Reference Hub8
An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT

An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT

Dipali K. Shende, Yogesh S. Angal, S.C. Patil.
Copyright: © 2022 |Volume: 16 |Issue: 1 |Pages: 24
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781683180203|DOI: 10.4018/IJISP.300317
Cite Article Cite Article

MLA

Shende, Dipali K., et al. "An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT." IJISP vol.16, no.1 2022: pp.1-24. http://doi.org/10.4018/IJISP.300317

APA

Shende, D. K., Angal, Y. S., & S.C. Patil. (2022). An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT. International Journal of Information Security and Privacy (IJISP), 16(1), 1-24. http://doi.org/10.4018/IJISP.300317

Chicago

Shende, Dipali K., Yogesh S. Angal, and S.C. Patil. "An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT," International Journal of Information Security and Privacy (IJISP) 16, no.1: 1-24. http://doi.org/10.4018/IJISP.300317

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper proposes an energy-aware multicast routing protocol (MRP) based on the optimization algorithm named iterative Crow Whale-Energy Trust routing (iterative CrowWhale-ETR). The CrowWhale-ETR is developed by including the historical terms from Taylor series in the CrowWhale optimization algorithm. Initially, the effective nodes for the multicast routing process are considered by measuring the trust and energy level of nodes. Based on the fitness factor, the protected nodes are selected relies on the trust and energy level of individual nodes. Once the secure nodes are selected, route detection and route selection is performed based on iterative CrowWhale-ETR. Finally, the route maintenance is done as per the remaining energy and trust factors of the nodes in the network. The comparative analysis of developed iterative CrowWhale-ETR is performed with the evaluation metrics, like energy, delay, throughput and detection rate using 50 and 100 nodes in the presence as well as absence of attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.