Abstract
The integration of security-aware and energy-optimized routing in Wireless Sensor Networks (WSNs) is crucial for establishing a robust, secure, and energy-efficient communication framework while maintaining the Quality of Service (QoS) requirements of the application. Furthermore, energy efficiency which is a critical concern due to the limited power resources of sensor nodes, seeks significant research attention. Optimized routing strategies enhance network longevity by minimizing energy dissipation during data communication. To address above issues, this paper proposes a novel Security-aware Red Fox Optimization (RFO)-based Cluster-based Routing (SECR) algorithm, which facilitates secure and energy-efficient data transmission among sensor nodes. The RFO algorithm is employed to dynamically select the optimal Cluster Head (CH) based on energy metrics and network topology. For secure data transmission, an adaptive Advanced Encryption Standard (AES) is implemented at the selected CH, ensuring data confidentiality before forwarding the encrypted information to the sink node. Performance evaluations through extensive simulations demonstrate that the proposed SECR protocol outperforms existing state-of-the-art routing techniques in terms of security robustness, energy efficiency, and network lifetime.









Similar content being viewed by others
Data Availability
No datasets were generated or analysed during the current study.
References
Verma S, Sood N, Sharma AK (2019) Genetic algorithm-based optimized cluster head selection for single and multiple data sinks in heterogeneous wireless sensor network. Appl Soft Comput 85:105788
Kaur S, Grewal V (2020) A novel approach for particle swarm optimization-based clustering with dual sink mobility in wireless sensor network. Int J Commun Syst 33(16):e4553
Gurram GV, Shariff NC, Biradar RL (2022) A secure energy aware meta-heuristic routing protocol (seamhr) for sustainable iot-wireless sensor network (wsn). Theoret Comput Sci 930:63–76
Rahmadika S, Ramdania DR, Harika M (2018) Security analysis on the decentralized energy trading system using blockchain technology. Jurnal Online Informatika 3(1):44–47
Elsadig MA (2023) Detection of denial-of-service attack in wireless sensor networks: A lightweight machine learning approach. IEEE Access 11:83537–83552
Krishna KP, Thirumuru R (2023) Energy efficient and multi-hop routing for constrained wireless sensor networks. Sustainable Computing: Informatics and Systems, page 100866
Harn L, Hsu CF, Xia Z, He Z (2021) Lightweight aggregated data encryption for wireless sensor networks (wsns). IEEE Sensors Letters 5(4):1–4
Anusuya Devi V, Sampradeepraj T (2024) End-to-end self-organizing intelligent security model for wireless sensor network based on a hybrid (aes-rsa) cryptography. Wireless Pers Commun 136(3):1675–1703
Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil S (2023) Cryptographic data security for reliable wireless sensor network. Alex Eng J 72:37–50
Zheng L (2024) An improved localization approach based on sybil attack for wsn. Physical Communication 63:102283
Połap D, Woźniak M (2021) Red fox optimization algorithm. Expert Syst Appl 166:114107
Bhatia T, Kansal S, Goel S, Verma AK (2016) A genetic algorithm based distance-aware routing protocol for wireless sensor networks. Comput Electr Eng 56:441–455
Sahoo BM, Pandey HM, Amgoth T (2021) Gapso-h: A hybrid approach towards optimizing the cluster based routing in wireless sensor network. Swarm Evol Comput 60:100772
Dogra R, Rani S, Sharma B, Verma S, Anand D, Chatterjee P (2021) A novel dynamic clustering approach for energy hole mitigation in internet of things-based wireless sensor network. Int J Commun Syst 34(9):e4806
Pokhrel SR, Verma S, Garg S, Sharma AK, Choi J (2020) An intelligent clustering framework for massive communication of industrial sensors. IEEE Transactions on Industrial Informatics
Avdhesh Yadav S, Poongoodi T (2025) A novel optimized routing technique to mitigate hot-spot problem (north) for wireless sensor network-based internet of things. International Journal of Communication Systems, page e5314
Tang Q, Xie R, Fang Z, Huang T, Chen T, Zhang R, Yu FR (2024) Joint service deployment and task scheduling for satellite edge computing: A two-timescale hierarchical approach. IEEE J Sel Areas Commun 42(5):1063–1079
Tang Q, Xie R, Yu FR, Chen T, Zhang R, Huang T, Liu Y (2023) Collective deep reinforcement learning for intelligence sharing in the internet of intelligence-empowered edge computing. IEEE Trans Mob Comput 22(11):6327–6342
Roshini A, Kiran KVD (2023) Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks. Int J Intell Netw 4:19–28
Gopinath S, Vinoth Kumar K, Elayaraja P, Parameswari A, Balakrishnan S, Thiruppathi M (2021) Sceer: secure cluster based efficient energy routing scheme for wireless sensor networks. Materials Today: Proceedings 45:3579–3584
Rathee M, Kumar S, Gandomi AH, Dilip K, Balusamy B, Patan R (2021) Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Trans Eng Manage 68(1):170–182
Zhang Y, Ren Q, Song K, Liu Y, Zhang T, Qian Y (2022) An energy-efficient multilevel secure routing protocol in iot networks. IEEE Internet Things J 9(13):10539–10553
Verma S, Zeadally S, Kaur S, Sharma AK (2022) Intelligent and secure clustering in wireless sensor network (wsn)-based intelligent transportation systems. IEEE Trans Intell Transp Syst 23(8):13473–13481
Ahmed KM, Shams R, Khan FH, Luque-Nieto MA (2024) Securing underwater wireless sensor networks: A review of attacks and mitigation techniques. IEEE Access 12:161096–161133
Verma S, Sood N, Sharma AK (2019) Qos provisioning-based routing protocols using multiple data sink in iot-based wsn. Mod Phys Lett A 34(29):1950235
Sharma R, Vashisht V, Singh U (2020) eetmfo/ga: a secure and energy efficient cluster head selection in wireless sensor networks. Telecommunication Systems, pages 1–16
Nguyen HD, Pham VD, Nguyen QH, Pham VM, Pham MH, Vu VM, Bui QT (2020) An optimal search for neural network parameters using the salp swarm optimization algorithm: a landslide application. Remote Sensing Letters 11(4):353–362
Rappaport TS et al (1996) Wireless communications: principles and practice. Prentice Hall PTR New Jersey
Acknowledgements
The authors gratefully acknowledge the reviewers for their immense efforts involved in giving their precious time to review this article.
Funding
No funding was received to assist with the preparation of this manuscript. The authors have no relevant financial or non-financial interests to disclose.
Author information
Authors and Affiliations
Contributions
Sameer Dixit handled the technical foundation and revision of the manuscript. Overall proofreading for the manuscript was done by Shaima Qureshi.
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare no competing interests.
Ethical Approval and Consent to Participate
This article contains no studies with human participants or animals performed by any of the authors.
Consent for Publication
All authors agree to publish the paper and related research results.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Dixit, S., Qureshi, S. Security-aware, Red fox optimization-based cluster-based routing in wireless sensor network. Peer-to-Peer Netw. Appl. 18, 128 (2025). https://doi.org/10.1007/s12083-025-01951-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12083-025-01951-8