Reference Hub27
Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment

Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment

Meghana Gopal Raj, Santosh Kumar Pani
Copyright: © 2022 |Volume: 18 |Issue: 1 |Pages: 25
ISSN: 1552-6283|EISSN: 1552-6291|EISBN13: 9781799893967|DOI: 10.4018/IJSWIS.300824
Cite Article Cite Article

MLA

Raj, Meghana Gopal, and Santosh Kumar Pani. "Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment." IJSWIS vol.18, no.1 2022: pp.1-25. http://doi.org/10.4018/IJSWIS.300824

APA

Raj, M. G. & Pani, S. K. (2022). Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment. International Journal on Semantic Web and Information Systems (IJSWIS), 18(1), 1-25. http://doi.org/10.4018/IJSWIS.300824

Chicago

Raj, Meghana Gopal, and Santosh Kumar Pani. "Chaotic Whale Crow Optimization Algorithm for Secure Routing in the IoT Environment," International Journal on Semantic Web and Information Systems (IJSWIS) 18, no.1: 1-25. http://doi.org/10.4018/IJSWIS.300824

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper solves the internet of things (IoT) security issues by introducing a chaotic whale crow (CWC) optimization, which is the integration of chaotic whale optimization algorithm (CWOA) in crow search algorithm (CSA). The framework operates on two crucial aspects: one is to select the secure nodes, and the other is to implement secure routing using the selected trusted nodes. First, the selection of trusted nodes is performed based on trust factors like direct, indirect, forwarding rate, integrity, and availability factors. Then, the selected trusted nodes are adapted for trust-based secure routing, which is optimally performed using the proposed CWC, based on the fitness parameters trust and energy. Finally, the proposed CWC is evaluated, which revealed high performance with a minimal delay of 191.46ms, which shows 14.87%, 7.35%, 6.82%, 4.19%, and 5.74% improved performance compared to existing LaSeR, PM Ipv6, secTrust-RPL RISA, and LSDAR techniques. Similarly, the proposed method obtained the maximal energy of 71.25J and maximal throughput of 129.77kbps.