{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:08:40Z","timestamp":1777705720019,"version":"3.51.4"},"reference-count":31,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,5,4]]},"abstract":"<jats:p>Wireless Sensor Networks are becoming increasingly popular in everyday life since they offer a variety of network structures for developing cutting-edge real-time applications. Wireless sensor devices have high energy consumption limitations, so it is necessary to handle excessive energy consumption by malicious nodes properly to improve network performance. Even though numerous studies have been conducted to increase the dependability of routing in WSNs, the existing routing strategies do not meet the required security constraints by using intelligent methods to protect the sensor nodes from malicious attack. To overcome this challenge a novel Trust Aware Clustering based Secure Routing Techniques (TAC-SRT) has been proposed to minimize the overall energy consumption, improved security to nodes and to maximize the network lifetime. The proposed method is carried out in three phases. In the first phase, the cluster head is selected by using K mean clustering. In the second phase, the trust value of each node is evaluated by using Mamdani fuzzy inference rule. In the third phase, the Tversky similarity index is used to find the normal or malicious node and establishes the shortest route. The Fully Homomorphic Elliptic Curve Cryptography technique is then used to perform secure data transmission. The effectiveness of the proposed strategy is examined using several parameters, such as the lifetime of the network, data confidentiality, active nodes, and energy consumption. The proposed technique improves the network lifetime by 23.01%, 17.4%, and 13.2% better than MOSFA, SecDL, and CAR-MOSOA respectively. Finally, the proposed method demonstrated superior performance in terms of delay, throughput, encryption time, network lifetime, and packet delivery ratio compared with existing techniques.<\/jats:p>","DOI":"10.3233\/jifs-223197","type":"journal-article","created":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T11:36:51Z","timestamp":1676979411000},"page":"8785-8800","source":"Crossref","is-referenced-by-count":10,"title":["Trust aware clustering based secure routing techniques in wireless sensor network"],"prefix":"10.1177","volume":"44","author":[{"given":"D.","family":"Hemanand","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, S.A. Engineering College (Autonomous), Thiruverkadu, Chennai, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Sridhar","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Sri Ramakrishna Engineering College, Coimbatore, Tamilnadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"C.","family":"Priya","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Karpagam College of Engineering, Coimbatore, Tamilnadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.J.","family":"Sathish Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science & Engineering, Panimalar Engineering College, Chennai, Tamilnadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"issue":"1","key":"10.3233\/JIFS-223197_ref1","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/s11277-020-07706-3","article-title":"Wireless sensor network path optimization using sensor node coverage area calculation approach","volume":"116","author":"Verma","year":"2021","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-223197_ref2","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1016\/j.procs.2018.10.407","article-title":"A hybrid ant colony and artificial bee colony optimization algorithm-based cluster head selection for IoT","volume":"143","author":"Janakiraman","year":"2018","journal-title":"Procedia Computer Science"},{"issue":"35","key":"10.3233\/JIFS-223197_ref3","first-page":"e5","article-title":"A Markov process-based opportunistic trust factor estimation mechanism for efficient cluster head selection and extending the lifetime of wireless sensor networks","volume":"8","author":"Janakiraman","year":"2021","journal-title":"EAI Endorsed Transactions on Energy Web"},{"key":"10.3233\/JIFS-223197_ref4","doi-asserted-by":"crossref","first-page":"74315","DOI":"10.1109\/ACCESS.2020.2986493","article-title":"Proficient QoS-based target coverage problem in wireless sensor networks,pp","volume":"8","author":"Singh","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-223197_ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2017.07.015","article-title":"Energy-efficient