Applying emergence to the design of routing protocols for the security of wireless ad hoc networks
UNSPECIFIED (2005) Applying emergence to the design of routing protocols for the security of wireless ad hoc networks. In: 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, SEP 05-09, 2005, Athens, GREECE.Full text not available from this repository.
This paper aims to illustrate for the first time the applicability of emergence within the design, modeling and simulation of wireless routing protocols for the security of information exchange in the presence of a malicious node. Our methodology focuses on the black hole problem and delivers a set of results that describe a protocol prototype within a number of set characteristic pairs. For this purpose, and motivated by the ever growing number of protocol implementations, we define an adaptive system that, through a set of simple rules, has the capability of selecting the fittest structure within a well defined environment capable of dealing with the problem under question.
|Item Type:||Conference Item (UNSPECIFIED)|
|Subjects:||Q Science > QA Mathematics > QA76 Electronic computers. Computer science. Computer software
T Technology > TK Electrical engineering. Electronics Nuclear engineering
|Journal or Publication Title:||First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings|
|Publisher:||IEEE COMPUTER SOC|
|Number of Pages:||12|
|Page Range:||pp. 303-314|
|Title of Event:||1st International Conference on Security and Privacy for Emerging Areas in Communication Networks|
|Location of Event:||Athens, GREECE|
|Date(s) of Event:||SEP 05-09, 2005|
Actions (login required)