Research Article
Enhanced Lion Optimization with Efficient Path Routing Equalization Technique against DoS Attack in Wireless Sensor Network
Step 1: establish route in crosslayer network | Step 2: find the node in network is trustworthy | Step 3: frequent transmission | Step 4: if node==anomaly | Step 5: communication is obstructed | Step 6: overload occurred | Step 7: else | Step 8: if node! = anomaly | Step 9: communication can be performed | Step 10: improves network lifetime and reduce delay | Step 11: end | Step 12: end process |
|