Open Access iconOpen Access

ARTICLE

Performance Evaluation of Malicious Node Detection and Mitigation of IoT-Based Trust Model for Wireless Sensor Network

Anil Kumar1, Abhay Bhatia1, Amit Singh2, Preeti Rani3,*, Vincent Omollo Nyangaresi4,*, Mahendihasan S. Heera5

1 Department of Computer Science & Engineering, Roorkee Institute of Technology, Roorkee, Uttarakhand, India
2 Faculty of Engineering, Teerthanker Mahaveer University, Moradabad, Uttar Pradesh, India
3 College of Computing Sciences and IT (CCSIT), Teerthanker Mahaveer University, Moradabad, Uttar Pradesh, India
4 Department of Computer Science and Software Engineering, Jaramogi Oginga Odinga University of Science & Technology, Bondo, Kenya
5 Faculty of Computer Science and Application, Gokul Global University, Siddhpur, Gujarat, India

* Corresponding Authors: Preeti Rani. Email: email; Vincent Omollo Nyangaresi. Email: email

(This article belongs to the Special Issue: Advanced Localization and Multi-Sensor Fusion in WSN, IoT & VANET)

Computers, Materials & Continua 2026, 88(1), 81 https://doi.org/10.32604/cmc.2026.076553

Abstract

The Internet of Things (IoT) enables seamless real-time monitoring and data exchange across distributed and heterogeneous environments with wireless sensor networks (WSNs). The open architecture and resource constraints of wireless sensor networks (WSNs) make them highly vulnerable to internal security threats caused by malicious or compromised nodes, particularly in Internet of Things (IoT) environments. To address this issue, we proposed Dynamic Trust Evaluation Model (DTEM), designed to provide a secure, scalable, and efficient framework for IoT-based WSNs. The proposed model identifies the role of trust management in routing, data aggregation, and intrusion detection, including trust-based protocols. DTEM incorporates a lightweight elliptic curve cryptography (ECC) mechanism to ensure secure communication, protect trust information from manipulation, and enhance overall system reliability. In addition, machine learning techniques are employed to improve malicious node classification accuracy. Component-wise analysis demonstrates that the dynamic trust evaluation forms the core detection mechanism, while ECC enhances communication security and machine learning improves malicious node classification accuracy. A large-scale network simulation is conducted to evaluate DTEM’s performance under various attack scenarios. Results demonstrate improved malicious node detection accuracy, higher packet delivery ratios, reduced energy consumption, and lower communication overheads. The proposed DTEM framework proves to be a robust and scalable solution for securing IoT-based wireless sensor networks, making it suitable for real-world applications.

Keywords

Internet of Things; node detection; security threats; security and protocols; wireless sensor network

Cite This Article

APA Style
Kumar, A., Bhatia, A., Singh, A., Rani, P., Nyangaresi, V.O. et al. (2026). Performance Evaluation of Malicious Node Detection and Mitigation of IoT-Based Trust Model for Wireless Sensor Network. Computers, Materials & Continua, 88(1), 81. https://doi.org/10.32604/cmc.2026.076553
Vancouver Style
Kumar A, Bhatia A, Singh A, Rani P, Nyangaresi VO, Heera MS. Performance Evaluation of Malicious Node Detection and Mitigation of IoT-Based Trust Model for Wireless Sensor Network. Comput Mater Contin. 2026;88(1):81. https://doi.org/10.32604/cmc.2026.076553
IEEE Style
A. Kumar, A. Bhatia, A. Singh, P. Rani, V. O. Nyangaresi, and M. S. Heera, “Performance Evaluation of Malicious Node Detection and Mitigation of IoT-Based Trust Model for Wireless Sensor Network,” Comput. Mater. Contin., vol. 88, no. 1, pp. 81, 2026. https://doi.org/10.32604/cmc.2026.076553



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 282

    View

  • 51

    Download

  • 0

    Like

Share Link