Visible to the public Detection of Falsified Selfish Node with Optimized Trust Computation Model In Chimp -AODV Based WSN

TitleDetection of Falsified Selfish Node with Optimized Trust Computation Model In Chimp -AODV Based WSN
Publication TypeConference Paper
Year of Publication2022
AuthorsManjula, P., Baghavathi Priya, S.
Conference Name2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC)
KeywordsAdaptation models, AODV, COA, COA-EASRP, Collaboration, Computational modeling, energy measurement, false trust, policy-based governance, pubcrawl, resilience, Resiliency, Routing, Routing protocols, Scalability, security, TCM, Wireless sensor networks, WSN
AbstractIn Wireless Sensor Networks (WSNs), energy and security are two critical concerns that must be addressed. Because of the scarcity of energy, several security measures are restricted. For secure data routing in WSN, it becomes vital to identify insider packet drop attacks. The trust mechanism is an effective strategy for detecting this assault. Each node in this system validates the trustworthiness of its neighbors before transmitting packets, ensuring that only trust-worthy nodes get packets. With such a trust-aware scheme, however, there is a risk of false alarm. This work develops an adaptive trust computation model (TCM)which is implemented in our already proposed Chimp Optimization Algorithm-based Energy-Aware Secure Routing Protocol (COA-EASRP) for WSN. The proposed technique computes the optimal path using the hybrid combination of COA-EASRP and AODV as well as TCM is used to indicate false alarms in detecting selfish nodes. Our Proposed approach provides the series of Simulation outputs carried out based on various parameters
DOI10.1109/ICESIC53714.2022.9783507
Citation Keymanjula_detection_2022