Energy efficient routing with cluster approach in wireless networks – A literature review
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.35Keywords:
Wireless networks, Clustering approach, Efficient routing, Malicious attacks, energy efficientDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This literature review examines the cluster-based approaches in wireless networks, focusing on their effectiveness in conserving energy, enhancing routing efficiency, and improving network credibility. Wireless networks are increasingly employed in various applications, from internet of things (IoT) systems to mobile ad hoc networks, where energy efficiency is critical due to the limited battery life of devices. Cluster-based techniques group nodes into clusters to optimize resource utilization, facilitating energy conservation by enabling localized communication and reducing redundant transmissions. The review explores various clustering algorithms, such as low-energy adaptive clustering hierarchy (LEACH) and hybrid energy-efficient distributed clustering (HEED), highlighting their impact on network longevity and scalability. Additionally, the study addresses the challenges of maintaining robust routing protocols within clustered networks, emphasizing the importance of reliable data transmission and node credibility to mitigate risks from malicious attacks. By synthesizing current research findings, this review provides insights into the future directions of cluster-based strategies in wireless networks, suggesting potential enhancements to ensure efficient energy management and reliable network performance.Abstract
How to Cite
Downloads
Similar Articles
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Amudavalli L, K. Muthuramalingam, Integrated energy-efficient routing and secure data management for location-aware wireless sensor networks with PFO leveraged improved fuzzy unequal clustering algorithm (IFUC) , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Prabhu, A. Chandrabose, Optimization based energy aware scheduling in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Rita Jenifer, V. Sinthu Janita, Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- P. Pattunnarajam, Janani G, A. Vijayaraj, Sathiya Priya S, Enhanced routing strategy of wireless sensor network based on fifth generation communication technology , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- M. Monika, J. Merline Vinotha, A resilient supply chain model integrating demand variability and carbon emissions in imperfect production systems , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RFSVMDD: Ensemble of multi-dimension random forest and custom-made support vector machine for detecting RPL DDoS attacks in an IoT-based WSN environment , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

