Skip to main content

ACO-Based Secure Routing Protocols in MANETs

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1005))

Abstract

Applications of mobile ad hoc networks (MANETs) have gained increasing popularity among different areas of human life and significantly attracted the attention of the researchers in this field. Routing in a MANET plays the vital role in its real-world application. Further, routing in MANET is associated with a set of issues that need to be addressed before its implementation. The issues include satisfaction of specified quality of service (QoS) requirements and security issues. In this paper, we have addressed security issues as our point of focus. Again, security issues can be addressed using various algorithms and out of all, evolutionary technique-based algorithms appear to be more effective for the purpose. Ant colony optimization (ACO) is one of the most popular evolutionary algorithms for optimization. We have carried out an extensive review of ant colony optimization (ACO)-based secure MANET routing protocols and the contents of this paper can help researchers in the field of MANET to devise secure routing protocols, especially using ACO algorithm for addressing the security issues in a MANET.

This is a preview of subscription content, log in via an institution.

References

  1. Panda, N., Pattanayak, B.K.: Defense against co-operative black-hole attack and gray-hole attack in MANET. Int. J. Eng. Technol. 7(3.4), 84–89 (2018)

    Article  Google Scholar 

  2. Panda, P., Gadnayak, K.K., Panda, N.: MANET attacks and their countermeasures: a survey. Int. J. Comput. Sci. Mobile Comput. (IJCSMC) 2(11), 319–330 (2013)

    Google Scholar 

  3. Alhamdy, S.A.S., Noudehi, A.N., Majdara, M.: Solving traveling salesman problem (TSP) using ants colony (ACO) algorithm and comparing with tabu search, simulated annealing and genetic algorithm. J. Appl. Sci. Res. (2012)

    Google Scholar 

  4. Dorigo, M., et al. (eds.): Ant Colony Optimization and Swarm Intelligence: 6th International Conference, ANTS 2008, Brussels, Belgium, September 22–24, 2008, Proceedings, vol. 5217. Springer (2008)

    Google Scholar 

  5. Dorigo, M., Blum, C.: Ant colony optimization theory: a survey. Theoret. Comput. Sci. 344(2–3), 243–278 (2005)

    Article  MathSciNet  Google Scholar 

  6. Dorigo, M., Maniezzo, V., Colorni, A.: Ant system: optimization by a colony of cooperating agents. IEEE Trans. Syst. Man Cybern. B (Cybern.) 26(1), 29–41 (1996)

    Article  Google Scholar 

  7. Stützle, T., Hoos, H.H.: MAX–MIN ant system. Future Gener. Comput. Syst. 16(8), 889–914 (2000)

    Article  Google Scholar 

  8. Dorigo, M., Gambardella, L.M.: Ant colony system: a cooperative learning approach to the traveling salesman problem. IEEE Trans. Evol. Comput. 1(1), 53–66 (1997)

    Article  Google Scholar 

  9. Kapoor, V., Abraham, V.S., Singh, R.: Elliptic curve cryptography. Ubiquity 2008(5), 7:1–7:8 (2008)

    Article  Google Scholar 

  10. Vijayalakshmi, V., Palanivelu, T.: Secure antnet routing algorithm for scalable adhoc networks using elliptic curve cryptography. J. Comput. Sci. 3(12), 939–943 (2007)

    Article  Google Scholar 

  11. Mehfuz, S., Doja, M.N.: Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs. J. Artif. Evol. Appl. 2008 (2008)

    Article  Google Scholar 

  12. Barr, R.: Swans-Scalable Wireless Ad Hoc Network Simulator (2004)

    Google Scholar 

  13. Indirani, G., Selvakumar, K.: Swarm based detection and defense technique for malicious attacks in mobile ad hoc networks. Int. J. Comput. Appl. 50(19), 1–6 (2012)

    Google Scholar 

  14. Jia, Q., Sun, K., Stavrou, A.: Capman: capability-based defense against multi-path denial of service (dos) attacks in manet. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN). IEEE (2011)

    Google Scholar 

  15. Sowmya, K., Rakesh, T., Hudedagaddi, D.P.: Detection and prevention of blackhole attack in MANET using ACO. Int. J. Comput. Sci. Netw. Secur. 12(5), 21 (2012)

    Google Scholar 

  16. Memarmoshrefi, P., Zhang, H., Hogrefe, D.: Investigation of a bioinspired security mechanism in mobile ad hoc networks. In: Proceedings of the WiMob, pp. 709–716 (2013)

    Google Scholar 

  17. Memarmoshrefi, P., Zhang, H., Hogrefe, D.: Social insect-based sybil attack detection in mobile ad-hoc networks. In: Proceedings of the 8th International Conference on Bioinspired Information and Communications Technologies, pp. 141–148 (2014)

    Google Scholar 

  18. Sridhar, S., Baskaran, R.: Ant based trustworthy routing in mobile ad hoc networks spotlighting quality of service. Am. J. Comput. Sci. Inf. Technol. (AJCSIT), 3(1), 64–73 (2015)

    Google Scholar 

  19. Shanthi, K., Murugan, D.: Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wireless Netw. 23(4), 1025–1033 (2017)

    Article  Google Scholar 

  20. Reddy, K.C., Nalla, D.: Identity based authenticated group key agreement protocol. In: International Conference on Cryptology in India. Springer, Berlin (2002)

    Chapter  Google Scholar 

  21. Zhu, S., et al.: LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks. In: Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops, 2003. IEEE (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Niranjan Panda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Panda, N., Pattanayak, B.K. (2020). ACO-Based Secure Routing Protocols in MANETs. In: Patnaik, S., Ip, A., Tavana, M., Jain, V. (eds) New Paradigm in Decision Science and Management. Advances in Intelligent Systems and Computing, vol 1005. Springer, Singapore. https://doi.org/10.1007/978-981-13-9330-3_18

Download citation

Publish with us

Policies and ethics