Computer Standards & Interfaces 82 (2022) 103622 Available online 10 January 2022 0920-5489/© 2022 Elsevier B.V. All rights reserved. MFO-RPL: A secure RPL-based routing protocol utilizing moth-fame optimizer for the IoT applications Ali Seyfollahi , Meysam Moodi , Ali Ghaffari * Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran A R T I C L E INFO Keywords: Routing security RPL Rank attack Moth-fame optimization algorithm ABSTRACT The intricate features and autonomous confguration of Routing Protocol for Low-power and Lossy Networks (RPL) make it challenging to provide a key management solution and deploy it on constrained resources sensing systems. So far, various types of attacks, such as rank attacks, have been identifed on this protocol, so it is necessary to take appropriate countermeasures to mitigate and isolate their effects. This paper proposes the Moth-Flame Optimization-based secure scheme for RPL (MFO-RPL) to optimize the routing process and rank attack detection in RPL. MFO-RPL uses the petal algorithm to select the next-hop nodes and form the optimal path between the source and root in the graph. Then, rank attacks in RPL are detected using the Moth-Flame algorithm to prevent malicious nodes from being selected as the preferred parent. Simulation fndings under different scenarios revealed that MFO-RPL has fewer lost packets, rank switching, convergence time, and attacks than comparative schemes. 1. Introduction Around 30 billion smart things such as smartphones, dust-driven sensors, wearables, and cyber-physical systems from all over the world are connected via the Internet and are growing exponentially [1,2]. Different communication standards are adapted for these heterogeneous networks and pervasive communications such as Low-power and Lossy Networks (LLN) [3] and IPv6 over Low-powered Wireless Personal Area Networks (6LoWPAN) [47]. These things have constrained processing, energy resource and storage, low data rate, and bandwidth [8,9]. In LLN, numerous embedded devices send massive volumes of data to the Internet [10], with the inherent challenges of low Packet Delivery Ratio (PDR) and high packet losses [11]. The Internet Engineering Task Force (IETF) has introduced the RPL routing protocol [12] to meet the various requirements of applications and obligations [13]. Network designers can utilize RPLs unparalleled fexibility by using the different metrics they want for the RPL Objective Function (OF). Given each networks dynamic topology and potential vulnerabil- ities, data routing and addressing consider two crucial concerns in IoT networks that require appropriate attention [14]. Based on the layered architecture, IoT enables Internet communication between physical devices of heterogeneous networks [15]. Layers in the IoT ecosystems architecture meet each others needs, and their interaction also affects the whole systems performance [16]. Small size, low hardware, and communication capabilities have led to limitations in the functions of aggregation, transmission, and communication between nodes and their routing in the IoT [17]. Routing of messages exchanged between nodes is one of the main challenges in IoT communications, which is very important due to the need to maintain the uniformity of the path packets between the source and destination [18] and has led to various pro- posals for routing in the IoT. 1.1. Motivation Considering IoT environmentsdynamics, discovering security challenges, and providing automated solutions require more time and energy [19]. In IoT, network security is critical, especially when packets pass through heterogeneous networks of billions of intelligent nodes [20] to reach a server on the Internet. The scale and rate of new attacks on sensor devices in the IoT are increasing day by day, and therefore the study of data transmission security requires a lot of attention [21]. In the meantime, creating secure routing is challenging. This essential need to secure the routing process between multiple IoT devices across hetero- geneous networks requires extensive research. One of the signifcant information security concerns in IoT is network layer security. RPL can be vulnerable to common routing attacks in wireless * Corresponding author. E-mail address: a.ghaffari@iaut.ac.ir (A. Ghaffari). Contents lists available at ScienceDirect Computer Standards & Interfaces journal homepage: www.elsevier.com/locate/csi https://doi.org/10.1016/j.csi.2022.103622 Received 15 December 2020; Received in revised form 2 October 2021; Accepted 4 January 2022