Trust aware clustering approach for the detection of malicious nodes in the WSN
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.21Keywords:
Wireless sensor networks, Clustering approach, Low-energy adaptive clustering hierarchy, Malicious node detection.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Wireless sensor networks (WSNs) are pivotal in a range of applications such as environmental monitoring, healthcare, and defense. However, their decentralized and resource-constrained nature makes them vulnerable to various security threats, particularly from malicious nodes that can disrupt the network’s functionality. To address this issue, this paper proposes a novel trust aware clustering (LEACH) approach integrated with an optimization-based technique for the detection of malicious nodes in WSNs. The proposed model leverages the low-energy adaptive clustering hierarchy (LEACH) protocol for efficient clustering and energy management while incorporating a trust-based mechanism to evaluate the behavior of nodes. Additionally, an optimization algorithm is employed to enhance the accuracy of malicious node detection and improve the overall network performance. The trust model dynamically updates based on node interactions, ensuring that compromised nodes are detected and isolated promptly. Simulation results demonstrate the efficacy of the proposed approach in terms of increased detection accuracy, reduced energy consumption, and prolonged network lifetime, making it a robust solution for securing WSNs against malicious attacks.Abstract
How to Cite
Downloads
Similar Articles
- Prakash Lakhani, Premasish Roy, Souren Koner, Deepa Nair, D. Patil, Mona Sinha, Exploring the influence of work-life balance on employee engagement in Mumbai’s real estate industry , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Aditi Malik, Rishi Chaudhry, Mohit, Urvashi Suryavanshi, Mapping the landscape of political advertising research: A comprehensive bibliometric analysis , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Brigith Gladys L, J. Merline Vinotha, Sustainable rough multi-objective two-stage solid transportation problem of third-party e-commerce logistic providers with conditional fixed parameter on safety , The Scientific Temper: Vol. 16 No. 01 (2025): The Scientific Temper
- Hariini Chandramohan, Sethu Gunasekaran, Comparative analysis on the photocatalytic activity of titania and silica nanoparticles using dye discoloration and contact angle test , The Scientific Temper: Vol. 16 No. 01 (2025): The Scientific Temper
- Mithun Vinayaka Kulkarni, Vijayanand M, Syed Mudassir, Said Bakhit Ali Bakhit Tabook, Mohammed Hassan Abdullah Al-Hafeedh, An overview of wastepaper and carton recycling in Oman , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Nalini. S, Ritha. W, Sasitharan Nagapan, Optimal Inventory Policies for Perishable Products Under Demand and Lead Time Uncertainty , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Syed Amin Jameel, Abdul Rahim Mohamed Shanavas, Deep-Ultranet: Diabetic Retinopathy Grading System Using Ultra-Widefield Retinal Images , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- Maya Kumari, Vikas Y Patade, Z Ahmad, TRANSGENIC APPROACH TOWARDS DEVELOPMENT OF COLD STRESS TOLERANT VEGETABLES FOR HIGH ALTITUDE AREAS , The Scientific Temper: Vol. 1 No. 01 (2010): The Scientific Temper
- Nivethra Selvaraj , Dr. R. Prathiba Devi, Eco-friendly natural dyes and their application on printing graphics , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Amita Pal, Richa Trivedi, Amit Jain, Sudhir Jain, Diurnal and seasonal variation of GPS-TEC during a low solar activity period at EIA region (Bhopal) , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 38 39 40 41 42 43 44 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper

