1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
|
Internet Engineering Task Force (IETF) E. Kim
Request for Comments: 6606 ETRI
Category: Informational D. Kaspar
ISSN: 2070-1721 Simula Research Laboratory
C. Gomez
Universitat Politecnica de Catalunya/Fundacio i2CAT
C. Bormann
Universitaet Bremen TZI
May 2012
Problem Statement and Requirements for
IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Routing
Abstract
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) are
formed by devices that are compatible with the IEEE 802.15.4
standard. However, neither the IEEE 802.15.4 standard nor the
6LoWPAN format specification defines how mesh topologies could be
obtained and maintained. Thus, it should be considered how 6LoWPAN
formation and multi-hop routing could be supported.
This document provides the problem statement and design space for
6LoWPAN routing. It defines the routing requirements for 6LoWPANs,
considering the low-power and other particular characteristics of the
devices and links. The purpose of this document is not to recommend
specific solutions but to provide general, layer-agnostic guidelines
about the design of 6LoWPAN routing that can lead to further analysis
and protocol design. This document is intended as input to groups
working on routing protocols relevant to 6LoWPANs, such as the IETF
ROLL WG.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6606.
Kim, et al. Informational [Page 1]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
Copyright Notice
Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Problem Statement ...............................................2
2. Terminology .....................................................5
3. Design Space ....................................................5
3.1. Reference Network Model ....................................6
4. Scenario Considerations and Parameters for 6LoWPAN Routing ......8
5. 6LoWPAN Routing Requirements ...................................13
5.1. Support of 6LoWPAN Device Properties ......................13
5.2. Support of 6LoWPAN Link Properties ........................15
5.3. Support of 6LoWPAN Characteristics ........................18
5.4. Support of Security .......................................22
5.5. Support of Mesh-Under Forwarding ..........................25
5.6. Support of Management .....................................26
6. Security Considerations ........................................27
7. Acknowledgments ................................................27
8. References .....................................................28
8.1. Normative References ......................................28
8.2. Informative References ....................................29
1. Problem Statement
6LoWPANs are formed by devices that are compatible with the
IEEE 802.15.4 standard [IEEE802.15.4]. Most of the LoWPAN devices
are distinguished by their low bandwidth, short range, scarce memory
capacity, limited processing capability, and other attributes of
inexpensive hardware. The characteristics of nodes participating in
LoWPANs are assumed to be those described in the 6LoWPAN problem
statement [RFC4919], and in the IPv6 over IEEE 802.15.4 document
[RFC4944], which has specified how to carry IPv6 packets over
IEEE 802.15.4 and similar networks. Whereas IEEE 802.15.4
distinguishes two types of devices called full-function devices
(FFDs) and reduced-function devices (RFDs), this distinction is based
Kim, et al. Informational [Page 2]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
on some features of the Medium Access Control (MAC) layer that are
not always in use. Hence, the distinction is not made in this
document. Nevertheless, some 6LoWPAN nodes may limit themselves to
the role of hosts only, whereas other 6LoWPAN nodes may take part in
routing. This host/ router distinction can correlate with the
processing and storage capabilities of the device and power available
in a similar way to the idea of RFDs and FFDs.
IEEE 802.15.4 networks support star and mesh topologies. However,
neither the IEEE 802.15.4 standard nor the 6LoWPAN format
specification ([RFC4944]) define how mesh topologies could be
obtained and maintained. Thus, 6LoWPAN formation and multi-hop
routing can be supported either below the IP layer (the adaptation
layer or Logical Link Control (LLC)) or the IP layer. (Note that in
the IETF, the term "routing" usually, but not always [RFC5556],
refers exclusively to the formation of paths and the forwarding at
the IP layer. In this document, we distinguish the layer at which
these services are performed by the terms "route-over" and
"mesh-under". See Sections 2 and 3.) A number of IP routing
protocols have been developed in various IETF working groups.
However, these existing routing protocols may not satisfy the
requirements of multi-hop routing in 6LoWPANs, for the following
reasons:
o 6LoWPAN nodes have special types and roles, such as nodes drawing
their power from primary batteries, power-affluent nodes,
mains-powered and high-performance gateways, data aggregators,
etc. 6LoWPAN routing protocols should support multiple device
types and roles.
o More stringent requirements apply to LoWPANs, as opposed to
higher-performance or non-battery-operated networks. 6LoWPAN
nodes are characterized by small memory sizes and low processing
power, and they run on very limited power supplied by primary
non-rechargeable batteries (a few KB of RAM, a few dozen KB of
ROM/ flash memory, and a few MHz of CPU is typical). A node's
lifetime is usually defined by the lifetime of its battery.
o Handling sleeping nodes is very critical in LoWPANs, more so than
in traditional ad hoc networks. LoWPAN nodes might stay in sleep
mode most of the time. Taking advantage of appropriate times for
transmissions is important for efficient packet forwarding.
o Routing in 6LoWPANs might possibly translate to a simpler problem
than routing in higher-performance networks. LoWPANs might be
either transit networks or stub networks. Under the assumption
that LoWPANs are never transit networks (as implied by [RFC4944]),
Kim, et al. Informational [Page 3]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
routing protocols may be drastically simplified. This document
will focus on the requirements for stub networks. Additional
requirements may apply to transit networks.
o Routing in LoWPANs might possibly translate to a harder problem
than routing in higher-performance networks. Routing in LoWPANs
requires power optimization, stable operation in lossy
environments, etc. These requirements are not easily satisfiable
all at once [ROLL-PROTOCOLS].
These properties create new challenges for the design of routing
within LoWPANs.
The 6LoWPAN problem statement [RFC4919] briefly mentions four
requirements for routing protocols:
(a) low overhead on data packets
(b) low routing overhead
(c) minimal memory and computation requirements
(d) support for sleeping nodes (consideration of battery savings)
These four high-level requirements describe the basic requirements
for 6LoWPAN routing. Based on the fundamental features of 6LoWPANs,
more detailed routing requirements, which can lead to further
analysis and protocol design, are presented in this document.
Considering the problems above, detailed 6LoWPAN routing requirements
must be defined. Application-specific features affect the design of
6LoWPAN routing requirements and corresponding solutions. However,
various applications can be profiled by similar technical
characteristics, although the related detailed requirements might
differ (e.g., a few dozen nodes in a home lighting system need
appropriate scalability for the system's applications, while millions
of nodes for a highway infrastructure system also need appropriate
scalability).
This routing requirements document states the routing requirements of
6LoWPAN applications in general, providing examples for different
cases of routing. It does not imply that a single routing solution
will be favorable for all 6LoWPAN applications, and there is no
requirement for different routing protocols to run simultaneously.
Kim, et al. Informational [Page 4]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Readers are expected to be familiar with all the terms and concepts
that are discussed in "IPv6 over Low-Power Wireless Personal Area
Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and
Goals" [RFC4919] and "Transmission of IPv6 Packets over IEEE 802.15.4
Networks" [RFC4944].
This specification makes use of the terminology defined in
[6LoWPAN-ND].
3. Design Space
Apart from a wide variety of conceivable routing algorithms for
6LoWPANs, it is possible to perform routing in the IP layer (using a
route-over approach) or below IP, as defined by the 6LoWPAN format
document [RFC4944] (using the mesh-under approach). See Figure 1.
The route-over approach relies on IP routing and therefore supports
routing over possibly various types of interconnected links.
Note: The ROLL WG is now working on route-over approaches for
Low-power and Lossy Networks (LLNs), not specifically for 6LoWPANs.
This document focuses on 6LoWPAN-specific requirements; it may be
used in conjunction with the more application-oriented requirements
defined by the ROLL WG.
The mesh-under approach performs the multi-hop communication below
the IP link. The most significant consequence of the mesh-under
mechanism is that the characteristics of IEEE 802.15.4 directly
affect the 6LoWPAN routing mechanisms, including the use of 64-bit
(or 16-bit short) link-layer addresses instead of IP addresses. A
6LoWPAN would therefore be seen as a single IP link.
Most statements in this document consider both the route-over and
mesh-under cases.
Kim, et al. Informational [Page 5]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
Figure 1 shows the place of 6LoWPAN routing in the entire network
stack.
+---------------------------+ +-----------------------------+
| Application Layer | | Application Layer |
+---------------------------+ +-----------------------------+
| Transport Layer (TCP/UDP) | | Transport Layer (TCP/UDP) |
+---------------------------+ +-----------------------------+
| Network Layer (IPv6) | | Network +---------+ |
+---------------------------+ | Layer | Routing | |
| 6LoWPAN | | (IPv6) +---------+ |
| Adaptation | +-----------------------------+
| Layer +----------+ | | 6LoWPAN Adaptation Layer |
+--------------| Routing* |-+ +-----------------------------+
| 802.15.4 MAC +----------+ | | 802.15.4 MAC |
+---------------------------+ +-----------------------------+
| 802.15.4 PHY | | 802.15.4 PHY |
+---------------------------+ +-----------------------------+
* Here, "Routing" is not equivalent to IP routing,
but includes the functionalities of path computation and
forwarding under the IP layer.
The term "Routing" is used in the figure in order to
illustrate which layer handles path computation and
packet forwarding in mesh-under as compared to route-over.
Figure 1: Mesh-Under Routing (Left) and Route-Over Routing (Right)
In order to avoid packet fragmentation and the overhead for
reassembly, routing packets should fit into a single IEEE 802.15.4
physical frame, and application data should not be expanded to an
extent that they no longer fit.
3.1. Reference Network Model
For multi-hop communication in 6LoWPANs, when a route-over mechanism
is in use, all routers (i.e., 6LoWPAN Border Routers (6LBRs) and
6LoWPAN Routers (6LRs)) perform IP routing within the stub network
(see Figure 2). In this case, the link-local scope covers the set of
nodes within symmetric radio range of a node.
When a LoWPAN follows the mesh-under configuration, the 6LBR is the
only IPv6 router in the LoWPAN (see Figure 3). This means that the
IPv6 link-local scope includes all nodes in the LoWPAN. For this, a
mesh-under mechanism MUST be provided to support multi-hop
transmission.
Kim, et al. Informational [Page 6]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
h h
/ | 6LBR: 6LoWPAN Border Router
6LBR -- 6LR --- 6LR --- h 6LR: 6LoWPAN Router
/ \ h: Host
h 6LR --- h
|
/ \
6LR - 6LR -- h
Figure 2: An Example of a Route-Over LoWPAN
h h
/ | 6LBR: 6LoWPAN Border Router
6LBR --- m --- m --- h m: mesh-under forwarder
/ \ h: Host
h m --- h
|
/ \
m - m -- h
Figure 3: An Example of a Mesh-Under LoWPAN
Note than in both mesh-under and route-over networks, there is no
expectation of topologically based address assignment in the 6LoWPAN.
Instead, addresses are typically assigned based on the EUI-64
addresses assigned at manufacturing time to nodes, or based on a
(from a topological point of view) more or less random process
assigning 16-bit MAC addresses to individual nodes. Within a
6LoWPAN, there is therefore no opportunity for aggregation or
summarization of IPv6 addresses beyond the sharing of (one or more)
common prefixes.
Not all devices that are within radio range of each other need to be
part of the same LoWPAN. When multiple LoWPANs are formed with
globally unique IPv6 addresses in the 6LoWPANs, and device (a) of
LoWPAN [A] wants to communicate with device (b) of LoWPAN [B], the
normal IPv6 mechanisms will be employed. For route-over, the IPv6
address of (b) is set as the destination of the packets, and the
devices perform IP routing to the 6LBR for these outgoing packets.
For mesh-under, there is one IP hop from device (a) to the 6LBR of
[A], no matter how many radio hops they are apart from each other.
This, of course, assumes the existence of a mesh-under routing
protocol in order to reach the 6LBR. Note that a default route to
the 6LBR could be inserted into the 6LoWPAN routing system for both
route-over and mesh-under.
Kim, et al. Informational [Page 7]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
4. Scenario Considerations and Parameters for 6LoWPAN Routing
IP-based LoWPAN technology is still in its early stage of
development, but the range of conceivable usage scenarios is
tremendous. The numerous possible applications of sensor networks
make it obvious that mesh topologies will be prevalent in LoWPAN
environments and robust routing will be a necessity for expedient
communication. Research efforts in the area of sensor networking
have put forth a large variety of multi-hop routing algorithms
[Bulusu]. Most related work focuses on optimizing routing for
specific application scenarios, which can be realized using several
modes of communication, including the following [Watteyne]:
o Flooding (in very small networks)
o Hierarchical routing
o Geographic routing
o Self-organizing coordinate routing
Depending on the topology of a LoWPAN and the application(s) running
over it, different types of routing may be used. However, this
document abstracts from application-specific communication and
describes general routing requirements valid for overall routing in
LoWPANs.
The following parameters can be used to describe specific scenarios
in which the candidate routing protocols could be evaluated.
a. Network Properties:
* Number of Devices, Density, and Network Diameter:
These parameters usually affect the routing state directly
(e.g., the number of entries in a routing table or neighbor
list). Especially in large and dense networks, policies must
be applied for discarding "low-quality" and stale routing
entries in order to prevent memory overflow.
* Connectivity:
Due to external factors or programmed disconnections, a LoWPAN
can be in several states of connectivity -- anything in the
range from "always connected" to "rarely connected". This
poses great challenges to the dynamic discovery of routes
across a LoWPAN.
Kim, et al. Informational [Page 8]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
* Dynamicity (including mobility):
Location changes can be induced by unpredictable external
factors or by controlled motion, which may in turn cause route
changes. Also, nodes may dynamically be introduced into a
LoWPAN and removed from it later. The routing state and the
volume of control messages may heavily depend on the number of
moving nodes in a LoWPAN and their speed, as well as how
quickly and frequently environmental characteristics
influencing radio propagation change.
* Deployment:
In a LoWPAN, it is possible for nodes to be scattered randomly
or to be deployed in an organized manner. The deployment can
occur at once, or as an iterative process, which may also
affect the routing state.
* Spatial Distribution of Nodes and Gateways:
Network connectivity depends on the spatial distribution of
the nodes and on other factors, such as device number,
density, and transmission range. For instance, nodes can be
placed on a grid, or randomly located in an area (as can be
modeled by a two-dimensional Poisson distribution), etc.
Assuming a random spatial distribution, an average of 7
neighbors per node are required for approximately 95% network
connectivity (10 neighbors per node are needed for 99%
connectivity) [Kuhn]. In addition, if the LoWPAN is connected
to other networks through infrastructure nodes called
gateways, the number and spatial distribution of these
gateways affect network congestion and available data rate,
among other things.
* Traffic Patterns, Topology, and Applications:
The design of a LoWPAN and the requirements for its
application have a big impact on the network topology and the
most efficient routing type to be used. For different traffic
patterns (point-to-point, multipoint-to-point, point-to-
multipoint) and network architectures, various routing
mechanisms have been developed, such as data-centric, event-
driven, address-centric, and geographic routing.
* Classes of Service:
For mixing applications of different criticality on one
LoWPAN, support of multiple classes of service may be required
in resource-constrained LoWPANs and may require a new routing
protocol functionality.
Kim, et al. Informational [Page 9]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
* Security:
LoWPANs may carry sensitive information and require a high
level of security support where the availability, integrity,
and confidentiality of data are of prime relevance. Secured
messages cause overhead and affect the power consumption of
LoWPAN routing protocols.
b. Node Parameters:
* Processing Speed and Memory Size:
These basic parameters define the maximum size of the routing
state and the maximum complexity of its processing. LoWPAN
nodes may have different performance characteristics, queuing
strategies, and queue buffer sizes.
* Power Consumption and Power Source:
The number of battery- and mains-powered nodes and their
positions in the topology created by them in a LoWPAN affect
routing protocols in their selection of paths that optimize
network lifetime.
* Transmission Range:
This parameter affects routing. For example, a high
transmission range may cause a dense network, which in turn
results in more direct neighbors of a node, higher
connectivity, and a larger routing state.
* Traffic Pattern:
This parameter affects routing, since highly loaded nodes
(either because they are the source of packets to be
transmitted or due to forwarding) may contribute to higher
delivery delays and may consume more energy than lightly
loaded nodes. This applies to both data packets and routing
control messages.
Kim, et al. Informational [Page 10]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
c. Link Parameters:
This section discusses link parameters that apply to
IEEE 802.15.4 legacy mode (i.e., not making use of improved
modulation schemes).
* Throughput:
The maximum user data throughput of a bulk data transmission
between a single sender and a single receiver through an
unslotted IEEE 802.15.4 2.4 GHz channel in ideal conditions is
as follows [Latre]:
+ 16-bit MAC addresses, unreliable mode: 151.6 kbit/s
+ 16-bit MAC addresses, reliable mode: 139.0 kbit/s
+ 64-bit MAC addresses, unreliable mode: 135.6 kbit/s
+ 64-bit MAC addresses, reliable mode: 124.4 kbit/s
Throughput for the 915 MHz band is as follows:
+ 16-bit MAC addresses, unreliable mode: 31.1 kbit/s
+ 16-bit MAC addresses, reliable mode: 28.6 kbit/s
+ 64-bit MAC addresses, unreliable mode: 27.8 kbit/s
+ 64-bit MAC addresses, reliable mode: 25.6 kbit/s
Throughput for the 868 MHz band is as follows:
+ 16-bit MAC addresses, unreliable mode: 15.5 kbit/s
+ 16-bit MAC addresses, reliable mode: 14.3 kbit/s
+ 64-bit MAC addresses, unreliable mode: 13.9 kbit/s
+ 64-bit MAC addresses, reliable mode: 12.8 kbit/s
Kim, et al. Informational [Page 11]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
* Latency:
Latency ranges -- depending on payload size -- of a frame
transmission between a single sender and a single receiver
through an unslotted IEEE 802.15.4 2.4 GHz channel in ideal
conditions are as shown below [Latre]. For unreliable mode,
the actual latency is provided. For reliable mode, the round-
trip time, including transmission of a Layer-2 acknowledgment,
is provided:
+ 16-bit MAC addresses, unreliable mode: [1.92 ms, 6.02 ms]
+ 16-bit MAC addresses, reliable mode: [2.46 ms, 6.56 ms]
+ 64-bit MAC addresses, unreliable mode: [2.75 ms, 6.02 ms]
+ 64-bit MAC addresses, reliable mode: [3.30 ms, 6.56 ms]
Latency ranges for the 915 MHz band are as follows:
+ 16-bit MAC addresses, unreliable mode: [5.85 ms, 29.35 ms]
+ 16-bit MAC addresses, reliable mode: [8.35 ms, 31.85 ms]
+ 64-bit MAC addresses, unreliable mode: [8.95 ms, 29.35 ms]
+ 64-bit MAC addresses, reliable mode: [11.45 ms, 31.82 ms]
Latency ranges for the 868 MHz band are as follows:
+ 16-bit MAC addresses, unreliable mode: [11.7 ms, 58.7 ms]
+ 16-bit MAC addresses, reliable mode: [16.7 ms, 63.7 ms]
+ 64-bit MAC addresses, unreliable mode: [17.9 ms, 58.7 ms]
+ 64-bit MAC addresses, reliable mode: [22.9 ms, 63.7 ms]
Note that some of the parameters presented in this section may be
used as link or node evaluation metrics. However, multi-criteria
routing may be too expensive for 6LoWPAN nodes. Rather, various
single-criteria metrics are available and can be selected to suit the
environment or application.
Kim, et al. Informational [Page 12]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
5. 6LoWPAN Routing Requirements
This section defines a list of requirements for 6LoWPAN routing. An
important design property specific to low-power networks is that
LoWPANs have to support multiple device types and roles, such as
o host nodes drawing their power from primary batteries or using
energy harvesting (sometimes called "power-constrained nodes")
o mains-powered host nodes (an example of what we call "power-
affluent nodes")
o power-affluent (but not necessarily mains-powered) high-
performance gateway(s)
o nodes with various functionality (data aggregators, relays, local
manager/coordinators, etc.)
Due to these different device types and roles, LoWPANs need to
consider the following two primary attributes:
o Power conservation: some devices are mains-powered, but many are
battery-operated and need to last several months to a few years
with a single AA battery. Many devices are mains-powered most of
the time but still need to function on batteries for possibly
extended periods (e.g., on a construction site before building
power is switched on for the first time).
o Low performance: tiny devices, small memory sizes, low-performance
processors, low bandwidth, high loss rates, etc.
These fundamental attributes of LoWPANs affect the design of routing
solutions. Whether existing routing specifications are simplified
and modified, or new solutions are introduced in order to fit the
low-power requirements of LoWPANs, they need to meet the requirements
described below.
5.1. Support of 6LoWPAN Device Properties
The general objectives listed in this section should be met by
6LoWPAN routing protocols. The importance of each requirement is
dependent on what node type the protocol is running on and what the
role of the node is. The following requirements consider the
presence of battery-powered nodes in LoWPANs.
Kim, et al. Informational [Page 13]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
[R01] 6LoWPAN routing protocols SHOULD allow implementation with
small code size and require low routing state to fit the typical
6LoWPAN node capacity. Generally speaking, the code size is bounded
by available flash memory size, and the routing table is bounded by
RAM size, possibly limiting it to less than 32 entries.
