Optimization of Access Points in Wireless Sensor Network: An approach towards security

9Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless Sensor Networks has lot to do with the technology. With several problems existing, the use of Access Points in a secured way will provide the long lasting connectivity throughout the covered area. The connectivity and the security process are discussed using two different algorithms in this paper. The connectivity to the end user is established with the help of encryption and decryption process of keys. The two algorithms are Optimization algorithm and Craving algorithm. By using these two algorithms, the connectivity is extended outside the range of signals with sensor nodes.

Cite

CITATION STYLE

APA

Nagaraja, A., Gunupudi, R. K., Saravana Kumar, R., & Mangathayaru, N. (2015). Optimization of Access Points in Wireless Sensor Network: An approach towards security. In Advances in Intelligent Systems and Computing (Vol. 348, pp. 299–306). Springer Verlag. https://doi.org/10.1007/978-3-319-18503-3_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free