2022
DOI: 10.4018/ijisp.300317
|View full text |Cite
|
Sign up to set email alerts
|

An Iterative CrowWhale-Based Optimization Model for Energy-Aware Multicast Routing in IoT

Abstract: This paper proposes an energy-aware multicast routing protocol (MRP) based on the optimization algorithm named iterative Crow Whale-Energy Trust routing (iterative CrowWhale-ETR). The CrowWhale-ETR is developed by including the historical terms from Taylor series in the CrowWhale optimization algorithm. Initially, the effective nodes for the multicast routing process are considered by measuring the trust and energy level of nodes. Based on the fitness factor, the protected nodes are selected relies on the trus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…However, it supports storage, computation, and application processes to end users, such as cloud computing 16‐18 . It fills the gap between IoT devices, such as smart vehicles in IoV deployment, and remote data centers 19,20 . Accordingly, it offers some other merits, like minimized latency, increased security, and reduced bandwidth.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it supports storage, computation, and application processes to end users, such as cloud computing 16‐18 . It fills the gap between IoT devices, such as smart vehicles in IoV deployment, and remote data centers 19,20 . Accordingly, it offers some other merits, like minimized latency, increased security, and reduced bandwidth.…”
Section: Introductionmentioning
confidence: 99%
“…[16][17][18] It fills the gap between IoT devices, such as smart vehicles in IoV deployment, and remote data centers. 19,20 Accordingly, it offers some other merits, like minimized latency, increased security, and reduced bandwidth. Hence, fog computing is a hopeful technology in different IoT services.…”
mentioning
confidence: 99%
“…In these technologies, communication, as well as computing systems, is effortlessly embedded. IoT objects are characterized both by their strong resource constraints and by their lossy communication connections [17]. Certainly, these objects have restricted memory, processing power, and energy providers, as well as a high loss rate, an imperfect frame size, a low throughput, and diminutive communication ranges [20].…”
Section: Introductionmentioning
confidence: 99%