Title :
Beaver algorithm for network security and optimization: Preliminary report
Author_Institution :
Dept. of Inf., De Montfort Univ., Leicester, UK
Abstract :
This paper presents the theoretical account for designing and developing an algorithm for network security inspired by the behavior of Beavers. The algorithm uses the beaver behavioral patterns in constructing dams and water tunnels to create analogous secure tunnels and information lakes. The approach is a user-centric and the paper demonstrates the use of the algorithm in security and route optimization with the assumption that the beaver agent is deployed on a mobile device (e.g. smart mobile phone). An algorithmic approach to design the beaver agent and swarm is followed here. The set of algorithms presented is complemented by critical review outlining the further work needed.
Keywords :
mobile radio; particle swarm optimisation; telecommunication network routing; telecommunication security; Beaver algorithm; beaver behavioral patterns; mobile device; network optimization; network security; route optimization; swarm intelligence; user-centric approach; Ad hoc networks; Algorithm design and analysis; Animals; Buildings; Computer security; Data security; Information security; Mobile handsets; Particle swarm optimization; Protection;
Conference_Titel :
Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on
Conference_Location :
San Antonio, TX
Print_ISBN :
978-1-4244-2793-2
Electronic_ISBN :
1062-922X
DOI :
10.1109/ICSMC.2009.5346866