Trust aware clustering approach for the detection of malicious nodes in the WSN
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.21Keywords:
Wireless sensor networks, Clustering approach, Low-energy adaptive clustering hierarchy, Malicious node detection.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Wireless sensor networks (WSNs) are pivotal in a range of applications such as environmental monitoring, healthcare, and defense. However, their decentralized and resource-constrained nature makes them vulnerable to various security threats, particularly from malicious nodes that can disrupt the network’s functionality. To address this issue, this paper proposes a novel trust aware clustering (LEACH) approach integrated with an optimization-based technique for the detection of malicious nodes in WSNs. The proposed model leverages the low-energy adaptive clustering hierarchy (LEACH) protocol for efficient clustering and energy management while incorporating a trust-based mechanism to evaluate the behavior of nodes. Additionally, an optimization algorithm is employed to enhance the accuracy of malicious node detection and improve the overall network performance. The trust model dynamically updates based on node interactions, ensuring that compromised nodes are detected and isolated promptly. Simulation results demonstrate the efficacy of the proposed approach in terms of increased detection accuracy, reduced energy consumption, and prolonged network lifetime, making it a robust solution for securing WSNs against malicious attacks.Abstract
How to Cite
Downloads
Similar Articles
- B.P. Singh, Manju Yadav, Afforestation and Economic Upgradation of Wastelands Reclamation in Ganga-Yamuna Doab , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- Vijay Kumar, Priya Thapliyal, Rajesh Rayal, Baljeet Singh Saharan, Arun Kumar, Shweta Sahni, The Molecular Profiling and HCV RNA Quantification to Study the Distribution of Different HCV Genotypes in Accordance to Geographical Condition , The Scientific Temper: Vol. 12 No. 1&2 (2021): The Scientific Temper
- R. P. Singh, R. Chandra, Bikramaditya ., Efficacy of Phosphorus and PSB Response in Different Varieties of Summer Moongbean and Its Residual Effect on Fodder Sorghum in Western Uttar Pradesh , The Scientific Temper: Vol. 11 No. 1&2 (2020): The Scientific Temper
- Preeti Gupta, Shalie Malik, Photoperiodic Supervision and Adaptability in Avian System , The Scientific Temper: Vol. 11 No. 1&2 (2020): The Scientific Temper
- Aditi Sharma, Atal Bihari Bajpai, Naina Srivastava, Yunus Ali, Anjali Thapa, Naveen Gaurav, Arun Kumar, Effect of Growth Regulators and in vitro Clonal Propagation of Adhatoda vasica , The Scientific Temper: Vol. 13 No. 01 (2022): The Scientific Temper
- Engida Admassu, Classifying enset based on their disease tolerance using deep learning , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- Sindhu S, L. Arockiam, DRMF: Optimizing machine learning accuracy in IoT crop recommendation with domain rules and MissForest imputation , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Indraji C, Dominic J, Access of web OPAC through library automation in university libraries in Tamil Nadu: A study , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Krishna P. Kalyanathaya, Krishna Prasad K, A framework for generating explanations of machine learning models in Fintech industry , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Tewoderos Legesse, Bekelech Sharew, Evaluation of white seeded sesame (Sesamum indicium L.) genotypes on growth and yield performance in Menit Goldya Woreda of West Omo Zone, SWE , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 20 21 22 23 24 25 26 27 28 29 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper