Trust aware clustering approach for the detection of malicious nodes in the WSN
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.21Keywords:
Wireless sensor networks, Clustering approach, Low-energy adaptive clustering hierarchy, Malicious node detection.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Wireless sensor networks (WSNs) are pivotal in a range of applications such as environmental monitoring, healthcare, and defense. However, their decentralized and resource-constrained nature makes them vulnerable to various security threats, particularly from malicious nodes that can disrupt the network’s functionality. To address this issue, this paper proposes a novel trust aware clustering (LEACH) approach integrated with an optimization-based technique for the detection of malicious nodes in WSNs. The proposed model leverages the low-energy adaptive clustering hierarchy (LEACH) protocol for efficient clustering and energy management while incorporating a trust-based mechanism to evaluate the behavior of nodes. Additionally, an optimization algorithm is employed to enhance the accuracy of malicious node detection and improve the overall network performance. The trust model dynamically updates based on node interactions, ensuring that compromised nodes are detected and isolated promptly. Simulation results demonstrate the efficacy of the proposed approach in terms of increased detection accuracy, reduced energy consumption, and prolonged network lifetime, making it a robust solution for securing WSNs against malicious attacks.Abstract
How to Cite
Downloads
Similar Articles
- Amol Garge, Monika Tripathi, Navigating the virtual frontier: Best practices for ERP implementation in the digital age , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Sohini Bhattacharyya, Ajay Kumar Harit, Manoj Singh, Urvashi Sharma, Chaitramayee Pradhan, Occurrence of Antibiotic Resistance in Lotic Ecosystems , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Chetna Dhull, Asha ., Impact of crop insurance and crop loans on agricultural growth in Haryana: A factor analysis approach , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Ankush Wadhwa, Sanjay Nandal, Development of an Index in Social Science: A Systematic Literature Review , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Swetha Rajkumar, Jayaprasanth Devakumar, LSTM based data driven fault detection and isolation in small modular reactors , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Shivani Goel, Rashmi Ashtt, Monali Wankar, Analyzing the impact of crime on quality of life in Old Delhi: A quantitative approach , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Modenisha U, Ritha. W, Fueling Sustainability: A Cost-Benefit Analysis of RDF and Sewage Sludge as Alternative Fuels in Cement Production , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Surender Singh, Deep Lal, Rachna Thakur, Suchitra Devi, Socio-economic Compulsions on Climate Change and Energy Security of India , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- M. Rajalakshmi, V. Sulochana, Enhancing deep learning model performance in air quality classification through probabilistic hyperparameter tuning with tree-structured Parzen estimators , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Mohamed Azharudheen A, Vijayalakshmi V, Improvement of data analysis and protection using novel privacy-preserving methods for big data application , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 17 18 19 20 21 22 23 24 25 26 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper

