3 research outputs found

    Performance Evaluation of Network Security Protocols on Open Source and Microsoft Windows Platforms

    Get PDF
    Internet is increasingly being used to support collaborative applications such as voice and video-conferencing, replicated servers and databases of different types. Since most communication over the Internet involves the traversal of insecure open networks, basic security services such as data privacy, integrity and authentication are necessary. One of the levels of computer security is operating system security. This paper analyzes the limitations and behavioral patterns of security protocols across different platform. It compared the performance of security protocols in terms of authentication, encryption algorithm, cryptographic methods etc.; in order to determine which platform provides better support for security protocols. Network simulator tool was used to simulate different scenarios to show the performance of security protocols across two Operating System Platforms (Linux and Windows). Analysis of the simulation values of selected performance metrics of the security protocols, across both platforms, were evaluated. Results obtained showed comparable differences in the values of the performance parameters considered. For instance, IP processing delay of the Windows Client node was initially high (about 0.0125 milliseconds), but later decreases to about 0.0115 milliseconds, while the Linux Client node is constant at about 0.0115 milliseconds. Variations in the values of the performance parameters for both platforms, in both network scenarios are not significant enough to reflect a noticeable difference in the impacts of the network security protocols on the performance of the operating system platforms. Keywords: Open Source, IP Security, SSL, OPNET, Security Protocol, Operating System

    Towards an Improved Hoarding Procedure in a Mobile Environment

    Get PDF
    Frequent disconnection has been a critical issue in wireless network communication therefore causing excessive delay in data delivery. In this paper, we formulated a management mechanism based on computational optimization to achieve efficient and fast computation in order to reduce inherent delay during the hoarding process. The simulated result obtained is evaluated based on hoard size and delivery time. Keywords: Hoarding Procedure, Mobile computing Environment and Computational Optimization

    A Framework for Electronic Toll Collection in Smart and Connected Communities

    Get PDF
    Abstract—The number of vehicles plying the highways keeps growing at a steady pace, leading to high maintenance costs. Toll collection was introduced as a means of raising funds for road maintenance, but the traditional method is usually slow and is prone to cause vehicular traffic congestion on the highways. In this paper, a framework was proposed for Electronic Toll Collection (ETC) in smart and connected communities. The main components of the intelligent system architecture are the wireless sensor nodes, web and mobile applications, and a cloud platform. The Wireless Sensor Network (WSN) enables vehicle detection and classification, and establishes a communication link to the back-end of the system. The central database and the web server are hosted in the Cloud while a mobile application is used for electronic transactions, subscription renewal, notification of toll payments, and for tracking toll payment history. In addition, a web dash board is provided for efficient toll administration. The implementation of this system will improve the toll collection efficiency in terms of speed and flexibility. Overall, the contribution of this work extends the frontier of WSNs to the domain of Intelligent Transportation System (ITS)
    corecore