coverage protocol based on stable and predictive scheduling in wireless sensor networks","volume":"127","author":"Chenait","year":"2017","journal-title":"Computer Networks"},{"issue":"1","key":"10.3233\/JIFS-223197_ref6","first-page":"8","article-title":"Energy efficient scheduling protocols for heterogeneous WSNs","volume":"11","author":"Singh","year":"2016","journal-title":"Int J Forensic Comput Sci"},{"issue":"8","key":"10.3233\/JIFS-223197_ref7","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1109\/LWC.2021.3070630","article-title":"A malicious node detection strategy based on fuzzy trust model and the abc algorithm in wireless sensor network","volume":"10","author":"Pang","year":"2021","journal-title":"IEEE Wireless Communications Letters"},{"issue":"4","key":"10.3233\/JIFS-223197_ref8","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1109\/LWC.2019.2912610","article-title":"Approximation theory for connectivity of ad hoc wireless networks with node faults","volume":"8","author":"Takabe","year":"2019","journal-title":"IEEE Wireless Communications Letters"},{"issue":"6","key":"10.3233\/JIFS-223197_ref9","doi-asserted-by":"crossref","first-page":"809","DOI":"10.17485\/ijst\/2014\/v7i6.11","article-title":"Designing a wireless sensor network for ocean status notification system","volume":"7","author":"Ghaffari","year":"2014","journal-title":"Indian Journal of Science and Technology"},{"issue":"1","key":"10.3233\/JIFS-223197_ref10","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s11276-017-1558-2","article-title":"Murugan, Cluster head selection for energy efficient and delay-less routing in wireless sensor network","volume":"25","author":"Sarkar","year":"2019","journal-title":"Wireless Networks"},{"issue":"14","key":"10.3233\/JIFS-223197_ref11","doi-asserted-by":"crossref","first-page":"2689","DOI":"10.1016\/j.comnet.2013.06.003","article-title":"Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors","volume":"57","author":"Zhang","year":"2013","journal-title":"Computer Networks"},{"issue":"9","key":"10.3233\/JIFS-223197_ref12","doi-asserted-by":"crossref","first-page":"2891","DOI":"10.1109\/JSEN.2012.2204737","article-title":"Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication","volume":"12","author":"Lee","year":"2012","journal-title":"IEEE Sensors Journal"},{"issue":"1","key":"10.3233\/JIFS-223197_ref13","doi-asserted-by":"crossref","first-page":"26","DOI":"10.5626\/JCSE.2020.14.1.26","article-title":"A cluster-based routing strategy using gravitational search algorithm for wsn","volume":"14","author":"Kavitha","year":"2020","journal-title":"Journal of Computing Science and Engineering"},{"key":"10.3233\/JIFS-223197_ref14","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.jnca.2015.02.004","article-title":"Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network","volume":"52","author":"Elhabyan","year":"2015","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"10.3233\/JIFS-223197_ref15","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.eij.2018.01.002","article-title":"Hybrid meta-heuristic optimization-based energy efficient protocol for wireless sensor networks","volume":"19","author":"Kaur","year":"2018","journal-title":"Egyptian Informatics Journal"},{"issue":"3","key":"10.3233\/JIFS-223197_ref16","doi-asserted-by":"crossref","first-page":"2473","DOI":"10.1007\/s11277-017-4983-8","article-title":"Energy-aware clustering-based routing in wireless sensor networks using cuckoo optimization algorithm","volume":"98","author":"Khabiri","year":"2018","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"10.3233\/JIFS-223197_ref17","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1007\/s00521-016-2662-4","article-title":"CRHS: clustering and routing in wireless sensor networks using harmony search algorithm","volume":"30","author":"Lalwani","year":"2018","journal-title":"Neural Computing and Applications"},{"key":"10.3233\/JIFS-223197_ref18","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.engappai.2017.11.003","article-title":"Integrated clustering and routing protocol for wireless sensor networks using Cuckoo and Harmony Search based metaheuristic techniques","volume":"68","author":"Gupta","year":"2018","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"10","key":"10.3233\/JIFS-223197_ref19","doi-asserted-by":"crossref","first-page":"2050163","DOI":"10.1142\/S0218126620501637","article-title":"A hybrid swarm intelligence algorithm for clustering-based routing in wireless sensor networks","volume":"29","author":"Barzin","year":"2020","journal-title":"Journal