A secure multi-hop routing algorithm based-on fuzzy logic for IoT communication
•Comprehensive assessment of operational impact of low carbon dwellings on local power infrastructure.•7 low-carbon homes with ASHP and PV constructed meeting UK’s Future Homes Standard are analysed.•Peak demand about 1/3 of the maximum power capacity of each dwelling.•Electricity consumption largel...
Saved in:
| Published in: | Engineering science and technology, an international journal Vol. 72; p. 102208 |
|---|---|
| Main Authors: | , , , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Elsevier B.V
01.12.2025
Elsevier |
| Subjects: | |
| ISSN: | 2215-0986, 2215-0986 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | •Comprehensive assessment of operational impact of low carbon dwellings on local power infrastructure.•7 low-carbon homes with ASHP and PV constructed meeting UK’s Future Homes Standard are analysed.•Peak demand about 1/3 of the maximum power capacity of each dwelling.•Electricity consumption largely driven by occupancy behaviour.•Importance of diversity-based power network planning over theoretical capacity estimates.
The fast growth of the Internet of Things (IoT) into mission-critical applications requires secure and efficient routing protocols. Nevertheless, the resource limitations of IoT devices and their susceptibility to attacks require smart, dynamic solutions. To overcome these challenges, this paper introduces a new, safe, multi-hop routing algorithm that combines the use of fuzzy logic and reinforcement learning. We initially build a high-performance communication backbone over a Connected Dominating Set (CDS) to reduce network overhead. A fuzzy inference system then intelligently considers the possible paths using path energy, distance, and node credibility to choose the best path to transmit the data. A Q-learning model is used to dynamically evaluate the reliability of each node to provide security, and to identify and isolate malicious actors. Our algorithm is shown to be better in experimental results, with the ability to increase the ratio of packet delivery by up to 2.4 percent and at the same time lower the average energy consumption by about 6.53 percent of the current state-of-the-art protocols. These results demonstrate that our hybrid solution has a great potential to improve the reliability and safety of data routing in contemporary IoT networks. |
|---|---|
| AbstractList | The fast growth of the Internet of Things (IoT) into mission-critical applications requires secure and efficient routing protocols. Nevertheless, the resource limitations of IoT devices and their susceptibility to attacks require smart, dynamic solutions. To overcome these challenges, this paper introduces a new, safe, multi-hop routing algorithm that combines the use of fuzzy logic and reinforcement learning. We initially build a high-performance communication backbone over a Connected Dominating Set (CDS) to reduce network overhead. A fuzzy inference system then intelligently considers the possible paths using path energy, distance, and node credibility to choose the best path to transmit the data. A Q-learning model is used to dynamically evaluate the reliability of each node to provide security, and to identify and isolate malicious actors. Our algorithm is shown to be better in experimental results, with the ability to increase the ratio of packet delivery by up to 2.4 percent and at the same time lower the average energy consumption by about 6.53 percent of the current state-of-the-art protocols. These results demonstrate that our hybrid solution has a great potential to improve the reliability and safety of data routing in contemporary IoT networks. •Comprehensive assessment of operational impact of low carbon dwellings on local power infrastructure.•7 low-carbon homes with ASHP and PV constructed meeting UK’s Future Homes Standard are analysed.•Peak demand about 1/3 of the maximum power capacity of each dwelling.•Electricity consumption largely driven by occupancy behaviour.•Importance of diversity-based power network planning over theoretical capacity estimates. The fast growth of the Internet of Things (IoT) into mission-critical applications requires secure and efficient routing protocols. Nevertheless, the resource limitations of IoT devices and their susceptibility to attacks require smart, dynamic solutions. To overcome these challenges, this paper introduces a new, safe, multi-hop routing algorithm that combines the use of fuzzy logic and reinforcement learning. We initially build a high-performance communication backbone over a Connected Dominating Set (CDS) to reduce network overhead. A fuzzy inference system then intelligently considers the possible paths using path energy, distance, and node credibility to choose the best path to transmit the data. A Q-learning model is used to dynamically evaluate the reliability of each node to provide security, and to identify and isolate malicious actors. Our algorithm is shown to be better in experimental results, with the ability to increase the ratio of packet delivery by up to 2.4 percent and at the same time lower the average energy consumption by about 6.53 percent of the current state-of-the-art protocols. These results demonstrate that our hybrid solution has a great potential to improve the reliability and safety of data routing in contemporary IoT networks. |
| ArticleNumber | 102208 |
| Author | Fu, Tao Qin, Xuming Han, Guoxin Lin, Weiting Li, Jinfang |
| Author_xml | – sequence: 1 givenname: Tao surname: Fu fullname: Fu, Tao email: changeful22@163.com – sequence: 2 givenname: Guoxin surname: Han fullname: Han, Guoxin email: Gxhan1231120192@outlook.com – sequence: 3 givenname: Xuming surname: Qin fullname: Qin, Xuming – sequence: 4 givenname: Jinfang surname: Li fullname: Li, Jinfang – sequence: 5 givenname: Weiting surname: Lin fullname: Lin, Weiting |
| BookMark | eNp9kMtqwzAQRUVJoWmaP-hCP-BUkl_yphBCH4FANulayNLIkbGtINmF5Ovr1KV01ZWGC_eM5tyjWec6QOiRkhUlNHuqVzWEXh1XjLB0jBgj_AbNGaNpRAqezf7Md2gZQk0IoQWjNM3maL_GAdTgAbdD09vo6E7Yu6G3XYVlUzlv-2OLSxlAR67DZrhczrhxlVXYOI-37oCVa9uhs0r21nUP6NbIJsDy512gj9eXw-Y92u3ftpv1LlJxVvRRybKcmELSOGEUeKFNrpnJ0pInhHGilQRqTKF5rLNyDDJWJJoDK8YOqJLEC7SduNrJWpy8baU_Cyet-A6cr4T0vVUNCJknGjgQTsokydNxWU4TABaTOI15Xo6sZGIp70LwYH55lIirY1GLybG4OhaT47H2PNVgvPPTghdBWegUaOtB9eNH7P-AL0MRiB8 |
| Cites_doi | 10.1007/s11276-021-02850-5 10.1016/j.jnca.2016.03.006 10.3390/su16114756 10.1109/ACCESS.2021.3130005 10.48084/etasr.7115 10.1007/s10207-023-00737-4 10.1007/s12083-025-01957-2 10.1002/ett.4216 10.1002/dac.4782 10.1007/s12083-024-01670-6 10.1109/CIS.2013.145 10.1007/s11277-022-09632-y 10.1109/JIOT.2021.3121529 10.1109/JSAC.2016.2525418 10.1016/j.comcom.2022.02.004 10.3390/s22166215 10.1109/MWC.2017.1600421 10.1038/s41598-023-44764-6 10.1016/j.csi.2024.103873 10.1007/s12083-024-01708-9 10.1007/s11227-022-04766-z 10.1007/s12083-023-01603-9 10.1007/s11277-021-08653-3 10.3390/en15134777 |
| ContentType | Journal Article |
| Copyright | 2025 The Authors |
| Copyright_xml | – notice: 2025 The Authors |
| DBID | 6I. AAFTH AAYXX CITATION DOA |
| DOI | 10.1016/j.jestch.2025.102208 |
| DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals (DOAJ) url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2215-0986 |
| ExternalDocumentID | oai_doaj_org_article_a74de8e080b447589d714ee23035387b 10_1016_j_jestch_2025_102208 S2215098625002630 |
| GroupedDBID | 0R~ 4.4 457 5VS 6I. AAEDT AAEDW AAFTH AAIKJ AALRI AAXUO AAYWO ABMAC ACGFS ADBBV ADEZE ADVLN AEXQZ AFJKZ AFTJW AGHFR AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ APXCP BCNDV EBS EJD FDB GROUPED_DOAJ HZ~ IPNFZ IXB KQ8 M41 M~E O9- OK1 RIG ROL SSZ AAYXX CITATION |
| ID | FETCH-LOGICAL-c369t-b2670f9a13421e89df7d2f65b840280dcae1ff9d83d6b2806294d8e29f9aecb03 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 0 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001619693000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2215-0986 |
| IngestDate | Mon Nov 17 19:36:42 EST 2025 Thu Nov 27 00:33:35 EST 2025 Wed Dec 10 14:40:02 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Fuzzy logic Internet of things Connected dominating set Secure routing algorithm |
| Language | English |
| License | This is an open access article under the CC BY-NC-ND license. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c369t-b2670f9a13421e89df7d2f65b840280dcae1ff9d83d6b2806294d8e29f9aecb03 |
| OpenAccessLink | https://doaj.org/article/a74de8e080b447589d714ee23035387b |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_a74de8e080b447589d714ee23035387b crossref_primary_10_1016_j_jestch_2025_102208 elsevier_sciencedirect_doi_10_1016_j_jestch_2025_102208 |
| PublicationCentury | 2000 |
| PublicationDate | December 2025 2025-12-00 2025-12-01 |
| PublicationDateYYYYMMDD | 2025-12-01 |
| PublicationDate_xml | – month: 12 year: 2025 text: December 2025 |
| PublicationDecade | 2020 |
| PublicationTitle | Engineering science and technology, an international journal |
| PublicationYear | 2025 |
| Publisher | Elsevier B.V Elsevier |
| Publisher_xml | – name: Elsevier B.V – name: Elsevier |
| References | Alotaibi (b0105) 2021; 9 Muzammal, Murugesan, Jhanjhi, Hossain, Yassine (b0070) 2022; 22 Rajasoundaran, Prabu, Routray, Malla, Kumar, Mukherjee, Qi (b0115) 2022; 187 K. Zhao, L. Ge. A survey on the internet of things security. In 2013 Ninth international conference on computational intelligence and security (pp. 663-667), 2013. IEEE. Statista. Number of Connected Devices Worldwide 2030|Statista. Statista Research Department. Available online: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/ (accessed on 27 January 2021). Nagaraju, Goyal, Verma, Safirescu, Mihaltan (b0100) 2022; 15 Yaqoob, Ahmed, Hashem, Ahmed, Gani, Imran, Guizani (b0030) 2017; 24 Dinesh, Svn (b0165) 2024; 17 Horwitz, L. Internet of Things (IoT)—The Future of IoT Miniguide: The Burgeoning IoT Market Continues—Cisco. Cisco. Available online: https://www.cisco.com/c/en/us/solutions/internet-of-things/future-of-iot.html (accessed on 25 May 2020). Mujeeb, Praveen Sam, Madhavi (b0080) 2021; 121 Usturge, Pavan Kumar (b0130) 2023; 32 Rajan, Raju, SVN, Selvi, Shanmugapriya (b0150) 2025; 18 Kala, Karthik, K, s. (b0090) 2021; 34 Shanmugapriya, Svn (b0160) 2024; 17 Rui, Pan, Shu (b0125) 2023; 13 Symantec. Internet security threat report ISTR. Email Threat. 2017, 2017. Available online: https://docs.broadcom.com/doc/istr-22-2017-en (accessed on 10 May 2022). Goodin, D. Brickerbot, the Permanent Denial-Of-Service Botnet, Is Back with a Vengeance|Ars Technica. Ars Technica. Available online: https://arstechnica.com/information technology/2017/04/brickerbot-the-permanent-denial-of-service-botnet-is-backwith-a-vengeance/ (accessed on 27 November 2018). Paul, F. Gartner’s Top 10 IoT Trends for 2019 and Beyond. NETWORKWORLD. Available online: https://www.networkworld.com/article/3322517/a-critical-look-at-gartners-top-10-iot-trends.html (accessed on 25 May 2020). Cao, Wang, Huang, Yi, He (b0085) 2021; 32 Ragesh, Kumar (b0120) 2023; 79 Airehrour, Gutierrez, Ray (b0010) 2016; 66 Burange, Deshmukh, Thakare, Shelke (b0145) 2025; 91 Hilton, S. Dyn analysis summary of Friday October 21 attack|dyn blog. Company News 2016, 20–22. Available online: https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ (accessed on 27 November 2018). Archived at: https://perma.cc/YW5C-MDEV (accessed