Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.40Keywords:
Wireless sensor network, Malicious node, Clustering approach, Efficient routing protocol.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Wireless sensor networks (WSNs) are widely used in various fields such as environmental monitoring, healthcare, military applications, and smart cities. However, due to their decentralized nature, limited resources, and deployment in often hostile environments, WSNs are vulnerable to several security threats, especially malicious node attacks. Malicious nodes can disrupt network operations by dropping packets, injecting false data, or launching attacks such as sinkholes, wormholes, and Sybil attacks. To counter these threats, numerous malicious node detection methods have been proposed, ranging from trust-based models to anomaly detection techniques and clustering-based approaches. In parallel, the design of efficient routing protocols plays a critical role in ensuring energy-efficient and secure data transmission within the network. This review paper presents a comprehensive analysis of existing techniques for malicious node detection and efficient routing in WSNsAbstract
How to Cite
Downloads
Similar Articles
- Manikannan Palanivel, Alaudeen A, Pandiyan K. S, Sivaprakasam P, Hybrid fuzzy and fire fly algorithm-based MPPT controller for PV system using super lift boost converter , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Teklu Hailu, Regasa Begna , Pre-extension demonstration of inter-cropping of improved forages with food and cash crops at Semen Bench Woreda, Southwest Ethiopia , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- T. Kanimozhi, V. Rajeswari, R. Suguna, J. Nirmaladevi, P. Prema, B. Janani, R. Gomathi, RWHO: A hybrid of CNN architecture and optimization algorithm to predict basal cell carcinoma skin cancer in dermoscopic images , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Sangeeta ., Jitander S. Sikka, Meenal Malik, Static deformation of a two-phase medium consisting of a rigid boundary elastic layer and an isotropic elastic half-space induced by a very long tensile fault , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Shahala Sheikh, Lalsingh Khalsa, Nitin Chandel, Vinod Varghese, Hygrothermoelastic large deflection behaviour in a thin circular plate with non-Fourier and non-Fick law , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Pooja Soni, Vikramaditya Dave, Sujit Kumar, Hemani Paliwal, A comparative study of AI-driven techno-economic analysis for grid-tied solar PV-fuel cell hybrid power systems , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- S Prabhakaran, Yugeshkrishnan M, Santhiya M, Danush Kumar S M, Smart Dustbin using IOT , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Sujay Bhalchandra, Nilesh D. Shinde, An exploratory study of factors influencing manufacturer-dealer relationship in Indian automobile industry , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Swetha Rajkumar, Jayaprasanth Devakumar, LSTM based data driven fault detection and isolation in small modular reactors , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- D. Padma Prabha, C. Victoria Priscilla, A combined framework based on LSTM autoencoder and XGBoost with adaptive threshold classification for credit card fraud detection , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 9 10 11 12 13 14 15 16 17 18 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Advancements in image quality assessment: a comparative study of image processing and deep learning techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Improving image quality assessment with enhanced denoising autoencoders and optimization methods , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper