Zhitang Li, Yangming Ma, Li Wang, Jie Lei and Jie Ma
The purpose of this paper is to show how to ensure a real‐time precise aggregation processing of network security events without difficultly determined parameters.
Abstract
Purpose
The purpose of this paper is to show how to ensure a real‐time precise aggregation processing of network security events without difficultly determined parameters.
Design/methodology/approach
The aggregation method includes the choice of aggregation granularity, consistency of abstraction layer, the expression of all hyper security events (HSEs) of a node in cache, and aggregation algorithm based on classification, etc.
Findings
The aggregation method is capable to provide a real‐time way for good HSEs for next correlation processing with weak and easy parameters to determine.
Research limitations/implications
The cost of space is not discussed in the method.
Practical implications
The aggregation method is suitable for real‐time management of difficult issues to resolve massive security events.
Originality/value
Many ideas and concepts of the paper are proposed for the first time, such as the expression of all HSEs of a node in cache, weak queue length instead of the weak‐time window and so on.
Details
Keywords
Fan Jun, Li Zhitang and Nie Wei
The purpose of this paper is to focus on alleviating the problems of both hidden and exposed terminal, which remain unsolved in many directional MAC protocols.
Abstract
Purpose
The purpose of this paper is to focus on alleviating the problems of both hidden and exposed terminal, which remain unsolved in many directional MAC protocols.
Design/methodology/approach
GPS is used to calibrate synchronization among the nodes, and directional antennas are used. In the protocol, different antenna mode and transmit power are used. The assertion signal and omni‐directional RTS are transmitted in omni‐directional mode, while directional CTS, directional RTS, DATA and ACK are transmitted in directional mode. With properly designed RTS‐CTS handshake, the protocol can make full use of spatial reuse of directional communication and enhance parallelism in data transmission.
Findings
The preliminary simulation results indicate that the protocol works well and achieves considerably high performance in both sparse and dense ad hoc networks.
Research limitations/implications
The line of sight environment is the main limitation that the MAC protocol will be applied.
Practical implications
The protocol is a very useful solution for employing directional antennas for ad hoc networks.
Originality/value
The MAC protocol can effectively alleviate the directional hidden and exposed terminal problems as well as node deafness. It can greatly improve throughput and achieve low‐medium access delay, making it suitable for ad hoc networks.