Table 1 Comparison of the related works.
Scheme | Strengths | Weaknesses |
|---|---|---|
SecAODV16 | Using a hierarchical topology, considering energy efficiency and network security at the same time, regarding the remaining energy of nodes when finding new paths, using a hybrid cryptography to secure connections between nodes | High communication cast, high delay in the routing process |
Shivhare et al.17 | Counteracting reply attacks, modification attacks, selective forwarding attacks, and data leakages, making a tradeoff between network longevity and data security, considering energy efficiency in the routing process | Low scalability, need to more experiments |
Chen et al.18 | Designing an adaptive trust model, using a recommendation filtering algorithm, high accuracy, high trust evaluation speed | High communication overhead, high time complexity |
Javaheri et al.19 | Using fuzzy logic in the clustering process, considering a hierarchical topology, adjusting factors and fuzzy rules based on HAOA, considering energy efficiency in the clustering and routing processes, increasing network stability and lifetime | Not designing a security mechanism for separating abnormal nodes from normal nodes, high time complexity |
LBR-GWO20 | Increasing network lifetime, considering energy efficiency in the clustering, considering a hierarchical topology, high scalability | Not designing a security mechanism for separating abnormal nodes from normal nodes, high time complexity, not considering inter-cluster routing |
3LWT-GWO21 | Designing a three-level trust evaluation technique, considering a hierarchical topology, high scalability, regarding energy efficiency in the clustering, high detection rate, high accuracy | Low convergence speed, need to improve data aggregation process |
AF-TNS22 | Selecting trusted neighbors in the secure transmission process, using a simple decision-making system, high network stability | Designing a weak trust system, low scalability, not considering a clustering process |
SASR23 | Selecting an optimal and secure route between source and destination, low computational complexity, considering a hierarchical topology, regarding energy efficiency in the clustering, improving network lifetime | High delay in the data transmission process, high communication cost |
CRSC24 | Balanced energy distribution between sensor nodes, increasing network lifetime, high scalability and reliability in the routing process | High time complexity, choosing cluster heads only based on distance and ignoring other parameters, especially energy in the CH selection process |
Gopal and Saravanan25 | Guaranteeing data accessibility, high accuracy, high detection speed, low delay and low communication cost in the routing process | Not considering energy in the routing process, not considering energy efficiency in the security mechanism, ignoring the clustering mechanism to increase scalability |
CTEA26 | Designing a strong trust mechanism, detecting badmouth and energy drain attacks, considering communication trust and improving security and reliability in the data transmission process, considering energy efficiency, improving network lifetime | High computational complexity, low scalability |