In a network, the most common transport protocol is the Transmission Control Protocol. The Transmission Control Protocol comes in many variants like TCP, Tahoe, Reno, NewReno, Vegas, STCP and so on. Each of these variants would work differently in different networks according to the parameters of that network. On the other hand, there are mainly four common routing protocols used in networks like DSDV, DSR, AODV and TORA. In this paper, we have simulated different networks with differing parameters to analyze the behavior of the most common protocols DSDV and AODV with different variants of TCP. By creating different networks in ns2 simulator, we could deeply analyze the behavior of the protocols with these TCP variants in the basis of the amount of packet drops in each case. The lesser the amount of drops the better the algorithm. This paper implicitly analyses which TCP variant has lesser drop rates with which routing protocol.
In computer security, machine learning has a greater impact in recent years. Ranging from spam filtering, malware analysis, and traffic analysis to network security the usage of machine learning algorithms are manifold. In the area of network security, machine learning techniques are used especially in developing intrusion detection systems. There are basically two kinds of intrusion detection systems -host intrusion detection systems and network intrusion detection systems. Even though machine learning techniques have greatly improved the efficiency of the intrusion detection systems, they are vulnerable to adversarial attacks which are designed and launched by adaptive adversaries who know the working principles of machine learning models. In recent years adversarial machine learning has gained attention in the domain of machine learning in which attackers exploit the inherent fallacies in the assumptions made in the machine learning models. In the domain of network security especially in intrusion detection systems, the significant role of adversarial machine learning has not been addressed in detail. This survey examines different types of defenses deployed to mitigate the impact of adversarial attacks. Their effectiveness in dealing with attacks is analysed and their limitations are discussed.
The most major requirements of wireless networks in the current network context are security, scalability and memory efficiency. Most of the earlier implementations use cryptographic key exchanges alone for imposing security but mostly proved to be less secure with the presence of many attacks like IP-spoofing and masquerading. This is because, the security is present only during communication i.e., only message integrity is ensured and not the user authenticity. Hence we are trying to include an authentication scheme along with the already existing integrity scheme to provide maximum security all through the lifetime of networks. In this paper, we consider different options for providing authentication, analyze them and find which method can be used for producing better results General TermsWireless Sensor Networks, Security,
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.