Trust aware clustering approach for the detection of malicious nodes in the WSN
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl.21Keywords:
Wireless sensor networks, Clustering approach, Low-energy adaptive clustering hierarchy, Malicious node detection.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Wireless sensor networks (WSNs) are pivotal in a range of applications such as environmental monitoring, healthcare, and defense. However, their decentralized and resource-constrained nature makes them vulnerable to various security threats, particularly from malicious nodes that can disrupt the network’s functionality. To address this issue, this paper proposes a novel trust aware clustering (LEACH) approach integrated with an optimization-based technique for the detection of malicious nodes in WSNs. The proposed model leverages the low-energy adaptive clustering hierarchy (LEACH) protocol for efficient clustering and energy management while incorporating a trust-based mechanism to evaluate the behavior of nodes. Additionally, an optimization algorithm is employed to enhance the accuracy of malicious node detection and improve the overall network performance. The trust model dynamically updates based on node interactions, ensuring that compromised nodes are detected and isolated promptly. Simulation results demonstrate the efficacy of the proposed approach in terms of increased detection accuracy, reduced energy consumption, and prolonged network lifetime, making it a robust solution for securing WSNs against malicious attacks.Abstract
How to Cite
Downloads
Similar Articles
- Allin Joe D, Thiyagarajan Krishnan, A modified sierpinski carpet antenna structure for multiband wireless applications , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- M. Jayakandan, A. Chandrabose, An ensemble-based approach for sentiment analysis of covid-19 Twitter data using machine learning and deep learning techniques , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Manpreet Kaur, Shweta Mishra, A smart grid data privacy-preserving aggregation approach with authentication , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- D. Jayadurga, A. Chandrabose, Distribution of virtual machines with SVM-FFDM approach in cloud computing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Naveena Somasundaram, Vigneshkumar M, Sanjay R. Pawar, M. Amutha, Balu S, Priya V, AI-driven material design for tissue engineering a comprehensive approach integrating generative adversarial networks and high-throughput experimentation , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Shaik Abdulla P., Abdul Razak T., Retrieval-Based Inception V3-Net Algorithm and Invariant Data Classification using Enhanced Deep Belief Networks for Content-Based Image Retrieval , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Iftikhar A. Tayubi, Mayur D. Jakhete, Spoorthi B. Shetty, Ashish Verma, Mohit Tiwari, S. Kiruba, Sustainable healthcare AI-enhanced materials discovery and design for eco-friendly and biocompatible medical applications , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Rashmi Rani, ROLE OF NEUROTICISM AND EXTRAVERSION FACTORS OF PERSONALITY ON LIFE SATISFACTION IN MARRIED COUPLES , The Scientific Temper: Vol. 8 No. 1&2 (2017): The Scientific Temper
- Hashmat Ali, Nishant Soren, Rohit Kumar Ravi, Kunal Kumar, Anjali, Evaluation of Standard Changes in Free Energy During Complexation of p-chlorobenzoylthioacetophenone with Some Bivalent Transition Metals , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Pooja Soni, Vikramaditya Dave, Sujit Kumar, Hemani Paliwal, A comparative study of AI-driven techno-economic analysis for grid-tied solar PV-fuel cell hybrid power systems , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 2 3 4 5 6 7 8 9 10 11 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Enhanced malicious node identification in WSNs with directed acyclic graphs and RC4-based encryption , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper