Table 1 Comparison of the related works.
Method | Publication year | Security mechanism | Routing technique | Energy efficiency | Strengths | Weakness |
|---|---|---|---|---|---|---|
Cao et al.25 | 2021 | Blockchain | An SDN-based secure routing | \(\times\) | Designing a flexible, programmable, and secure routing framework | Not paying attention to the energy index in the routing process |
REERS26 | 2021 | \(\times\) | Clustering routing method | \(\checkmark\) | Increasing energy efficiency and reducing delay | Not having a security mechanism |
Abbas et al.27 | 2021 | Blockchain | A GA-based routing protocol | \(\times\) | Designing a lightweight authentication structure, ability to accurately detect attacking nodes | Not paying attention to the energy index in the routing process, high execution and transaction costs |
RISA28 | 2020 | \(\times\) | A SFLA-based content centric routing method | \(\checkmark\) | Increasing energy efficiency | Not designing a security mechanism |
RDDI29 | 2020 | HHO-based watchful node selection process | A hierarchical energy-aware geographic routing based on the fuzzy clustering | \(\checkmark\) | Enhancing energy efficiency, detecting and isolating malicious nodes | Not evaluating its robustness and efficiency against cybersecurity attacks |
CTSRD18 | 2023 | A decentralized and light trust structure called W-Trust | A tree-cluster based routing scheme supported by a dragonfly algorithm | \(\checkmark\) | Considering energy efficiency, using a tree-cluster network topology | Low packet delivery rate (PDR) |
EEMSR30 | 2021 | A multi-trust framework based on data perception trust, data fusion trust, and communication trust | AHP-based clustering and a GA-based routing protocol | \(\checkmark\) | Balancing energy consumption in the network, designing a strong security mechanism, detecting malicious nodes | High time complexity |
E-BEENISH31 | 2019 | \(\times\) | A clustering routing technique | \(\checkmark\) | Considering remaining energy and the distance from the sink node for selecting CHs, high scalability | Not designing a security mechanism |
FSRF | \(\times\) | A fuzzy trust mechanism | A clustering routing method based on firefly algorithm | \(\checkmark\) | High network lifetime, high scalability, considering energy efficiency, using a strong security mechanism | Low packet delivery rate (PDR) |