Malicious Detection using Secure Mutual Trust Based Routing on an Intrusion Detection System in WSN
The Lack of infrastructure makes secured data distribution, challenging task in Wireless Sensor Networks (WSNs). In traditional routing methods, either security or routing optimization is addressed separately; however, both are not addressed at similar instances. Hence, if there exists a bottleneck while handling security or routing, where either one is affected by the other. In this paper, Mutual Trust Management (MTM) framework is designed between the sensor nodes is proposed in WSN to identify the malicious nodes. The trust model is connected with an Intrusion Detection System (IDS) to effectively analyse the malicious nodes and routing of packets between the nodes is designed with the Structure of a Multilayer Perceptron (MLP) Network to route the packets through the secured path. The simulations are conducted using the NS-2 setup for validating the trustworthiness and packet delivery through the secured route. The proposed method is compared against the existing methods to test the efficacy of MTM-MLP model and the results show that the MTM-MLP achieves higher detection against ransomware than the other methodsThe Lack of infrastructure makes secured data distribution, challenging task in Wireless Sensor Networks (WSNs). In traditional routing methods, either security or routing optimization is addressed separately; however, both are not addressed at similar instances. Hence, if there exists a bottleneck while handling security or routing, where either one is affected by the other. In this paper, Mutual Trust Management (MTM) framework is designed between the sensor nodes is proposed in WSN to identify the malicious nodes. The trust model is connected with an Intrusion Detection System (IDS) to effectively analyse the malicious nodes and routing of packets between the nodes is designed with the Structure of a Multilayer Perceptron (MLP) Network to route the packets through the secured path. The simulations are conducted using the NS-2 setup for validating the trustworthiness and packet delivery through the secured route. The proposed method is compared against the existing methods to test the efficacy of MTM-MLP model and the results show that the MTM-MLP achieves higher detection against ransomware than the other methods