Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new prob...Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new problems in the wireless Media Access Control (MAC), that is, the deafness and new hidden terminal problem, which may cause severe performance degradation. To solve the problems, we propose an effective Circular RTR Directional MAC (CRDMAC) protocol for WANETs by using a sub-transmission channel and Ready to Receive (RTR) packets, which modifies the IEEE 802.11 Distributed Coordinated Function (DCF). The sub-channel avoids collisions to other ongoing transmission, and the RTR packets notify the neighbor nodes that the mutual transmission has been finished. We evaluate the CRDMAC protocol through simulations and the results show that the proposed protocol outperforms existing DMAC (directional MAC) protocol and the CRCM (Circular RTS and CTS MAC) protocol in terms of throughput and packet drop rate.展开更多
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the...Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.展开更多
基金supported by the Grant-in-Aid for Scientific Research of Japan Society for Promotion of Science(JSPS)Collaboration Research Grant of National Institute of Informatics (NII) ,Japan
文摘Using directional antennas in Wireless Ad hoc Networks (WANETs) offers great potential of reducing the radio interference, and improving the communication throughput. Directional antennas, however, introduces new problems in the wireless Media Access Control (MAC), that is, the deafness and new hidden terminal problem, which may cause severe performance degradation. To solve the problems, we propose an effective Circular RTR Directional MAC (CRDMAC) protocol for WANETs by using a sub-transmission channel and Ready to Receive (RTR) packets, which modifies the IEEE 802.11 Distributed Coordinated Function (DCF). The sub-channel avoids collisions to other ongoing transmission, and the RTR packets notify the neighbor nodes that the mutual transmission has been finished. We evaluate the CRDMAC protocol through simulations and the results show that the proposed protocol outperforms existing DMAC (directional MAC) protocol and the CRCM (Circular RTS and CTS MAC) protocol in terms of throughput and packet drop rate.
文摘Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.