of Circuits, Systems and Computers"},{"issue":"1","key":"10.3233\/JIFS-223197_ref20","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/s11277-020-07377-0","article-title":"A coherent approach for dynamic cluster-based routing and coverage hole detection and recovery in Bi-layered WSN-IoT","volume":"114","author":"Jain","year":"2020","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"10.3233\/JIFS-223197_ref21","doi-asserted-by":"crossref","first-page":"2135","DOI":"10.1007\/s11277-020-07469-x","article-title":"Kalyani, SecDL: QoS-aware secure deep learning approach for dynamic cluster-based routing in WSN assisted IoT","volume":"114","author":"Sujanthi","year":"2020","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-223197_ref22","doi-asserted-by":"crossref","first-page":"102317","DOI":"10.1016\/j.adhoc.2020.102317","article-title":"Energy efficient cluster-based routing protocol for WSN using butterfly optimization algorithm and ant colony optimization","volume":"110","author":"Maheshwari","year":"2021","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"10.3233\/JIFS-223197_ref23","doi-asserted-by":"crossref","first-page":"1334","DOI":"10.1007\/s12083-020-01056-4","article-title":"Belrhiti El Alaoui, An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs","volume":"14","author":"Moussa","year":"2021","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"10.3233\/JIFS-223197_ref24","doi-asserted-by":"crossref","first-page":"101338","DOI":"10.1016\/j.pmcj.2021.101338","article-title":"Merged glowworm swarm with ant colony optimization for energy efficient clustering and routing in wireless sensor network","volume":"71","author":"Reddy","year":"2021","journal-title":"Pervasive and Mobile Computing"},{"issue":"24","key":"10.3233\/JIFS-223197_ref25","doi-asserted-by":"crossref","first-page":"8496","DOI":"10.3390\/s21248496","article-title":"Collision-Aware Routing Using Multi-Objective Seagull Optimization Algorithm for WSN-Based IoT","volume":"21","author":"Jagannathan","year":"2021","journal-title":"Sensors"},{"issue":"1","key":"10.3233\/JIFS-223197_ref26","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1007\/s11277-019-06422-x","article-title":"Secure and energy-efficient route adjustment model for internet of things","volume":"108","author":"Jain","year":"2019","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"10.3233\/JIFS-223197_ref27","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/s40815-020-00929-3","article-title":"Fuzzy-logic-inspired zone-based clustering algorithm for wireless sensor networks","volume":"23","author":"Stephan","year":"2021","journal-title":"International Journal of Fuzzy Systems"},{"issue":"3","key":"10.3233\/JIFS-223197_ref28","doi-asserted-by":"crossref","first-page":"799","DOI":"10.1007\/s40815-016-0181-1","article-title":"Enhanced zone stable election protocol based on fuzzy logic for cluster head election in wireless sensor networks","volume":"19","author":"Sahaaya Arul Mary","year":"2017","journal-title":"International Journal of Fuzzy Systems"},{"issue":"2","key":"10.3233\/JIFS-223197_ref29","first-page":"2088","article-title":"Evaluate the performance of K-Means and the fuzzy C-Means algorithms to formation balanced clusters in wireless sensor networks","volume":"10","author":"Hassan","year":"2020","journal-title":"International Journal of Electrical & Computer Engineering"},{"issue":"2","key":"10.3233\/JIFS-223197_ref30","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1007\/s40815-019-00751-6","article-title":"A hybrid fuzzy-genetic algorithm for performance optimization of cyber physical wireless body area networks","volume":"22","author":"Choudhary","year":"2020","journal-title":"International Journal of Fuzzy Systems"},{"issue":"3","key":"10.3233\/JIFS-223197_ref31","doi-asserted-by":"crossref","first-page":"2405","DOI":"10.1007\/s11277-021-08335-0","article-title":"Particle-Water Wave Optimization for Secure Routing in Wireless Sensor Network Using Cluster Head Selection,pp","volume":"119","author":"Khot","year":"2021","journal-title":"Wireless Personal Communications"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-223197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:44:58Z","timestamp":1777455898000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-223197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,4]]},"references-count":31,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-223197","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,4]]}}}