Table 1 Comparison of the related works.

From: A fuzzy logic-based secure hierarchical routing scheme using firefly algorithm in Internet of Things for healthcare

Method

Publication year

Security mechanism

Routing technique

Energy efficiency

Strengths

Weakness

Cao et al.25

2021

Blockchain

An SDN-based secure routing

\(\times\)

Designing a flexible, programmable, and secure routing framework

Not paying attention to the energy index in the routing process

REERS26

2021

\(\times\)

Clustering routing method

\(\checkmark\)

Increasing energy efficiency and reducing delay

Not having a security mechanism

Abbas et al.27

2021

Blockchain

A GA-based routing protocol

\(\times\)

Designing a lightweight authentication structure, ability to accurately detect attacking nodes

Not paying attention to the energy index in the routing process, high execution and transaction costs

RISA28

2020

\(\times\)

A SFLA-based content centric routing method

\(\checkmark\)

Increasing energy efficiency

Not designing a security mechanism

RDDI29

2020

HHO-based watchful node selection process

A hierarchical energy-aware geographic routing based on the fuzzy clustering

\(\checkmark\)

Enhancing energy efficiency, detecting and isolating malicious nodes

Not evaluating its robustness and efficiency against cybersecurity attacks

CTSRD18

2023

A decentralized and light trust structure called W-Trust

A tree-cluster based routing scheme supported by a dragonfly algorithm

\(\checkmark\)

Considering energy efficiency, using a tree-cluster network topology

Low packet delivery rate (PDR)

EEMSR30

2021

A multi-trust framework based on data perception trust, data fusion trust, and communication trust

AHP-based clustering and a GA-based routing protocol

\(\checkmark\)

Balancing energy consumption in the network, designing a strong security mechanism, detecting malicious nodes

High time complexity

E-BEENISH31

2019

\(\times\)

A clustering routing technique

\(\checkmark\)

Considering remaining energy and the distance from the sink node for selecting CHs, high scalability

Not designing a security mechanism

FSRF

\(\times\)

A fuzzy trust mechanism

A clustering routing method based on firefly algorithm

\(\checkmark\)

High network lifetime, high scalability, considering energy efficiency, using a strong security mechanism

Low packet delivery rate (PDR)