{"title":"物联网环境下安全路由的混沌鲸鱼乌鸦优化算法","authors":"Meghana G. Raj","doi":"10.4018/ijswis.300824","DOIUrl":null,"url":null,"abstract":"This paper solves the Internet of Things (IoT) security issues by introducing a Chaotic Whale Crow (CWC) optimization, which is the integration of Chaotic Whale Optimization Algorithm (CWOA) in Crow Search Algorithm (CSA). The framework operates on two crucial aspects: one is to select the secure nodes, and the other is to implement secure routing using the selected trusted nodes. First, the selection of trusted nodes is performed based on trust factors like direct, indirect, forwarding rate, integrity, and availability factors. Then, the selected trusted nodes are adapted for trust-based secure routing, which is optimally performed using the proposed CWC, based on the fitness parameters trust and energy. Finally, the proposed CWC is evaluated, which revealed high performance with a minimal delay of 191.46ms, which shows 14.87%, 7.35%, 6.82%, 4.19%, and 5.74% improved performance comapred to existing LaSeR, PM Ipv6, secTrust-RPL RISA, and LSDAR techniques. Similarly, the proposed method obtained the maximal energy of 71.25J, and maximal throughput of 129.77kbps.","PeriodicalId":54934,"journal":{"name":"International Journal on Semantic Web and Information Systems","volume":"42 1","pages":""},"PeriodicalIF":4.1000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Chaotic Whale Crow Optimization Algorithm for Secure Routing In Iot Environment\",\"authors\":\"Meghana G. Raj\",\"doi\":\"10.4018/ijswis.300824\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper solves the Internet of Things (IoT) security issues by introducing a Chaotic Whale Crow (CWC) optimization, which is the integration of Chaotic Whale Optimization Algorithm (CWOA) in Crow Search Algorithm (CSA). The framework operates on two crucial aspects: one is to select the secure nodes, and the other is to implement secure routing using the selected trusted nodes. First, the selection of trusted nodes is performed based on trust factors like direct, indirect, forwarding rate, integrity, and availability factors. Then, the selected trusted nodes are adapted for trust-based secure routing, which is optimally performed using the proposed CWC, based on the fitness parameters trust and energy. Finally, the proposed CWC is evaluated, which revealed high performance with a minimal delay of 191.46ms, which shows 14.87%, 7.35%, 6.82%, 4.19%, and 5.74% improved performance comapred to existing LaSeR, PM Ipv6, secTrust-RPL RISA, and LSDAR techniques. Similarly, the proposed method obtained the maximal energy of 71.25J, and maximal throughput of 129.77kbps.\",\"PeriodicalId\":54934,\"journal\":{\"name\":\"International Journal on Semantic Web and Information Systems\",\"volume\":\"42 1\",\"pages\":\"\"},\"PeriodicalIF\":4.1000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal on Semantic Web and Information Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.4018/ijswis.300824\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal on Semantic Web and Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.4018/ijswis.300824","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Chaotic Whale Crow Optimization Algorithm for Secure Routing In Iot Environment
This paper solves the Internet of Things (IoT) security issues by introducing a Chaotic Whale Crow (CWC) optimization, which is the integration of Chaotic Whale Optimization Algorithm (CWOA) in Crow Search Algorithm (CSA). The framework operates on two crucial aspects: one is to select the secure nodes, and the other is to implement secure routing using the selected trusted nodes. First, the selection of trusted nodes is performed based on trust factors like direct, indirect, forwarding rate, integrity, and availability factors. Then, the selected trusted nodes are adapted for trust-based secure routing, which is optimally performed using the proposed CWC, based on the fitness parameters trust and energy. Finally, the proposed CWC is evaluated, which revealed high performance with a minimal delay of 191.46ms, which shows 14.87%, 7.35%, 6.82%, 4.19%, and 5.74% improved performance comapred to existing LaSeR, PM Ipv6, secTrust-RPL RISA, and LSDAR techniques. Similarly, the proposed method obtained the maximal energy of 71.25J, and maximal throughput of 129.77kbps.
期刊介绍:
The International Journal on Semantic Web and Information Systems (IJSWIS) promotes a knowledge transfer channel where academics, practitioners, and researchers can discuss, analyze, criticize, synthesize, communicate, elaborate, and simplify the more-than-promising technology of the semantic Web in the context of information systems. The journal aims to establish value-adding knowledge transfer and personal development channels in three distinctive areas: academia, industry, and government.