Skip to main content

Genetic Evolution and Adaptation of Advanced Protocols for Ad Hoc Network Hardware Systems

  • Conference paper
  • First Online:
Book cover Research and Development in Intelligent Systems XXVII (SGAI 2010)

Abstract

The diversity of future technologies requiring ad hoc networks to operate within unpredicted situations will mean an increase in the required flexibility of the actual protocols used for communicating information. A methodology is proposed to genetically evolve the optimum ad hoc network communication protocol under any given network scenario. The methodology creates and dynamically adapts the communication protocol based upon an alphabet of characteristics and performance metrics using simple protocol mapping techniques and minimisation of a fitness function via a genetic selection process. A scenario has been created to evaluate the performance of the methodology in finding the optimum solution. Preliminary results show that the methodology is able to find the global optimum within several runs. The methodology could be enhanced using Field Programmable Gate Array (FPGA) hardware nodes for real time performance and distributed control.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. E. Royer, and C.-K. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks,” IEEE Personal Communications Magazine, vol. 6, no. 2, 1999.

    Google Scholar 

  2. P. Ocenasek, and M. Sveda, “An approach to automated design of security protocols,” in Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06), 2006.

    Google Scholar 

  3. H. Xue, H. Zhang, and S. Qing, “A schema of automated design security protocols,” in International Conference on Computational Intelligence and Security Workshops, 2007.

    Google Scholar 

  4. A. Perrig, and D. Song, “On a first step to the automatic generation of security protocols.”

    Google Scholar 

  5. S. Virtanen, J. Isoaho, T. Westerlund, and J. Lilius, “A programmable general protocol processor - a proposal for an expandable architecture,” in URSI/IEEE XXIV Convention on Radio Science, 1999.

    Google Scholar 

  6. J. Oberg, A. Kumar, and A. Hemani, “Scheduling of outputs in grammar-based hardware synthesis of data communication protocols,” IEEE.

    Google Scholar 

  7. I. Pavlosoglou, M. S. Leeson, and R. J. Green, “Applying emergence to the design of routing protocols for the security of wireless ad hoc networks,” in Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005.

    Google Scholar 

  8. R. Jurdak, C. V. Lopes, and P. B. Baldi, “A survey, classification and comparitive analysis of medium access control protocols for ad hoc networks,” IEEE Communications Surveys, vol. 6, no. 1, 2004.

    Google Scholar 

  9. F. Wang, A. Ghosh, C. Sankaren et al., “Mobile wimax systems: Performance and evolution,” IEEE Communications Magazine, vol. 46, no. 10, 2008.

    Google Scholar 

  10. E. D. Pinedo-Frausto, and J. A. Garcia-Macias, “An experimental analysis of zigbee networks,” in IEEE Conference on Local Computer Networks, 2008.

    Google Scholar 

  11. E. Ferro, and F. Potorti, “Bluetooth and wi-fi wireless protocols: A survey and a comparison,” IEEE Wireless Communications, vol. February, 2005.

    Google Scholar 

  12. A. C. V. Gummalla, and J. O. Limb, "Wireless medium access control protocols," IEEE Communications Surveys & Tutorials, Second Quarter, 2000.

    Google Scholar 

  13. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, and L. Viennot, “Optimized link state routing for ad hoc networks,” in Technology for the 21st Century Multi Topic Conference, 2001.

    Google Scholar 

  14. X. Zou, B. Ramamurthy, and S. Magliveras, “Routing techniques in wireless ad hoc networks - classification and comparison,” in Proceedings of the Sixth World Multiconference on Systemics, Cybernetics, and Informatics, 2002.

    Google Scholar 

  15. J. J. Garcia-Luna-Aceves, and M. Spohn, “Source-tree routing in wireless networks,” in Seventh International conference on Network Protocols, 1999.

    Google Scholar 

  16. D. Whitley, “A genetic algorithm tutorial,” Statistics and Computing, vol. 4, 1994.

    Google Scholar 

  17. "Qualnet." http://www.scalable-networks.com.

Download references

Acknowledgments

This work was supported by the Complexity Science Doctoral Training Centre at the University of Warwick under EPSRC funding. The authors would like to thank Professor Sadie Creese of the University of Warwick for helpful review comments.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag London Limited

About this paper

Cite this paper

Jackson, J., Leeson, M. (2011). Genetic Evolution and Adaptation of Advanced Protocols for Ad Hoc Network Hardware Systems. In: Bramer, M., Petridis, M., Hopgood, A. (eds) Research and Development in Intelligent Systems XXVII. SGAI 2010. Springer, London. https://doi.org/10.1007/978-0-85729-130-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-0-85729-130-1_32

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-0-85729-129-5

  • Online ISBN: 978-0-85729-130-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics