Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.32Keywords:
Wireless sensor network, Malicious node, Clustering approach, Optimization algorithm, Cluster formation, Packet delivery ratio.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Wireless sensor networks (WSNs) are pivotal in various applications, ranging from environmental monitoring to military operations. However, their susceptibility to security threats, particularly from malicious nodes, poses significant challenges to network integrity and data reliability. This paper proposes an innovative methodology that integrates clustering with an optimization approach to effectively identify and mitigate malicious nodes in WSNs. In the proposed methodology, the network is divided into clusters, each managed by a cluster head responsible for monitoring the behavior of nodes within its cluster. Trust values are assigned to nodes based on parameters such as data forwarding accuracy, communication consistency, and energy consumption. These trust metrics are optimized using a sophisticated optimization algorithm, which fine-tunes the decision-making process for identifying malicious nodes. By leveraging clustering, the method efficiently distributes computational tasks, while the optimization algorithm enhances the accuracy of malicious node detection by dynamically adjusting trust thresholds. The approach not only reduces the incidence of false positives but also extends the network lifetime by preventing compromised nodes from disrupting network operations. This trust-aware, optimized clustering strategy offers a robust solution for securing WSNs in critical applications, ensuring reliable and secure data transmission across the network.Abstract
How to Cite
Downloads
Similar Articles
- Raghavan Santhanam, P Venugopal, Sreoshi Dasgupta, R. S. Kumar, Saravanan M.P, Ravindra A. Kayande, Analysis of organizational culture and e-commerce adoption in the context of top management perspectives , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Dileep Pulugu, Shaik K. Ahamed, Senthil Vadivu, Nisarg Gandhewar, U D Prasan, S. Koteswari, Empowering healthcare with NLP-driven deep learning unveiling biomedical materials through text mining , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Ayesha Shakith, L. Arockiam, EMSMOTE: Ensemble multiclass synthetic minority oversampling technique to improve accuracy of multilingual sentiment analysis on imbalance data , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- U. Johns Praveena, J. Merline Vinotha, A New Approach for Solving Bilevel Fractional/quadratic Green Transportation Problem by Implementing AI with Multi Choice Parameters Under Uncertainty , The Scientific Temper: Vol. 16 No. 11 (2025): The Scientific Temper
- Abu Regasa, Habtamu Rufe, Synergistic Amelioration of Acidic Soils: A Review of Integrated Lime, Organic, and Inorganic Fertilizer Strategies , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Rustam Gulomov, Khilolakhon Rakhimova, Avazbek Batoshov, Doniyor Komilov, Bioclimatic modeling of the species Phlomoides canescens (Lamiaceae) , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Ayesha Shakith, L. Arockiam, Enhancing classification accuracy on code-mixed and imbalanced data using an adaptive deep autoencoder and XGBoost , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Raja S, Nagarajan L., Hybridization of bio-inspired algorithms with machine learning models for predicting the risk of type 2 diabetes mellitus , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Amanda Quist Okronipa, Lucy Ewuresi Eghan, A theoretical investigation of students’ adoption of artificial intelligence chatbots using social cognitive theory and uses and gratification theory , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Namita Singh, Suruchi Modi, Incorporating Climate-Responsive Vernacular Strategies and Modern Architectural Design: Sustainable Housing Model in North India , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
<< < 29 30 31 32 33 34 35 36 37 38 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Advancements in image quality assessment: a comparative study of image processing and deep learning techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- V. Karthikeyan, C. Jayanthi, Improving image quality assessment with enhanced denoising autoencoders and optimization methods , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper

