Return to Article Details Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks Download Download PDF