ARTICLE Copyright © 2023 by American Scientific Publishers All rights reserved. Printed in the United States of America Journal of Nanoelectronics and Optoelectronics Vol. 18, pp. 338–346, 2023 www.aspbs.com/jno Design a Secure Routing and Monitoring Framework Based on Hybrid Optimization for IoT-Based Wireless Sensor Networks Mohammad Khalid Imam Rahmani 1 , Moizuddin Mohammed 2 , Reyazur Rashid Irshad 3 , Sadaf Yasmin 4 , Swati Mishra 4 , Pooja Asopa 2 , Asharul Islam 5 , Sultan Ahmad 6, 7, , and Aleem Ali 8 Wireless Sensor Networks (WSNs) have employed in recent years for many different applications and func- tions. But, it has the critical task to detect the malicious node because node malicious attacks are dangerous attacks, and the concept of a malicious attack is opponents enter the network, search accidentally, and cap- ture one or more normal nodes. A lot of research developed to overcome this problem, but no precise results are found. In this paper, design a Hybrid Vulture and African Buffalo with Node Identity Verification (HVAB- NIV) model to predict the malicious nodes in the WSN. The fitness functions of the HVAB-NIV have operated to recognize the energy level of each node and improve the performance of node detection. The developed replica includes three stages that monitor each node, calculate the energy level and detect the malicious node. More than 100 node inputs were initialized in the proposed technique and implemented in the MAT- LAB tool. The suggested mechanism enhances the performance of malicious node detection and gains good accuracy for detecting nodes also, it saves running time and power consumption. The experimental results of the developed model has validated with other existing replicas to running time, False Prediction Rate (FPR), detection accuracy, True Prediction Rate (TPR), and power consumption. The developed methods achieve better results by gaining a high rate of accuracy detection, less running time, and false rate detection. Keywords: Wireless Sensor Network, Sensor Node, Malicious Node, Energy Value, Moving Nodes, Monitoring Module, Vulture Optimization, African Buffalo Optimization. 1 College of Computing and Informatics, Saudi Electronic University, Riyadh-11673, Saudi Arabia 2 Department of Computer Science, Banasthali Vidyapith, Niwai 304021, Rajasthan, India 3 Department of Computer Science, College of Science and Arts, Najran University, Sharurah-98341, Najran, Saudi Arabia 4 International School of Business Management, Suresh Gyan Vihar Uni- versity, Jaipur 302029, India 5 College of Computer Science, King Khalid University, Abha-62217, Saudi Arabia 6 Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj-11942, Saudi Arabia 7 Department of Computer Science and Engineering, University Center for Research and Development (UCRD), Chandigarh University, Gharuan, Mohali 140413, Punjab, India 8 Department of Computer Science and Engineering, UIE, Chandigarh University, Mohali, Chandigarh 140413, Punjab, India Author to whom correspondence should be addressed. Email: s.alisher@psau.edu.sa 1. INTRODUCTION WSNs typically have several nodes that transfer data from the source to the destination. Attacks are impacted by the transmission link of the node during the communication process, affecting the WSN [1]. Many methods have cre- ated to solve these issues, but they have specific issues with identifying fraudulent nodes. The primary concern in wireless applications is security because attacks in the WSN are volatile. Due to malicious node attacks, the WSN affects major harm during data sharing [2, 3]. The mali- cious node attack is dangerous it restricts the sensor nodes or good nodes. After that, start data broadcasting, and it abruptly stops. These issues prompted this study into the identification of malicious attacks in WSN. In general, Wireless Sensor Networks (WSN) has employed to track variables present in the WSN trans- mission environment [1]. A gateway has used to transport Received: 11 September 2022 Accepted: 30 January 2023 338 J. Nanoelectron. Optoelectron. 2023, Vol. 18, No. 3 1555-130X/2023/18/338/009 doi:10.1166/jno.2023.3397