A secure multi-hop routing algorithm based-on fuzzy logic for IoT communication

•Comprehensive assessment of operational impact of low carbon dwellings on local power infrastructure.•7 low-carbon homes with ASHP and PV constructed meeting UK’s Future Homes Standard are analysed.•Peak demand about 1/3 of the maximum power capacity of each dwelling.•Electricity consumption largel...

Full description

Saved in:
Bibliographic Details
Published in:Engineering science and technology, an international journal Vol. 72; p. 102208
Main Authors: Fu, Tao, Han, Guoxin, Qin, Xuming, Li, Jinfang, Lin, Weiting
Format: Journal Article
Language:English
Published: Elsevier B.V 01.12.2025
Elsevier
Subjects:
ISSN:2215-0986, 2215-0986
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract •Comprehensive assessment of operational impact of low carbon dwellings on local power infrastructure.•7 low-carbon homes with ASHP and PV constructed meeting UK’s Future Homes Standard are analysed.•Peak demand about 1/3 of the maximum power capacity of each dwelling.•Electricity consumption largely driven by occupancy behaviour.•Importance of diversity-based power network planning over theoretical capacity estimates. The fast growth of the Internet of Things (IoT) into mission-critical applications requires secure and efficient routing protocols. Nevertheless, the resource limitations of IoT devices and their susceptibility to attacks require smart, dynamic solutions. To overcome these challenges, this paper introduces a new, safe, multi-hop routing algorithm that combines the use of fuzzy logic and reinforcement learning. We initially build a high-performance communication backbone over a Connected Dominating Set (CDS) to reduce network overhead. A fuzzy inference system then intelligently considers the possible paths using path energy, distance, and node credibility to choose the best path to transmit the data. A Q-learning model is used to dynamically evaluate the reliability of each node to provide security, and to identify and isolate malicious actors. Our algorithm is shown to be better in experimental results, with the ability to increase the ratio of packet delivery by up to 2.4 percent and at the same time lower the average energy consumption by about 6.53 percent of the current state-of-the-art protocols. These results demonstrate that our hybrid solution has a great potential to improve the reliability and safety of data routing in contemporary IoT networks.
AbstractList The fast growth of the Internet of Things (IoT) into mission-critical applications requires secure and efficient routing protocols. Nevertheless, the resource limitations of IoT devices and their susceptibility to attacks require smart, dynamic solutions. To overcome these challenges, this paper introduces a new, safe, multi-hop routing algorithm that combines the use of fuzzy logic and reinforcement learning. We initially build a high-performance communication backbone over a Connected Dominating Set (CDS) to reduce network overhead. A fuzzy inference system then intelligently considers the possible paths using path energy, distance, and node credibility to choose the best path to transmit the data. A Q-learning model is used to dynamically evaluate the reliability of each node to provide security, and to identify and isolate malicious actors. Our algorithm is shown to be better in experimental results, with the ability to increase the ratio of packet delivery by up to 2.4 percent and at the same time lower the average energy consumption by about 6.53 percent of the current state-of-the-art protocols. These results demonstrate that our hybrid solution has a great potential to improve the reliability and safety of data routing in contemporary IoT networks.
•Comprehensive assessment of operational impact of low carbon dwellings on local power infrastructure.•7 low-carbon homes with ASHP and PV constructed meeting UK’s Future Homes Standard are analysed.•Peak demand about 1/3 of the maximum power capacity of each dwelling.•Electricity consumption largely driven by occupancy behaviour.•Importance of diversity-based power network planning over theoretical capacity estimates. The fast growth of the Internet of Things (IoT) into mission-critical applications requires secure and efficient routing protocols. Nevertheless, the resource limitations of IoT devices and their susceptibility to attacks require smart, dynamic solutions. To overcome these challenges, this paper introduces a new, safe, multi-hop routing algorithm that combines the use of fuzzy logic and reinforcement learning. We initially build a high-performance communication backbone over a Connected Dominating Set (CDS) to reduce network overhead. A fuzzy inference system then intelligently considers the possible paths using path energy, distance, and node credibility to choose the best path to transmit the data. A Q-learning model is used to dynamically evaluate the reliability of each node to provide security, and to identify and isolate malicious actors. Our algorithm is shown to be better in experimental results, with the ability to increase the ratio of packet delivery by up to 2.4 percent and at the same time lower the average energy consumption by about 6.53 percent of the current state-of-the-art protocols. These results demonstrate that our hybrid solution has a great potential to improve the reliability and safety of data routing in contemporary IoT networks.
