Malicious Node Identification in Energy Efficient Trust Node Based Routing Protocol (M-Eetrp) For Lifetime Improvement in Wsn
Nandoori Srikanth1, Muktyala Siva Ganga Prasad2

1Nandoori Srikanth, Department of ECE, Koneru Lakshmiah Educational Foundation, Green Fields, Vaddeswaram (Andhra Pradesh), India.
2Muktyala Siva Ganga Prasad, Department of ECE, Koneru Lakshmiah Educational Foundation, Green Fields, Vaddeswaram (Andhra Pradesh), India.

Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 1932-1935 | Volume-8 Issue-7, May 2019 | Retrieval Number: G6280058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Uneven Deployment of sensor nodes, Irregular terrains, energy limitations, malicious attacks, and interfered wireless links, are the key parameters which degrades the performance of WSN. To improve lifetime of the network sensor nodes are driven into sleep states, once they complete their sensing task. Irregular Terrains like military areas, plateaus suffers with uneven deployment of sensor nodes, and malicious attacks. Mobile node based data gathering is the efficient technique for lifetime maximization in WSN fixed up in irregular terrains like plateaus and also to avoid security based issues. The mobile node based data gathering techniques also suffer from energy limitations of mobile nodes. This paper explores an effective method of utilizing energy resources of mobile nodes without any malicious attacks by proposing “Malicious node identification in energy efficient trust node based routing protocol”. Malicious node identification is the key parameter in WSN to make the network more energy efficient. This Protocol gives better results compared with existing algorithms with the Improvement of Network lifetime by 67% and energy consumption as 30%.
Keyword: WSN, Data Aggregation, Trust Node, Malicious Node, Built in Self-Test.
Scope of the Article: Component-Based Software Engineering.