Autonomous detection of malevolent nodes using secure heterogeneous cluster protocol

C Kotteeswaran, I Patra, R Nagaraju… - Computers and …, 2022 - Elsevier
Surfing of internet by the users has been more vital from the inception of the network.
However, the number of users using the internet is increasing gradually. As a result, it has …

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

V Gomathy, N Padhy, D Samanta, M Sivaram… - Journal of Ambient …, 2020 - Springer
In wireless, every device can moves anywhere without any infrastructure also the
information can be maintained constantly for routing the traffic. The open issues of wireless …

[PDF][PDF] A Trusted Node Feedback Based Clustering Model For Detection Of Malicious Nodes In The Network

DR SIMHADRI MADHURI - Journal of Theoretical and Applied Information …, 2023 - jatit.org
The study of malicious nodes is an interesting one, but it has had a negative impact on
network performance characteristics. A degraded network response time may be caused by …

An efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks

A Aranganathan, CD Suriyakala - Journal of Ambient Intelligence and …, 2019 - Springer
Mobile ad-hoc networks are a type of self-configuring networks in which the node moves
from one location to another without any fixed infrastructure. Providing security in mobile ad …

Malicious cluster head detection mechanism in wireless sensor networks

A Ismail, R Amin - Wireless Personal Communications, 2019 - Springer
In wireless ad hoc network, all nodes participate for the transmission of data within the
network and responsible for designing network topology. Suspicious and malicious activities …

CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities

AK Sangaiah, A Javadpour, F Ja'fari, P Pinto… - Microprocessors and …, 2022 - Elsevier
This research aims to represent a novel approach to detect malicious nodes in Ad-hoc On-
demand Distance Vector (AODV) within the next-generation smart cities. Smart city …

A novel wireless sensor networks malicious node detection method

H Yang, X Zhang, F Cheng - Security and Privacy in New Computing …, 2019 - Springer
This paper proposed a malicious node detection model based on reputation with enhanced
low energy adaptive clustering hierarchy (Enhanced LEACH) routing protocol (MNDREL) …

Performance analysis of energy efficient cluster based heterogeneous wireless sensor network against malicious attack

M Lakshmi, CR Prashanth - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
In a distributed Wireless communication technology, sensor networks have been proposed
for use in many applications such as environmental monitoring and surveillance. Due to the …

A novel algorithm for improving malicious node detection effect in wireless sensor networks

H Yang, X Zhang, F Cheng - Mobile Networks and Applications, 2021 - Springer
As an important medium of information transmitting, Wireless Sensor Networks (WSN) is at
risk of a series of malicious nodes. In view of the inefficiency of the existing malicious node …

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score

J Zhang - Journal of Cyber Security and Mobility, 2023 - journals.riverpublishers.com
Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the
external physical environment to obtain data information, and use wireless communication …