Abstract
Wireless Sensor Networks has lot to do with the technology. With several problems existing, the use of Access Points in a secured way will provide the long lasting connectivity throughout the covered area. The connectivity and the security process are discussed using two different algorithms in this paper. The connectivity to the end user is established with the help of encryption and decryption process of keys. The two algorithms are Optimization algorithm and Craving algorithm. By using these two algorithms, the connectivity is extended outside the range of signals with sensor nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gupta, A.K., Dhyani, P.: Performance indicators in a 802.11 wlan deployment. In: International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom), pp. 490–494. IEEE Press (2009)
Bertrand, A., Szurley, J., Ruckebusch, P., Moerman, I., Moonen, M.: Efficient Calculation of Sensor Utility and Sensor Removal in Wireless Sensor Networks for Adaptive Signal Estimation and Beam forming. IEEE Transactions on Signal Processing 60(11), 5857–5869 (2012)
Korte, B., Vygen, J.: Combinatorial Optimization: Theory and Algorithms, 4th edn. Springer, Berlin (2010)
Chang, B.J., Chen, J.F.: Cross layer based adaptive vertical handoff with predictive RSS in heterogeneous wireless networks. IEEE Transactions Vehicular Technology 57(6), 3679–3692 (2008)
Cheng, C.-T., Tse, C.K., Lau, F.C.M.: A Delay Aware Data Collection Network Structure for Wireless Sensor Networks. IEEE Sensors Journal 11(3), 699–710 (2011)
wiki link for IEEE 802.11 Document, http://en.wikipedia.org/wiki/IEEE_802.11
Kurose, J.F.: Computer Networking - Using A Top down Approach, 5th edn. Pearson Publications (2010)
Lima, M., Carrano, E., Takakahashi, R.: Planejamento multicritério deredes wlans uilizando algoritmos genéticos. Technical Report, UFMG (2010)
Barbosa, M.A.S., Gouvea, M.M.: Access Point Design with a Genetic Algorithm. In: Sixth International Conference on Genetic and Evolutionary Computing (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Nagaraja, A., Gunupudi, R.K., Saravana Kumar, R., Mangathayaru, N. (2015). Optimization of Access Points in Wireless Sensor Network: An Approach towards Security. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Prokopova, Z., Silhavy, P. (eds) Intelligent Systems in Cybernetics and Automation Theory. CSOC 2015. Advances in Intelligent Systems and Computing, vol 348. Springer, Cham. https://doi.org/10.1007/978-3-319-18503-3_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-18503-3_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18502-6
Online ISBN: 978-3-319-18503-3
eBook Packages: EngineeringEngineering (R0)