1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

Research Article

Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks

  • @INPROCEEDINGS{10.1109/SECURECOMM.2005.13,
        author={ I.  Pavlosoglou and R.    Green and M.  Leeson},
        title={Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks},
        proceedings={1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2006},
        month={3},
        keywords={},
        doi={10.1109/SECURECOMM.2005.13}
    }
    
  • I. Pavlosoglou
    R. Green
    M. Leeson
    Year: 2006
    Applying Emergence to the Design of Routing Protocols for the Security of Wireless Ad Hoc Networks
    SECURECOMM
    IEEE
    DOI: 10.1109/SECURECOMM.2005.13
I. Pavlosoglou1, R. Green1, M. Leeson1
  • 1: University of Warwick, UK

Abstract

This paper aims to illustrate for the first time the applicability of emergence within the design, modeling and simulation of wireless routing protocols for the security of information exchange in the presence of a malicious node. Our methodology focuses on the black hole problem and delivers a set of results that describe a protocol prototype within a number of set characteristic pairs. For this purpose, and motivated by the ever growing number of protocol implementations, we define an adaptive system that, through a set of simple rules, has the capability of selecting the fittest structure within a well defined environment capable of dealing with the problem under question.