Title | Detection of Falsified Selfish Node with Optimized Trust Computation Model In Chimp -AODV Based WSN |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Manjula, P., Baghavathi Priya, S. |
Conference Name | 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC) |
Keywords | Adaptation models, AODV, COA, COA-EASRP, Collaboration, Computational modeling, energy measurement, false trust, policy-based governance, pubcrawl, resilience, Resiliency, Routing, Routing protocols, Scalability, security, TCM, Wireless sensor networks, WSN |
Abstract | In Wireless Sensor Networks (WSNs), energy and security are two critical concerns that must be addressed. Because of the scarcity of energy, several security measures are restricted. For secure data routing in WSN, it becomes vital to identify insider packet drop attacks. The trust mechanism is an effective strategy for detecting this assault. Each node in this system validates the trustworthiness of its neighbors before transmitting packets, ensuring that only trust-worthy nodes get packets. With such a trust-aware scheme, however, there is a risk of false alarm. This work develops an adaptive trust computation model (TCM)which is implemented in our already proposed Chimp Optimization Algorithm-based Energy-Aware Secure Routing Protocol (COA-EASRP) for WSN. The proposed technique computes the optimal path using the hybrid combination of COA-EASRP and AODV as well as TCM is used to indicate false alarms in detecting selfish nodes. Our Proposed approach provides the series of Simulation outputs carried out based on various parameters |
DOI | 10.1109/ICESIC53714.2022.9783507 |
Citation Key | manjula_detection_2022 |