{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:20:43Z","timestamp":1777890043725,"version":"3.51.4"},"reference-count":41,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T00:00:00Z","timestamp":1674432000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Web Intelligence"],"published-print":{"date-parts":[[2023,9,20]]},"abstract":"<jats:p>Multipath routing helps to establish various quality of service parameters, which is significant in helping multimedia broadcasting in the Internet of Things (IoT). Traditional multicast routing in IoT mainly concentrates on ad hoc sensor networking environments, which are not approachable and vigorous enough for assisting multimedia applications in an IoT environment. For resolving the challenging issues of multicast routing in IoT, CrowWhale-energy and trust-aware multicast routing (CrowWhale-ETR) have been devised. In this research, the routing performance of CrowWhale-ETR is analyzed by comparing it with optimization-based routing, routing protocols, and objective functions. Here, the optimization-based algorithm, namely the Spider Monkey Optimization algorithm (SMO), Whale Optimization Algorithm (WOA), Dolphin Echolocation Optimization (DEO) algorithm, Water Wave Optimization (WWO) algorithm, Crow Search Algorithm (CSA), and, routing protocols, like Ad hoc On-Demand Distance Vector (AODV), CTrust-RPL, Energy-Harvesting-Aware Routing Algorithm (EHARA), light-weight trust-based Quality of Service (QoS) routing, and Energy-awareness Load Balancing-Faster Local Repair (ELB-FLR) and the objective functions, such as energy, distance, delay, trust, link lifetime (LLT) and EDDTL (all objectives) are utilized for comparing the performance of CrowWhale-ETR. In addition, the performance of CrowWhale-ETR is analyzed in terms of delay, detection rate, energy, Packet Delivery Ratio (PDR), and throughput, and it achieved better values of 0.539\u00a0s, 0.628, 78.42%, 0.871, and 0.759 using EDDTL as fitness.<\/jats:p>","DOI":"10.3233\/web-220063","type":"journal-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T12:50:19Z","timestamp":1674564619000},"page":"271-291","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance evaluation and comparative analysis of CrowWhale-energy and trust aware multicast routing algorithm"],"prefix":"10.1177","volume":"21","author":[{"given":"Dipali K.","family":"Shende","sequence":"first","affiliation":[{"name":"PCCOER, Ravet Pune, India"}]},{"given":"Yogesh S.","family":"Angal","sequence":"additional","affiliation":[{"name":"Bhivarabai Sawant Institute of Technology and Research, Wagholi Pune, India"}]}],"member":"179","published-online":{"date-parts":[[2023,1,23]]},"reference":[{"key":"ref001","doi-asserted-by":"publisher","DOI":"10.3390\/jsan8010016"},{"key":"ref002","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.006"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.04.016"},{"key":"ref004","doi-asserted-by":"crossref","unstructured":"Z.A.\u00a0Almusaylim, A.\u00a0Alhumam, W.\u00a0Mansoor, P.\u00a0Chatterjee and N.Z.\u00a0Jhanjhi, Detection and mitigation of RPL rank and version number attacks in smart Internet of things, 2020.","DOI":"10.20944\/preprints202007.0476.v1"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruc.2016.03.001"},{"key":"ref006","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3813"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1007\/s12293-013-0128-0"},{"key":"ref008","unstructured":"S.\u00a0Beeby and N.M.\u00a0White\u00a0(eds), Energy Harvesting for Autonomous Systems, Artech House, 2010."},{"key":"ref009","doi-asserted-by":"crossref","unstructured":"I.D.\u00a0Chakeres and E.M.\u00a0Belding-Royer, AODV routing protocol implementation design, in: Proceedings 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings, 2004, pp.\u00a0698\u2013703.","DOI":"10.1109\/ICDCSW.2004.1284108"},{"key":"ref010","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4584-2"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.002"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900411"},{"key":"ref013","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2642643"},{"key":"ref014","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2013.03.004"},{"key":"ref015","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3229294"},{"key":"ref016","first-page":"1","author":"Kheirandishfard M.","journal-title":"Generic Colorized Journal"},{"key":"ref017","doi-asserted-by":"crossref","unstructured":"D.