Skip to main content

Advertisement

Log in

Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

The integration of security-aware and energy-optimized routing in Wireless Sensor Networks (WSNs) is crucial for establishing a robust, secure, and energy-efficient communication framework while maintaining the Quality of Service (QoS) requirements of the application. Furthermore, energy efficiency which is a critical concern due to the limited power resources of sensor nodes, seeks significant research attention. Optimized routing strategies enhance network longevity by minimizing energy dissipation during data communication. To address above issues, this paper proposes a novel Security-aware Red Fox Optimization (RFO)-based Cluster-based Routing (SECR) algorithm, which facilitates secure and energy-efficient data transmission among sensor nodes. The RFO algorithm is employed to dynamically select the optimal Cluster Head (CH) based on energy metrics and network topology. For secure data transmission, an adaptive Advanced Encryption Standard (AES) is implemented at the selected CH, ensuring data confidentiality before forwarding the encrypted information to the sink node. Performance evaluations through extensive simulations demonstrate that the proposed SECR protocol outperforms existing state-of-the-art routing techniques in terms of security robustness, energy efficiency, and network lifetime.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

References

  1. Verma S, Sood N, Sharma AK (2019) Genetic algorithm-based optimized cluster head selection for single and multiple data sinks in heterogeneous wireless sensor network. Appl Soft Comput 85:105788

    MATH  Google Scholar 

  2. Kaur S, Grewal V (2020) A novel approach for particle swarm optimization-based clustering with dual sink mobility in wireless sensor network. Int J Commun Syst 33(16):e4553

    Google Scholar 

  3. Gurram GV, Shariff NC, Biradar RL (2022) A secure energy aware meta-heuristic routing protocol (seamhr) for sustainable iot-wireless sensor network (wsn). Theoret Comput Sci 930:63–76

    MathSciNet  MATH  Google Scholar 

  4. Rahmadika S, Ramdania DR, Harika M (2018) Security analysis on the decentralized energy trading system using blockchain technology. Jurnal Online Informatika 3(1):44–47

    Google Scholar 

  5. Elsadig MA (2023) Detection of denial-of-service attack in wireless sensor networks: A lightweight machine learning approach. IEEE Access 11:83537–83552

    MATH  Google Scholar 

  6. Krishna KP, Thirumuru R (2023) Energy efficient and multi-hop routing for constrained wireless sensor networks. Sustainable Computing: Informatics and Systems, page 100866

  7. Harn L, Hsu CF, Xia Z, He Z (2021) Lightweight aggregated data encryption for wireless sensor networks (wsns). IEEE Sensors Letters 5(4):1–4

    MATH  Google Scholar 

  8. Anusuya Devi V, Sampradeepraj T (2024) End-to-end self-organizing intelligent security model for wireless sensor network based on a hybrid (aes-rsa) cryptography. Wireless Pers Commun 136(3):1675–1703

    MATH  Google Scholar 

  9. Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil S (2023) Cryptographic data security for reliable wireless sensor network. Alex Eng J 72:37–50

    Google Scholar 

  10. Zheng L (2024) An improved localization approach based on sybil attack for wsn. Physical Communication 63:102283

    MATH  Google Scholar 

  11. Połap D, Woźniak M (2021) Red fox optimization algorithm. Expert Syst Appl 166:114107

    MATH  Google Scholar 

  12. Bhatia T, Kansal S, Goel S, Verma AK (2016) A genetic algorithm based distance-aware routing protocol for wireless sensor networks. Comput Electr Eng 56:441–455

    MATH  Google Scholar 

  13. Sahoo BM, Pandey HM, Amgoth T (2021) Gapso-h: A hybrid approach towards optimizing the cluster based routing in wireless sensor network. Swarm Evol Comput 60:100772

    Google Scholar 

  14. Dogra R, Rani S, Sharma B, Verma S, Anand D, Chatterjee P (2021) A novel dynamic clustering approach for energy hole mitigation in internet of things-based wireless sensor network. Int J Commun Syst 34(9):e4806

