Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks

Published

16-10-2024

DOI:

https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.32

Keywords:

Wireless sensor network, Malicious node, Clustering approach, Optimization algorithm, Cluster formation, Packet delivery ratio.

Dimensions Badge

Authors

  • A. Rukmani PG and Research Department of Computer Science, Government Arts College (Autonomous) (Affiliated to Bharathidasan University, Tiruchirappalli – 24), Karur, Tamil Nadu, India
  • C. Jayanthi PG and Research Department of Computer Science, Government Arts College (Autonomous) (Affiliated to Bharathidasan University, Tiruchirappalli – 24), Karur, Tamil Nadu, India, E-Mail: eswarruby@gmail.com

Abstract

Wireless sensor networks (WSNs) are pivotal in various applications, ranging from environmental monitoring to military operations. However, their susceptibility to security threats, particularly from malicious nodes, poses significant challenges to network integrity and data reliability. This paper proposes an innovative methodology that integrates clustering with an optimization approach to effectively identify and mitigate malicious nodes in WSNs. In the proposed methodology, the network is divided into clusters, each managed by a cluster head responsible for monitoring the behavior of nodes within its cluster. Trust values are assigned to nodes based on parameters such as data forwarding accuracy, communication consistency, and energy consumption. These trust metrics are optimized using a sophisticated optimization algorithm, which fine-tunes the decision-making process for identifying malicious nodes. By leveraging clustering, the method efficiently distributes computational tasks, while the optimization algorithm enhances the accuracy of malicious node detection by dynamically adjusting trust thresholds. The approach not only reduces the incidence of false positives but also extends the network lifetime by preventing compromised nodes from disrupting network operations. This trust-aware, optimized clustering strategy offers a robust solution for securing WSNs in critical applications, ensuring reliable and secure data transmission across the network.

How to Cite

A. Rukmani, & C. Jayanthi. (2024). Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks. The Scientific Temper, 15(spl-1), 275–282. https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.32

Downloads

Download data is not yet available.