\u00a0Kothandaraman, S.\u00a0Naik Korra, A.\u00a0Balasundaram and S.\u00a0Magesh Kumar, Sequence number based secure routing algorithm for IoT networks, Materials Today: Proceedings (2021).","DOI":"10.1016\/j.matpr.2020.11.703"},{"key":"ref018","doi-asserted-by":"publisher","DOI":"10.26634\/jdp.7.3.17035"},{"key":"ref019","doi-asserted-by":"crossref","unstructured":"Q.\u00a0Le, T.\u00a0Ngo-Quynh and T.\u00a0Magedanz, RPL-based Multipath Routing Protocols for Internet of Things on Wireless Sensor Networks, in: International Conference on Advanced Technologies for Communications (ATC), Hanoi, Vietnam, 2014.","DOI":"10.1109\/ATC.2014.7043425"},{"key":"ref020","unstructured":"A.\u00a0Mayzaud, Monitoring and security for the RPL-based Internet of things, Doctoral dissertation, Universit\u00e9 de Lorraine, 2016."},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"key":"ref022","doi-asserted-by":"crossref","unstructured":"T.D.\u00a0Nguyen, J.Y.\u00a0Khan and D.T.\u00a0Ngo, An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications, in: Proceedings 2017 IEEE International Conference on Communications (ICC), 2017, pp.\u00a01\u20136.","DOI":"10.1109\/ICC.2017.7996888"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.006"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.029"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-04592-1"},{"issue":"3","key":"ref026","first-page":"34","volume":"4","author":"Prasad S.C.","year":"2021","journal-title":"Journal of Networking and Communication Systems"},{"issue":"4","key":"ref027","first-page":"23","volume":"2","author":"Praveen Kumar Reddy M.","year":"2019","journal-title":"Journal of Networking and Communication Systems"},{"key":"ref028","doi-asserted-by":"crossref","unstructured":"S.\u00a0Rani and S.H.\u00a0Ahmed, Multi-Hop Routing in Wireless Sensor Networks: An Overview, Taxonomy, and Research Challenges, 2015.","DOI":"10.1007\/978-981-287-730-7"},{"key":"ref029","doi-asserted-by":"crossref","unstructured":"A.\u00a0Seyfollahi, M.\u00a0Moodi and A.\u00a0Ghaffari, MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications, Computer Standards & Interfaces 82 (2022).","DOI":"10.1016\/j.csi.2022.103622"},{"key":"ref030","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2653362"},{"key":"ref031","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02299-y"},{"issue":"12","key":"ref032","first-page":"35","volume":"3","author":"Subbulakshmi P.","year":"2016","journal-title":"International Journal of New Technologies in Science and Engineering"},{"key":"ref033","doi-asserted-by":"crossref","unstructured":"M.\u00a0Suchanek, Sustainable transport development, innovation and technology, in: The Proceeding of TranSopot Conference, 2016.","DOI":"10.1007\/978-3-319-51427-7"},{"key":"ref034","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.08.013"},{"key":"ref035","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4224"},{"key":"ref036","doi-asserted-by":"crossref","unstructured":"V.\u00a0Vivekanand and V.T.\u00a0Thushara, Ultra resource constrained adaptive multipath routing for meteorological sensor networks, in: Advanced Networks and Telecommunications Systems (ANTS), Bangalore, India, 2016.","DOI":"10.1109\/ANTS.2016.7947809"},{"key":"ref037","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.06.004"},{"key":"ref038","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.06.004"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2020.07.003"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2598719"},{"key":"ref041","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2014.10.008"}],"container-title":["Web Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/WEB-220063","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/WEB-220063","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/WEB-220063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T05:27:37Z","timestamp":1777613257000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/WEB-220063"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,23]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9,20]]}},"alternative-id":["10.3233\/WEB-220063"],"URL":"https:\/\/doi.org\/10.3233\/web-220063","relation":{},"ISSN":["2405-6456","2405-6464"],"issn-type":[{"value":"2405-6456","type":"print"},{"value":"2405-6464","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,23]]}}}