Special Issue Article
A Comprehensive Review on Reduction of Malicious Nodes in Clustered Wireless Sensor Networks Using Different Trust Management Schemes
|Sudha Rani S #1, Edwin Prem Kumar G*2, B. Juswin Thilak#3
|Related article at Pubmed, Scholar Google|
Wireless sensor networks is one of the prominent computing network emerged worldwide due to its applications and features. The three major operations in sensor network are data sensing, data aggregation and data forwarding. One such type of wireless sensor network is clustered wireless sensor network in which a set of sensor nodes are partitioned into a certain number of clusters and within each cluster active sensor nodes are associated as cluster members, a sensor node with strong computing power is elected as a cluster head. Malicious cluster member and malicious cluster head is one of the key problem in clustering network. To reduce the effects of malicious or compromised nodes overhead in the network, we reviewed various Trust Mechanisms which calculates the trust value to identify the behaviour of malicious or compromised nodes. This paper is based on the survey of existing routing protocols related to clustering network and various existing trust management methods to provide enhanced security by preventing malicious nodes in clustering network.