Open Access
Subscription Access
Packet Flow Analysis Through NS2 Model
Safety measure is a necessary instruct to resolve the practical exertion in the researches of computer networks. Attacks on networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. NS2 and OPNET are best network simulation tools, which provide very powerful simulation functions for network protocols. As the huge use of internet increases day by day so as safety anxiety is also elevate day by day in excess ofthe internet.In this paper we discuss the network security and its related threats and also study the types ofprotocols and few issues related to protocols in computer networks. We also simulate the model of nodeswired network scenario, its packet flow rate analysis through TCP protocol using NS2 as a simulator.
Keywords
Simulation, Security Attacks, TCP/IP& NS2.
User
Font Size
Information
- Y. Wang, G. Attebury, et al. "A survey of security issues in wireless sensor networks." Computer Science and Engineering.Vol.8, no. 2. 2006.
- E. Shi and A. Perrig, “Designing Secure Sensor Networks,” Wireless Commun.Mag.,vol. 11, no. 6, pp. 38–43, Dec. 2004.
- N. Gura, A. Patel, et al. "Comparing elliptic curve cryptography and RSA on 8-bit CPUs."Cryptographic Hardware and Embedded Systems-CHES 2004, pp 925-943, 2004.
- M. Razzaque., S.Ahmad Salehi. Security and Privacy in Vehicular Ad- Hoc Networks: Survey and the Road Ahead. Wireless Networks and Security, Springer: 107-132, 2013.
- A. Perrig et al., “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, no. 5, pp. 521–34, Sept. 2002.
- H. Du, X. Hu, et al. "Energy efficient routing and scheduling for realtime data aggregation in WSNs." Computer communications.Vol.29, no. 17.3527-3535, 2006.
- X. Hung, et al. “An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge,” Sensors, Vol 8. 2008, 7753-7782
- L. Jialiang, Valois, F.; Dohler, M.; Min-You Wu; "Optimized Data Aggregation in WSNs Using Adaptive ARMA," Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on pp.115-120, 18-25 July 2010.
- S. Zhu et al., “An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks,” Proc. IEEE Symp. Security and Privacy, Oakland, CA, pp. 259–71, May 2004.
- J. Ben-Othman, and B. Yahya. "Energy efficient and QoS based routing protocol for wireless sensor networks." Journal of Parallel and Distributed Computing 70(8), 849-857 2010.
- D.W. Carman, P.S. Krus, and B.J. Matt, “Constraints and approaches for distributed sensor network security”, Technical Report 00-010, NAI Labs, Network Associates Inc., Glenwood, MD, 2000.
- R. E. Shannon, “Introduction to the art and science of simulation,” in Proc. of the 30th conference on winter simulation (WSC’98), 1989
- http://ns2tutor.weebly.com/ns2-in-windows.html
- http://www.cs.berkeley.edu/~dawnsong/papers/sybil.pdf
- http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=arnumber=44318 60
- http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.403.6592&rep=rep1&type=pdf
- http://ijaiem.org/Volume2Issue2/IJAIEM-2013-02-06-005.pdf
- http://sourceforge.net/projects/nsnam/files/
- http://www.ipcsit.com/vol35/003-CNCS2012-N010.pdf
Abstract Views: 239
PDF Views: 0