Secured Data Transmission and Malicious Node Detection in Wireless Sensor Network
Deepak N. Biradar1, Dr. T.S. Vishanath2

1Deepak N. Biradar, Computer Science and Engineering, Lingaraj Appa Engineering College, Bidar, India.
2Dr. T.S. Vishanath, Electronics and Communication Engineering, HOD ECE BKIT, Bhalki, India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 1062-1069 | Volume-8 Issue-6, August 2019. | Retrieval Number: F8300088619/2019©BEIESP | DOI: 10.35940/ijeat.F8300.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (

Abstract: Wireless Sensor Network (WSN) is developed extremely because of their low installation cost and various applications. WSN has compact and inexpensive sensor nodes for monitoring the physical environment. WSNs are susceptible to many attacks (e.g. malicious nodes) because of its distinct characteristics. The performance of node and network is affected by the malicious nodes. Moreover, the communication among the sensor nodes also required to be secured for preventing the data from the hackers. In this paper, the architecture of the WSN is generated by using the Fuzzy-C-Means clustering (FCM). Then the detection of the malicious nodes is performed by using the Acknowledgement Scheme (AS). This AS is integrated in the Ant Colony Optimization (ACO) based routing for avoiding the malicious nodes while generating the route from the source to the Base Station (BS). Then the Hybrid Encryption Algorithm (HEA) is used for performing the secure data transmission through the network and this proposed method is named as HEA-AS. The performance of the HEA-AS method is evaluated in terms of End to End Delay (EED), network lifetime, throughput, Packet Delivery Ratio (PDR) and Packet Loss Ratio (PLR). The proposed HEA-AS method is compared with the existing method called as CTCM to evaluate the effectiveness of the HEA-AS method.
Keywords: Wireless sensor networks, acknowledgement scheme, hybrid encryption algorithm, packet delivery ratio, ant colony optimization.