on 16 August 2022). Humayun, Jhanjhi, Alsayat, Ponnusamy (b0025) 2021; 22 CISCO. Cisco’s Talos Intelligence Group Blog: New VPNFilter Malware Targets at Least 500K Networking DevicesWorldwide. CISCO. Available online: https://blog.talosintelligence.com/2018/05/VPNFilter.html (accessed on 16 December 2018). Palattella, Dohler, Grieco, Rizzo, Torsner, Engel, Ladid (b0020) 2016; 34 Othmen, Mansouri, Asklany (b0140) 2024; 14 Josh Fruhlinger. The Mirai Botnet Explained: How IoT Devices Almost Brought Down the Internet|CSO Online. CSO. Available online: https://www.csoonline.com/article/3258748/security/the-mirai-botnet-explained-how-teen scammers-andcctv-cameras-almost-brought-down-the-internet.html (accessed on 1 December 2018). Kore, Patil (b0095) 2022; 28 Zhang, Ren, Song, Liu, Zhang, Qian (b0075) 2021; 9 Meena, Sharma (b0110) 2022; 125 Thangavelu, Rajendran (b0135) 2024; 16 Dinesh, Santhosh Kumar (b0155) 2024; 17 Dinesh, Santhosh Kumar (b0170) 2024; 23 10.1016/j.jestch.2025.102208_b0045 Mujeeb (10.1016/j.jestch.2025.102208_b0080) 2021; 121 10.1016/j.jestch.2025.102208_b0065 Ragesh (10.1016/j.jestch.2025.102208_b0120) 2023; 79 Nagaraju (10.1016/j.jestch.2025.102208_b0100) 2022; 15 10.1016/j.jestch.2025.102208_b0005 Dinesh (10.1016/j.jestch.2025.102208_b0165) 2024; 17 Burange (10.1016/j.jestch.2025.102208_b0145) 2025; 91 Dinesh (10.1016/j.jestch.2025.102208_b0170) 2024; 23 Alotaibi (10.1016/j.jestch.2025.102208_b0105) 2021; 9 Rajan (10.1016/j.jestch.2025.102208_b0150) 2025; 18 10.1016/j.jestch.2025.102208_b0040 Usturge (10.1016/j.jestch.2025.102208_b0130) 2023; 32 Othmen (10.1016/j.jestch.2025.102208_b0140) 2024; 14 10.1016/j.jestch.2025.102208_b0060 Rajasoundaran (10.1016/j.jestch.2025.102208_b0115) 2022; 187 Zhang (10.1016/j.jestch.2025.102208_b0075) 2021; 9 Kore (10.1016/j.jestch.2025.102208_b0095) 2022; 28 Meena (10.1016/j.jestch.2025.102208_b0110) 2022; 125 Humayun (10.1016/j.jestch.2025.102208_b0025) 2021; 22 Airehrour (10.1016/j.jestch.2025.102208_b0010) 2016; 66 10.1016/j.jestch.2025.102208_b0055 Yaqoob (10.1016/j.jestch.2025.102208_b0030) 2017; 24 Palattella (10.1016/j.jestch.2025.102208_b0020) 2016; 34 10.1016/j.jestch.2025.102208_b0015 Muzammal (10.1016/j.jestch.2025.102208_b0070) 2022; 22 10.1016/j.jestch.2025.102208_b0035 Thangavelu (10.1016/j.jestch.2025.102208_b0135) 2024; 16 Kala (10.1016/j.jestch.2025.102208_b0090) 2021; 34 10.1016/j.jestch.2025.102208_b0050 Rui (10.1016/j.jestch.2025.102208_b0125) 2023; 13 Dinesh (10.1016/j.jestch.2025.102208_b0155) 2024; 17 Cao (10.1016/j.jestch.2025.102208_b0085) 2021; 32 Shanmugapriya (10.1016/j.jestch.2025.102208_b0160) 2024; 17 |
| References_xml | – volume: 91 year: 2025 ident: b0145 article-title: Safeguarding the internet of things: Elevating IoT routing security through trust management excellence publication-title: Comput. Stand. Interfaces – volume: 187 start-page: 71 year: 2022 end-page: 82 ident: b0115 article-title: Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks publication-title: Comput. Commun. – reference: Symantec. Internet security threat report ISTR. Email Threat. 2017, 2017. Available online: https://docs.broadcom.com/doc/istr-22-2017-en (accessed on 10 May 2022). – volume: 22 start-page: 6215 year: 2022 ident: b0070 article-title: Trust and mobility-based protocol for secure routing in internet of things publication-title: Sensors – volume: 9 start-page: 10539 year: 2021 end-page: 10553 ident: b0075 article-title: An energy-efficient multilevel secure routing protocol in IoT networks publication-title: IEEE Internet Things J. – volume: 22 start-page: 105 year: 2021 end-page: 117 ident: b0025 article-title: Internet of things and ransomware: Evolution, mitigation and prevention publication-title: Egypt. Inf. J. – volume: 121 start-page: 621 year: 2021 end-page: 646 ident: b0080 article-title: Adaptive EHTARA: an energy-efficient and trust aware secure routing algorithm for big data classification in IoT network publication-title: Wirel. Pers. Commun. – volume: 24 start-page: 10 year: 2017 end-page: 16 ident: b0030 article-title: Internet of things architecture: recent advances, taxonomy, requirements, and open challenges publication-title: IEEE Wirel. Commun. – volume: 66 start-page: 198 year: 2016 end-page: 213 ident: b0010 article-title: Secure routing for internet of things: a survey publication-title: J. Netw. Comput. Appl. – reference: Josh Fruhlinger. The Mirai Botnet Explained: How IoT Devices Almost Brought Down the Internet|CSO Online. CSO. Available online: https://www.csoonline.com/article/3258748/security/the-mirai-botnet-explained-how-teen scammers-andcctv-cameras-almost-brought-down-the-internet.html (accessed on 1 December 2018). – volume: 34 start-page: 510 year: 2016 end-page: 527 ident: b0020 article-title: Internet of things in the 5G era: Enablers, architecture, and business models publication-title: IEEE J. Sel. Areas Commun. – volume: 32 start-page: 331 year: 2023 end-page: 346 ident: b0130 article-title: DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot publication-title: Inf. Security J.: A Global Perspective – reference: CISCO. Cisco’s Talos Intelligence Group Blog: New VPNFilter Malware Targets at Least 500K Networking DevicesWorldwide. CISCO. Available online: https://blog.talosintelligence.com/2018/05/VPNFilter.html (accessed on 16 December 2018). – reference: Paul, F. Gartner’s Top 10 IoT Trends for 2019 and Beyond. NETWORKWORLD. Available online: https://www.networkworld.com/article/3322517/a-critical-look-at-gartners-top-10-iot-trends.html (accessed on 25 May 2020). – volume: 14 start-page: 14402 year: 2024 end-page: 14410 ident: b0140 article-title: Robust and secure routing protocol based on group key management for internet of things systems publication-title: Eng., Technol. Appl. Sci. Res. – volume: 23 start-page: 199 year: 2024 end-page: 223 ident: b0170 article-title: Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network publication-title: Int. J. Inf. Secur. – volume: 17 start-page: 585 year: 2024 end-page: 611 ident: b0165 article-title: GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks publication-title: Peer-to-Peer Networking Appl. – volume: 34 start-page: e4782 year: 2021 ident: b0090 article-title: Advanced hybrid secure multipath optimized routing in internet of things (IoT)‐based WSN publication-title: Int. J. Commun Syst – volume: 16 start-page: 4756 year: 2024 ident: b0135 article-title: Energy-efficient secure routing for a sustainable heterogeneous iot network management publication-title: Sustainability – reference: Goodin, D. Brickerbot, the Permanent Denial-Of-Service Botnet, Is Back with a Vengeance|Ars Technica. Ars Technica. Available online: https://arstechnica.com/information technology/2017/04/brickerbot-the-permanent-denial-of-service-botnet-is-backwith-a-vengeance/ (accessed on 27 November 2018). – volume: 9 start-page: 159187 year: 2021 end-page: 159197 ident: b0105 article-title: Improved blowfish algorithm-based secure routing technique in IoT-based WSN publication-title: IEEE Access – reference: Horwitz, L. Internet of Things (IoT)—The Future of IoT Miniguide: The Burgeoning IoT Market Continues—Cisco. Cisco. Available online: https://www.cisco.com/c/en/us/solutions/internet-of-things/future-of-iot.html (accessed on 25 May 2020). – reference: Hilton, S. Dyn analysis summary of Friday October 21 attack|dyn blog. Company News 2016, 20–22. Available online: https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ (accessed on 27 November 2018). Archived at: https://perma.cc/YW5C-MDEV (accessed on 16 August 2022). – volume: 28 