期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Performance Evaluation of an Internet Protocol Security (IPSec) Based Multiprotocol Label Switching (MPLS) Virtual Private Network 被引量:1
1
作者 Conrad K. Simatimbe Smart Charles Lubobya 《Journal of Computer and Communications》 2020年第9期100-108,共9页
This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in d... This paper evaluates the performance of Internet Protocol Security (IPSec) based Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium sized organization. The demand for security in data networks has been increasing owing to the high cyber attacks and potential risks associated with networks spread over distant geographical locations. The MPLS networks ride on the public network backbone that is porous and highly susceptible to attacks and so the need for reliable security mechanisms to be part of the deployment plan. The evaluation criteria concentrated on Voice over Internet Protocol (VoIP) and Video conferencing with keen interest in jitter, end to end delivery and general data flow. This study used both structured questionnaire and observation methods. The structured questionnaire was administered to a group of 70 VPN users in a company. This provided the study with precise responses. The observation method was used in data simulations using OPNET Version 14.5 Simulation software. The results show that the IPSec features increase the size of data packets by approximately 9.98% translating into approximately 90.02% effectiveness. The tests showed that the performance metrics are all well within the recommended standards. The IPSec Based MPLS Virtual private network is more stable and secure than one without IPSec. 展开更多
关键词 Multiprotocol Label Switching Internet Protocol Security Virtual Private Network Video Conferencing Voice over Internet Protocol JITTER end to end delay
下载PDF
Energy-Efficient Cluster in Wireless Sensor Network Using Life Time Delay Clustering Algorithms
2
作者 V.Kumar N.Jayapandian P.Balasubramanie 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期77-86,共10页
Through Wireless Sensor Networks(WSN)formation,industrial and academic communities have seen remarkable development in recent decades.One of the most common techniques to derive the best out of wireless sensor network... Through Wireless Sensor Networks(WSN)formation,industrial and academic communities have seen remarkable development in recent decades.One of the most common techniques to derive the best out of wireless sensor networks is to upgrade the operating group.The most important problem is the arrangement of optimal number of sensor nodes as clusters to discuss clustering method.In this method,new client nodes and dynamic methods are used to determine the optimal number of clusters and cluster heads which are to be better organized and proposed to classify each round.Parameters of effective energy use and the ability to decide the best method of attachments are included.The Problem coverage find change ability network route due to which traffic and delays keep the performance to be very high.A newer version of Gravity Analysis Algorithm(GAA)is used to solve this problem.This proposed new approach GAA is introduced to improve network lifetime,increase system energy efficiency and end delay performance.Simulation results show that modified GAA performance is better than other networks and it has more advanced Life Time Delay Clustering Algorithms-LTDCA protocols.The proposed method provides a set of data collection and increased throughput in wireless sensor networks. 展开更多
关键词 WSNS Gravity analysis algorithm-GAA life time delay clustering algorithms-LTDCA end to end delay energy efficient
下载PDF
Efficient Routing Protocol Based on Security for Wireless Sensor Networks
3
作者 S. Nandhakumar Dr. N. Malmurugan 《Circuits and Systems》 2016年第8期1943-1953,共11页
Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is... Nowadays, the major part and most standard networks usually used in several applications are Wireless Sensor Networks (WSNs). It consists of different nodes which communicate each other for data transmission. There is no access point to control the nodes in the network. This makes the network to undergo severe attacks from both passive and active devices. Due to this attack, the network undergoes downgrade performance. To overcome these attacks, security based routing protocol is proposed with the security based wormhole detection scheme. This scheme comprises of two phases. In this approach, the detection of wormhole attacks is deployed for having correct balance between safe route and stability. Also, to ensure packets integrity cryptographic scheme is used as well as authenticity while travelling from source to destination nodes. By extensive simulation, the proposed scheme achieves enhanced performance of packet delivery ratio, end to end delay, throughput and overhead than the existing schemes. 展开更多
关键词 WSNS THROUGHPUT Integrated Cryptography Scheme Delivery Ratio Packet Loss AUTHENTICATION Data Integrity Communication Overhead and end to end delay
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部