Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.22Keywords:
Wireless sensor networks, Encryption technique, RC4, Directed acyclic graphs, Malicious node.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In wireless sensor networks (WSNs), ensuring secure data transmission while preventing malicious activity is a critical challenge. This paper presents a novel approach for the identification of malicious nodes in WSNs by integrating directed acyclic graphs (DAGs) with the RC4 encryption algorithm. DAGs are employed to establish a hierarchical structure that enables efficient data flow and tracking of communication patterns across the network. By utilizing DAGs, the system can monitor the consistency and integrity of data transmission, making it easier to detect anomalies caused by malicious nodes. The RC4 encryption algorithm further strengthens the approach by securing the communication between nodes, preventing unauthorized access and tampering. In combination, DAGs and RC4 provide a robust framework for both detecting malicious nodes and securing data exchanges. Experimental simulations demonstrate that the proposed approach enhances network security by identifying compromised nodes with high accuracy while maintaining efficient communication and low overhead. This method offers a scalable and secure solution for protecting WSNs from malicious threats.Abstract
How to Cite
Downloads
Similar Articles
- Shivali Kundan, Neha Verma, Zahid Nabi, Dinesh Kumar, Satellite radiance assimilation using the 3D-var technique for the heavy rainfall over the Indian region , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Shubharani Muragod, Sangeeta Kharde, Premenstrual syndrome among adolescent girls and its influence on academic performance- A cross-sectional study , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Archana Verma, Application of metaverse technologies and artificial intelligence in smart cities , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Anurag Tripathi, Distribution pattern of acetylcholinesterase in the Diencephalic nuclei of Hemidactylus flaviviridis , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Neha Saini, Rashmi Verma, Rabia Basri Aziz, Ashmita Bhatt, Hem Chandra Pant, Naveen Gaurav, Effect of Growth Regulators on Direct Clonal Propagation and Analysis of Total Phenolic Content of Wild and Propagated Mucuna pruriens , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- K. Vani, S. Sujatha, Fault tolerance systems in open source cloud computing environments–A systematic review , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Shahala Sheikh, Lalsingh Khalsa, Nitin Chandel, Vinod Varghese, Hygrothermoelastic large deflection behaviour in a thin circular plate with non-Fourier and non-Fick law , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- V Babydeepa, K. Sindhu, A hybrid feature selection and generative adversarial network for lung and uterus cancer prediction with big data , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Pavithra M, Dr. R. Neelaveni, Muthuraman K. R , Kamalesh G, Design of an interactive smart band for intellectually disabled person , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Lakshmi Priya, Anil Vasoya, C. Boopathi, Muthukumar Marappan, Evaluating dynamics, security, and performance metrics for smart manufacturing , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
<< < 18 19 20 21 22 23 24 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper

