Abstract
This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. The algorithm uses the beaver behavioral patterns in constructing dams and water tunnels to create analogous secure tunnels and information lakes. The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization with the assumption that the beaver agent is deployed on a mobile device (e.g. smart mobile phone). An algorithmic approach to design the beaver agent and swarm is followed here. The set of algorithms presented is complemented by critical review outlining the further work needed.
Original language | English |
---|---|
Title of host publication | Proceedings 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009 |
Pages | 3657-3662 |
Number of pages | 6 |
DOIs | |
Publication status | Published - 2009 |
Event | 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009 - San Antonio, TX, United States Duration: 11 Oct 2009 → 14 Oct 2009 |
Conference
Conference | 2009 IEEE International Conference on Systems, Man and Cybernetics, SMC 2009 |
---|---|
Country/Territory | United States |
City | San Antonio, TX |
Period | 11/10/09 → 14/10/09 |