International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |
| TITLE | An Energy-Efficient Trust-Based Framework for Malicious Node Detection in Wireless Sensor Networks |
|---|---|
| ABSTRACT | Wireless Sensor Networks (WSNs) are highly vulnerable to malicious node attacks due to their distributed architecture, wireless communication, and limited energy resources. Malicious nodes can disrupt packet transmission, reduce network reliability, and degrade overall communication performance. To address these challenges, this paper presents an energy-efficient trust-based framework for detecting malicious nodes in WSN. The proposed model evaluates sensor node behavior using dynamic trust computation based on packet forwarding behavior, residual energy, and communication reliability. Sensor nodes with trust values below a predefined threshold are identified as malicious and isolated from network communication. Simulation results demonstrate that the proposed trust-aware approach improves network performance and security compared to the non-trust model. Furthermore, the trust-based mechanism maintained better packet delivery performance and reduced the participation of malicious nodes during communication. The results confirm that integrating dynamic trust evaluation with energy-aware communication significantly enhances malicious node detection capability while maintaining efficient resource utilization in WSN environments. The proposed framework provides a reliable and scalable solution for secure wireless sensor network applications, including environmental monitoring, military surveillance, healthcare systems, and IoT-based smart infrastructure. |
| AUTHOR | CHANDER SHEKHAR, SUMIT DALAL, ROHINI SHARMA P.G. Student, Department of ECE, Sat Kabir Institute of Technology and Management, Ladrawan, Haryana, India Assistant Professor, Department of ECE, Sat Kabir Institute of Technology and Management, Ladrawan, Haryana, India Assistant Professor, Department of CS, GPGCW, Rohtak, Haryana, India |
| VOLUME | 184 |
| DOI | DOI: 10.15680/IJIRCCE.2026.1405057 |
| pdf/57_An Energy-Efficient Trust-Based Framework for Malicious Node Detection in Wireless Sensor Networks.pdf | |
| KEYWORDS | |
| References | [1] Zawaideh, F. and Salamah, M., 2019. An efficient weighted trust‐based malicious node detection scheme for wireless sensor networks. International Journal of Communication Systems, 32(3), p.e3878. [2] Wang, C., Liu, G. and Jiang, T., 2024. Malicious node detection in wireless weak-link sensor networks using dynamic trust management. IEEE Transactions on Mobile Computing, 23(12), pp.12866-12877. [3] Ram Prabha, V. and Latha, P., 2017. Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wireless Personal Communications, 94(4), pp.2549-2559. [4] Bao, F., Chen, R., Chang, M. and Cho, J.H., 2011, June. Trust-based intrusion detection in wireless sensor networks. In 2011 IEEE international conference on communications (ICC) (pp. 1-6). IEEE. [5] Gangwani, P., Perez-Pons, A. and Upadhyay, H., 2024. Evaluating trust management frameworks for wireless sensor networks. Sensors, 24(9), p.2852. [6] Geetha, V. and Chandrasekaran, K., 2014. A distributed trust based secure communication framework for wireless sensor network. Wireless Sensor Network, 6(9), p.173. [7] Gupta, S., Arora, M., Sharma, R. (2025). Achieving full coverage in wireless sensor networks through optimization techniques, Journal of Engineering, Mechanics and Modern Architecture, 4(6), pp. 47-54. [8] Malik, S., Arora, M., Sharma, R. (2025). Comprehensive Guide to Different Types of Attacks on Email Systems, Information Horizons: AMERICAN Journal of Library And Information Science Innovation, 2(6). [9] Gupta, S. and Arora, M., 2025. Balancing Coverage and Clustering in Mobile WSNs: An Optimization-Based Approach. International Journal of Computer Technology and Electronics Communication, 8(1), pp.10062-10068. [10] Pinki, Dalal, S., Sharma, R., Sumiran, Communication Protocols for Wireless Sensor Networks (WSNs): A Comprehensive Review, International Journal of Research Publication and Reviews, 5(4), pp. 3929-3933. [11] R. S., Gopal Sharma, Sumit Dalal, “Sleep-Awake and ACO based Resource Saving Protocol for WSN,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 11, no. 6, pp. 8456–8462, 2023. [12] She, W., Liu, Q., Tian, Z., Chen, J.S., Wang, B. and Liu, W., 2019. Blockchain trust model for malicious node detection in wireless sensor networks. Ieee Access, 7, pp.38947-38956. [13] Zhang, W., Das, S.K. and Liu, Y., 2006, September. A trust based framework for secure data aggregation in wireless sensor networks. In 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks (Vol. 1, pp. 60-69). IEEE. [14] Zhang, B., Huang, Z. and Xiang, Y., 2014. A novel multiple-level trust management framework for wireless sensor networks. Computer Networks, 72, pp.45-61. [15] Saidi, A., 2024. An adaptive trust system for misbehavior detection in wireless sensor networks. Wireless Networks, 30(4), pp.2589-2615. |