Research Article
Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks
@INPROCEEDINGS{10.1109/SECURECOMM.2005.13, author={ I. Pavlosoglou and R. Green and M. Leeson}, title={Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks}, proceedings={1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks}, publisher={IEEE}, proceedings_a={SECURECOMM}, year={2006}, month={3}, keywords={}, doi={10.1109/SECURECOMM.2005.13} }
- I. Pavlosoglou
R. Green
M. Leeson
Year: 2006
Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks
SECURECOMM
IEEE
DOI: 10.1109/SECURECOMM.2005.13
Abstract
This paper aims to illustrate for the first time the applicability of emergence within the design, modeling and simulation of wireless routing protocols for the security of information exchange in the presence of a malicious node. Our methodology focuses on the black hole problem and delivers a set of results that describe a protocol prototype within a number of set characteristic pairs. For this purpose, and motivated by the ever growing number of protocol implementations, we define an adaptive system that, through a set of simple rules, has the capability of selecting the fittest structure within a well defined environment capable of dealing with the problem under question.
Copyright © 2005–2024 IEEE