The RAM size of LoWPAN nodes often ranges between 4 KB and 10 KB
(2 KB minimum), and program flash memory normally consists of 48
KB to 128 KB. (For example, in the current market, MICAz has 128
KB program flash, 4 KB EEPROM, and 512 KB external flash ROM;
TIP700CM has 48 KB program flash, 10 KB RAM, and 1 MB external
flash ROM.)
Due to these hardware restrictions, code SHOULD fit within a small
memory size -- no more than 48 KB to 128 KB of flash memory,
including at least a few tens of KB of application code size. (As
a general observation, a routing protocol of low complexity may
help achieve the goal of reducing power consumption, improves
robustness, requires lower routing state, is easier to analyze,
and may be less prone to security attacks.)
In addition, operation with limited amounts of routing state (such
as routing tables and neighbor lists) SHOULD be maintained, since
some typical memory sizes preclude storing state of a large number
of nodes. For instance, industrial monitoring applications may
need to support a maximum of 20 hops [RFC5673]. Small networks
can be designed to support a smaller number of hops. While the
need for this is highly dependent on the network architecture,
there should be at least one mode of operation that can function
with 32 forwarding entries or less.
[R02] 6LoWPAN routing protocols SHOULD cause minimal power
consumption by efficiently using control packets (e.g., minimizing
expensive IP multicast, which causes link broadcast to the entire
LoWPAN) and by efficiently routing data packets.
One way of optimizing battery lifetime is by achieving a minimal
control message overhead. Compared to such functions as
computational operations or taking sensor samples, radio
communication is by far the dominant factor of power consumption
[Doherty]. Power consumption of transmission and/or reception
depends linearly on the length of data units and on the frequency
of transmission and reception of the data units [Shih].
The energy consumption of two example radio frequency (RF)
controllers for low-power nodes is shown in [Hill]. The TR1000
radio consumes 21 mW when transmitting at 0.75 mW, and 15 mW
during reception (with a receiver sensitivity of -85 dBm). The
Kim, et al. Informational [Page 14]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
CC1000 consumes 31.6 mW when transmitting at 0.75 mW, and 20 mW
during reception (with a receiver sensitivity of -105 dBm). Power
endurance under the concept of an idealized power source is
explained in [Hill]. Based on the energy of an idealized AA
battery, the CC1000 can transmit for approximately 4 days straight
or receive for 9 consecutive days. Note that availability for
reception consumes power as well.
As multicast may cause flooding in the LoWPAN, a 6LoWPAN routing
protocol SHOULD minimize the control cost by multicasting routing
packets.
Control cost of routing protocols in low-power and lossy networks
is discussed in more detail in [ROLL-PROTOCOLS].
5.2. Support of 6LoWPAN Link Properties
6LoWPAN links have the characteristics of low data rate and possibly
high loss rates. The routing requirements described in this section
are derived from the link properties.
[R03] 6LoWPAN routing protocol control messages SHOULD NOT exceed a
single IEEE 802.15.4 frame size, in order to avoid packet
fragmentation and the overhead for reassembly.
In order to save energy, routing overhead should be minimized to
prevent fragmentation of frames. Therefore, 6LoWPAN routing
should not cause packets to exceed the IEEE 802.15.4 frame size.
This reduces the energy required for transmission, avoids
unnecessary waste of bandwidth, and prevents the need for packet
reassembly. The [IEEE802.15.4] standard specifies an MTU of
127 bytes, yielding about 80 octets of actual MAC payload with
security enabled, some of which is taken for the (typically
compressed) IP header [RFC6282]. Avoiding fragmentation at the
adaptation layer may imply the use of semantic fragmentation
and/or algorithms that can work on small increments of routing
information.
[R04] The design of routing protocols for LoWPANs must consider the
fact that packets are to be delivered with sufficient probability
according to application requirements.
Requirements for a successful end-to-end packet delivery ratio
(where delivery may be bounded within certain latency levels)
vary, depending on the application. In industrial applications,
some non-critical monitoring applications may tolerate a
successful delivery ratio of less than 90% with hours of latency;
Kim, et al. Informational [Page 15]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
in some other cases, a delivery ratio of 99.9% is required
[RFC5673]. In building automation applications, application-layer
errors must be below 0.01% [RFC5867].
Successful end-to-end delivery of packets in an IEEE 802.15.4 mesh
depends on the quality of the path selected by the routing
protocol and on the ability of the routing protocol to cope with
short-term and long-term quality variation. The metric of the
routing protocol strongly influences performance of the routing
protocol in terms of delivery ratio.
The quality of a given path depends on the individual qualities of
the links (including the devices) that compose that path.
IEEE 802.15.4 settings affect the quality perceived at upper
layers. In particular, in IEEE 802.15.4 reliable mode, if an
acknowledgment frame is not received after a given period, the
originator retries frame transmission up to a maximum number of
times. If an acknowledgment frame is still not received by the
sender after performing the maximum number of transmission
attempts, the MAC layer assumes that the transmission has failed
and notifies the next higher layer of the failure. Note that
excessive retransmissions may be detrimental; see RFC 3819
[RFC3819].
[R05] The design of routing protocols for LoWPANs must consider the
latency requirements of applications and IEEE 802.15.4 link latency
characteristics.
Latency requirements may differ -- e.g., from a few hundred
milliseconds to minutes -- depending on the type of application.
Real-time building automation applications usually need response
times below 500 ms between egress and ingress, while forced-entry
security alerts must be routed to one or more fixed or mobile user
devices within 5 seconds [RFC5867]. Non-critical closed-loop
applications for industrial automation have latency requirements
that can be as low as 100 ms, but many control loops are tolerant
of latencies above 1 s [RFC5673]. In contrast, urban monitoring
applications allow latencies smaller than the typical intervals
used for reporting sensed information -- for instance, on the
order of seconds to minutes [RFC5548].
The range of latencies of a frame transmission between a single
sender and a single receiver through an ideal unslotted
IEEE 802.15.4 2.4 GHz channel is between 2.46 ms and 6.02 ms with
64-bit MAC addresses in unreliable mode, and between 2.20 ms and
6.56 ms with 64-bit MAC addresses in reliable mode. The range of
latencies of the 868 MHz band is from 11.7 ms to 63.7 ms,
depending on the address type and mode used (reliable or
Kim, et al. Informational [Page 16]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
unreliable). Note that the latencies may be larger than that,
depending on channel load, the MAC-layer settings, and the choice
of reliable or unreliable mode. Note that MAC approaches other
than legacy 802.15.4 may be used (e.g., TDMA). Duty cycling may
further affect latency (see [R08]). Depending on the routing path
chosen and the network diameter, multiple hops may contribute to
the end-to-end latency that an application may experience.
Note that a tradeoff exists between [R05] and [R04].
[R06] 6LoWPAN routing protocols SHOULD be robust to dynamic loss
caused by link failure or device unavailability either in the short
term (approx. 30 ms) -- due to Received Signal Strength Indication
(RSSI) variation, interference variation, noise, and asynchrony -- or
in the long term, due to a depleted power source, hardware breakdown,
operating system misbehavior, etc.
An important trait of 6LoWPAN devices is their unreliability,
which can be due to limited system capabilities and possibly being
closely coupled to the physical world with all its unpredictable
variations. In harsh environments, LoWPANs easily suffer from
link failure. Collisions or link failures easily increase send
and receive queues and can lead to queue overflow and packet
losses.
For home applications, where users expect feedback after carrying
out certain actions (such as handling a remote control while
moving around), routing protocols must converge within 2 seconds
if the destination node of the packet has moved and must converge
within 0.5 seconds if only the sender has moved [RFC5826]. The
tolerance of the recovery time can vary, depending on the
application; however, the routing protocol must provide the
detection of short-term unavailability and long-term
disappearance. The routing protocol has to exploit network
resources (e.g., path redundancy) to offer good network behavior
despite node failure.
Different routing protocols may exhibit different scaling
characteristics with respect to the recovery/convergence time and
the computational resources to achieve recovery after a
convergence; see also [R01] and [R10].
Kim, et al. Informational [Page 17]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
[R07] 6LoWPAN routing protocols SHOULD be designed to correctly
operate in the presence of link asymmetry.
Link asymmetry occurs when the probability of successful
transmission between two nodes is significantly higher in one
direction than in the other. This phenomenon has been reported in
a large number of experimental studies, and it is expected that
6LoWPANs will exhibit link asymmetry.
5.3. Support of 6LoWPAN Characteristics
6LoWPANs can be deployed in different sizes and topologies, adhere to
various models of mobility, be exposed to various levels of
interference, etc. In any case, LoWPANs must maintain low energy
consumption. The requirements described in this subsection are
derived from the network attributes of 6LoWPANs.
[R08] The design of 6LoWPAN routing protocols SHOULD take into
account that some nodes may be unresponsive during certain time
intervals, due to periodic hibernation.
Many nodes in LoWPAN environments might periodically hibernate
(i.e., disable their transceiver activity) in order to save
energy. Therefore, routing protocols must ensure robust packet
delivery despite nodes frequently shutting off their radio
transmission interface. Feedback from the lower IEEE 802.15.4
layer may be considered to enhance the power awareness of 6LoWPAN
routing protocols.
CC1000-based nodes must operate at a duty cycle of approximately
2% to survive for one year from an idealized AA battery power
source [Hill]. For home automation purposes, it is suggested that
the devices have to maximize the sleep phase with a duty cycle
lower than 1% [RFC5826], while in building automation
applications, batteries must be operational for at least 5 years
when the sensing devices are transmitting data (e.g., 64 bytes)
once per minute [RFC5867].
Depending on the application in use, packet rates may range from
one per second to one per day, or beyond. Routing protocols may
take advantage of knowledge about the packet transmission rate and
utilize this information in calculating routing paths. In many
IEEE 802.15.4 deployments, and in other wireless low-power
technologies, forwarders are mains-powered devices (and hence do
not need to sleep). However, it cannot be assumed that all
forwarders are mains-powered. A routing protocol that addresses
this case SHOULD provide a mode in which power consumption is a
metric. In addition, using nodes in power-saving modes for
Kim, et al. Informational [Page 18]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
forwarding may increase delay and reduce the probability of packet
delivery, which in this case also should be available as an input
into the path computation.
[R09] The metric used by 6LoWPAN routing protocols SHOULD provide
some flexibility with respect to the inputs provided by the lower
layers and other measures to optimize path selection, considering
energy balance and link qualities.
In homes, buildings, or infrastructure, some nodes will be
installed with mains power. Such power-installed nodes MUST be
considered as relay points for a prominent role in packet
delivery. 6LoWPAN routing protocols MUST know the power
constraints of the nodes.
Simple hop-count-only mechanisms may be inefficient in 6LoWPANs.
There is a Link Quality Indication (LQI) and/or RSSI from
IEEE 802.15.4 that may be taken into account for better metrics.
The metric to be used (and its goal) may depend on applications
and requirements.
The numbers in Figure 4 represent the Link Delivery Ratio (LDR) of
each pair of nodes. There are studies that show a piecewise
linear dependence between the LQI and the LDR [Chen].
0.6
A-------C
\ /
0.9 \ / 0.9
\ /
B
Figure 4: An Example Network
In this simple example, there are two options in routing from
node A to node C, with the following features:
A. Path AC:
+ (1/0.6) = 1.67 avg. transmissions needed for each packet
(confirmed link-layer delivery with retransmissions and
negligible ACK loss have been assumed)
+ one-hop path
Kim, et al. Informational [Page 19]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
+ good energy consumption and end-to-end latency of data
packets, poor delivery ratio (0.6)
+ poor probability of route reconfigurations
B. Path ABC:
+ (1/0.9)+(1/0.9) = 2.22 avg. transmissions needed for each
packet (under the same assumptions as above)
+ two-hop path
+ poor energy consumption and end-to-end latency of data
packets, good delivery ratio (0.81)
If energy consumption of the network must be minimized, path AC is
the best (this path would be chosen based on a hop-count metric).
However, if the delivery ratio in that case is not sufficient, the
best path is ABC (it would be chosen by an LQI-based metric).
Combinations of both metrics can be used.
The metric also affects the probability of route reconfiguration.
Route reconfiguration, which may be triggered by packet losses,
may require transmission of routing protocol messages. It is
possible to use a metric aimed at selecting the path with a low
route reconfiguration rate by using the LQI as an input to the
metric. Such a path has good properties, including stability and
low control message overhead.
Note that a tradeoff exists between [R09] and [R01].
[R10] 6LoWPAN routing protocols SHOULD be designed to achieve both
scalability -- from a few nodes to maybe millions of nodes -- and
minimal use of system resources.
A LoWPAN may consist of just a couple of nodes (for instance, in a
body-area network), but may also contain much higher numbers of
devices (e.g., monitoring of a city infrastructure or a highway).
For home automation applications, it is envisioned that the
routing protocol must support 250 devices in the network
[RFC5826], while routing protocols for metropolitan-scale sensor
networks must be capable of clustering a large number of sensing
nodes into regions containing on the order of 10^2 to 10^4 sensing
nodes each [RFC5548]. It is therefore necessary that routing
mechanisms are designed to be scalable for operation in networks
of various sizes. However, due to a lack of memory size and
computational power, 6LoWPAN routing might limit forwarding
entries to a small number, such as a maximum of 32 routing table
Kim, et al. Informational [Page 20]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
entries. Particularly in large networks, the routing mechanism
MUST be designed in such a way that the number of routers is
smaller than the number of hosts.
[R11] The procedure of route repair and related control messages
SHOULD NOT harm overall energy consumption from the routing
protocols.
Local repair improves throughput and end-to-end latency,
especially in large networks. Since routes are repaired quickly,
fewer data packets are dropped, and a smaller number of routing
protocol packet transmissions are needed, since routes can be
repaired without source-initiated route discovery [Lee]. One
important consideration here may be to avoid premature energy
depletion, even if that impairs other requirements.
[R12] 6LoWPAN routing protocols SHOULD allow for dynamically adaptive
topologies and mobile nodes. When supporting dynamic topologies and
mobile nodes, route maintenance should keep in mind the goal of a
minimal routing state and routing protocol message overhead.
Topological node mobility may be the result of physical movement
and/or a changing radio environment, making it very likely that
mobility needs to be handled even in a network with physically
static nodes. 6LoWPANs do not make use of a separate protocol to
maintain connectivity to moving nodes but expects the routing
protocol to handle it.
In addition, some nodes may move from one 6LoWPAN to another and
are expected to become functional members of the latter 6LoWPAN in
a limited amount of time.
Building monitoring applications, for instance, have a number of
requirements with respect to recovery and settling time for
mobility that range between 5 and 20 seconds (Section 5.3.1 of
[RFC5867]). For more interactive applications such as those used
in home automation systems, where users provide input and expect
instant feedback, mobility requirements are also stricter and, for
moves within a network, a convergence time below 0.5 seconds is
commonly required (Section 3.2 of [RFC5826]). In industrial
environments, where mobile equipment (e.g., cranes) moves around,
the routing protocol needs to support vehicular speeds of up to
35 km/h [RFC5673]. Currently, 6LoWPANs are not normally being
used for such fast mobility, but dynamic association and
disassociation MUST be supported in 6LoWPANs.
Kim, et al. Informational [Page 21]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
There are several challenges that should be addressed by a 6LoWPAN
routing protocol in order to create robust routing in dynamic
environments:
* Mobile Nodes Changing Their Location inside a LoWPAN:
If the nodes' movement pattern is unknown, mobility cannot
easily be detected or distinguished by the routing protocols.
Mobile nodes can be treated as nodes that disappear and
reappear in another place. The tracking of movement patterns
increases complexity and can be avoided by handling moving
nodes using reactive route updates.
* Movement of a LoWPAN with Respect to Other (Inter)Connected
LoWPANs:
Within each stub network, (one or more) relatively powerful
gateway nodes (6LBRs) need to be configured to handle moving
LoWPANs.
* Nodes Permanently Joining or Leaving the LoWPAN:
In order to ease routing table updates, reduce the size of
these updates, and minimize error control messages, nodes
leaving the network may announce their disassociation to the
closest edge router or to a specific node (if any) that takes
charge of local association and disassociation.
[R13] A 6LoWPAN routing protocol SHOULD support various traffic
patterns -- point-to-point, point-to-multipoint, and multipoint-to-
point -- while avoiding excessive multicast traffic in a LoWPAN.
6LoWPANs often have point-to-multipoint or multipoint-to-point
traffic patterns. Many emerging applications include point-to-
point communication as well. 6LoWPAN routing protocols should be
designed with the consideration of forwarding packets from/to
multiple sources/destinations. Current documents of the ROLL WG
explain that the workload or traffic pattern of use cases for
LoWPANs tends to be highly structured, unlike the any-to-any data
transfers that dominate typical client and server workloads. In
many cases, exploiting such structure may simplify difficult
problems arising from resource constraints or variation in
connectivity.
5.4. Support of Security
The routing requirement described in this subsection allows secure
transmission of routing messages. As in traditional networks,
routing mechanisms in 6LoWPANs present another window from which an
attacker might disrupt and significantly degrade the overall
performance of the 6LoWPAN. Attacks against non-secure routing aim
Kim, et al. Informational [Page 22]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
mainly to contaminate WPANs with false routing information, resulting
in routing inconsistencies. A malicious node can also snoop packets
and then launch replay attacks on the 6LoWPAN nodes. These attacks
can cause harm, especially when the attacker is a high-power device,
such as a laptop. It can also easily drain the batteries of 6LoWPAN
devices by sending broadcast messages, redirecting routes, etc.
[R14] 6LoWPAN routing protocols MUST support confidentiality,
authentication, and integrity services as required for secure
delivery of control messages.
A general set of requirements that may apply to these services can
be found in [KARP-THREATS].
Security is very important for designing robust routing protocols,
but it should not cause significant transmission overhead. The
security aspect, however, seems to be a bit of a tradeoff in a
6LoWPAN, since security is always a costly function. A 6LoWPAN
poses unique challenges to which traditional security techniques
cannot be applied directly. For example, public key cryptography
primitives are typically avoided (as being too expensive), as are
relatively heavyweight conventional encryption methods.
Consequently, it becomes questionable whether the 6LoWPAN devices
can support IPsec as it is. While [RFC6434] makes support of the
IPsec architecture a SHOULD for all IPv6 nodes, considering the
power constraints and limited processing capabilities of
IEEE 802.15.4-capable devices, IPsec is computationally expensive.
Internet Key Exchange (IKEv2) messaging as described in RFC 5996
[RFC5996] will not work well in 6LoWPANs, as we want to minimize
the amount of signaling in these networks. IPsec supports the
Authentication Header (AH) for authenticating the IP header and
the Encapsulating Security Payload (ESP) for authenticating and
encrypting the payload. The main issues of using IPsec are
two-fold: (1) processing power and (2) key management. Since
these tiny 6LoWPAN devices do not process huge amounts of data or
communicate with many different nodes, whether complete
implementation of a Security Association Database (SAD), policy
database, and dynamic key-management protocol are appropriate for
these small battery-powered devices or not is not well understood.
Bandwidth is a very scarce resource in 6LoWPAN environments. The
fact that IPsec additionally requires another header (AH or ESP)
in every packet makes its use problematic in 6LoWPAN environments.
IPsec requires two communicating peers to share a secret key that
is typically established dynamically with IKEv2. Thus, it has an
additional packet overhead incurred by the exchange of IKEv2
packets.
Kim, et al. Informational [Page 23]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
Given existing constraints in 6LoWPAN environments, IPsec may not
be suitable for use in such environments, especially since a
6LoWPAN node may not be capable of operating all IPsec algorithms
on its own. Thus, a 6LoWPAN may need to define its own keying
management method(s) that require minimum overhead in packet size
and in the number of signaling messages that are exchanged. IPsec
will provide authentication and confidentiality between end-nodes
and across multiple LoWPAN links, and may be useful only when two
nodes want to apply security to all exchanged messages. However,
in most cases, the security may be requested at the application
layer as needed, while other messages can flow in the network
without security overhead.
Security threats within LoWPANs may be different from existing
threat models in ad hoc network environments. If IEEE 802.15.4
security is not used, Neighbor Discovery (ND) in IEEE 802.15.4
links is susceptible to threats. These include Neighbor
Solicitation/Neighbor Advertisement (NS/NA) spoofing, a malicious
router, a default router that is "killed", a good router that goes
bad, a spoofed redirect, replay attacks, and remote ND DoS
[RFC3756]. However, if IEEE 802.15.4 security is used, no other
protection is needed for ND, as long as none of the nodes become
compromised, because the Corporate Intranet Model of RFC 3756 can
be assumed [6LoWPAN-ND].
Bootstrapping may also impose additional threats. For example, a
malicious node can obtain initial configuration information in
order to appear as a legitimate node and then carry out various
types of attacks. Such a node can also keep legitimate nodes busy
by broadcasting authentication/join requests. One option for
mitigating such threats is the use of mutual authentication
schemes based on the use of pre-shared keys [Ikram].
The IEEE 802.15.4 MAC provides an AES-based security mechanism.
Routing protocols may define how this mechanism (in conjunction
with IPsec whenever available) can be used to obtain the intended
security, either for the routing protocol alone or in conjunction
with the security used for the data. Byte overhead of the
mechanism, which depends on the security services selected, must
be considered. In the worst case in terms of overhead, the
mechanism consumes 21 bytes of MAC payload.
The IEEE 802.15.4 MAC security is typically supported by crypto
hardware, even in very simple chips that will be used in a
6LoWPAN. Even if the IEEE 802.15.4 MAC security mechanisms are
not used, this crypto hardware is usually available for use by
Kim, et al. Informational [Page 24]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
application code running on these chips. A security protocol
outside IEEE 802.15.4 MAC security SHOULD therefore provide a mode
of operation that is covered by this crypto hardware.
IEEE 802.15.4 does not specify protection for acknowledgment
frames. Since the sequence numbers of data frames are sent in the
clear, an adversary can forge an acknowledgment for each data
frame. Exploitation of this weakness can be combined with
targeted jamming to prevent delivery of selected packets.
Consequently, IEEE 802.15.4 acknowledgments cannot be relied upon.
In applications that require high security, the routing protocol
must not exploit feedback from acknowledgments (e.g., to keep
track of neighbor connectivity, see [R16]).
5.5. Support of Mesh-Under Forwarding
One LoWPAN may be built as one IPv6 link. In this case, mesh-under
forwarding mechanisms must be supported. While this document
provides general, layer-agnostic guidelines about the design of
6LoWPAN routing, the requirements in this section are specifically
related to Layer 2. These requirements are directed to bodies that
might consider working on mesh-under routing, such as the IEEE. The
requirements described in this subsection allow optimization and
correct operation of routing solutions, taking into account the
specific features of the mesh-under configuration.
[R15] Mesh-under requires the development of a routing protocol
operating below IP. This protocol MUST support 16-bit short and
64-bit extended MAC addresses.
[R16] In order to perform discovery and maintenance of neighbors
(i.e., neighborhood discovery as opposed to ND-style neighbor
discovery), LoWPAN nodes SHOULD avoid sending separate "Hello"
messages. Instead, link-layer mechanisms (such as acknowledgments)
MAY be utilized to keep track of active neighbors.
Reception of an acknowledgment after a frame transmission may
render unnecessary the transmission of explicit Hello messages,
for example. In a more general view, any frame received by a node
may be used as an input to evaluate the connectivity between the
sender and receiver of that frame.
[R17] If the routing protocol functionality includes enabling IP
multicast, then it MAY employ structure in the network for efficient
distribution in order to minimize link-layer broadcast.
Kim, et al. Informational [Page 25]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
5.6. Support of Management
When a new protocol is designed, the operational environment and
manageability of the protocol should be considered from the start
[RFC5706]. This subsection provides a requirement for the
manageability of 6LoWPAN routing protocols.
[R18] A 6LoWPAN routing protocol SHOULD be designed according to the
guidelines for operations and management stated in [RFC5706].
The management operations that a 6LoWPAN routing protocol
implementation can support depend on the memory and processing
capabilities of the 6LoWPAN devices used, which are typically
constrained. However, 6LoWPANs may benefit significantly from
supporting such 6LoWPAN routing protocol management operations as
configuration and performance monitoring.
The design of 6LoWPAN routing protocols should take into account
that, according to "Architectural Principles of the Internet"
[RFC1958], "options and parameters should be configured or
negotiated dynamically rather than manually". This is especially
important for 6LoWPANs, which can be composed of a large number of
devices (and, in addition, these devices may not have an
appropriate user interface). Therefore, parameter
autoconfiguration is a desirable property for a 6LoWPAN routing
protocol, although some subset of routing protocol parameters may
allow other forms of configuration as well.
In order to verify the correct operation of the 6LoWPAN routing
protocol and the network itself, a 6LoWPAN routing protocol should
allow monitoring of the status and/or value of 6LoWPAN routing
protocol parameters and data structures such as routing table
entries. In order to enable fault management, further monitoring
of the 6LoWPAN routing protocol operation is needed. For this,
faults can be reported via error log messages. These messages may
contain information such as the number of times a packet could not
be sent to a valid next hop, the duration of each period without
connectivity, memory overflow and its causes, etc.
[RFC5706] -- in particular its Section 3 -- provides a
comprehensive guide to properly designing the management solution
for a 6LoWPAN routing protocol.
Kim, et al. Informational [Page 26]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
6. Security Considerations
Security issues are described in Section 5.4. The security
considerations in RFC 4919 [RFC4919], RFC 4944 [RFC4944], and
RFC 4593 [RFC4593] apply as well.
The use of wireless links renders a 6LoWPAN susceptible to attacks
like any other wireless network. In outdoor 6LoWPANs, the physical
exposure of the nodes allows an adversary to capture, clone, or
tamper with these devices. In ad hoc 6LoWPANs that are dynamic in
both their topology and node memberships, a static security
configuration does not suffice. Spoofed, altered, or replayed
routing information might occur, while multihopping could delay the
detection and treatment of attacks.
This specification expects that the link layer is sufficiently
protected, either by means of physical or IP security for the
backbone link, or with MAC-sublayer cryptography. However, link-
layer encryption and authentication may not be sufficient to provide
confidentiality, authentication, integrity, and freshness to both
data and routing protocol packets. Time synchronization, self-
organization, and secure localization for multi-hop routing are also
critical to support.
For secure routing protocol operation, it may be necessary to
consider authenticated broadcast (and multicast) and bidirectional
link verification. On the other hand, secure end-to-end data
delivery can be assisted by the routing protocol. For example,
multi-path routing could be considered for increasing security to
prevent selective forwarding. However, the challenge is that
6LoWPANs already have high resource constraints, so that 6LBR and
LoWPAN nodes may require different security solutions.
7. Acknowledgments
The authors of this document highly appreciate the authors of "IPv6
over Low Power WPAN Security Analysis" [6LoWPAN-SEC]. Although their
security analysis work is not ongoing at the time of this writing,
the valuable information and text in that document are used in
Section 5.4 of this document, per advice received during IESG review
procedures. Thanks to their work, Section 5.4 is much improved. The
authors also thank S. Chakrabarti, who gave valuable comments
regarding mesh-under requirements, and A. Petrescu for significant
review.
Carles Gomez has been supported in part by FEDER and by the Spanish
Government through projects TIC2006-04504 and TEC2009-11453.
Kim, et al. Informational [Page 27]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
8. References
8.1. Normative References
[IEEE802.15.4]
IEEE Computer Society, "IEEE Standard for Local and
Metropolitan Area Networks -- Part 15.4: Low-Rate
Wireless Personal Area Networks (LR-WPANs)", IEEE
Std. 802.15.4-2011, September 2011.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3756] Nikander, P., Ed., Kempf, J., and E. Nordmark, "IPv6
Neighbor Discovery (ND) Trust Models and Threats",
RFC 3756, May 2004.
[RFC3819] Karn, P., Ed., Bormann, C., Fairhurst, G., Grossman, D.,
Ludwig, R., Mahdavi, J., Montenegro, G., Touch, J., and L.
Wood, "Advice for Internet Subnetwork Designers", BCP 89,
RFC 3819, July 2004.
[RFC4593] Barbir, A., Murphy, S., and Y. Yang, "Generic Threats to
Routing Protocols", RFC 4593, October 2006.
