2024
DOI: 10.21203/rs.3.rs-4045649/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Routing and Security Based Ad-hoc Networks Configuration for Identification of Attack Using Reinforcement Learning Approach

J. Avinash

Abstract: In many fields of Research, wireless sensor networks have grown in popularity. Depending on the dangerous situation the networks fields, there are more chances to attack wireless sensor network. This research explains how to locate rogue nodes in the networks based on investigation and responses from each node in the networks. In generally a malicious node blocks the transmission of signal to other nodes. So, in order to increase network performance, avoid much traffic for the server to buffer, causing them to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 15 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?