Skip to main content
Log in

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In wireless, every device can moves anywhere without any infrastructure also the information can be maintained constantly for routing the traffic. The open issues of wireless Adhoc network the attacks which are chosen the forwarding attack that is dropped by malicious node to corrupt the network performance then the information integrity exposure. Aim of the problem that existing methods in Adhoc network for malicious node detection which cannot assure the traceability of the node as well as the fairness of node detection. In this paper, the proposed heterogeneous cluster based secure routing scheme provides trust based secure network for detection of attacks such as wormhole and black hole caused by malicious nodes presence in wireless Adhoc network. The simulation result shows that the proposed model is detect the malicious nodes effectively in wireless Adhoc networks. The malicious node detection efficiency can be achieved 96% also energy consumption also 10% better than existing method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  • Bao F, Chen R, Chang M, Cho JH (2011) Trust-based intrusion detection in wireless sensor networks. IEEE Int Conf Commun (ICC) 2011:1–6

    Google Scholar 

  • Bhavana N, Mouriya K, Mano jKumar DS (2017) Detection and avoidance of malicious nodes in MANET. Int J Pure Appl Math 116(21):401–407

    Google Scholar 

  • Chatla AB, Maji B, Habibulla K (2017) A survey of energy aware and identity based encryption protocols in wireless ad-hoc network. J Adv Res Dyn Control Syst 9(12):1464–1473

    Google Scholar 

  • Chen RC, Hsieh CF, Chang WL (2016) Using ambient intelligence to extend network lifetime in wireless sensor networks. J Ambient Intell Humaniz Comput 7(6):777–788

    Article  Google Scholar 

  • Debroy BK, Sadi MS, Al-Imran Md (2011) An efficient approach to select cluster head in wireless sensor network. Int J Commun 6(7):529–539

    Google Scholar 

  • Jamali MAJ (2019) A multipath QoS multicast routing protocol based on link stability and route reliability in mobile ad-hoc networks. J Ambient Intell Humaniz Comput 10(1):107–123

    Article  MathSciNet  Google Scholar 

  • Kar P, Misra S (2016) Reliable and efficient data acquisition in wireless sensor networks in the presence of transfaulty nodes. IEEE Trans Netw Serv Manag.https://doi.org/10.1109/TNSM.2016.2516243

    Article  Google Scholar 

  • Kukreja D, Dhurandher SK, Reddy BVR (2018) Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack. J Ambient Intell Humaniz Comput 9(4):941–956

    Article  Google Scholar 

  • Mitchell R, Chen R (2015) Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Trans Reliab 65(1):350–358

    Article  Google Scholar 

  • Prabha VR, Latha P (2016) Fuzzy trust protocol for malicious node detection in wireless sensor networks. Wirel Pers Commun 94(4):2549–2559

    Article  Google Scholar 

  • Sampathkumar A, Vivekanandan P (2019) Gene selection using PLOA method in microarray data for cancer classification. J Med Imaging Health Informatics 9(6):1294–1300

    Article  Google Scholar 

  • Sun B, Li D (2018) A comprehensive trust-aware routing protocol with multi-attributes for WSNs. IEEE Access 6:4725–4741. https://doi.org/10.1109/ACCESS.2017.2786944

    Article  Google Scholar 

  • Sun B, Shan X, Wu K, Xiao Y (2013) Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Syst J 7(1):13–25

    Article  Google Scholar 

  • Yang Q, Zhu X, Fu H, Che X (2015) Survey of security technologies on wireless sensor networks. J Sensors.https://doi.org/10.1155/2015/842392

    Article  Google Scholar 

  • Yessembayev A, Sarkar D, Sikder F (2018) Detection of good and bad sensor nodes in the presence of malicious attacks and its application to data aggregation. IEEE Trans Signal Inf Process Netw 4(3):549–563

    MathSciNet  Google Scholar 

  • Zawaideh F, Salamah M, Al-Bahadili H (2017) A Fair trust-based malicious node detection and isolation scheme for WSNs. IT-DREPS Conference, Amman, Jordan, vol 6, p 8

  • Zhang Z, Zhu H, Luo S, Xin Y, Liu X (2017) Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE Access 5:12088–12102

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iraj Sadegh Amiri.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gomathy, V., Padhy, N., Samanta, D. et al. Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Human Comput 11, 4995–5001 (2020). https://doi.org/10.1007/s12652-020-01797-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-01797-3

Keywords

Navigation