W i t =   { Q t t Q t n t n } ,
where W i and Q t are positive signals.
The IbiboRPLChain Solution can be seamlessly integrated into this framework to enhance the security and integrity of the multiagent system. By introducing an additional blockchain layer to the RPL architecture, the IbiboRPLChain Solution enables secure authentication of communication links between the routing layer and the sensor layer. This ensures that only authorised agents can participate in the network and prevents malicious nodes from manipulating routing information or disrupting network operations.

4.7. Experimental Simulation Scenarios

The experimental evaluation was executed using the Contiki Operating System integrated with the Cooja simulator, a well-established open-source framework tailored for the emulation of wireless sensor networks (WSNs) and Internet of Things (IoT) deployments within constrained environments. Contiki’s modular and lightweight architecture has made it a preferred choice in academic research, enabling extensive configurability, a low memory footprint, and direct access to core system components for protocol development. Its open-source nature facilitates the modification of underlying kernel and network stack functionalities, allowing the implementation and validation of novel algorithms under realistic simulation conditions.
The simulation environment and associated configurations used in this study are detailed in Table 1.
Two experimental simulation scenarios are presented to demonstrate the performance enhancements achieved by the IbiboRPLChain Solution.

4.7.1. Example 1: Triggering Experiment

To verify the triggering mechanism, consider a network model with eight neighbouring nodes. The selected nodes are described by the following equations:
X i t =   R i t   D i t ,
Y i t = R i t D j t ,
Z i t = R i t D k t ,
where:
  • X i t and Y i t are the multiagent coordination points of different angles.
  • R i t is the regular velocity of the respective nodes.
For each node, an input R i t   R is announced, and X i t =   Y i t . Integrating the IbiboRPLChain Solution with regular velocity values along the x and y axes, we obtain X i t =   R i t   a n d   Y i t =   R i t , resulting in the coordination of joined values.
The multiagent controller input values U i t   a n d   Y i t along the x and y axes are represented by:
X i t =   R i n t ,   Y i t =   R i n t ,   Z i t =   R i n t
This describes the relationship between X i t ,   Y i t ,   a n d   R i t :
X i t =   C o l X i t ,   R i n t ,   Y i t ,   R i n t   a n d   R i t =   c o l D i t ,   D j t
Under the IbiboRPLChain Solution, the multiagents positioned with X i t ,   Y i t reach different points [38,50]. The multiagent data transmission triggered by the IbiboRPLChain Solution effectively reduces the tracking instants.
In a normal static environment, the coupling values are designed to be Ci > 3.5. In such cases, an ideal formation consists of eight autonomous neighbouring nodes. When X i t =   x i t   ε i t ,   Y i t =   y i t   ε i t , where ε i x t and ε i y t are ideal values, then X i t and Y i t will converge to a normal consensus value.

4.7.2. Example 2: Performance Evaluation

The existing experimental results for limited agents and specific time schedules demonstrate that dynamic event triggering with limited agents reduces triggering instants but is not optimal for the triggered scheme [51]. The proposed IbiboRPLChain Solution shows clear results with a significant reduction in triggering instants.
Figure 2 illustrates the time versus multiagent triggering [37,38]. The triggering level indicates that the IbiboRPLChain Solution improves performance.
Multiagent linear dynamic event-triggered schemes as shown in Figure 1.
The graph x t , y t of nine agents indicates almost highest time sequence achievement.
Figure 3, represent the mobile roots, Figure 4 represents the autonomous mobile roots. And while Figure 5 represent the mobile roots. The experimental results will cover the propagation value to maintain the consensus.
The distributed network topology is defined as D N   =   1 N D   i = 1 -------------- Y i t Y   0 t -------------- 4   o f   4.23   ×   1   ×   10 8 and 10 s, this metric reflects the activeness of the distributed network topology [52].
The ideal proposed topology setting is mentioned in Figure 6. The starting stage of the multiagent followers are mentioned in the positions below.
X1 = [2.5, 0, −2]T, X2 = −10× [2, 2, 2]T, X3 = −5× [2, 2, 2]T, X4 = 8× [2, 2, 2]T, X5 = −5× [2, 2, 2]T, X6 = −10× [2.5, 0, −2]T, X7 = 8× [2.5, 0, −2]T, X8 = 10× [2.5, 0, −2]T,
The triggering time sequences are followed with various sequences and receive the values which show the multiagent security performance. Figure 7 indicate that the multiagent system follows the consensus protocol, which controls the threat activity and improves the network computation time. While Figure 8 indicates the mobile roots security performance in different time evolutions in the wireless network scenario.
The adaptive time evolution strength (Figure 9) shows high values that follow the stable propagation. The above-mentioned case considered for nine autonomous mobiles.
To determine the effectiveness of the proposed adaptive distributed control, with time evolutions of second variables are noted with time series [53] (Figure 10).
Experimental Scenario: The experimental scenario demonstrates the ideal solution with a dynamic distributed adaptive consensus protocol and a dynamic triggering event multiagent communication system. We have taken the ideal proposed multiagent system with the format mentioned below.
In Figure 11, it sets the initial geometry of eight agents, deliberately spread across different quadrants and radii of the 200 m × 200 m arena so some pairs are multi-hop from the start. Positions are scaled along two basis directions (e.g., multiples of [ 2,2 , 2 ] [ 2,2 , 2 ] [ 2,2 , 2 ] and [ 2.5,0 , 2 ] [ 2.5,0 , 2 ] [ 2.5,0 , 2 ] ) , creating heterogeneous neighbour sets, link qualities, and hop counts. This layout stresses the event-triggered mechanism and tests IbiboRPLChain’s selectivity, such that only statistically significant anomalies should prompt on-chain attestation. In short, Figure 11 is a controlled, adversarially realistic starting map that forces topology formation, exposes parent changes and rank dynamics, and reveals how well the trigger suppresses chatter while preserving timely, decentralised enforcement.
The computation process λmin (I) = 0.3475 is showcasing the response delay. In addition, ω = 3.9864, ώ (0) = 2, σ = 2.5. Based on the experimental setup, by selecting this, ώi = 15 obtains that λio = [819.09, 392.18, 94.92, 98.08]T and δ = [0.00344, 0.0045, 0.0043, 0.0049, 0.0042]T. We can highlight that α = [0.4, 0.4, 0.6, 0.30, 0.34]T. With respect to Q = I4, it has Y = P, BT = [0.3947, 0.9365, 0.4826].
The eight multiagents and the followers processing under adaptive dynamic distributed consensus control and the dynamic event triggering conditions are highlighted in various intervals [54].
Figure 12 shows the eight followers’ state trajectories converging from widely separated initial conditions to a common profile with short transients and little overshoot. The stepped or infrequent updates reflect the event-triggered consensus, which suppresses non-informative transmissions hence fewer packets and lower effective delay. All agents stabilise smoothly, evidencing that IbiboRPLChain’s in-loop, noise-aware triggering preserves formation accuracy while keeping control-plane traffic sparse.
The experimental results show the delay on the output the communication delay highly reduced.
Table 2 contrasts a MAC-scheduled baseline with a IbiboRPLChain and shows clear gains across all tracked outcomes, fewer trigger events, faster response, reliable consensus, higher security/activeness, lower computation cost, and steadier propagation. The advantage comes from IbiboRPLChain’s event-triggered consensus (cuts non-informative traffic) and on-chain, tamper-evident enforcement (uniform, rapid mitigation), so only statistically meaningful anomalies incur overhead.
The proposed IbiboRPLChain Solution outperforms the existing system in all aspects. It reduces triggering instants by 50%, improves time by 2×, achieves consensus, increases activeness by 3×, improves security by 4×, reduces network computation time by 3×, stabilises propagation, and increases time evolution strength by 5×.
Table 3 benchmarks IbiboRPLChain against a generic decentralised method and public/enterprise chains (Bitcoin, Ethereum, Hyperledger Fabric) across crypto, trigger granularity, latency, consensus, propagation, activeness/adaptability, and cost. IbiboRPLChain is event-triggered (per-anomaly, not per-packet), permissioned (e.g., BFT/PoA), and uses lightweight SHA-256/ECDSA/Merkle proofs, yielding low latency and computational cost suited to RPL LLNs. By contrast, Bitcoin/Ethereum rely on block/transaction triggers with PoW/PoS—high latency/energy—and Fabric’s BFT stack, while lower-latency, is heavier and enterprise-oriented. Net effect: IbiboRPLChain aligns with LLN budgets (energy/airtime) and delivers prompt, in-loop authentication; the others serve as secure but mismatched baselines for constrained IoT.
Overall, the proposed IbiboRPLChain Solution is a significant improvement over the existing system.

4.8. The Proposed IbiboRPLChain Solution: Algorithmic Derivation

4.8.1. Design Rationale and Threat Model

IbiboRPLChain inserts a lightweight, permissioned blockchain layer between the RPL control plane and the sensing plane so that authentication and mitigation occur inside the routing loop rather than as a post hoc process at a trusted sink. This design choice removes the single point of failure inherent in sink-centric schemes and ensures tamper-evident, network-wide consistency of decisions. The target adversary space is insider, and hybrid attacks specific to RPL, most notably version number attack (VNA), decreased and increased rank manipulation (DRA/IRA), replay of control messages (DIO/DAO/DIS), and coordinated parent-churn attempts (see Section 3.1).

4.8.2. State–Space View of the Control Plane

We recast the RPL control plane as a discrete-time state–space system consistent with (1):
x k + 1 = A x k + B u k + w k ,
where the state vector x k aggregates security-relevant routing quantities (per-node rank, preferred parent, DODAG version, and lightweight link surrogates such as ETX/PRR); the input u k captures protocol actions (e.g., parent switches, DIO/DAO emissions); and the disturbance w k encapsulates exogenous variability (loss, mobility, interference). This formalisation makes explicit what is predictable under benign evolution and, therefore, what constitutes a suspicious deviation at time k + 1 .

4.8.3. Measurement Model and Minimum-Variance Fusion

Observations are related to the latent state via (2):
z k   =   C x k   +   v k ,
where z k comprises compact per-node summaries (neighbours’ ranks/versions, moving-window control-message rates, and simple link-quality proxies) and v k is measurement noise. Nodes forward only these summaries rather than raw traces so that the monitoring logic can perform minimum-variance (Kalman-style) fusion without incurring the bandwidth and energy costs that are prohibitive in IEEE 802.15.4 LLNs. Summaries are integrity-protected before they influence estimates.

4.8.4. Event-Triggered Dynamic Consensus (Equations (3)–(7))

To avoid a central estimator, nodes run a balanced distributed variance estimation with event-triggered messaging: a node transmits an update only when its local estimate changes materially; otherwise, it remains silent. This yields two benefits that are borne out empirically:
(i)
Statistical robustness: adversarial outliers are diluted by the majority evolution of honest nodes;
(ii)
Communication frugality: non-informative traffic is suppressed, conserving energy while preserving responsiveness in dynamic topologies.

4.8.5. Attack Observables and Anomaly Scoring

From ( x k ,   z k ) we extract low-cost, protocol-native attack observables that do not require heavy machine learning:
  • Rank discontinuity: ∣ Δ rank ∣ = ∣   r a n k k r a n k k 1 ∣ exceeding a policy threshold.
  • Version jump: Δ v e r   =   v e r k     v e r k 1 inconsistent with legitimate DODAG rebuilds.
  • Parent churn: excessive rate of preferred-parent changes in a sliding window.
  • Control burstiness: DIO/DAO/DIS frequency significantly above the norm given current link quality.
A node’s anomaly score is a weighted sum of the above (weights and thresholds are policy parameters; see Section 4.8.9). When the score crosses the trigger threshold, the node (or a local gateway) raises an attestation.

4.8.6. Smart-Contract Attestation and On-Chain Ruling

An attestation contains hashed features and freshness metadata and is submitted to a permissioned ledger. A compact smart contract verifies recency and applies a strike/penalty rule, returning a ruling (benign/malicious) and recording it immutably. Because this adjudication is in-ledger, all routers converge on the same view (no partition-specific outcomes), and there is no dependence on a single overseer.

4.8.7. Network-Side Mitigation and Recovery

If the ruling is malicious, the network applies a mitigation ladder appropriate to LLNs: warn → rate-limit control messages → quarantine/blacklist (revoking parentage and denying DAO participation) → rekey (local/subtree). Alerts reference the on-chain record so that actions are auditable and consistently enforced. Benign rulings decay the anomaly score to avoid sticky states.

4.8.8. Complexity, Energy Budget, and Correctness

Per-packet work is O ( 1 ) for feature extraction plus O ( l o g W ) if a replay window is maintained. Only suspicious flows touch the chain, so energy stays near baseline; the event trigger maintains responsiveness by escalating when it matters. Correctness depends on:
(a)
Conservative thresholds for noisy links;
(b)
Event-trigger parameters that suppress chatter without masking genuine changes;
(c)
Low-latency, permissioned consensus (e.g., BFT/PoA), configured with a finality depth compatible with LLN delay budgets.

4.8.9. Parameterisation Used in Our Experiments

For transparency and reproducibility, Table 1 (Section 4.7), provides the simulation environment (Contiki 2.7, Cooja, Z1 motes, IEEE 802.15.4, MRHOF, 1800 s, 200 × 200 m, 60 s application interval). The security policy parameters below correspond to the results reported in Figure 2, Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11 and Figure 12 and Table 2 and Table 3; they may be tuned for other deployments.
  • Anomaly score weights:
w r a n k ,   w v e r ,   w p a r e n t ,   w b u r s t ,   w r e p l a y ,   w c o n s i s t e n c y .
  • Thresholds:
T r a n k   ( r a n k   s t e p ) ,   T v e r   ( v e r s i o n   b u m p ) ,   T p a r e n t   ( P a r e n t   s w i t c h / w i n d o w )   T f r e q   ( m s g / w i n d o w ) ,   T s c o r e   ( t r i g g e r ) .
  • Windows and timers:
T w i n d o w   ( f r e q u e n c y   w i n d o w ) ,   T c o o l d o w n   ( s c o r e   d e c a y ) ,   T b l a c k l i s t   ( q u a r a n t i n e ) ,   T a d a p t   ( p o l i c y   t u n i n g ) .
  • Ledger settings: consensus type (e.g., PoA/BFT), finality depth, gateway authorisation list.

4.8.10. Algorithm Overview (High-Level Workflow)

Input: LLN graph G = ( V , E ) ; policy P O L ; smart contract S C .
Loop (per control message):
  • Verify freshness/signature; update per-node counters.
  • Compute Δ rank, Δ version, parent-churn, and burstiness; update anomaly score.
  • If score ≥ T s c o r e : submit hashed features to S C .
  • On-chain ruling → benign: decay score; malicious: blacklist/quarantine/rekey + broadcast alert.
  • Periodically adapt thresholds using false-positive/false-negative estimates from the audit log.

4.8.11. Empirical Alignment with the Derivation

Under identical radio and topology settings (Table 1), activating the event-trigger plus in-loop attestation produced the headline gains reported in Section 4.7: ~50% fewer triggering instants, 2× faster response, 100% consensus, 3× lower network computation time (100 s → 33 s), 3× activeness, 4× security, and stabilised propagation/time-evolution metrics. These results are consistent with the derivation: the dynamic consensus filters outliers and limits chatter; the anomaly score surfaces genuine inconsistencies; and the smart contract provides immediate, decentralised adjudication with uniform enforcement.

5. Analysis and Discussions

In this wireless scenario, the experimental setup is fixed with multiple autonomous multi-roots with covering common values to achieve the consensus adaptive protocol. Figure 3 and Figure 4 show the time evolution.
Figure 13 and Figure 14 below are the static single consensus protocol that creates new user identity threats; it reflects the time evaluations of the communication framework. The time evolutions are highly affected in 40, 50 and 60 s and highly interrupt the network communication. Figure 14 illustrates the adaptive time evolutions provided no restrictions for threats and malicious activity. The threat activities gradually affect the time evolutions.
The neighbour node positions and sequence details are placed in the xy-plane of the assigned nodes. The time evolutions are assigned in different variables movements.
The distributed consensus refers to the consistency on the computation time and maintains the security-based data management system. This security system controls the attacker interception and allows the trusted neighbour nodes. The consensus protocol governs unrestricted network nodes that trigger threat activity and controls it.
Figure 2 shows the distributed adaptive function values indicating the performance of the energy maintenance. The consensus values are expressed below [39].
C S n   =   1 N n i = 1   <   10 n , the 10−n becomes the exponential values and 24 s multiagents reaches the consensus [56]. These values represent the successful distributed network topology setup.
The wireless network scenario identifying the different adaptive distributed control system following the dynamic distributed adaptive consensus protocol expressions are as follows:
Do = [2.5, 0, −2.5]T, D1 = −5× [1.5, 0, −1.5]T, D2 = 1× [2.5, 0, −2.5]T, D3 = 1× [2.5, 0, −2.5]T, D4 = 2× [2.5, 0, −2.5]T, D5 = 3× [2.5, 0, −2.5]T, D6 = 4× [2.5, 0, −2.5]T, D7 = 5× [0.5, 0, 1.5]T. It is easy to handle the adaptive values. To obtain the theory calculations,
K 1   =   B T ;   P   =   0.4100 ,   0.4500 ,   0.4230 . The neighbour nodes and adaptive controller are showing in consensus. The data transmission and interval between the transmissions are followed successfully [19]. The data communication intervals are reduced effectively [30]. The adaptive time evolutions n i t and parameters w i t respectively. K = (1/N) i = 1 n || xi(t)–xo(t)|| 2. After 15 s, the dynamic distributed the consensus protocol achieved [16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57]. The successful data transmission on constraint multiagent coordination, via dynamic consensus control algorithm, supports the locally available referred network signals and provides major support for balance compensation due to predefined convergence under dynamic network networks.
The security on an application layer in wireless network faces several challenging obstacles as mentioned:
  • Identity Authentication. Each application has an enormous number of users; therefore, it is required to apply the privilege and deny illegal access by employing authentication mechanisms.
  • Data Storage and Recovery. Data transmission among different wireless objects and applications is exposed to many security threats. This state needs the data integrity and privacy to protect the transmitted data from exploitation.
  • Handling Huge Data. The application layer processes a large amount of data, which leads to data loss during the transmission process. This problem may affect the efficiency of the wireless processes.
  • Software Vulnerabilities. Programming errors in application software can create vulnerabilities that may be exploited.
Therefore, the key tasks of IoT security must guarantee proper application-level protections by achieving CIA and set of other requirements as follows:
  • Confidentiality. Equivalent to privacy, confidentiality ensures that data is protected and only accessible to authorised users.
  • Integrity. Data integrity is a security requirement to ensure the accuracy, completeness, and consistency of the data.
  • Availability. Availability of data refers to ensuring that authorised users can access information and services whenever they need it.
  • Access control. This is a security procedure used to control who or what can view or utilise resources and manage server communication.
  • Authentication. This is the process of recognising a user’s identity before launching a communication channel between two parties.
  • Authorisation. This defines the rights and privileges of the authentication party after gaining access to a system.

6. Conclusions

While the IbiboRPLChain Solution sets a compelling precedent for secure and scalable routing in IoT-LLNs, it is crucial to contextualise these outcomes within the landscape of existing research. Many prior models, such as VeRA [15], SHA-1-based cryptographic rank regulation [16], and trust-based intrusion detection systems [24], have demonstrated varying degrees of success in combating routing threats. However, these systems often present a trade-off between security strength and operational efficiency. For instance, VeRA’s hash-chain approach mitigates version and rank manipulation attacks effectively but requires high computational throughput—making it unsuitable for energy-constrained LLN nodes. Trust-based frameworks, while offering decentralised decision-making, frequently rely on subjective metrics and cannot react promptly to rapidly evolving attack vectors, particularly when they occur within the routing layer itself [24]. Moreover, machine learning-driven detection models [23,24] have shown promise in identifying Sybil and DoS attacks using historical traffic data but suffer from high latency, require extensive labelled datasets, and rely on centralised training architectures—thus undermining the decentralisation premise of LLNs.
In contrast, the IbiboRPLChain Solution introduces a fundamentally different architecture, prioritising both resilience and real-time response. Its blockchain-based design decentralises trust, eliminating reliance on a single node for authentication. More importantly, the integration of smart contracts for event-triggered routing authentication significantly shortens the detection-to-response window. Unlike models that passively log attacks or rely on periodic audits, IbiboRPLChain automatically triggers secure verification protocols once anomalous routing behaviour such as suspicious rank changes or version escalations is detected. This design ensures that malicious nodes are immediately isolated and prevents further routing disruption [58].
Empirical simulations conducted using Contiki OS and the Cooja emulator further affirm the technical merit of this approach. In controlled testbed conditions using Z1 motes and IEEE 802.15.4 configurations, IbiboRPLChain reduced the number of routing attack trigger instances by 50%. It achieved 100% consensus among participating nodes and decreased network computation time from 100 to 33 s, indicating a threefold improvement in routing decision efficiency. Additionally, the system improved overall security by a factor of four, measured through enhanced resistance to insider threats, improved packet delivery rates, and robust node identity verification. Network activeness and propagation stability also increased by 3× and 5×, respectively, while maintaining minimal energy overhead, as demonstrated by battery consumption metrics stabilising near baseline across the 1800 s simulation window. These results illustrate the feasibility of deploying IbiboRPLChain in real-world IoT environments, particularly in smart cities, industrial monitoring systems, and healthcare applications, where low latency and high trustworthiness are paramount.
Compared with the static-consensus baseline under the same Contiki/Cooja configuration (Table 1), the IbiboRPLChain dynamic distributed consensus halved the settling/communication time (100 s → 50 s; −50%) and reduced network computation time by 67% (100 s → 33 s); it also halved the number of triggering instants (100 → 50; −50%), increased security from 20% to 80% (+60 pp; 4×), raised activeness from 10% to 30% (+20 pp; 3×), and achieved stable propagation (0% → 100%), confirming the practical effectiveness of the proposed approach (Table 2; see also Figure 12).
Yet, the system is not without limitations. The blockchain ledger size, though managed efficiently in simulations, may scale unfavourably in high-frequency transaction environments, especially when thousands of nodes are deployed. Similarly, the smart contract execution times, although minimal in test conditions, may introduce delays if the underlying blockchain consensus mechanism is not optimised for high throughput. Furthermore, while the current implementation secures RPL routing, it does not yet offer full-stack protection across other layers of the IoT protocol stack such as the application or physical layers where threats such as firmware attacks and cross-layer spoofing remain viable. Additionally, IbiboRPLChain is currently built around a proof-of-concept private blockchain; future research must explore the integration of more energy-aware consensus models, such as Proof-of-Authority (PoA) or Delegated Byzantine Fault Tolerance (dBFT), which are better suited for constrained environments than Proof-of-Work (PoW) or even traditional Proof-of-Stake (PoS) [59].
To further enhance the robustness and applicability of the proposed system, future work should pursue deployment in heterogeneous, real-world environments, including multi-hop networks and mobile LLNs. Moreover, integrating adaptive machine learning agents into the smart contract framework could enable proactive threat prediction and auto-tuning of verification thresholds, thereby combining the strengths of both blockchain and AI-driven security. There is also scope for exploring cross-domain interoperability, allowing the IbiboRPLChain to function across various IoT platforms and blockchain ecosystems via standardised interfaces or blockchain-agnostic layers.
In summary, this work delivers a novel and practically viable contribution to the field of IoT security by bridging the gap between theoretical blockchain models and real-time, event-triggered, energy-efficient network security. It surpasses existing models in responsiveness, decentralisation, and empirical performance, while also laying a foundation for further research in adaptive, scalable, and autonomous security protocols for the next generation of IoT networks.

Author Contributions

Conceptualization, J.T.I.; Methodology, J.T.I.; Software, J.T.I.; Validation, J.T.I.; Formal analysis, J.T.I.; Investigation, J.T.I.; Resources, J.E.B., T.A. and O.O.A.; Data curation, J.T.I.; Writing – original draft, J.T.I.; Writing – review & editing, J.E.B., T.A. and O.O.A.; Visualization, J.T.I.; Supervision, J.E.B., T.A. and O.O.A.; Project administration, J.T.I., J.E.B., T.A. and O.O.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alfriehat, N.; Anbar, M.; Aladaileh, M.; Hasbullah, I.; Shurbaji, T.A.; Karuppayah, S.; Almomani, A. RPL-based attack detection approaches in IoT networks: Review and taxonomy. Artif. Intell. Rev. 2024, 57, 1–56. [Google Scholar] [CrossRef]
  2. Alsukayti, I.S.; Alreshoodi, M. RPL-Based IoT Networks under Simple and Complex Routing Security Attacks: An Experimental Study. Appl. Sci. 2023, 13, 4878. [Google Scholar] [CrossRef]
  3. Prajapati, A.K.; Pilli, E.S.; Battula, R.B.; Varadharajan, V.; Verma, A.; Joshi, R.C. A Comprehensive Survey on RPL Routing-based Attacks and Mitigation. Comput. Electr. Eng. 2025, 123, 110071. [Google Scholar] [CrossRef]
  4. Boudouaia, M. Version Number Attacks in RPL-based IoT Networks: State of the Art. In Proceedings of the 8th International Conference on Future Networks & Distributed Systems, Marakech, Morocco, 11–12 December 2024; ACM: New York, NY, USA, 2024. [Google Scholar]
  5. Omar, A.A.R.A.; Soudan, B.; Altaweel, A. UOS_IOTSH_2024: A Comprehensive Network Traffic Dataset for Sinkhole Attacks in Diverse RPL IoT Networks. Data Brief 2024, 55, 110650. [Google Scholar] [CrossRef]
  6. Bang, A.O.; Rao, U.P.; Kaliyar, P.; Conti, M. Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey. ACM Comput. Surv. 2025, 55, 1–36. [Google Scholar] [CrossRef]
  7. Arshad, D. THC-RPL: Trust-enabled Hybrid Cooperative Routing for Sybil Detection in IoT Networks. PLoS ONE 2022. [Google Scholar] [CrossRef]
  8. Hassan, J.; Sohail, A.; Awad, A.I.; Zaka, M.A. LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks. Ad Hoc Netw. 2024, 163, 103576. [Google Scholar] [CrossRef]
  9. Raghavendra, T.; Anand, M.; Selvi, M.; Thangaramya, K.; Kumar, S.S.; Kannan, A. An intelligent RPL attack detection using machine learning-based intrusion detection system for Internet of Things. Procedia Comput. Sci. 2022, 215, 61–70. [Google Scholar] [CrossRef]
  10. Alfriehat, N.; Alenezi, M.; Alshahrani, H.; Alenezi, F.; Alarifi, A.; Al-Hadhrami, T.; Alghamdi, M.; Almomani, A.; Alzahrani, B.; Alotaibi. Machine/Deep Learning for IoT IDS (within survey (1)). Artif. Intell. Rev. 2024. [Google Scholar]
  11. Albinali, H.; Azzedin, F. Replay Attacks in RPL-based IoT: Comparative & Empirical Study. Comput. Netw. 2025, 257, 110996. [Google Scholar]
  12. Krari, A.; Hajami, A.; Toubi, A.; Said, M.A. Enhancing IoT Security: A Comprehensive Framework for Energy and Radio Dataset Generation to Mitigate IoT RPL Attacks. Int. J. Tech. Phys. Probl. Eng. 2024, 16, 106–119. [Google Scholar]
  13. Obaidat, M.A.; Rawashdeh, M.; Alja’afreh, M.; Abouali, M.; Thakur, K.; Karime, A. Exploring IoT and blockchain: A comprehensive survey on security, integration strategies, applications and future research directions. Big Data Cogn. Comput. 2024, 8, 174. [Google Scholar] [CrossRef]
  14. Kumar, N.; Ali, R. Smart contract-based authentication in 6G-IoNMT: Protocol design and latency trade-offs. Comput. Netw. 2024. [Google Scholar]
  15. Bano, S.; Sonnino, A.; Al-Bassam, M.; Azouvi, S.; McCorry, P.; Meiklejohn, S.; Danezis, G. SoK: Consensus in the age of blockchains. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies, Zurich, Switzerland, 21–23 October 2019; pp. 183–198. [Google Scholar] [CrossRef]
  16. Biais, B.; Bisiere, C.; Bouvard, M.; Casamatta, C. The Blockchain Folk Theorem; IDEI Working Papers; Institutd’ÉconomieIndustrielle: Toulouse, France, 2017. [Google Scholar]
  17. Bonneau, J. Hostile blockchain takeovers (short paper). In Proceedings of the 5th IFCA Workshop on Bitcoin and Blockchain Research, Willemstad, Curaçao, 2 March 2018; pp. 92–100. [Google Scholar]
  18. Zhong, S.; Chen, J.; Yang, Y. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of the IEEE INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), San Francisco, CA, USA, 30 March–3 April 2003; IEEE: New York, NY, USA, 2003; Volume 3, pp. 1987–1997. [Google Scholar]
  19. Zhang, Z.; Wang, J.; Luo, J.; Ding, X.; Zhong, J.; Wang, J.; Wu, F.X.; Pan, Y. Sprites: Detection of deletions from sequencing data by re-aligning split reads. Bioinformatics 2016, 32, 1788–1796. [Google Scholar] [CrossRef]
  20. Shang, R.; Liu, H.; Jiao, L.; Esfahani, A.M. Community mining using three closely joint techniques based on community mutual membership and refinement strategy. Appl. Soft Comput. 2017, 61, 1060–1073. [Google Scholar] [CrossRef]
  21. Uddin, A.; Stranieri, A.; Gondal, I.; Balasurbramanian, V. A lightweight blockchain based framework for underwater iot. Electronics 2019, 8, 1552. [Google Scholar] [CrossRef]
