Genetic Evolution and Adaptation of Advanced Protocols for Ad Hoc Network Hardware Systems

  • Jennifer Jackson
  • Mark Leeson
Conference paper


The diversity of future technologies requiring ad hoc networks to operate within unpredicted situations will mean an increase in the required flexibility of the actual protocols used for communicating information. A methodology is proposed to genetically evolve the optimum ad hoc network communication protocol under any given network scenario. The methodology creates and dynamically adapts the communication protocol based upon an alphabet of characteristics and performance metrics using simple protocol mapping techniques and minimisation of a fitness function via a genetic selection process. A scenario has been created to evaluate the performance of the methodology in finding the optimum solution. Preliminary results show that the methodology is able to find the global optimum within several runs. The methodology could be enhanced using Field Programmable Gate Array (FPGA) hardware nodes for real time performance and distributed control.


Medium Access Control Transmission Control Protocol Field Programmable Gate Array Communication Protocol Medium Access Control Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.



This work was supported by the Complexity Science Doctoral Training Centre at the University of Warwick under EPSRC funding. The authors would like to thank Professor Sadie Creese of the University of Warwick for helpful review comments.


  1. 1.
    E. Royer, and C.-K. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks,” IEEE Personal Communications Magazine, vol. 6, no. 2, 1999.Google Scholar
  2. 2.
    P. Ocenasek, and M. Sveda, “An approach to automated design of security protocols,” in Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06), 2006.Google Scholar
  3. 3.
    H. Xue, H. Zhang, and S. Qing, “A schema of automated design security protocols,” in International Conference on Computational Intelligence and Security Workshops, 2007.Google Scholar
  4. 4.
    A. Perrig, and D. Song, “On a first step to the automatic generation of security protocols.”Google Scholar
  5. 5.
    S. Virtanen, J. Isoaho, T. Westerlund, and J. Lilius, “A programmable general protocol processor - a proposal for an expandable architecture,” in URSI/IEEE XXIV Convention on Radio Science, 1999.Google Scholar
  6. 6.
    J. Oberg, A. Kumar, and A. Hemani, “Scheduling of outputs in grammar-based hardware synthesis of data communication protocols,” IEEE.Google Scholar
  7. 7.
    I. Pavlosoglou, M. S. Leeson, and R. J. Green, “Applying emergence to the design of routing protocols for the security of wireless ad hoc networks,” in Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005.Google Scholar
  8. 8.
    R. Jurdak, C. V. Lopes, and P. B. Baldi, “A survey, classification and comparitive analysis of medium access control protocols for ad hoc networks,” IEEE Communications Surveys, vol. 6, no. 1, 2004.Google Scholar
  9. 9.
    F. Wang, A. Ghosh, C. Sankaren et al., “Mobile wimax systems: Performance and evolution,” IEEE Communications Magazine, vol. 46, no. 10, 2008.Google Scholar
  10. 10.
    E. D. Pinedo-Frausto, and J. A. Garcia-Macias, “An experimental analysis of zigbee networks,” in IEEE Conference on Local Computer Networks, 2008.Google Scholar
  11. 11.
    E. Ferro, and F. Potorti, “Bluetooth and wi-fi wireless protocols: A survey and a comparison,” IEEE Wireless Communications, vol. February, 2005.Google Scholar
  12. 12.
    A. C. V. Gummalla, and J. O. Limb, "Wireless medium access control protocols," IEEE Communications Surveys & Tutorials, Second Quarter, 2000.Google Scholar
  13. 13.
    P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, and L. Viennot, “Optimized link state routing for ad hoc networks,” in Technology for the 21st Century Multi Topic Conference, 2001.Google Scholar
  14. 14.
    X. Zou, B. Ramamurthy, and S. Magliveras, “Routing techniques in wireless ad hoc networks - classification and comparison,” in Proceedings of the Sixth World Multiconference on Systemics, Cybernetics, and Informatics, 2002.Google Scholar
  15. 15.
    J. J. Garcia-Luna-Aceves, and M. Spohn, “Source-tree routing in wireless networks,” in Seventh International conference on Network Protocols, 1999.Google Scholar
  16. 16.
    D. Whitley, “A genetic algorithm tutorial,” Statistics and Computing, vol. 4, 1994.Google Scholar
  17. 17.

Copyright information

© Springer-Verlag London Limited 2011

Authors and Affiliations

  • Jennifer Jackson
    • 1
  • Mark Leeson
    • 2
  1. 1.Complexity Science, University of WarwickCoventryUK
  2. 2.Engineering, University of WarwickCoventryUK

Personalised recommendations