Abstract
Restriction on intrusions is one of the foremost aspects of security to conserve the resources in a wireless network. The perimeter of the shadowing zone where in sensing and connectivity are simultaneously changing had to be estimated to prevent intruders. So the proposed work estimates a relationship between the data transmissions and computational time to find the trust factor of channels using factor graphs. Subsequently, estimating the Value of Information (VoI), contention time, and topological significance based on sensing power to alleviate blind spots had been observed to identify intrusions. Factor graph-based routing scenarios capable of handling channel uncertainties in time-triggered wireless sensor communication are indicated with edges and their factors. The process of local interactions with edges provides inference of intrusions to determine global solutions to preserve the network and its data transfer.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.