  22. Li, C.; Coelho, E.A.A.; Dragicevic, T.; Guerrero, J.M.; Vasquez, J.C. Multiagent-based distributed state of charge balancing control for distributed energy storage units in ac microgrids. IEEE Trans. Ind. Appl. 2017, 53, 2369–2381. [Google Scholar] [CrossRef]
  23. Xing, L.; Mishra, Y.; Tian, Y.-C.; Ledwich, G.; Zhou, C.; Du, W.; Qian, F. Distributed state-of-charge balance control with event triggered signal transmissions for multiple energy storage systems in smart grid. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1601–1611. [Google Scholar] [CrossRef]
  24. Sharma, M.; Elmiligi, H.; Gebali, F.; Verma, A. Simulating Attacks for RPL and Generating Multi-class Dataset for Supervised Machine Learning. In Proceedings of the 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 17–19 October 2019; pp. 20–26. [Google Scholar] [CrossRef]
  25. Liu, Z.; Liu, Z.; Zhang, L.; Lin, X. MARP: A distributed MAC layer attack resistant pseudonym scheme for VANET. IEEE Trans. Dependable Secur. Comput. 2018, 17, 869–882. [Google Scholar] [CrossRef]
  26. Haq, I.U.; Alnemr, R.; Paschke, A.; Schikuta, E.; Boley, H.; Meinel, C. Distributed trust management for validating sla choreographies. In Proceedings of the Grids and Service-Oriented Architectures for Service Level Agreements, Boston, MA, USA, 1 January 2010. [Google Scholar]
  27. Lu, Y. Blockchain and the related issues: A review of current research topics. J. Manag. Anal. 2018, 5, 231–255. [Google Scholar] [CrossRef]
  28. Lu, Y. Blockchain: A survey on functions, applications and open issues. J. Ind. Integr. Manag. 2018, 3, 1850015. [Google Scholar] [CrossRef]
  29. Atlam, H.F.; Alenezi, A.; Alassafi, M.O.; Wills, G. Blockchain with Internet of Things: Benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 2018, 10, 40–48. [Google Scholar] [CrossRef]
  30. Ibibo, J.T. IoT Attacks Countermeasures: Systematic Review and Future Research Direction. In Big Data Technologies and Applications (BDTA 2023); Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Tan, Z., Wu, Y., Xu, M., Eds.; Springer: Cham, Switzerland, 2024; Volume 555. [Google Scholar] [CrossRef]
  31. Ibibo, J.T. Emerging Challenges and Solutions in RPL Protocol: Research Review. In Proceedings of the 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, UK, 6–8 November 2023; pp. 283–289. [Google Scholar] [CrossRef]
  32. Ma, X.; Dong, D. Evolutionary nonnegative matrix factorization algorithms for community detection in dynamic networks. IEEE Trans. Knowl. Data Eng. 2017, 29, 1045–1058. [Google Scholar] [CrossRef]
  33. Meng, Z.; Yang, T.; Li, G.; Ren, W.; Wu, D. Synchronization of coupled dynamical systems: Tolerance to weak connectivity and arbitrarily bounded time-varying delays. IEEE Trans. Autom. Control 2017, 63, 1791–1797. [Google Scholar] [CrossRef]
  34. Wang, B.; Wang, J.; Zhang, B.; Chen, W.; Zhang, Z. Leader-follower consensus of multi-vehicle wirelessly networked uncertain systems subject to nonlinear dynamics and actuator fault. IEEE Trans. Autom. Sci. Eng. 2018, 15, 492–505. [Google Scholar] [CrossRef]
  35. Zhao, Y.; Liu, Y.; Wen, G.; Chen, G. Distributed optimization of linear multi-agent systems: Edge-and node-based adaptive designs. IEEE Trans. Autom. Control 2017, 62, 3602–3609. [Google Scholar] [CrossRef]
  36. Liu, Y.-J.; Tong, S. Barrier Lyapunov functions for Nussbaum gain adaptive control of full state constrained nonlinear systems. Automatica 2017, 76, 143–152. [Google Scholar] [CrossRef]
  37. He, W.; Xu, C.; Han, Q.L.; Qian, F.; Lang, Z. L2 leader–follower consensus of networked Euler–Lagrange systems with external disturbances. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 1920–1928. [Google Scholar] [CrossRef]
  38. Coelho, V.N.; Cohen, M.W.; Coelho, I.M.; Liu, N.; Guimarães, F.G. Multi-agent systems applied for energy systems integration: State-of-the-art applications and trends in microgrids. Appl. Energy 2017, 187, 820–832. [Google Scholar] [CrossRef]
  39. Ge, X.; Han, Q.-L. Distributed formation control of networked multi-agent systems using a dynamic event-triggered communication mechanism. IEEE Trans. Ind. Electron. 2017, 64, 8118–8127. [Google Scholar] [CrossRef]
  40. He, W.; Chen, G.; Han, Q.-L.; Qian, F. Network-based leader-following consensus of nonlinear multi-agent systems via distributed impulsive control. Inf. Sci. 2017, 380, 145–158. [Google Scholar]
  41. Nguyen, D.H.; Narikiyo, T.; Kawanishi, M. Robust consensus analysis and design under relative state constraints or uncertainties. IEEE Trans. Autom. Control 2018, 63, 1784–1790. [Google Scholar] [CrossRef]
  42. Yu, J.; Shi, Y. scaled group consensus in multiagent systems with first/second-order continuous dynamics. IEEE Trans. Cybern. 2018, 48, 2259–2271. [Google Scholar] [PubMed]
  43. Zhao, M.; Peng, C.; He, W.; Song, Y. Event-triggered communication for leader-following consensus of second-order multiagent systems. IEEE Trans. Cybern. 2018, 48, 1888–1897. [Google Scholar] [CrossRef]
  44. Ge, X.; Han, Q.-L.; Zhang, X.-M. Achieving cluster formation of multi-agent systems under aperiodic sampling and communication delays. IEEE Trans. Ind. Electron. 2018, 65, 3417–3426. [Google Scholar]
  45. NxT–The Blockchain Application Platform. Available online: https://nxtplatform.org/ (accessed on 8 April 2019).
  46. Ibibo, J.T. A Bibliometric Analysis and Comprehensive Overview of Security Attacks Against RPL in IoT Networks. In The Seventh International Conference on Safety and Security with IoT, SaSeIoT 2023; EAI/Springer Innovations in Communication and Computing; Tran, K.P., Li, S., Heuchenne, C., Truong, T.H., Eds.; Springer: Cham, Switzerland, 2024. [Google Scholar] [CrossRef]
  47. Du, C.; Liu, X.; Ren, W.; Lu, P.; Liu, H. Finite-time consensus for linear multi-agent systems via event-triggered strategy without continuous communication. IEEE Trans. Control Netw. Syst. 2019, 7, 19–29. [Google Scholar] [CrossRef]
  48. Miraz, M.H.; Ali, M. Applications of blockchain technology beyond cryptocurrency. arXiv 2018, arXiv:1801.03528. [Google Scholar] [CrossRef]
  49. Madumidha, S.; SivaRanjani, P.; Rajesh, S.; Sivajumar, S. Blockchain security for Internet of Things: A literature survey. Int. J. Pure Appl. Math. 2018, 119, 3677–3686. [Google Scholar]
  50. Ibibo, J.T.; Japheth, B.R. RPL Protocol Using Contiki Operating Systems: A Review. In The Seventh International Conference on Safety and Security with IoT, SaSeIoT 2023; EAI/Springer Innovations in Communication and Computing; Tran, K.P., Li, S., Heuchenne, C., Truong, T.H., Eds.; Springer: Cham, Switzerland, 2024. [Google Scholar] [CrossRef]
  51. Liu, T.; Jiang, Z.-P. Event-based control of nonlinear systems with partial state and output feedback. Automatica 2015, 53, 10–22. [Google Scholar] [CrossRef]
  52. Xing, L.; Wen, C.; Liu, Z.; Su, H.; Cai, J. Event-triggered output feedback control for a class of uncertain nonlinear systems. IEEE Trans. Autom. Control 2018, 64, 290–297. [Google Scholar] [CrossRef]
  53. Wang, X.; Lemmon, M.D. Event-triggering in distributed networked control systems. IEEE Trans. Autom. Control 2011, 56, 586–601. [Google Scholar] [CrossRef]
  54. Du, S.L.; Sun, X.M.; Cao, M.; Wang, W. Pursuing an evader through cooperative relaying in multi-agent surveillance networks. Automatica 2017, 83, 155–161. [Google Scholar] [CrossRef]
  55. Bartoletti, M.; Lande, S.; Podda, A.S. A proof-of-stake protocol for consensus on bitcoin subchains. In Financial Cryptography and Data Security; Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M., Eds.; Springer: Cham, Switzerland, 2017; pp. 568–584. [Google Scholar]
  56. Nowzari, C.; Garcia, E.; Cortés, J. Event-triggered communication and control of networked systems for multi-agent consensus. Automatica 2019, 105, 1–27. [Google Scholar] [CrossRef]
  57. George, J.; Yi, X.; Yang, T. Distributed robust dynamic average consensus with dynamic event-triggered communication. In Proceedings of the 2018 IEEE Conference on Decision and Control (CDC), Miami, FL, USA, 17–19 December 2018; pp. 434–439. [Google Scholar]
  58. Murali, S.; Jamalipour, A. A lightweight intrusion detection for sybil attack under mobile RPL in the internet of things. IEEE Internet Things J. 2019, 7, 379–388. [Google Scholar] [CrossRef]
  59. Almusaylim, Z.A.; Alhumam, A.; Mansoor, W.; Chatterjee, P.; Jhanjhi, N.Z. Detection and mitigation of RPL rank and version number attacks in smart internet of things. Preprints 2020. [Google Scholar] [CrossRef]
Figure 1. Distributed Adaptive Framework control for dynamic event-triggered architecture.
Figure 1. Distributed Adaptive Framework control for dynamic event-triggered architecture.
Applsci 15 10557 g001
Figure 2. Time vs. multiagent triggering.
Figure 2. Time vs. multiagent triggering.
Applsci 15 10557 g002
Figure 3. Time evolutions of n t i = 1,2 , 3 , , 8 .
Figure 3. Time evolutions of n t i = 1,2 , 3 , , 8 .
Applsci 15 10557 g003
Figure 4. Adaptive time evolutions A n t i = 1,2 , 3 , , 8 .
Figure 4. Adaptive time evolutions A n t i = 1,2 , 3 , , 8 .
Applsci 15 10557 g004
Figure 5. Time evolutions of second variables U i t i = 1,2 , 3 , , 8 .
Figure 5. Time evolutions of second variables U i t i = 1,2 , 3 , , 8 .
Applsci 15 10557 g005
Figure 6. Distributed network topology setup.
Figure 6. Distributed network topology setup.
Applsci 15 10557 g006
Figure 7. Triggering time sequences i = 1 , 2 , 3 , , 8 .
Figure 7. Triggering time sequences i = 1 , 2 , 3 , , 8 .
Applsci 15 10557 g007
Figure 8. Time evolutions of n t   i = 1,2 , 3 , , 8 .
Figure 8. Time evolutions of n t   i = 1,2 , 3 , , 8 .
Applsci 15 10557 g008
Figure 9. Adaptive time evolutions A n t i = 1,2 , 3 , , 8 .
Figure 9. Adaptive time evolutions A n t i = 1,2 , 3 , , 8 .
Applsci 15 10557 g009
Figure 10. Time evolutions of second variables U i t i = 1,2 , 3 , , 8 .
Figure 10. Time evolutions of second variables U i t i = 1,2 , 3 , , 8 .
Applsci 15 10557 g010
Figure 11. Positions of the eight multiagents in experimental scenario.
Figure 11. Positions of the eight multiagents in experimental scenario.
Applsci 15 10557 g011
Figure 12. State of eight followers and time evolutions.
Figure 12. State of eight followers and time evolutions.
Applsci 15 10557 g012
Figure 13. Time evolutions of n t i = 1,2 , 3 , , 8 .
Figure 13. Time evolutions of n t i = 1,2 , 3 , , 8 .
Applsci 15 10557 g013
Figure 14. Adaptive time evolutions A n t i = 1,2 , 3 , , 8 .
Figure 14. Adaptive time evolutions A n t i = 1,2 , 3 , , 8 .
Applsci 15 10557 g014
Table 1. Simulation Parameters.
Table 1. Simulation Parameters.
N/SParametersValue
1SimulatorCooja (Contiki 2.7)
2Simulation time1800 s
3DODAG root rank1
4Scenario dimension200 × 200 m2
5Node Distribution Uniform Distribution
6Mote typeZ1
7Gateway nodes1
8Radio mediumUnit disc graph medium
9Transport layer protocolUDP
10PHY and MAC layerIEEE 802.15.4
11Data packet size 30 bytes
12Speed of node1 to 2 m/s
13Transmission range 50 m
14Data packet sending interval60 s
15Routing Protocol RPL
16Rank Metric MRHOF
17Nominal Capacity1000 mAh
18Battery Capacity1000 mAh
Table 2. Comparison table between IbiboRPLChain Solution and existing system.
Table 2. Comparison table between IbiboRPLChain Solution and existing system.
FeatureExisting—Limited Agents and Specific Time Schedules Proposed—IbiboRPLChain Solution SystemImprovement
Methodology Mac Protocol Based Scheduling Method [43] Blockchain based Authentication MethodAuthentication System
Triggering instantsHigh (100)Reduced by 50% (50)Significant reduction
TimeSlow (100 s)Improved by 2× (50 s)Twice as fast
ConsensusNot achieved (0%)Achieved (100%)Significant improvement
ActivenessLow (10%)Increased by 3× (30%)Significant improvement
SecurityLow (20%)Improved by 4× (80%)Significant improvement
Network computation timeHigh (100 s)Reduced by 3× (33 s)Significant reduction
PropagationUnstable (0%)Stabilised (100%)Significant improvement
Time evolution strengthLow (10%)Increased by 5× (50%)Significant improvement
Table 3. Comparison table between Ibibo RPLChain Solution and existing system.
Table 3. Comparison table between Ibibo RPLChain Solution and existing system.
FeatureExisting Method–Decentralised MethodIbiboRPLChain SolutionBitcoinEthereumHyperledger Fabric
Author NameKonstantinos Tsoulias1 [8]Our SolutionS. Lande [55]R. Shang [21]D. H. Nguyen [39]
SecurityUses SHA-256 to secure the blockchain.Uses a combination of cryptographic algorithms to secure the blockchain, including SHA-256, ECDSA, and Merkle trees.Uses SHA-256 to secure the blockchain.Uses SHA-256 to secure the blockchain.Uses PBFT to secure the blockchain.
Triggering instantsTransactions Events or transactionsBlock completionTransactionsTransactions
TimeTransaction TimeBlock timeBlock timeTransaction timeTransaction time
ConsensusProof of Work (PoW)Proof of Work (PoW)Proof of Work (PoW)Proof of Stake (PoS)Byzantine Fault Tolerance (BFT)
PropagationShardingGossip protocolGossip protocolShardingGossip protocol
Time evolution strengthStrongStrongStrongStrongStrong
ActivenessActivePassivePassivePassiveActive
AdvantagesSecure, widely adoptedSecure, scalable, efficientSecure, widely adoptedSecure, supports smart contractsSecure, enterprise-grade
AdaptabilityLimited adaptabilityCan be adapted to a variety of IoT-LLN environmentsLimited adaptabilityLimited adaptabilityLimited adaptability
Computational CostModerate computational costLow computational costHigh computational costHigh computational costModerate computational cost
FeaturesSupports smart contracts.Supports secure authentication, data integrity, and non-repudiation.Supports secure payments.Supports smart contracts.Supports enterprise-grade security.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ibibo, J.T.; Balota, J.E.; Alwada'n, T.; Akinade, O.O. Enhancing IoT-LLN Security with IbiboRPLChain Solution: A Blockchain-Based Authentication Method. Appl. Sci. 2025, 15, 10557. https://doi.org/10.3390/app151910557

AMA Style

Ibibo JT, Balota JE, Alwada'n T, Akinade OO. Enhancing IoT-LLN Security with IbiboRPLChain Solution: A Blockchain-Based Authentication Method. Applied Sciences. 2025; 15(19):10557. https://doi.org/10.3390/app151910557

Chicago/Turabian Style

Ibibo, Joshua T., Josiah E. Balota, Tariq Alwada'n, and Olugbenga O. Akinade. 2025. "Enhancing IoT-LLN Security with IbiboRPLChain Solution: A Blockchain-Based Authentication Method" Applied Sciences 15, no. 19: 10557. https://doi.org/10.3390/app151910557

APA Style

Ibibo, J. T., Balota, J. E., Alwada'n, T., & Akinade, O. O. (2025). Enhancing IoT-LLN Security with IbiboRPLChain Solution: A Blockchain-Based Authentication Method. Applied Sciences, 15(19), 10557. https://doi.org/10.3390/app151910557

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop