Applying emergence to the design of routing protocols for the security of wireless ad hoc networks

被引:0
作者
Pavlosoglou, I [1 ]
Leeson, M [1 ]
Green, R [1 ]
机构
[1] Univ Warwick, Sch Engn, Commun & Signal Proc Grp, Coventry CV4 7AL, W Midlands, England
来源
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS | 2005年
关键词
D O I
10.1109/SECURECOMM.2005.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper aims to illustrate for the first time the applicability of emergence within the design, modeling and simulation of wireless routing protocols for the security of information exchange in the presence of a malicious node. Our methodology focuses on the black hole problem and delivers a set of results that describe a protocol prototype within a number of set characteristic pairs. For this purpose, and motivated by the ever growing number of protocol implementations, we define an adaptive system that, through a set of simple rules, has the capability of selecting the fittest structure within a well defined environment capable of dealing with the problem under question.
引用
收藏
页码:303 / 314
页数:12
相关论文
共 50 条
[1]  
AAD I, 2004, 10 ACM INT C MOB COM
[2]  
[Anonymous], P 6 ANN INT C MOB CO
[3]  
AWERBUCH B, MITIGATING BYZANINE
[4]  
AWERBUCH B, 2003, PROVABLY SECURE COMP
[5]  
Baas N.A., 1994, Artificial Life III, VXVII, P515
[6]  
BONABEAU E, 1999, SWARM INTELIGENCE NA
[7]   Detecting disruptive routers: A distributed network monitoring approach [J].
Bradley, KA ;
Cheung, S ;
Puketza, N ;
Mukherjee, B ;
Olsson, RA .
1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, :115-124
[8]  
BROCH J, 1998, P INT C MOB COMP NET
[9]  
CHEUNG S, 1998, 1997 NEW SEC PAR WOR, P94
[10]  
Das S. R., 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), P3, DOI 10.1109/INFCOM.2000.832168