Show simple item record

dc.contributor.authorZarza, Luis
dc.contributor.authorForné Muñoz, Jorge
dc.contributor.authorPegueroles Vallés, Josep R.
dc.contributor.authorSoriano Ibáñez, Miguel
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica
dc.date.accessioned2010-11-02T13:07:28Z
dc.date.available2010-11-02T13:07:28Z
dc.date.created2010
dc.date.issued2010
dc.identifier.citationZarza, L. [et al.]. Genetic algorithms for designing network security protocols. A: "Advances in artificial intelligence for privacy protection and security". World Scientífic, 2010, p. 325-358.
dc.identifier.isbn978-981-279-032-3
dc.identifier.urihttp://hdl.handle.net/2117/10076
dc.description.abstractThe design of cryptographic and security protocols for new scenarios and applications can be computationally expensive. Examples of these can be sensor or mobile ad-hoc networks where thousands of nodes can be involved. In such cases, the aid of an automated tool generating protocols for a predefined problem can be of great utility. This work uses the genetic algorithms (GA) techniques for the automatic design of security networked protocols. When using GA for optimizing protocols two aspects are critical: the genome definition and the evaluation function. We discuss how security protocols can be represented as binary strings and can be interpreted as security protocols; moreover we define several basic criteria for evaluating security protocols. Finally, we present the software we developed for generating secure communications protocols and show some examples and obtained results.
dc.format.extent34 p.
dc.language.isoeng
dc.publisherWorld Scientífic
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Spain
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/
dc.subjectÀrees temàtiques de la UPC::Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors
dc.subject.lcshGenetic algorithms
dc.subject.lcshTelematics
dc.subject.lcshComputer networks--Security measures
dc.titleGenetic algorithms for designing network security protocols
dc.typePart of book or chapter of book
dc.subject.lemacSeguretat informàtica
dc.contributor.groupUniversitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics
dc.rights.accessRestricted access - publisher's policy
local.identifier.drac3344809
dc.description.versionPostprint (published version)
local.citation.authorZarza, L.; Forné, J.; Pegueroles, J.; Soriano, M.
local.citation.publicationNameAdvances in artificial intelligence for privacy protection and security
local.citation.startingPage325
local.citation.endingPage358


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 Spain
Except where otherwise noted, content on this work is licensed under a Creative Commons license : Attribution-NonCommercial-NoDerivs 3.0 Spain