  15. Pokhrel SR, Verma S, Garg S, Sharma AK, Choi J (2020) An intelligent clustering framework for massive communication of industrial sensors. IEEE Transactions on Industrial Informatics

  16. Avdhesh Yadav S, Poongoodi T (2025) A novel optimized routing technique to mitigate hot-spot problem (north) for wireless sensor network-based internet of things. International Journal of Communication Systems, page e5314

  17. Tang Q, Xie R, Fang Z, Huang T, Chen T, Zhang R, Yu FR (2024) Joint service deployment and task scheduling for satellite edge computing: A two-timescale hierarchical approach. IEEE J Sel Areas Commun 42(5):1063–1079

    MATH  Google Scholar 

  18. Tang Q, Xie R, Yu FR, Chen T, Zhang R, Huang T, Liu Y (2023) Collective deep reinforcement learning for intelligence sharing in the internet of intelligence-empowered edge computing. IEEE Trans Mob Comput 22(11):6327–6342

    MATH  Google Scholar 

  19. Roshini A, Kiran KVD (2023) Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks. Int J Intell Netw 4:19–28

    MATH  Google Scholar 

  20. Gopinath S, Vinoth Kumar K, Elayaraja P, Parameswari A, Balakrishnan S, Thiruppathi M (2021) Sceer: secure cluster based efficient energy routing scheme for wireless sensor networks. Materials Today: Proceedings 45:3579–3584

    Google Scholar 

  21. Rathee M, Kumar S, Gandomi AH, Dilip K, Balusamy B, Patan R (2021) Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Trans Eng Manage 68(1):170–182

    MATH  Google Scholar 

  22. Zhang Y, Ren Q, Song K, Liu Y, Zhang T, Qian Y (2022) An energy-efficient multilevel secure routing protocol in iot networks. IEEE Internet Things J 9(13):10539–10553

    MATH  Google Scholar 

  23. Verma S, Zeadally S, Kaur S, Sharma AK (2022) Intelligent and secure clustering in wireless sensor network (wsn)-based intelligent transportation systems. IEEE Trans Intell Transp Syst 23(8):13473–13481

    MATH  Google Scholar 

  24. Ahmed KM, Shams R, Khan FH, Luque-Nieto MA (2024) Securing underwater wireless sensor networks: A review of attacks and mitigation techniques. IEEE Access 12:161096–161133

    Google Scholar 

  25. Verma S, Sood N, Sharma AK (2019) Qos provisioning-based routing protocols using multiple data sink in iot-based wsn. Mod Phys Lett A 34(29):1950235

    MATH  Google Scholar 

  26. Sharma R, Vashisht V, Singh U (2020) eetmfo/ga: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommunication Systems, pages 1–16

  27. Nguyen HD, Pham VD, Nguyen QH, Pham VM, Pham MH, Vu VM, Bui QT (2020) An optimal search for neural network parameters using the salp swarm optimization algorithm: a landslide application. Remote Sensing Letters 11(4):353–362

    MATH  Google Scholar 

  28. Rappaport TS et al (1996) Wireless communications: principles and practice. Prentice Hall PTR New Jersey

Download references

Acknowledgements

The authors gratefully acknowledge the reviewers for their immense efforts involved in giving their precious time to review this article.

Funding

No funding was received to assist with the preparation of this manuscript. The authors have no relevant financial or non-financial interests to disclose.

Author information

Authors and Affiliations

Authors

Contributions

Sameer Dixit handled the technical foundation and revision of the manuscript. Overall proofreading for the manuscript was done by Shaima Qureshi.

Corresponding author

Correspondence to Sameer Dixit.

Ethics declarations

Conflict of Interest

The authors declare no competing interests.

Ethical Approval and Consent to Participate

This article contains no studies with human participants or animals performed by any of the authors.

Consent for Publication

All authors agree to publish the paper and related research results.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dixit, S., Qureshi, S. Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network. Peer-to-Peer Netw. Appl. 18, 128 (2025). https://doi.org/10.1007/s12083-025-01951-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-025-01951-8

Keywords