start-page: 287 year: 2022 end-page: 301 ident: b0095 article-title: Cross layered cryptography based secure routing for IoT-enabled smart healthcare system publication-title: Wirel. Netw – reference: Statista. Number of Connected Devices Worldwide 2030|Statista. Statista Research Department. Available online: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/ (accessed on 27 January 2021). – volume: 17 start-page: 2609 year: 2024 end-page: 2636 ident: b0155 article-title: HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks publication-title: Peer-to-Peer Network. Appl. – volume: 79 start-page: 2882 year: 2023 end-page: 2909 ident: b0120 article-title: Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications publication-title: J. Supercomput. – volume: 18 start-page: 136 year: 2025 ident: b0150 article-title: RL-BOT—Reinforcement learning based billfish optimization technique for secured data aggregation in internet of things publication-title: Peer-to-Peer Network. Appl. – volume: 32 start-page: e4216 year: 2021 ident: b0085 article-title: A security‐driven network architecture for routing in industrial internet of things publication-title: Trans. Emerg. Telecommun. Technol. – volume: 15 start-page: 4777 year: 2022 ident: b0100 article-title: Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks publication-title: Energies – reference: K. Zhao, L. Ge. A survey on the internet of things security. In 2013 Ninth international conference on computational intelligence and security (pp. 663-667), 2013. IEEE. – volume: 125 start-page: 1753 year: 2022 end-page: 1781 ident: b0110 article-title: Secret dynamic key authentication and decision trust secure routing framework for internet of things based WSN publication-title: Wirel. Pers. Commun. – volume: 13 start-page: 18003 year: 2023 ident: b0125 article-title: Secure routing in the internet of things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques publication-title: Sci. Rep. – volume: 17 start-page: 1830 year: 2024 end-page: 1864 ident: b0160 article-title: An energy efficient swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT publication-title: Peer-to-Peer Network. Appl. – ident: 10.1016/j.jestch.2025.102208_b0045 – volume: 28 start-page: 287 issue: 1 year: 2022 ident: 10.1016/j.jestch.2025.102208_b0095 article-title: Cross layered cryptography based secure routing for IoT-enabled smart healthcare system publication-title: Wirel. Netw doi: 10.1007/s11276-021-02850-5 – volume: 66 start-page: 198 year: 2016 ident: 10.1016/j.jestch.2025.102208_b0010 article-title: Secure routing for internet of things: a survey publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2016.03.006 – volume: 16 start-page: 4756 issue: 11 year: 2024 ident: 10.1016/j.jestch.2025.102208_b0135 article-title: Energy-efficient secure routing for a sustainable heterogeneous iot network management publication-title: Sustainability doi: 10.3390/su16114756 – volume: 9 start-page: 159187 year: 2021 ident: 10.1016/j.jestch.2025.102208_b0105 article-title: Improved blowfish algorithm-based secure routing technique in IoT-based WSN publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3130005 – volume: 14 start-page: 14402 issue: 3 year: 2024 ident: 10.1016/j.jestch.2025.102208_b0140 article-title: Robust and secure routing protocol based on group key management for internet of things systems publication-title: Eng., Technol. Appl. Sci. Res. doi: 10.48084/etasr.7115 – volume: 23 start-page: 199 issue: 1 year: 2024 ident: 10.1016/j.jestch.2025.102208_b0170 article-title: Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network publication-title: Int. J. Inf. Secur. doi: 10.1007/s10207-023-00737-4 – volume: 18 start-page: 136 issue: 3 year: 2025 ident: 10.1016/j.jestch.2025.102208_b0150 article-title: RL-BOT—Reinforcement learning based billfish optimization technique for secured data aggregation in internet of things publication-title: Peer-to-Peer Network. Appl. doi: 10.1007/s12083-025-01957-2 – ident: 10.1016/j.jestch.2025.102208_b0055 – volume: 32 start-page: e4216 issue: 4 year: 2021 ident: 10.1016/j.jestch.2025.102208_b0085 article-title: A security‐driven network architecture for routing in industrial internet of things publication-title: Trans. Emerg. Telecommun. Technol. doi: 10.1002/ett.4216 – volume: 34 start-page: e4782 issue: 8 year: 2021 ident: 10.1016/j.jestch.2025.102208_b0090 article-title: Advanced hybrid secure multipath optimized routing in internet of things (IoT)‐based WSN publication-title: Int. J. Commun Syst doi: 10.1002/dac.4782 – volume: 17 start-page: 1830 issue: 4 year: 2024 ident: 10.1016/j.jestch.2025.102208_b0160 article-title: An energy efficient swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT publication-title: Peer-to-Peer Network. Appl. doi: 10.1007/s12083-024-01670-6 – ident: 10.1016/j.jestch.2025.102208_b0005 doi: 10.1109/CIS.2013.145 – volume: 125 start-page: 1753 issue: 2 year: 2022 ident: 10.1016/j.jestch.2025.102208_b0110 article-title: Secret dynamic key authentication and decision trust secure routing framework for internet of things based WSN publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-022-09632-y – ident: 10.1016/j.jestch.2025.102208_b0065 – volume: 9 start-page: 10539 issue: 13 year: 2021 ident: 10.1016/j.jestch.2025.102208_b0075 article-title: An energy-efficient multilevel secure routing protocol in IoT networks publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2021.3121529 – volume: 34 start-page: 510 issue: 3 year: 2016 ident: 10.1016/j.jestch.2025.102208_b0020 article-title: Internet of things in the 5G era: Enablers, architecture, and business models publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2016.2525418 – volume: 187 start-page: 71 year: 2022 ident: 10.1016/j.jestch.2025.102208_b0115 article-title: Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks publication-title: Comput. Commun. doi: 10.1016/j.comcom.2022.02.004 – volume: 22 start-page: 6215 issue: 16 year: 2022 ident: 10.1016/j.jestch.2025.102208_b0070 article-title: Trust and mobility-based protocol for secure routing in internet of things publication-title: Sensors doi: 10.3390/s22166215 – ident: 10.1016/j.jestch.2025.102208_b0015 – ident: 10.1016/j.jestch.2025.102208_b0040 – volume: 24 start-page: 10 issue: 3 year: 2017 ident: 10.1016/j.jestch.2025.102208_b0030 article-title: Internet of things architecture: recent advances, taxonomy, requirements, and open challenges publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.2017.1600421 – ident: 10.1016/j.jestch.2025.102208_b0050 – volume: 13 start-page: 18003 issue: 1 year: 2023 ident: 10.1016/j.jestch.2025.102208_b0125 article-title: Secure routing in the internet of things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques publication-title: Sci. Rep. doi: 10.1038/s41598-023-44764-6 – volume: 32 start-page: 331 issue: 5 year: 2023 ident: 10.1016/j.jestch.2025.102208_b0130 article-title: DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot publication-title: Inf. Security J.: A Global Perspective – volume: 91 year: 2025 ident: 10.1016/j.jestch.2025.102208_b0145 article-title: Safeguarding the internet of things: Elevating IoT routing security through trust management excellence publication-title: Comput. Stand. Interfaces doi: 10.1016/j.csi.2024.103873 – volume: 17 start-page: 2609 issue: 5 year: 2024 ident: 10.1016/j.jestch.2025.102208_b0155 article-title: HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks publication-title: Peer-to-Peer Network. Appl. doi: 10.1007/s12083-024-01708-9 – volume: 22 start-page: 105 issue: 1 year: 