Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.22Keywords:
Wireless sensor networks, Encryption technique, RC4, Directed acyclic graphs, Malicious node.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
In wireless sensor networks (WSNs), ensuring secure data transmission while preventing malicious activity is a critical challenge. This paper presents a novel approach for the identification of malicious nodes in WSNs by integrating directed acyclic graphs (DAGs) with the RC4 encryption algorithm. DAGs are employed to establish a hierarchical structure that enables efficient data flow and tracking of communication patterns across the network. By utilizing DAGs, the system can monitor the consistency and integrity of data transmission, making it easier to detect anomalies caused by malicious nodes. The RC4 encryption algorithm further strengthens the approach by securing the communication between nodes, preventing unauthorized access and tampering. In combination, DAGs and RC4 provide a robust framework for both detecting malicious nodes and securing data exchanges. Experimental simulations demonstrate that the proposed approach enhances network security by identifying compromised nodes with high accuracy while maintaining efficient communication and low overhead. This method offers a scalable and secure solution for protecting WSNs from malicious threats.Abstract
How to Cite
Downloads
Similar Articles
- Yasodha V, V. Sinthu Janita, AI-driven IoT routing: A hybrid deep reinforcement learning and shrike optimization framework for energy-efficient communication , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Manpreet Kaur, Shweta Mishra, A smart grid data privacy-preserving aggregation approach with authentication , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Vishakha Khambhati, Rajan Kumar Singh, Assessment of Respiratory Dynamics from ECG during Physical Exertion , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Vinay Viratia, Sandeep Kumar, Shama Praveen, Tarang Shrivastava, Priyanka, Enhancing Trunk Control Balance in Children with Spastic Diplegic Cerebral Palsy: Comparative Effectiveness of the Vestibular Stimulation Technique and Standard Treatment , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Nida Syeda, Kishore Selva Babu, Exploring the role of digital humanities in the centralization of knowledge production: Clusters, networks, or echo chambers , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Krupali Bhatt, Tushharkumar Bhatt, Certain findings on the gamma graph of some graphs , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Ayesha Shakith, L. Arockiam, EMSMOTE: Ensemble multiclass synthetic minority oversampling technique to improve accuracy of multilingual sentiment analysis on imbalance data , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Balaji V, Purnendu Bikash Acharjee, Muniyandy Elangovan, Gauri Kalnoor, Ravi Rastogi, Vishnu Patidar, Developing a semantic framework for categorizing IoT agriculture sensor data: A machine learning and web semantics approach , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- T. Ramyaveni, V. Maniraj, Hyperparameter tuning of diabetes prediction using machine learning algorithm with pelican optimization algorithm , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper

