An implementation and evaluation of the security features of RPL