Table 1 Comparison of the related works.

From: A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)

Scheme

Strengths

Weaknesses

SecAODV16

Using a hierarchical topology, considering energy efficiency and network security at the same time, regarding the remaining energy of nodes when finding new paths, using a hybrid cryptography to secure connections between nodes

High communication cast, high delay in the routing process

Shivhare et al.17

Counteracting reply attacks, modification attacks, selective forwarding attacks, and data leakages, making a tradeoff between network longevity and data security, considering energy efficiency in the routing process

Low scalability, need to more experiments

Chen et al.18

Designing an adaptive trust model, using a recommendation filtering algorithm, high accuracy, high trust evaluation speed

High communication overhead, high time complexity

Javaheri et al.19

Using fuzzy logic in the clustering process, considering a hierarchical topology, adjusting factors and fuzzy rules based on HAOA, considering energy efficiency in the clustering and routing processes, increasing network stability and lifetime

Not designing a security mechanism for separating abnormal nodes from normal nodes, high time complexity

LBR-GWO20

Increasing network lifetime, considering energy efficiency in the clustering, considering a hierarchical topology, high scalability

Not designing a security mechanism for separating abnormal nodes from normal nodes, high time complexity, not considering inter-cluster routing

3LWT-GWO21

Designing a three-level trust evaluation technique, considering a hierarchical topology, high scalability, regarding energy efficiency in the clustering, high detection rate, high accuracy

Low convergence speed, need to improve data aggregation process

AF-TNS22

Selecting trusted neighbors in the secure transmission process, using a simple decision-making system, high network stability

Designing a weak trust system, low scalability, not considering a clustering process

SASR23

Selecting an optimal and secure route between source and destination, low computational complexity, considering a hierarchical topology, regarding energy efficiency in the clustering, improving network lifetime

High delay in the data transmission process, high communication cost

CRSC24

Balanced energy distribution between sensor nodes, increasing network lifetime, high scalability and reliability in the routing process

High time complexity, choosing cluster heads only based on distance and ignoring other parameters, especially energy in the CH selection process

Gopal and Saravanan25

Guaranteeing data accessibility, high accuracy, high detection speed, low delay and low communication cost in the routing process

Not considering energy in the routing process, not considering energy efficiency in the security mechanism, ignoring the clustering mechanism to increase scalability

CTEA26

Designing a strong trust mechanism, detecting badmouth and energy drain attacks, considering communication trust and improving security and reliability in the data transmission process, considering energy efficiency, improving network lifetime

High computational complexity, low scalability