Abstract

The development of wireless communication in the information technological era, collecting data, and transfering it from unmanned systems or devices could be monitored by any application while it is online. Direct and aliveness of countless wireless devices in a cluster of the medium could legitimate unwanted users to interrupt easily in an information flow. It would lead to data loss and security breach. Many traditional algorithms are effectively contributed to the support of cryptography-based encryption to ensure the user's data security. IoT devices with limited transmission power constraints have to communicate with the base station, and the data collected from the zones would need optimal transmission power. There is a need for a machine learning-based algorithm or optimization algorithm to maximize data transfer in a secure and safe transmission.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call