{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T17:50:26Z","timestamp":1774288226272,"version":"3.50.1"},"reference-count":42,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2021,4,22]]},"abstract":"<jats:p>WSN plays a major role in the design of IoT system. In today\u2019s internet era IoT integrates the digital devices, sensing equipment and computing devices for data sensing, gathering and communicate the data to the Base station via the optimal path. WSN, owing to the characteristics such as energy constrained and untrustworthy environment makes them to face many challenges which may affect the performance and QoS of the network. Thus, in WSN based IoT both security and energy efficiency are considered as herculean design challenges and requires important concern for the enhancement of network life time. Hence, to address these problems in this paper a novel secure energy aware cluster based routing algorithm named Trusted Energy Efficient Fuzzy logic based clustering Algorithm (TEEFCA) has been proposed. This algorithm consists of two major objectives. Firstly, the trustworthy nodes are identified, which may act as candidate nodes for cluster based routing. Secondly, the fuzzy inference system is employed under the two circumstances namely selection of optimal Cluster Leader (CL) and cluster formation process by considering the following three parameters such as (i) node\u2019s Residual Energy level (ii) Cluster Density (iii) Distance Node BS. From, the experiment outcomes implemented using MATLAB it have been proved that TEEFCA shows significant improvement in terms of power conservation, network stability and lifetime when compared to the existing cluster aware routing approaches.<\/jats:p>","DOI":"10.3233\/jifs-201633","type":"journal-article","created":{"date-parts":[[2021,2,16]],"date-time":"2021-02-16T11:58:41Z","timestamp":1613476721000},"page":"9197-9211","source":"Crossref","is-referenced-by-count":37,"title":["Trusted energy aware cluster based routing using fuzzy logic for WSN in IoT"],"prefix":"10.1177","volume":"40","author":[{"given":"A.R.","family":"Rajeswari","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Sethu Institute of Technology, India"}]},{"given":"K.","family":"Kulothungan","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, CEG, Anna University, Chennai, India"}]},{"given":"Sannasi","family":"Ganapathy","sequence":"additional","affiliation":[{"name":"Centre for Cyber-Physical Systems & School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India"}]},{"given":"Arputharaj","family":"Kannan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-201633_ref1","doi-asserted-by":"crossref","unstructured":"Xiao L. and Wang Z. , Internet of Things: a new application for intelligent traffic monitoring system, J Netw 6(6) (2011).","DOI":"10.4304\/jnw.6.6.887-894"},{"issue":"12","key":"10.3233\/JIFS-201633_ref2","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","article-title":"Wireless sensor network survey","volume":"52","author":"Yick","year":"2008","journal-title":"Computer Networks"},{"key":"10.3233\/JIFS-201633_ref3","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.2004.1368893","article-title":"Routing techniques in wireless sensor networks: A survey","volume":"11","author":"Al-Karaki","year":"2004","journal-title":"IEEE Wireless Communications"},{"key":"10.3233\/JIFS-201633_ref4","doi-asserted-by":"crossref","unstructured":"Akyildiz I.F. and Vuran M.C. , Wireless sensor networks Hoboken: Wiley, (2010), 131\u2013141.","DOI":"10.1002\/9780470515181"},{"key":"10.3233\/JIFS-201633_ref5","doi-asserted-by":"crossref","unstructured":"Potdar V. , Sharif A. and Chang E. , Wireless sensor networks: A survey, In International conference on advanced information networking and applications workshops, 2009. WAINA\u201909 (2009), 636\u2013641.","DOI":"10.1109\/WAINA.2009.192"},{"key":"10.3233\/JIFS-201633_ref6","unstructured":"Forster, Introduction to Wireless Sensor Networks, John Wiley and Sons, (2016), ISBN: 978-1-118-99351-4."},{"issue":"7","key":"10.3233\/JIFS-201633_ref7","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","article-title":"Internet of things: vision, applications and research challenges","volume":"10","author":"Miorandi","year":"2012","journal-title":"J Ad Hoc Netw"},{"issue":"7","key":"10.3233\/JIFS-201633_ref8","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/MCOM.2016.7509394","article-title":"CoAP congestion control for the internet of things","volume":"54","author":"Betzler","year":"2016","journal-title":"IEEE Commun Mag"},{"issue":"9","key":"10.3233\/JIFS-201633_ref11","doi-asserted-by":"crossref","first-page":"2891","DOI":"10.1109\/JSEN.2012.2204737","article-title":"Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication","volume":"12","author":"Lee","year":"2012","journal-title":"IEEE Sens J"},{"issue":"8","key":"10.3233\/JIFS-201633_ref12","first-page":"185","article-title":"Trust Aware Svm Based Ids For Mitigating The Malicious Nodes In Manet","volume":"8","author":"Rajeswari","year":"2019","journal-title":"International Journal of Innovative Technology and Exploring Engineering"},{"key":"10.3233\/JIFS-201633_ref13","unstructured":"Crosby G.V. , Pissinou N. and Gadze J. , A framework for trust-based cluster head election in wireless sensor networks, in Proceedings of the 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems, (2006), pp. 13\u201322."