Genetic algorithms for designing network security protocols
dc.contributor.author | Zarza, Luis |
dc.contributor.author | Forné Muñoz, Jorge |
dc.contributor.author | Pegueroles Vallés, Josep R. |
dc.contributor.author | Soriano Ibáñez, Miguel |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2010-11-02T13:07:28Z |
dc.date.available | 2010-11-02T13:07:28Z |
dc.date.created | 2010 |
dc.date.issued | 2010 |
dc.identifier.citation | Zarza, L. [et al.]. Genetic algorithms for designing network security protocols. A: "Advances in artificial intelligence for privacy protection and security". World Scientífic, 2010, p. 325-358. |
dc.identifier.isbn | 978-981-279-032-3 |
dc.identifier.uri | http://hdl.handle.net/2117/10076 |
dc.description.abstract | The design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. In such cases, the aid of an automated tool generating protocols for a predefined problem can be of great utility. This work uses the genetic algorithms (GA) techniques for the automatic design of security networked protocols. When using GA for optimizing protocols two aspects are critical: the genome definition and the evaluation function. We discuss how security protocols can be represented as binary strings and can be interpreted as security protocols; moreover we define several basic criteria for evaluating security protocols. Finally, we present the software we developed for generating secure communications protocols and show some examples and obtained results. |
dc.format.extent | 34 p. |
dc.language.iso | eng |
dc.publisher | World Scientífic |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors |
dc.subject.lcsh | Genetic algorithms |
dc.subject.lcsh | Telematics |
dc.subject.lcsh | Computer networks--Security measures |
dc.title | Genetic algorithms for designing network security protocols |
dc.type | Part of book or chapter of book |
dc.subject.lemac | Seguretat informàtica |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 3344809 |
dc.description.version | Postprint (published version) |
local.citation.author | Zarza, L.; Forné, J.; Pegueroles, J.; Soriano, M. |
local.citation.publicationName | Advances in artificial intelligence for privacy protection and security |
local.citation.startingPage | 325 |
local.citation.endingPage | 358 |
Files in this item
This item appears in the following Collection(s)
-
Capítols de llibre [21]
-
Capítols de llibre [2]
Except where otherwise noted, content on this work
is licensed under a Creative Commons license
:
Attribution-NonCommercial-NoDerivs 3.0 Spain