Trust aware clustering approach for the detection of malicious nodes in the WSN
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.21Keywords:
Wireless sensor networks, Clustering approach, Low-energy adaptive clustering hierarchy, Malicious node detection.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Wireless sensor networks (WSNs) are pivotal in a range of applications such as environmental monitoring, healthcare, and defense. However, their decentralized and resource-constrained nature makes them vulnerable to various security threats, particularly from malicious nodes that can disrupt the network’s functionality. To address this issue, this paper proposes a novel trust aware clustering (LEACH) approach integrated with an optimization-based technique for the detection of malicious nodes in WSNs. The proposed model leverages the low-energy adaptive clustering hierarchy (LEACH) protocol for efficient clustering and energy management while incorporating a trust-based mechanism to evaluate the behavior of nodes. Additionally, an optimization algorithm is employed to enhance the accuracy of malicious node detection and improve the overall network performance. The trust model dynamically updates based on node interactions, ensuring that compromised nodes are detected and isolated promptly. Simulation results demonstrate the efficacy of the proposed approach in terms of increased detection accuracy, reduced energy consumption, and prolonged network lifetime, making it a robust solution for securing WSNs against malicious attacks.Abstract
How to Cite
Downloads
Similar Articles
- Kanwar D Singh, Rashmi Ashtt, Barriers to last mile connectivity: The role of crime in metro station accessibility , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Bhavesh Parekh, Parthiv Patel, Unravelling Indianness in R.K. Narayan’s novels: A multidisciplinary exploration of culture, tradition and modernity , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- Jayaganesh Jagannathan, Dr. Agrawal Rajesh K, Dr. Neelam Labhade-Kumar, Ravi Rastogi, Manu Vasudevan Unni, K. K. Baseer, Developing interpretable models and techniques for explainable AI in decision-making , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Koyel Naskar, Urmi Satyan, Celebration and protest in art: a Comparative Study of Australia’s Corroboree and West Bengal’s Gambhira as Forms of Socio-Cultural Expression , The Scientific Temper: Vol. 15 No. spl-2 (2024): The Scientific Temper
- Priya Thapliyal, Pallavi Dheer, Satish Chandra Nautiyal, Rajesh Rayal, Rakesh Rai, Indra Rautela, Comparative Study of Fast Plaque Assay and Real Time PCR for Detection of Mycobacterium tuberculosis in Pulmonary Samples , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- Isreal zewide, Abde S. Hajigame, Wondwosen Wondimu, Kibinesh Adimasu, Response of Bread Wheat (Triticum aestivum L.) Varieties to Blended NPSB Fertilizer Levels in Sori Saylem District, South-West Ethiopia , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- A.P. Asha Sapna, C. Anbalagan, Towards a better living environment-compressive strength and water absorption testing of mini compressed stabilized earth blocks and fired bricks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Santosh T. Karmani, Sachin V. V. Acharekar, The impact of online degree programs on employment opportunities in contemporary India , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Arenlila Jamir, Sangeeta Kharde, Anita Dalal, Health-seeking behavior of first-time mothers toward pregnancy , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- P. Ananthi, A. Chandrabose, Exploring learning-assisted optimization for mobile crowd sensing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 20 21 22 23 24 25 26 27 28 29 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper

