Search results

1 – 2 of 2
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 14 June 2011

Zhitang Li, Yangming Ma, Li Wang, Jie Lei and Jie Ma

The purpose of this paper is to show how to ensure a real‐time precise aggregation processing of network security events without difficultly determined parameters.

563

Abstract

Purpose

The purpose of this paper is to show how to ensure a real‐time precise aggregation processing of network security events without difficultly determined parameters.

Design/methodology/approach

The aggregation method includes the choice of aggregation granularity, consistency of abstraction layer, the expression of all hyper security events (HSEs) of a node in cache, and aggregation algorithm based on classification, etc.

Findings

The aggregation method is capable to provide a real‐time way for good HSEs for next correlation processing with weak and easy parameters to determine.

Research limitations/implications

The cost of space is not discussed in the method.

Practical implications

The aggregation method is suitable for real‐time management of difficult issues to resolve massive security events.

Originality/value

Many ideas and concepts of the paper are proposed for the first time, such as the expression of all HSEs of a node in cache, weak queue length instead of the weak‐time window and so on.

Details

Kybernetes, vol. 40 no. 5/6
Type: Research Article
ISSN: 0368-492X

Keywords

Access Restricted. View access options
Article
Publication date: 17 October 2008

Fan Jun, Li Zhitang and Nie Wei

The purpose of this paper is to focus on alleviating the problems of both hidden and exposed terminal, which remain unsolved in many directional MAC protocols.

207

Abstract

Purpose

The purpose of this paper is to focus on alleviating the problems of both hidden and exposed terminal, which remain unsolved in many directional MAC protocols.

Design/methodology/approach

GPS is used to calibrate synchronization among the nodes, and directional antennas are used. In the protocol, different antenna mode and transmit power are used. The assertion signal and omni‐directional RTS are transmitted in omni‐directional mode, while directional CTS, directional RTS, DATA and ACK are transmitted in directional mode. With properly designed RTS‐CTS handshake, the protocol can make full use of spatial reuse of directional communication and enhance parallelism in data transmission.

Findings

The preliminary simulation results indicate that the protocol works well and achieves considerably high performance in both sparse and dense ad hoc networks.

Research limitations/implications

The line of sight environment is the main limitation that the MAC protocol will be applied.

Practical implications

The protocol is a very useful solution for employing directional antennas for ad hoc networks.

Originality/value

The MAC protocol can effectively alleviate the directional hidden and exposed terminal problems as well as node deafness. It can greatly improve throughput and achieve low‐medium access delay, making it suitable for ad hoc networks.

Details

Kybernetes, vol. 37 no. 9/10
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 2 of 2
Per page
102050