Author:
Padmapriya N.,Subathra S.
Abstract
Abstract
Wireless Computing draws in huge speculations, while simultaneously client necessities are ceaselessly expanded. Additionally development in remote advancements should stay up with aforementioned fields, so as to encourage the mix of imaginative administrations and applications in ordinary correspondence of the system. In the proposed framework we upgrade the security instrument for every sensor node by utilizing GWO(Grey wolf optimization) algorithm, and then the dummy sources are created to deceive the adversary and thus the original source is secured.
Subject
General Physics and Astronomy
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献