[RFC4919] Kushalnagar, N., Montenegro, G., and C. Schumacher, "IPv6
over Low-Power Wireless Personal Area Networks (6LoWPANs):
Overview, Assumptions, Problem Statement, and Goals",
RFC 4919, August 2007.
[RFC4944] Montenegro, G., Kushalnagar, N., Hui, J., and D. Culler,
"Transmission of IPv6 Packets over IEEE 802.15.4
Networks", RFC 4944, September 2007.
[RFC5548] Dohler, M., Ed., Watteyne, T., Ed., Winter, T., Ed., and
D. Barthel, Ed., "Routing Requirements for Urban Low-Power
and Lossy Networks", RFC 5548, May 2009.
[RFC5673] Pister, K., Ed., Thubert, P., Ed., Dwars, S., and T.
Phinney, "Industrial Routing Requirements in Low-Power and
Lossy Networks", RFC 5673, October 2009.
Kim, et al. Informational [Page 28]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
8.2. Informative References
[6LoWPAN-ND]
Shelby, Z., Ed., Chakrabarti, S., and E. Nordmark,
"Neighbor Discovery Optimization for Low Power and Lossy
Networks (6LoWPAN)", Work in Progress, October 2011.
[6LoWPAN-SEC]
Park, S., Kim, K., Haddad, W., Ed., Chakrabarti, S., and
J. Laganier, "IPv6 over Low Power WPAN Security Analysis",
Work in Progress, March 2011.
[Bulusu] Bulusu, N., Ed., and S. Jha, Ed., "Wireless Sensor
Networks: A Systems Perspective", Artech House,
ISBN 9781580538671, July 2005.
[Chen] Chen, B., Muniswamy-Reddy, K., and M. Welsh, "Ad-Hoc
Multicast Routing on Resource-Limited Sensor Nodes", Proc.
2nd International Workshop on Multi-hop Ad Hoc Networks,
May 2006.
[Doherty] Doherty, L., Warneke, B., Boser, B., and K. Pister,
"Energy and Performance Considerations for Smart Dust",
International Journal of Parallel and Distributed Systems
and Networks, Vol. 4, No. 3, 2001.
[Hill] Hill, J., "System Architecture for Wireless Sensor
Networks", Ph.D. Thesis, UC Berkeley, 2003.
[Ikram] Ikram, M., Chowdhury, A., Zafar, B., Cha, H., Kim, K.,
Yoo, S., and D. Kim, "A Simple Lightweight Authentic
Bootstrapping Protocol for IPv6-based Low Rate Wireless
Personal Area Networks (6LoWPANs)", Proc. International
Conference on Wireless Communications and
Mobile Computing, June 2009.
[KARP-THREATS]
Lebovitz, G. and M. Bhatia, "Keying and Authentication for
Routing Protocols (KARP) Overview, Threats, and
Requirements", Work in Progress, May 2012.
[Kuhn] Kuhn, F., Wattenhofer, R., and A. Zollinger, "Worst-Case
Optimal and Average-Case Efficient Ad-Hoc Geometric
Routing", MobiHoc '03: Proceedings of the 4th ACM
International Symposium on Mobile Ad Hoc Networking and
Computing, June 2003.
Kim, et al. Informational [Page 29]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
[Latre] Latre, B., De Mil, P., Moerman, I., Dhoedt, B., and P.
Demeester, "Throughput and Delay Analysis of Unslotted
IEEE 802.15.4", Journal of Networks, Vol. 1, No. 1,
May 2006.
[Lee] Lee, S., Belding-Royer, E., and C. Perkins, "Scalability
Study of the Ad Hoc On-Demand Distance-Vector Routing
Protocol", International Journal of Network Management,
Vol. 13, pp. 97-114, March 2003.
[RFC1958] Carpenter, B., Ed., "Architectural Principles of the
Internet", RFC 1958, June 1996.
[RFC5556] Touch, J. and R. Perlman, "Transparent Interconnection of
Lots of Links (TRILL): Problem and Applicability
Statement", RFC 5556, May 2009.
[RFC5706] Harrington, D., "Guidelines for Considering Operations and
Management of New Protocols and Protocol Extensions",
RFC 5706, November 2009.
[RFC5826] Brandt, A., Buron, J., and G. Porcu, "Home Automation
Routing Requirements in Low-Power and Lossy Networks",
RFC 5826, April 2010.
[RFC5867] Martocci, J., Ed., De Mil, P., Riou, N., and W. Vermeylen,
"Building Automation Routing Requirements in Low-Power and
Lossy Networks", RFC 5867, June 2010.
[RFC5996] Kaufman, C., Hoffman, P., Nir, Y., and P. Eronen,
"Internet Key Exchange Protocol Version 2 (IKEv2)",
RFC 5996, September 2010.
[RFC6282] Hui, J., Ed., and P. Thubert, "Compression Format for IPv6
Datagrams over IEEE 802.15.4-Based Networks", RFC 6282,
September 2011.
[RFC6434] Jankiewicz, E., Loughney, J., and T. Narten, "IPv6 Node
Requirements", RFC 6434, December 2011.
[ROLL-PROTOCOLS]
Levis, P., Tavakoli, A., and S. Dawson-Haggerty, "Overview
of Existing Routing Protocols for Low Power and Lossy
Networks", Work in Progress, April 2009.
Kim, et al. Informational [Page 30]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
[Shih] Shih, E., Cho, S., Ickes, N., Min, R., Sinha, A., Wang,
A., and A. Chandrakasan, "Physical Layer Driven Protocols
and Algorithm Design for Energy-Efficient Wireless Sensor
Networks", MobiCom '01: Proceedings of the 7th ACM Annual
International Conference on Mobile Computing and
Networking, July 2001.
[Watteyne] Watteyne, T., Molinaro, A., Richichi, M., and M. Dohler,
"From MANET To IETF ROLL Standardization: A Paradigm Shift
in WSN Routing Protocols", IEEE Communications Surveys and
Tutorials, Vol. 13, Issue 4, pp. 688-707, 2011,
<http://ieeexplore.ieee.org/xpl/
articleDetails.jsp?arnumber=5581105>.
Kim, et al. Informational [Page 31]
^L
RFC 6606 6LoWPAN Routing Requirements May 2012
Authors' Addresses
Eunsook Eunah Kim
ETRI
161 Gajeong-dong
Yuseong-gu
Daejeon 305-700
Korea
Phone: +82-42-860-6124
EMail: eunah.ietf@gmail.com
Dominik Kaspar
Simula Research Laboratory
Martin Linges v 17
Fornebu 1364
Norway
Phone: +47-6782-8223
EMail: dokaspar.ietf@gmail.com
Carles Gomez
Universitat Politecnica de Catalunya/Fundacio i2CAT
Escola d'Enginyeria de Telecomunicacio i Aeroespacial
de Castelldefels
C/Esteve Terradas, 7
Castelldefels 08860
Spain
Phone: +34-93-413-7206
EMail: carlesgo@entel.upc.edu
Carsten Bormann
Universitaet Bremen TZI
Postfach 330440
Bremen D-28359
Germany
Phone: +49-421-218-63921
EMail: cabo@tzi.org
Kim, et al. Informational [Page 32]
^L
|