[HTML][HTML] Performance analysis of malicious node detection and elimination using clustering approach on MANET

S Gopalakrishnan - Circuits and Systems, 2016 - scirp.org
… a technique in cluster based intrusion detection system which eliminates the malicious nodes.
… Each node within the cluster gets the cluster key from the cluster head and this key is used …

Malicious node detection in vehicular ad-hoc network (vanet) using enhanced beacon trust management with clustering protocol (ebtm-cp)

C Gupta, L Singh, R Tiwari - Wireless Personal Communications, 2023 - Springer
… Beacon Trust Management with Clustering Protocol (EBTM-CP) for the efficient selection of
cluster heads and malicious node detection. The implementation of this protocol will deliver …

[PDF][PDF] A comparative analysis of clustering protocols of wireless sensor network

H Mohapatra, AK Rath, PB Landge, D Bhise… - International journal of …, 2020 - academia.edu
… The paper [8] proposed faulty node detection (FIND) technique to identify nodes with …
clustering protocols based on few selected criteria such as heterogeneity and its level, clustering

Comparison of clustering algorithms and protocols for wireless sensor networks

N Nasser, C Arboleda, M Liliana - 2006 Canadian conference …, 2006 - ieeexplore.ieee.org
… In some way, the CH is the sink for the cluster nodes, and the BS is the sink for the cluster
by the occurrence of certain events (ie the detection of a big change in the monitored attributes)…

Adaptive security design with malicious node detection in cluster-based sensor networks

MY Hsieh, YM Huang, HC Chao - Computer Communications, 2007 - Elsevier
protocols from ordinary sensor nodes to the BS via cluster heads. The three modules are
the cluster round module, the primary security module, and the intrusion detection module. …

A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks

L Yang, Y Lu, SX Yang, T Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… on other nodes has higher probability to be the cluster head. … 5) We present a fuzzy-based
clustering protocol by … our secure clustering protocol in terms of number of malicious clusters, …

ICP: Instantaneous clustering protocol for wireless sensor networks

L Kong, Q Xiang, X Liu, XY Liu, X Gao, G Chen… - Computer …, 2016 - Elsevier
clustering problem considering both time- and energy-efficiency. We propose a novel
instantaneous clustering protocol (ICP) that groups sensor nodesnode is detected, the clustering

Data similarity aware dynamic node clustering in wireless sensor networks

F Gielow, G Jakllari, M Nogueira, A Santos - Ad Hoc Networks, 2015 - Elsevier
… , supporting their dynamic maintenance and internal routing, thereby enabling an easy
detection of nodes which should be clustered together. DDFC acts between the link and network …

A access-based clustering protocol for multihop wireless ad hoc networks

TC Hou, TJ Tsai - IEEE journal on selected areas in …, 2001 - ieeexplore.ieee.org
… Alternatively, since the RTS collision can only be detected at the receiving nodes where the
… these receiving nodes to send back negative ACKs (NACK) if they detect collisions. The …

[PDF][PDF] Clustering protocols in wireless sensor networks: A survey

N Jain, P Sinha, SK Gupta - International Journal of Applied …, 2013 - academia.edu
clustering protocol LEACH for wireless sensor networks. In this sensors are organized into
clusters and randomly select a few nodes as cluster … , such as detection of periodical data from …