Performance, privacy and security issues at the TCP internet layer DOI Creative Commons

Ogweno Jeremiah Okeyo

World Journal of Advanced Research and Reviews, Journal Year: 2024, Volume and Issue: 21(3), P. 1386 - 1410

Published: March 20, 2024

The rapid growth of internet-based services and applications has revolutionized the way we communicate, interact, conduct business. However, this widespread connectivity also brings forth numerous challenges related to performance privacy security at internet layer. This paper aims provide a comprehensive analysis various issues that arise in context, highlighting their impact on user experience, data protection, network efficiency, address concerns; research investigates factors affecting Layer. Through extensive studies, examines congestion, routing inefficiencies, protocol limitations overall services. delves into vulnerabilities risks associated with It potential threats posed by malicious actors, including hackers, breaches, unauthorized access sensitive information. findings contribute understanding interplay between performances By identifying key solutions, study provides valuable insights for administrators, service providers, policymakers, end-users optimize while ensuring robust measures. Ultimately, foster safer more efficient ecosystem all stakeholders.

Language: Английский

Competitive Swarm Optimizer: A decade survey DOI
Dikshit Chauhan,

Shivani,

Ran Cheng

et al.

Swarm and Evolutionary Computation, Journal Year: 2024, Volume and Issue: 87, P. 101543 - 101543

Published: April 4, 2024

Language: Английский

Citations

18

Proposal for a security and privacy enhancement system for private smart environments DOI
Sonia Solera-Cotanilla, Manuel Álvarez-Campana, Carmen Sánchez-Zas

et al.

Internet of Things, Journal Year: 2025, Volume and Issue: unknown, P. 101585 - 101585

Published: March 1, 2025

Language: Английский

Citations

0

A multi-objective optimized OLSR routing protocol DOI Creative Commons
Wenhong Wei,

Huijia Wu,

Ying He

et al.

PLoS ONE, Journal Year: 2024, Volume and Issue: 19(4), P. e0301842 - e0301842

Published: April 26, 2024

The rapid development of mobile communication devices has brought challenges to wireless networks, where data packets are able organize and maintain local area networks more freely without the constraints wired devices. Scholars have developed diverse network protocols on how ensure transmission while maintaining its self-organizational nature. However, it is difficult for traditional meet needs increasingly complex networks. In order solve problem that better node set may not be selected when selecting responsible forwarding in OLSR protocol, a multi-objective optimized algorithm proposed this paper, which incorporating new MPR mechanism an improved NSGA-II algorithm. process route discovery, intermediate nodes determined by mechanism, then main parameters protocol provided optimization Matlab was used build self-organizing study. addition, conventional simulated annealing compare with Simulation results show can effectively reduce packet loss end-to-end delay obtaining HV Spacing, two result evaluation metrics.

Language: Английский

Citations

1

Performance, privacy and security issues at the TCP internet layer DOI Creative Commons

Ogweno Jeremiah Okeyo

World Journal of Advanced Research and Reviews, Journal Year: 2024, Volume and Issue: 21(3), P. 1386 - 1410

Published: March 20, 2024

The rapid growth of internet-based services and applications has revolutionized the way we communicate, interact, conduct business. However, this widespread connectivity also brings forth numerous challenges related to performance privacy security at internet layer. This paper aims provide a comprehensive analysis various issues that arise in context, highlighting their impact on user experience, data protection, network efficiency, address concerns; research investigates factors affecting Layer. Through extensive studies, examines congestion, routing inefficiencies, protocol limitations overall services. delves into vulnerabilities risks associated with It potential threats posed by malicious actors, including hackers, breaches, unauthorized access sensitive information. findings contribute understanding interplay between performances By identifying key solutions, study provides valuable insights for administrators, service providers, policymakers, end-users optimize while ensuring robust measures. Ultimately, foster safer more efficient ecosystem all stakeholders.

Language: Английский

Citations

0