A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.3.35Keywords:
Clustering, Optimal routing, Secured WSN, ECC, Data transmission, Energy consumption.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Secure routing in Wireless Sensor Networks (WSNs) is vital for preserving data veracity and privacy in the face of possible threats. Traditional routing protocols lack robust security mechanisms, making WSNs vulnerable to attacks. Secure routing protocols in WSNs aim to address these vulnerabilities by implementing authentication, encryption, and intrusion detection techniques to ensure secure and reliable data transmission while minimizing energy consumption. This paper proposes a novel secured routing algorithm tailored for cluster-based networks, aimed at enhancing energy efficiency and data delivery security by integrating trust-based authentication mechanisms. The approach begins with the design of a clustering algorithm, which organizes network nodes into clusters based on proximity or network topology. Subsequently, a trust-based authentication mechanism is developed to evaluate the reliability and integrity of both nodes and links within the network. Building upon these foundational elements, a secured routing protocol is devised to capitalize on the cluster-based organization and trust-based authentication, thereby facilitating energy-efficient and secure data transmission. The proposed algorithm and authentication mechanism Cluster and Optimal Routing Assisted Cryptograph (CORAC) are implemented within a simulated network environment to validate their efficacy. Performance evaluation is conducted through simulation studies, focusing on key metrics such as packet delivery ratio, energy consumption, and security effectiveness. This comprehensive approach aims to address the dual challenges of energy efficiency and data security in cluster-based networks, offering a promising solution for future deployments in various applications.Abstract
How to Cite
Downloads
Similar Articles
- Shaik Abdulla P., Abdul Razak T., Retrieval-Based Inception V3-Net Algorithm and Invariant Data Classification using Enhanced Deep Belief Networks for Content-Based Image Retrieval , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Desalu Tamirat, Tesfaye Getachew , Worku masho, Zelalem Admasu , Morphological and morphometric features of indigenous chicken in North Shewa zone, Oromia regional state, Ethiopia , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Heikham G. Chanu, Sudha A. Raddi, Anita Dalal, Sangeeta N. Kharde, Shivani Tendulkar, Association between the socio-demographic variables of women admitted for delivery to a Tertiary Care Hospital and their maternal and neonatal outcome - A cross-sectional study , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- S. Ramkumar, K. Aanandha Saravanan, Martin Joel Rathnam, M. Revathy, Integration of AI and agent-based modeling for simulating human-ecological systems , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Komal Raichura, Asha L. Bavarava, Redefining Classroom Dynamics: AI Tools and the Future of English Language Pedagogy , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Neerav Nishant, Nisha Rathore, Vinay Kumar Nassa, Vijay Kumar Dwivedi, Thulasimani T, Surrya Prakash Dillibabu, Integrating machine learning and mathematical programming for efficient optimization of electric discharge machining technique , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Rimpi Manna, Anitha Arvind, Correlation between ocular surface disease index scores, tear film characteristics, and screen time usage among young adults , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Rajashree Sunder Raj, Sayar Ahmad Sheikh, Health status of women in slums: A comprehensive study in Raichur District Karnataka, India , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- U. Johns Praveena, J. Merline Vinotha, A New Approach for Solving Bilevel Fractional/quadratic Green Transportation Problem by Implementing AI with Multi Choice Parameters Under Uncertainty , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Pravin P. P, J. Arunshankar, Development of digital twin for PMDC motor control loop , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
<< < 16 17 18 19 20 21 22 23 24 25 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- V. Karthikeyan, C. Jayanthi, Advancements in image quality assessment: a comparative study of image processing and deep learning techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Improving image quality assessment with enhanced denoising autoencoders and optimization methods , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

