z-logo
open-access-imgOpen Access
A Secure Communication and Location Privacy in WSN Using Grey Wolf Optimization
Author(s) -
N. Padmapriya,
S. Subathra
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1717/1/012050
Subject(s) - upgrade , adversary , computer science , computer security , node (physics) , wireless sensor network , wireless , computer network , telecommunications , engineering , operating system , structural engineering
Wireless Computing draws in huge speculations, while simultaneously client necessities are ceaselessly expanded. Additionally development in remote advancements should stay up with aforementioned fields, so as to encourage the mix of imaginative administrations and applications in ordinary correspondence of the system. In the proposed framework we upgrade the security instrument for every sensor node by utilizing GWO(Grey wolf optimization) algorithm, and then the dummy sources are created to deceive the adversary and thus the original source is secured.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here