ArticleNumber 102208
Author Fu, Tao
Qin, Xuming
Han, Guoxin
Lin, Weiting
Li, Jinfang
Author_xml – sequence: 1
  givenname: Tao
  surname: Fu
  fullname: Fu, Tao
  email: changeful22@163.com
– sequence: 2
  givenname: Guoxin
  surname: Han
  fullname: Han, Guoxin
  email: Gxhan1231120192@outlook.com
– sequence: 3
  givenname: Xuming
  surname: Qin
  fullname: Qin, Xuming
– sequence: 4
  givenname: Jinfang
  surname: Li
  fullname: Li, Jinfang
– sequence: 5
  givenname: Weiting
  surname: Lin
  fullname: Lin, Weiting
BookMark eNp9kMtqwzAQRUVJoWmaP-hCP-BUkl_yphBCH4FANulayNLIkbGtINmF5Ovr1KV01ZWGC_eM5tyjWec6QOiRkhUlNHuqVzWEXh1XjLB0jBgj_AbNGaNpRAqezf7Md2gZQk0IoQWjNM3maL_GAdTgAbdD09vo6E7Yu6G3XYVlUzlv-2OLSxlAR67DZrhczrhxlVXYOI-37oCVa9uhs0r21nUP6NbIJsDy512gj9eXw-Y92u3ftpv1LlJxVvRRybKcmELSOGEUeKFNrpnJ0pInhHGilQRqTKF5rLNyDDJWJJoDK8YOqJLEC7SduNrJWpy8baU_Cyet-A6cr4T0vVUNCJknGjgQTsokydNxWU4TABaTOI15Xo6sZGIp70LwYH55lIirY1GLybG4OhaT47H2PNVgvPPTghdBWegUaOtB9eNH7P-AL0MRiB8
Cites_doi 10.1007/s11276-021-02850-5
10.1016/j.jnca.2016.03.006
10.3390/su16114756
10.1109/ACCESS.2021.3130005
10.48084/etasr.7115
10.1007/s10207-023-00737-4
10.1007/s12083-025-01957-2
10.1002/ett.4216
10.1002/dac.4782
10.1007/s12083-024-01670-6
10.1109/CIS.2013.145
10.1007/s11277-022-09632-y
10.1109/JIOT.2021.3121529
10.1109/JSAC.2016.2525418
10.1016/j.comcom.2022.02.004
10.3390/s22166215
10.1109/MWC.2017.1600421
10.1038/s41598-023-44764-6
10.1016/j.csi.2024.103873
10.1007/s12083-024-01708-9
10.1007/s11227-022-04766-z
10.1007/s12083-023-01603-9
10.1007/s11277-021-08653-3
10.3390/en15134777
ContentType Journal Article
Copyright 2025 The Authors
Copyright_xml – notice: 2025 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
DOA
DOI 10.1016/j.jestch.2025.102208
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList

Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals (DOAJ)
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2215-0986
ExternalDocumentID oai_doaj_org_article_a74de8e080b447589d714ee23035387b
10_1016_j_jestch_2025_102208
S2215098625002630
GroupedDBID 0R~
4.4
457
5VS
6I.
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAXUO
AAYWO
ABMAC
ACGFS
ADBBV
ADEZE
ADVLN
AEXQZ
AFJKZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
APXCP
BCNDV
EBS
EJD
FDB
GROUPED_DOAJ
HZ~
IPNFZ
IXB
KQ8
M41
M~E
O9-
OK1
RIG
ROL
SSZ
AAYXX
CITATION
ID FETCH-LOGICAL-c369t-b2670f9a13421e89df7d2f65b840280dcae1ff9d83d6b2806294d8e29f9aecb03
IEDL.DBID DOA
ISICitedReferencesCount 0
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001619693000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2215-0986
IngestDate Mon Nov 17 19:36:42 EST 2025
Thu Nov 27 00:33:35 EST 2025
Wed Dec 10 14:40:02 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Fuzzy logic
Internet of things
Connected dominating set
Secure routing algorithm
Language English
License This is an open access article under the CC BY-NC-ND license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c369t-b2670f9a13421e89df7d2f65b840280dcae1ff9d83d6b2806294d8e29f9aecb03
OpenAccessLink https://doaj.org/article/a74de8e080b447589d714ee23035387b
ParticipantIDs doaj_primary_oai_doaj_org_article_a74de8e080b447589d714ee23035387b
crossref_primary_10_1016_j_jestch_2025_102208
elsevier_sciencedirect_doi_10_1016_j_jestch_2025_102208
PublicationCentury 2000
PublicationDate December 2025
2025-12-00
2025-12-01
PublicationDateYYYYMMDD 2025-12-01
PublicationDate_xml – month: 12
  year: 2025
  text: December 2025
PublicationDecade 2020
PublicationTitle Engineering science and technology, an international journal
PublicationYear 2025
Publisher Elsevier B.V
Elsevier
Publisher_xml – name: Elsevier B.V
– name: Elsevier
References Alotaibi (b0105) 2021; 9
Muzammal, Murugesan, Jhanjhi, Hossain, Yassine (b0070) 2022; 22
Rajasoundaran, Prabu, Routray, Malla, Kumar, Mukherjee, Qi (b0115) 2022; 187
K. Zhao, L. Ge. A survey on the internet of things security. In 2013 Ninth international conference on computational intelligence and security (pp. 663-667), 2013. IEEE.
Statista. Number of Connected Devices Worldwide 2030|Statista. Statista Research Department. Available online: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/ (accessed on 27 January 2021).
Nagaraju, Goyal, Verma, Safirescu, Mihaltan (b0100) 2022; 15
Yaqoob, Ahmed, Hashem, Ahmed, Gani, Imran, Guizani (b0030) 2017; 24
Dinesh, Svn (b0165) 2024; 17
Horwitz, L. Internet of Things (IoT)—The Future of IoT Miniguide: The Burgeoning IoT Market Continues—Cisco. Cisco. Available online: https://www.cisco.com/c/en/us/solutions/internet-of-things/future-of-iot.html (accessed on 25 May 2020).
Mujeeb, Praveen Sam, Madhavi (b0080) 2021; 121
Usturge, Pavan Kumar (b0130) 2023; 32
Rajan, Raju, SVN, Selvi, Shanmugapriya (b0150) 2025; 18
Kala, Karthik, K, s. (b0090) 2021; 34
Shanmugapriya, Svn (b0160) 2024; 17
Rui, Pan, Shu (b0125) 2023; 13
Symantec. Internet security threat report ISTR. Email Threat. 2017, 2017. Available online: https://docs.broadcom.com/doc/istr-22-2017-en (accessed on 10 May 2022).
Goodin, D. Brickerbot, the Permanent Denial-Of-Service Botnet, Is Back with a Vengeance|Ars Technica. Ars Technica. Available online: https://arstechnica.com/information technology/2017/04/brickerbot-the-permanent-denial-of-service-botnet-is-backwith-a-vengeance/ (accessed on 27 November 2018).
Paul, F. Gartner’s Top 10 IoT Trends for 2019 and Beyond. NETWORKWORLD. Available online: https://www.networkworld.com/article/3322517/a-critical-look-at-gartners-top-10-iot-trends.html (accessed on 25 May 2020).
Cao, Wang, Huang, Yi, He (b0085) 2021; 32
Ragesh, Kumar (b0120) 2023; 79
Airehrour, Gutierrez, Ray (b0010) 2016; 66
Burange, Deshmukh, Thakare, Shelke (b0145) 2025; 91
Hilton, S. Dyn analysis summary of Friday October 21 attack|dyn blog. Company News 2016, 20–22. Available online: https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ (accessed on 27 November 2018). Archived at: https://perma.cc/YW5C-MDEV (accessed on 16 August 2022).
Humayun, Jhanjhi, Alsayat, Ponnusamy (b0025) 2021; 22
CISCO. Cisco’s Talos Intelligence Group Blog: New VPNFilter Malware Targets at Least 500K Networking DevicesWorldwide. CISCO. Available online: https://blog.talosintelligence.com/2018/05/VPNFilter.html (accessed on 16 December 2018).
Palattella, Dohler, Grieco, Rizzo, Torsner, Engel, Ladid (b0020) 2016; 34
Othmen, Mansouri, Asklany (b0140) 2024; 14
Josh Fruhlinger. The Mirai Botnet Explained: How IoT Devices Almost Brought Down the Internet|CSO Online. CSO. Available online: https://www.csoonline.com/article/3258748/security/the-mirai-botnet-explained-how-teen scammers-andcctv-cameras-almost-brought-down-the-internet.html (accessed on 1 December 2018).
Kore, Patil (b0095) 2022; 28
Zhang, Ren, Song, Liu, Zhang, Qian (b0075) 2021; 9
Meena, Sharma (b0110) 2022; 125
Thangavelu, Rajendran (b0135) 2024; 16
Dinesh, Santhosh Kumar (b0155) 2024; 17
Dinesh, Santhosh Kumar (b0170) 2024; 23
10.1016/j.jestch.2025.102208_b0045
Mujeeb (10.1016/j.jestch.2025.102208_b0080) 2021; 121
10.1016/j.jestch.2025.102208_b0065
Ragesh (10.1016/j.jestch.2025.102208_b0120) 2023; 79
Nagaraju (10.1016/j.jestch.2025.102208_b0100) 2022; 15
10.1016/j.jestch.2025.102208_b0005
Dinesh (10.1016/j.jestch.2025.102208_b0165) 2024; 17
Burange (10.1016/j.jestch.2025.102208_b0145) 2025; 91
Dinesh (10.1016/j.jestch.2025.102208_b0170) 2024; 23
Alotaibi (10.1016/j.jestch.2025.102208_b0105) 2021; 9
Rajan (10.1016/j.jestch.2025.102208_b0150) 2025; 18
10.1016/j.jestch.2025.102208_b0040
Usturge (10.1016/j.jestch.2025.102208_b0130) 2023; 32
Othmen (10.1016/j.jestch.2025.102208_b0140) 2024; 14
10.1016/j.jestch.2025.102208_b0060
Rajasoundaran (10.1016/j.jestch.2025.102208_b0115) 2022; 187
Zhang (10.1016/j.jestch.2025.102208_b0075) 2021; 9
Kore (10.1016/j.jestch.2025.102208_b0095) 2022; 28
Meena (10.1016/j.jestch.2025.102208_b0110) 2022; 125
Humayun (10.1016/j.jestch.2025.102208_b0025) 2021; 22
Airehrour (10.1016/j.jestch.2025.102208_b0010) 2016; 66
10.1016/j.jestch.2025.102208_b0055
Yaqoob (10.1016/j.jestch.2025.102208_b0030) 2017; 24
Palattella (10.1016/j.jestch.2025.102208_b0020) 2016; 34
10.1016/j.jestch.2025.102208_b0015
Muzammal (10.1016/j.jestch.2025.102208_b0070) 2022; 22
10.1016/j.jestch.2025.102208_b0035
Thangavelu (10.1016/j.jestch.2025.102208_b0135) 2024; 16
Kala (10.1016/j.jestch.2025.102208_b0090) 2021; 34
10.1016/j.jestch.2025.102208_b0050
Rui (10.1016/j.jestch.2025.102208_b0125) 2023; 13
Dinesh (10.1016/j.jestch.2025.102208_b0155) 2024; 17
Cao (10.1016/j.jestch.2025.102208_b0085) 2021; 32
Shanmugapriya (10.1016/j.jestch.2025.102208_b0160) 2024; 17
References_xml – volume: 91
  year: 2025
  ident: b0145
  article-title: Safeguarding the internet of things: Elevating IoT routing security through trust management excellence
  publication-title: Comput. Stand. Interfaces
– volume: 187
  start-page: 71
  year: 2022
  end-page: 82
  ident: b0115
  article-title: Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks
  publication-title: Comput. Commun.
– reference: Symantec. Internet security threat report ISTR. Email Threat. 2017, 2017. Available online: https://docs.broadcom.com/doc/istr-22-2017-en (accessed on 10 May 2022).
– volume: 22
  start-page: 6215
  year: 2022
  ident: b0070
  article-title: Trust and mobility-based protocol for secure routing in internet of things
  publication-title: Sensors
– volume: 9
  start-page: 10539
  year: 2021
  end-page: 10553
  ident: b0075
  article-title: An energy-efficient multilevel secure routing protocol in IoT networks
  publication-title: IEEE Internet Things J.