2021 ident: 10.1016/j.jestch.2025.102208_b0025 article-title: Internet of things and ransomware: Evolution, mitigation and prevention publication-title: Egypt. Inf. J. – ident: 10.1016/j.jestch.2025.102208_b0035 – ident: 10.1016/j.jestch.2025.102208_b0060 – volume: 79 start-page: 2882 issue: 3 year: 2023 ident: 10.1016/j.jestch.2025.102208_b0120 article-title: Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications publication-title: J. Supercomput. doi: 10.1007/s11227-022-04766-z – volume: 17 start-page: 585 issue: 2 year: 2024 ident: 10.1016/j.jestch.2025.102208_b0165 article-title: GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks publication-title: Peer-to-Peer Networking Appl. doi: 10.1007/s12083-023-01603-9 – volume: 121 start-page: 621 issue: 1 year: 2021 ident: 10.1016/j.jestch.2025.102208_b0080 article-title: Adaptive EHTARA: an energy-efficient and trust aware secure routing algorithm for big data classification in IoT network publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-021-08653-3 – volume: 15 start-page: 4777 issue: 13 year: 2022 ident: 10.1016/j.jestch.2025.102208_b0100 article-title: Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks publication-title: Energies doi: 10.3390/en15134777 |
| SSID | ssj0001921156 |
| Score | 2.310519 |
| Snippet | •Comprehensive assessment of operational impact of low carbon dwellings on local power infrastructure.•7 low-carbon homes with ASHP and PV constructed meeting... The fast growth of the Internet of Things (IoT) into mission-critical applications requires secure and efficient routing protocols. Nevertheless, the resource... |
| SourceID | doaj crossref elsevier |
| SourceType | Open Website Index Database Publisher |
| StartPage | 102208 |
| SubjectTerms | Connected dominating set Fuzzy logic Internet of things Secure routing algorithm |
| Title | A secure multi-hop routing algorithm based-on fuzzy logic for IoT communication |
| URI | https://dx.doi.org/10.1016/j.jestch.2025.102208 https://doaj.org/article/a74de8e080b447589d714ee23035387b |
| Volume | 72 |
| WOSCitedRecordID | wos001619693000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: Directory of Open Access Journals (DOAJ) customDbUrl: eissn: 2215-0986 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001921156 issn: 2215-0986 databaseCode: DOA dateStart: 20140101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2215-0986 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001921156 issn: 2215-0986 databaseCode: M~E dateStart: 20140101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV27TsMwFLVQxQAD4inKSx5YLfJwY2csqBVIUBgK6hb5SVtBUvWBRAe-nes4QZlgYckQJdfRuYnvcXx8jNClSDohV5YSyC4jlHFKhJWWAHdXgenEMi5VlS_3bDDgo1H61Njqy2nCvD2wB-5KMKoNN0BspPOm46lmITUGmHMM3yqTrvcNWNoYTE09bwGqk9Rr5UpB1xS62XL-Ieo4w4LI7SjZqEWlZX-jJDXKTH8X7VT8EHf9c-2hDZPvo-2Ga-ABeuzihftLbnCpBiTjYobnxcrpl7F4ey1guD9-x648aVLk2K7W609cdnEYGCq-K4ZYNZeFHKLnfm94c0uqfRGIAuSWREYJC2wqwphGoQFELNORTToSBmsRD7QSJrQ21TzWiXQzp1FKNTdRCvcYJYP4CLXyIjfHCGuhqNYplTEVVEslhArDRFAIwLiSoo1IjVA28_YXWa0Lm2Ye0cwhmnlE2-jawfhzrTOvLk9ASrMqpdlfKW0jVichq3iAr-8QavJr8yf_0fwp2nIhvWblDLWW85U5R5vqYzlZzC_K9wyOD1-9byN02MU |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+secure+multi-hop+routing+algorithm+based-on+fuzzy+logic+for+IoT+communication&rft.jtitle=Engineering+science+and+technology%2C+an+international+journal&rft.au=Fu%2C+Tao&rft.au=Han%2C+Guoxin&rft.au=Qin%2C+Xuming&rft.au=Li%2C+Jinfang&rft.date=2025-12-01&rft.pub=Elsevier+B.V&rft.issn=2215-0986&rft.eissn=2215-0986&rft.volume=72&rft_id=info:doi/10.1016%2Fj.jestch.2025.102208&rft.externalDocID=S2215098625002630 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2215-0986&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2215-0986&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2215-0986&client=summon |