},{"key":"10.3233\/JIFS-201633_ref14","unstructured":"Marmol F.G. and Perez G.M. , TRMSim-WSN, trust and reputation models simulator for wireless sensor networks, In Proceedings of the IEEE International Conference onCommunications, Communication and Information Systems Security Symposium, (2009), pp. 14\u201318."},{"key":"10.3233\/JIFS-201633_ref15","doi-asserted-by":"crossref","first-page":"2070","DOI":"10.4236\/cs.2016.78180","article-title":"Malicious nodes detection in MANET using back-off clustering approach","volume":"7","author":"Rajeswari","year":"2016","journal-title":"Circuits Syst"},{"key":"10.3233\/JIFS-201633_ref16","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.protcy.2013.12.390","article-title":"A light weight trust based secure and energy efficient clustering in wireless sensor network: Honey bee mating intelligence approach","volume":"10","author":"Sahoo","year":"2013","journal-title":"Procedia Technology"},{"key":"10.3233\/JIFS-201633_ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/3815834"},{"issue":"2","key":"10.3233\/JIFS-201633_ref18","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s11277-016-3269-x","article-title":"An energy efficient cluster head selection technique using network trust and swarm intelligence","volume":"89","author":"Juliana","year":"2016","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-201633_ref19","unstructured":"Li C. , Ye M. , Chen G. and Wu J. , An energy-efficient unequal clustering mechanism for wireless sensor networks, In IEEE international conference on mobile adhoc and sensor systems conference (2005), pp. 8\u201318."},{"key":"10.3233\/JIFS-201633_ref20","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.jnca.2014.09.005","article-title":"Clustering in sensor networks: A literature survey","volume":"46","author":"Afsar","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"issue":"6","key":"10.3233\/JIFS-201633_ref21","first-page":"671","article-title":"GNB-AODV: Guard Node Based \u2013AODV to Mitigate Black Hole Attack in MANET","volume":"2","author":"Rajeswari","year":"2016","journal-title":"International Journal of Scientific Research in Science, Engineering and Technology"},{"key":"10.3233\/JIFS-201633_ref22","doi-asserted-by":"crossref","unstructured":"Xiao L. and Wang Z. , Internet of Things: a new application for intelligent traffic monitoring system, J Netw 6(6) (2011).","DOI":"10.4304\/jnw.6.6.887-894"},{"issue":"7","key":"10.3233\/JIFS-201633_ref23","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1049\/iet-com.2009.0164","article-title":"Multi-layer clustering routing algorithm for wireless vehicular sensor networks","volume":"4","author":"Liu","year":"2010","journal-title":"IET Communications"},{"issue":"2","key":"10.3233\/JIFS-201633_ref24","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/JCN.2010.6391368","article-title":"Distance aware intelligent clustering protocol for wireless sensor networks","volume":"12","author":"Gautam","year":"2010","journal-title":"Journal of Communications and Networks"},{"issue":"5","key":"10.3233\/JIFS-201633_ref26","first-page":"1","article-title":"Location aware cluster based routing in wireless sensor networks","volume":"3","author":"Jerusha","year":"2012","journal-title":"International Journal of Computer and Communication Technology"},{"key":"10.3233\/JIFS-201633_ref27","unstructured":"Sahoo R.R. , Singh M. , Sardar A.R. , Mohapatra S. and Sarkar S.K. , TREE-CR: Trust based secure and energy efficient clustering inWSN, In Emerging trends in computing, communication and nanotechnology (ICE-CCN), 2013 international conference, (2013), pp. 532\u2013538."},{"key":"10.3233\/JIFS-201633_ref28","doi-asserted-by":"crossref","unstructured":"Yan L. , Pan Y. and Zhang J. , Trust cluster head election algorithm based on ant colony systems, Proceedings of the 3rd International joint Conference on Computational Science and Optimization, (2010), 419\u2013422.","DOI":"10.1109\/CSO.2010.205"},{"issue":"4","key":"10.3233\/JIFS-201633_ref29","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TWC.2002.804190","article-title":"An application specific protocol architecture for wireless sensor network","volume":"1","author":"Heinzelman","year":"2002","journal-title":"IEEE Trans Wirel Commun"},{"issue":"4","key":"10.3233\/JIFS-201633_ref30","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/TMC.2004.41","article-title":"HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks","volume":"3","author":"Younis","year":"2004","journal-title":"IEEE Trans Mob Comput"},{"key":"10.3233\/JIFS-201633_ref31","unstructured":"Handy M.J. , Haase M. and Timmermann D. , Low energy adaptive clustering hierarchy with deterministic cluster-head selection, In 4th international workshop on mobile and wireless communications network, (2003), 368\u2013372."},{"key":"10.3233\/JIFS-201633_ref32","unstructured":"Farooq M.O. , Dogar A.B. and Shah G.A. , MR-LEACH: Multi-hop routing with low energy adaptive clustering hierarchy, In Proceedings of fourth international conference on sensor technologies and applications, Venice, (2010), 262\u2013268."},{"key":"10.3233\/JIFS-201633_ref33","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for internet of things","volume":"42","author":"Yan","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"10.3233\/JIFS-201633_ref34","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","article-title":"Hierarchical trust management for wireless sensor networks and its applications to trust based routing and intrusion detection","volume":"9","author":"Bao","year":"2012","journal-title":"IEEE Trans Netw Serv Manage"},{"key":"10.3233\/JIFS-201633_ref35","first-page":"202","article-title":"Trust-based LEACH protocol for wireless sensor networks","volume":"1","author":"Song","year":"2008","journal-title":"In Future generation communication and networking, FGCN\u201908 second international conference"},{"issue":"10","key":"10.3233\/JIFS-201633_ref36","doi-asserted-by":"crossref","first-page":"1592","DOI":"10.4304\/jnw.7.10.1592-1599","article-title":"A framework of trust-energy balanced procedure for cluster head selection in wireless sensor networks","volume":"7","author":"Guo","year":"2012","journal-title":"Journal of Networks"},{"issue":"9","key":"10.3233\/JIFS-201633_ref37","first-page":"30","article-title":"Trust based energy efficient clustering using genetic algorithm in wireless sensor networks (teecga)","volume":"112","author":"Nimbalkar","year":"2015","journal-title":"International Journal of Computer Applications"},{"key":"10.3233\/JIFS-201633_ref38","first-page":"1","article-title":"CHEF: Cluster head election mechanism using fuzzy logic in wireless sensor networks","volume":"1","author":"Kim","year":"2008","journal-title":"In Proceedings of IEEE 10th international conference on advanced communication technology"},{"issue":"7","key":"10.3233\/JIFS-201633_ref39","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1016\/j.adhoc.2012.04.004","article-title":"An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic","volume":"10","author":"Taheri","year":"2012","journal-title":"Ad Hoc Netw"},{"key":"10.3233\/JIFS-201633_ref40","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.procs.2012.06.035","article-title":"An energy efficient fuzzy logic cluster formation protocol in wireless sensor networks","volume":"10","author":"Mhemed","year":"2012","journal-title":"Procedia Computer Science"},{"issue":"3","key":"10.3233\/JIFS-201633_ref41","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1007\/s11276-015-1013-1","article-title":"Fuzzy logic based unequal clustering for wireless sensor networks","volume":"22","author":"Logambigai","year":"2016","journal-title":"Wirel Netw"},{"key":"10.3233\/JIFS-201633_ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00766-8"},{"issue":"3","key":"10.3233\/JIFS-201633_ref43","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1109\/JSAC.2016.2525418","article-title":"Internet of Things in the 5G era: enablers, architecture, and business models","volume":"34","author":"Palattella","year":"2016","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"10.3233\/JIFS-201633_ref44","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Information and Control"},{"key":"10.3233\/JIFS-201633_ref46","doi-asserted-by":"crossref","unstructured":"Dahane A. , Berrached N.E. and Loukil A. , Balanced and safe weighted clustering algorithm for mobile wireless sensor networks, In IFIP international conference on computer science and its applications, (2015), 429\u2013441.","DOI":"10.1007\/978-3-319-19578-0_35"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-201633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T03:58:20Z","timestamp":1770004700000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-201633"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,22]]},"references-count":42,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-201633","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,22]]}}}