– volume: 22
  start-page: 105
  year: 2021
  end-page: 117
  ident: b0025
  article-title: Internet of things and ransomware: Evolution, mitigation and prevention
  publication-title: Egypt. Inf. J.
– volume: 121
  start-page: 621
  year: 2021
  end-page: 646
  ident: b0080
  article-title: Adaptive EHTARA: an energy-efficient and trust aware secure routing algorithm for big data classification in IoT network
  publication-title: Wirel. Pers. Commun.
– volume: 24
  start-page: 10
  year: 2017
  end-page: 16
  ident: b0030
  article-title: Internet of things architecture: recent advances, taxonomy, requirements, and open challenges
  publication-title: IEEE Wirel. Commun.
– volume: 66
  start-page: 198
  year: 2016
  end-page: 213
  ident: b0010
  article-title: Secure routing for internet of things: a survey
  publication-title: J. Netw. Comput. Appl.
– reference: Josh Fruhlinger. The Mirai Botnet Explained: How IoT Devices Almost Brought Down the Internet|CSO Online. CSO. Available online: https://www.csoonline.com/article/3258748/security/the-mirai-botnet-explained-how-teen scammers-andcctv-cameras-almost-brought-down-the-internet.html (accessed on 1 December 2018).
– volume: 34
  start-page: 510
  year: 2016
  end-page: 527
  ident: b0020
  article-title: Internet of things in the 5G era: Enablers, architecture, and business models
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 32
  start-page: 331
  year: 2023
  end-page: 346
  ident: b0130
  article-title: DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot
  publication-title: Inf. Security J.: A Global Perspective
– reference: CISCO. Cisco’s Talos Intelligence Group Blog: New VPNFilter Malware Targets at Least 500K Networking DevicesWorldwide. CISCO. Available online: https://blog.talosintelligence.com/2018/05/VPNFilter.html (accessed on 16 December 2018).
– reference: Paul, F. Gartner’s Top 10 IoT Trends for 2019 and Beyond. NETWORKWORLD. Available online: https://www.networkworld.com/article/3322517/a-critical-look-at-gartners-top-10-iot-trends.html (accessed on 25 May 2020).
– volume: 14
  start-page: 14402
  year: 2024
  end-page: 14410
  ident: b0140
  article-title: Robust and secure routing protocol based on group key management for internet of things systems
  publication-title: Eng., Technol. Appl. Sci. Res.
– volume: 23
  start-page: 199
  year: 2024
  end-page: 223
  ident: b0170
  article-title: Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network
  publication-title: Int. J. Inf. Secur.
– volume: 17
  start-page: 585
  year: 2024
  end-page: 611
  ident: b0165
  article-title: GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks
  publication-title: Peer-to-Peer Networking Appl.
– volume: 34
  start-page: e4782
  year: 2021
  ident: b0090
  article-title: Advanced hybrid secure multipath optimized routing in internet of things (IoT)‐based WSN
  publication-title: Int. J. Commun Syst
– volume: 16
  start-page: 4756
  year: 2024
  ident: b0135
  article-title: Energy-efficient secure routing for a sustainable heterogeneous iot network management
  publication-title: Sustainability
– reference: Goodin, D. Brickerbot, the Permanent Denial-Of-Service Botnet, Is Back with a Vengeance|Ars Technica. Ars Technica. Available online: https://arstechnica.com/information technology/2017/04/brickerbot-the-permanent-denial-of-service-botnet-is-backwith-a-vengeance/ (accessed on 27 November 2018).
– volume: 9
  start-page: 159187
  year: 2021
  end-page: 159197
  ident: b0105
  article-title: Improved blowfish algorithm-based secure routing technique in IoT-based WSN
  publication-title: IEEE Access
– reference: Horwitz, L. Internet of Things (IoT)—The Future of IoT Miniguide: The Burgeoning IoT Market Continues—Cisco. Cisco. Available online: https://www.cisco.com/c/en/us/solutions/internet-of-things/future-of-iot.html (accessed on 25 May 2020).
– reference: Hilton, S. Dyn analysis summary of Friday October 21 attack|dyn blog. Company News 2016, 20–22. Available online: https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/ (accessed on 27 November 2018). Archived at: https://perma.cc/YW5C-MDEV (accessed on 16 August 2022).
– volume: 28
  start-page: 287
  year: 2022
  end-page: 301
  ident: b0095
  article-title: Cross layered cryptography based secure routing for IoT-enabled smart healthcare system
  publication-title: Wirel. Netw
– reference: Statista. Number of Connected Devices Worldwide 2030|Statista. Statista Research Department. Available online: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/ (accessed on 27 January 2021).
– volume: 17
  start-page: 2609
  year: 2024
  end-page: 2636
  ident: b0155
  article-title: HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks
  publication-title: Peer-to-Peer Network. Appl.
– volume: 79
  start-page: 2882
  year: 2023
  end-page: 2909
  ident: b0120
  article-title: Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications
  publication-title: J. Supercomput.
– volume: 18
  start-page: 136
  year: 2025
  ident: b0150
  article-title: RL-BOT—Reinforcement learning based billfish optimization technique for secured data aggregation in internet of things
  publication-title: Peer-to-Peer Network. Appl.
– volume: 32
  start-page: e4216
  year: 2021
  ident: b0085
  article-title: A security‐driven network architecture for routing in industrial internet of things
  publication-title: Trans. Emerg. Telecommun. Technol.
– volume: 15
  start-page: 4777
  year: 2022
  ident: b0100
  article-title: Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks
  publication-title: Energies
– reference: K. Zhao, L. Ge. A survey on the internet of things security. In 2013 Ninth international conference on computational intelligence and security (pp. 663-667), 2013. IEEE.
– volume: 125
  start-page: 1753
  year: 2022
  end-page: 1781
  ident: b0110
  article-title: Secret dynamic key authentication and decision trust secure routing framework for internet of things based WSN
  publication-title: Wirel. Pers. Commun.
– volume: 13
  start-page: 18003
  year: 2023
  ident: b0125
  article-title: Secure routing in the internet of things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques
  publication-title: Sci. Rep.
– volume: 17
  start-page: 1830
  year: 2024
  end-page: 1864
  ident: b0160
  article-title: An energy efficient swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT
  publication-title: Peer-to-Peer Network. Appl.
– ident: 10.1016/j.jestch.2025.102208_b0045
– volume: 28
  start-page: 287
  issue: 1
  year: 2022
  ident: 10.1016/j.jestch.2025.102208_b0095
  article-title: Cross layered cryptography based secure routing for IoT-enabled smart healthcare system
  publication-title: Wirel. Netw
  doi: 10.1007/s11276-021-02850-5
– volume: 66
  start-page: 198
  year: 2016
  ident: 10.1016/j.jestch.2025.102208_b0010
  article-title: Secure routing for internet of things: a survey
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2016.03.006
– volume: 16
  start-page: 4756
  issue: 11
  year: 2024
  ident: 10.1016/j.jestch.2025.102208_b0135
  article-title: Energy-efficient secure routing for a sustainable heterogeneous iot network management
  publication-title: Sustainability
  doi: 10.3390/su16114756
– volume: 9
  start-page: 159187
  year: 2021
  ident: 10.1016/j.jestch.2025.102208_b0105
  article-title: Improved blowfish algorithm-based secure routing technique in IoT-based WSN
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3130005
– volume: 14
  start-page: 14402
  issue: 3
  year: 2024
  ident: 10.1016/j.jestch.2025.102208_b0140
  article-title: Robust and secure routing protocol based on group key management for internet of things systems
  publication-title: Eng., Technol. Appl. Sci. Res.
  doi: 10.48084/etasr.7115
– volume: 23
  start-page: 199
  issue: 1
  year: 2024
  ident: 10.1016/j.jestch.2025.102208_b0170
  article-title: Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-023-00737-4
– volume: 18
  start-page: 136
  issue: 3
  year: 2025
  ident: 10.1016/j.jestch.2025.102208_b0150
  article-title: RL-BOT—Reinforcement learning based billfish optimization technique for secured data aggregation in internet of things
  publication-title: Peer-to-Peer Network. Appl.
  doi: 10.1007/s12083-025-01957-2
– ident: 10.1016/j.jestch.2025.102208_b0055
– volume: 32
  start-page: e4216
  issue: 4
  year: 2021
  ident: 10.1016/j.jestch.2025.102208_b0085
  article-title: A security‐driven network architecture for routing in industrial internet of things
  publication-title: Trans. Emerg. Telecommun. Technol.
  doi: 10.1002/ett.4216
– volume: 34
  start-page: e4782
  issue: 8
  year: 2021
  ident: 10.1016/j.jestch.2025.102208_b0090
  article-title: Advanced hybrid secure multipath optimized routing in internet of things (IoT)‐based WSN
  publication-title: Int. J. Commun Syst
  doi: 10.1002/dac.4782
– volume: 17
  start-page: 1830
  issue: 4
  year: 2024
  ident: 10.1016/j.jestch.2025.102208_b0160
  article-title: An energy efficient swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT
  publication-title: Peer-to-Peer Network. Appl.
  doi: 10.1007/s12083-024-01670-6
– ident: 10.1016/j.jestch.2025.102208_b0005
  doi: 10.1109/CIS.2013.145
– volume: 125
  start-page: 1753
  issue: 2
  year: 2022
  ident: 10.1016/j.jestch.2025.102208_b0110
  article-title: Secret dynamic key authentication and decision trust secure routing framework for internet of things based WSN
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-022-09632-y
– ident: 10.1016/j.jestch.2025.102208_b0065
– volume: 9
  start-page: 10539
  issue: 13
  year: 2021
  ident: 10.1016/j.jestch.2025.102208_b0075
  article-title: An energy-efficient multilevel secure routing protocol in IoT networks
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2021.3121529
– volume: 34
  start-page: 510
  issue: 3
  year: 2016
  ident: 10.1016/j.jestch.2025.102208_b0020
  article-title: Internet of things in the 5G era: Enablers, architecture, and business models
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2016.2525418
– volume: 187
  start-page: 71
  year: 2022
  ident: 10.1016/j.jestch.2025.102208_b0115
  article-title: Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2022.02.004
– volume: 22
  start-page: 6215
  issue: 16
  year: 2022
  ident: 10.1016/j.jestch.2025.102208_b0070
  article-title: Trust and mobility-based protocol for secure routing in internet of things
  publication-title: Sensors
  doi: 10.3390/s22166215
– ident: 10.1016/j.jestch.2025.102208_b0015
– ident: 10.1016/j.jestch.2025.102208_b0040
– volume: 24
  start-page: 10
  issue: 3
  year: 2017
  ident: 10.1016/j.jestch.2025.102208_b0030
  article-title: Internet of things architecture: recent advances, taxonomy, requirements, and open challenges
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.2017.1600421
– ident: 10.1016/j.jestch.2025.102208_b0050
– volume: 13
  start-page: 18003
  issue: 1
  year: 2023
  ident: 10.1016/j.jestch.2025.102208_b0125
  article-title: Secure routing in the internet of things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques
  publication-title: Sci. Rep.
  doi: 10.1038/s41598-023-44764-6
– volume: 32
  start-page: 331
  issue: 5
  year: 2023
  ident: 10.1016/j.jestch.2025.102208_b0130
  article-title: DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot
  publication-title: Inf. Security J.: A Global Perspective
– volume: 91
  year: 2025
  ident: 10.1016/j.jestch.2025.102208_b0145
  article-title: Safeguarding the internet of things: Elevating IoT routing security through trust management excellence
  publication-title: Comput. Stand. Interfaces
  doi: 10.1016/j.csi.2024.103873
– volume: 17
  start-page: 2609
  issue: 5
  year: 2024
  ident: 10.1016/j.jestch.2025.102208_b0155
  article-title: HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks
  publication-title: Peer-to-Peer Network. Appl.
  doi: 10.1007/s12083-024-01708-9
– volume: 22
  start-page: 105
  issue: 1
  year: 2021
  ident: 10.1016/j.jestch.2025.102208_b0025
  article-title: Internet of things and ransomware: Evolution, mitigation and prevention
  publication-title: Egypt. Inf. J.
– ident: 10.1016/j.jestch.2025.102208_b0035
– ident: 10.1016/j.jestch.2025.102208_b0060
– volume: 79
  start-page: 2882
  issue: 3
  year: 2023
  ident: 10.1016/j.jestch.2025.102208_b0120
  article-title: Trust-based secure routing and message delivery protocol for signal processing attacks in IoT applications
  publication-title: J. Supercomput.
  doi: 10.1007/s11227-022-04766-z
– volume: 17
  start-page: 585
  issue: 2
  year: 2024
  ident: 10.1016/j.jestch.2025.102208_b0165
  article-title: GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks
  publication-title: Peer-to-Peer Networking Appl.
  doi: 10.1007/s12083-023-01603-9
– volume: 121
  start-page: 621
  issue: 1
  year: 2021
  ident: 10.1016/j.jestch.2025.102208_b0080
  article-title: Adaptive EHTARA: an energy-efficient and trust aware secure routing algorithm for big data classification in IoT network
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-021-08653-3
– volume: 15
  start-page: 4777
  issue: 13
  year: 2022
  ident: 10.1016/j.jestch.2025.102208_b0100
  article-title: Secure routing-based energy optimization for IOT application with heterogeneous wireless sensor networks
  publication-title: Energies
  doi: 10.3390/en15134777
SSID ssj0001921156
Score 2.310519
Snippet •Comprehensive assessment of operational impact of low carbon dwellings on local power infrastructure.•7 low-carbon homes with ASHP and PV constructed meeting...
The fast growth of the Internet of Things (IoT) into mission-critical applications requires secure and efficient routing protocols. Nevertheless, the resource...
SourceID doaj
crossref
elsevier
SourceType Open Website
Index Database
Publisher
StartPage 102208
SubjectTerms Connected dominating set
Fuzzy logic
Internet of things
Secure routing algorithm
Title A secure multi-hop routing algorithm based-on fuzzy logic for IoT communication
URI https://dx.doi.org/10.1016/j.jestch.2025.102208
https://doaj.org/article/a74de8e080b447589d714ee23035387b
Volume 72
WOSCitedRecordID wos001619693000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: Directory of Open Access Journals (DOAJ)
  customDbUrl:
  eissn: 2215-0986
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001921156
  issn: 2215-0986
  databaseCode: DOA
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2215-0986
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001921156
  issn: 2215-0986
  databaseCode: M~E
  dateStart: 20140101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV27TsMwFLVQxQAD4inKSx5YLfJwY2csqBVIUBgK6hb5SVtBUvWBRAe-nes4QZlgYckQJdfRuYnvcXx8jNClSDohV5YSyC4jlHFKhJWWAHdXgenEMi5VlS_3bDDgo1H61Njqy2nCvD2wB-5KMKoNN0BspPOm46lmITUGmHMM3yqTrvcNWNoYTE09bwGqk9Rr5UpB1xS62XL-Ieo4w4LI7SjZqEWlZX-jJDXKTH8X7VT8EHf9c-2hDZPvo-2Ga-ABeuzihftLbnCpBiTjYobnxcrpl7F4ey1guD9-x648aVLk2K7W609cdnEYGCq-K4ZYNZeFHKLnfm94c0uqfRGIAuSWREYJC2wqwphGoQFELNORTToSBmsRD7QSJrQ21TzWiXQzp1FKNTdRCvcYJYP4CLXyIjfHCGuhqNYplTEVVEslhArDRFAIwLiSoo1IjVA28_YXWa0Lm2Ye0cwhmnlE2-jawfhzrTOvLk9ASrMqpdlfKW0jVichq3iAr-8QavJr8yf_0fwp2nIhvWblDLWW85U5R5vqYzlZzC_K9wyOD1-9byN02MU
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+secure+multi-hop+routing+algorithm+based-on+fuzzy+logic+for+IoT+communication&rft.jtitle=Engineering+science+and+technology%2C+an+international+journal&rft.au=Fu%2C+Tao&rft.au=Han%2C+Guoxin&rft.au=Qin%2C+Xuming&rft.au=Li%2C+Jinfang&rft.date=2025-12-01&rft.pub=Elsevier+B.V&rft.issn=2215-0986&rft.eissn=2215-0986&rft.volume=72&rft_id=info:doi/10.1016%2Fj.jestch.2025.102208&rft.externalDocID=S2215098625002630
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2215-0986&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2215-0986&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2215-0986&client=summon