Trust aware clustering approach for the detection of malicious nodes in the WSN
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.21Keywords:
Wireless sensor networks, Clustering approach, Low-energy adaptive clustering hierarchy, Malicious node detection.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Wireless sensor networks (WSNs) are pivotal in a range of applications such as environmental monitoring, healthcare, and defense. However, their decentralized and resource-constrained nature makes them vulnerable to various security threats, particularly from malicious nodes that can disrupt the network’s functionality. To address this issue, this paper proposes a novel trust aware clustering (LEACH) approach integrated with an optimization-based technique for the detection of malicious nodes in WSNs. The proposed model leverages the low-energy adaptive clustering hierarchy (LEACH) protocol for efficient clustering and energy management while incorporating a trust-based mechanism to evaluate the behavior of nodes. Additionally, an optimization algorithm is employed to enhance the accuracy of malicious node detection and improve the overall network performance. The trust model dynamically updates based on node interactions, ensuring that compromised nodes are detected and isolated promptly. Simulation results demonstrate the efficacy of the proposed approach in terms of increased detection accuracy, reduced energy consumption, and prolonged network lifetime, making it a robust solution for securing WSNs against malicious attacks.Abstract
How to Cite
Downloads
Similar Articles
- Mohanapriya Jayapal, Hema Jagadeesan, Plant-microbe-dye interaction during rhizoremediation , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- A. Sandanasamy, P. Joseph Charles, Distributed SDN control for IoT networks: A federated meta reinforcement learning solution for load balancing , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Manan Pathak, Dishang Trivedi Trivedi, Field-effect limits and design parameters for hybrid HVDC – HVAC transmission line corridors , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- V. Seethala Devi, N. Vanjulavalli, K. Sujith, R. Surendiran, A metaheuristic optimisation algorithm-based optimal feature subset strategy that enhances the machine learning algorithm’s classifier performance , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- Amanda Quist Okronipa, Lucy Ewuresi Eghan, A theoretical investigation of students’ adoption of artificial intelligence chatbots using social cognitive theory and uses and gratification theory , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- Sowmiya M, Banu Rekha B, Malar E, Ensemble classifiers with hybrid feature selection approach for diagnosis of coronary artery disease , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- P. Rajkumar, B. Vijay Bhaskar, Assessing the impact of indoor air pollution on respiratory health: A survey of home residents in rural area , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Dimpal Khambhati, Chirag Patel, Analyzing cardiac physiology: ECG ensemble averaging and morphological features under treadmill-induced stress in LabVIEW , The Scientific Temper: Vol. 16 No. 07 (2025): The Scientific Temper
- Merla Agnes Mary, Britto Ramesh Kumar, Hybrid GAN with KNN - SMOTE Approach for Class-Imbalance in Non-Invasive Fetal ECG Monitoring , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
<< < 9 10 11 12 13 14 15 16 17 18 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper

