A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Artficial Immune Systems and Their Applications
Artficial Immune Systems and Their Applications
Intelligent Packets For Dynamic Network Routing Using Distributed Genetic Algorithm
GECCO '02 Proceedings of the Genetic and Evolutionary Computation Conference
Digital signature protection of the OSPF routing protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
An experimental study of insider attacks for OSPF routing protocol
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
When Ants Attack: Security Issues for Stigmergic Systems
When Ants Attack: Security Issues for Stigmergic Systems
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
AntNet: distributed stigmergetic control for communications networks
Journal of Artificial Intelligence Research
Routing with Byzantine robustness
Routing with Byzantine robustness
A performance evaluation framework for nature inspired routing algorithms
EC'05 Proceedings of the 3rd European conference on Applications of Evolutionary Computing
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Proceedings of the 9th annual conference on Genetic and evolutionary computation
Power-efficient epidemic information dissemination in sensor networks
BADS '09 Proceedings of the 2009 workshop on Bio-inspired algorithms for distributed systems
A survey: algorithms simulating bee swarm intelligence
Artificial Intelligence Review
Injecting power-awareness into epidemic information dissemination in sensor networks
Future Generation Computer Systems
BeeAIS: artificial immune system security for nature inspired, MANET routing protocol, BeeADHoc
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
PPSN'06 Proceedings of the 9th international conference on Parallel Problem Solving from Nature
Hi-index | 0.00 |
Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them have received little attention. In this paper we discuss the security threats of a state-of-the-art routing protocol, BeeHive, and then extend the algorithm with our security model to counter them. We further conclude from our extensive experiments that standard cryptography techniques can not be utilized due to their large processing and communication costs, if Nature inspired routing protocols are to be deployed in real world networks.