Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.22Keywords:
Wireless sensor networks, Encryption technique, RC4, Directed acyclic graphs, Malicious node.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In wireless sensor networks (WSNs), ensuring secure data transmission while preventing malicious activity is a critical challenge. This paper presents a novel approach for the identification of malicious nodes in WSNs by integrating directed acyclic graphs (DAGs) with the RC4 encryption algorithm. DAGs are employed to establish a hierarchical structure that enables efficient data flow and tracking of communication patterns across the network. By utilizing DAGs, the system can monitor the consistency and integrity of data transmission, making it easier to detect anomalies caused by malicious nodes. The RC4 encryption algorithm further strengthens the approach by securing the communication between nodes, preventing unauthorized access and tampering. In combination, DAGs and RC4 provide a robust framework for both detecting malicious nodes and securing data exchanges. Experimental simulations demonstrate that the proposed approach enhances network security by identifying compromised nodes with high accuracy while maintaining efficient communication and low overhead. This method offers a scalable and secure solution for protecting WSNs from malicious threats.Abstract
How to Cite
Downloads
Similar Articles
- Dhulasi Priya S, Saranya K G, Significance of artificial intelligence in the development of sustainable transportation , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Arenlila Jamir, Sangeeta Kharde, Anita Dalal, Health-seeking behavior of first-time mothers toward pregnancy , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Sampa Mondal, Baibaswata Bhattacharjee, Amelioration of the UV-blocking property of ZnO nanoparticles as an active sunscreen ingredient , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Pritee Rajaram Ray, Bijal Zaveri, Inclusive education for children with learning difficulties in Mauritius: An analytical study among select stakeholders , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- L. Vamsi Narasimha Rao, P.S.Prakash, M.Veera Kumari, Improvement of power system operation using a novel hybrid optimization method for optimal allocation of facts devices in radial transmission line , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Manan Pathak, Dishang Trivedi Trivedi, Field-effect limits and design parameters for hybrid HVDC – HVAC transmission line corridors , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- Rahul, Naveen Sharma, Thermosolutal Instability of Couple Stress Rivlin Ericksen Ferromagnetic Fluid with Rotation, Magnetic and Variable Gravity Field in Porous Medium , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Ravikiran K, Neerav Nishant, M Sreedhar, N.Kavitha, Mathur N Kathiravan, Geetha A, Deep learning methods and integrated digital image processing techniques for detecting and evaluating wheat stripe rust disease , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Rajeshwari D, C. Victoria Priscilla, An optimized real-time human detected keyframe extraction algorithm (HDKFE) based on faster R-CNN , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- G Vanitha, M Kasthuri, A robust feature selection approach for high-dimensional medical data classification using enhanced correlation attribute evaluation , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
<< < 15 16 17 18 19 20 21 22 23 24 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper

