Abstract
Applications of mobile ad hoc networks (MANETs) have gained increasing popularity among different areas of human life and significantly attracted the attention of the researchers in this field. Routing in a MANET plays the vital role in its real-world application. Further, routing in MANET is associated with a set of issues that need to be addressed before its implementation. The issues include satisfaction of specified quality of service (QoS) requirements and security issues. In this paper, we have addressed security issues as our point of focus. Again, security issues can be addressed using various algorithms and out of all, evolutionary technique-based algorithms appear to be more effective for the purpose. Ant colony optimization (ACO) is one of the most popular evolutionary algorithms for optimization. We have carried out an extensive review of ant colony optimization (ACO)-based secure MANET routing protocols and the contents of this paper can help researchers in the field of MANET to devise secure routing protocols, especially using ACO algorithm for addressing the security issues in a MANET.
This is a preview of subscription content, log in via an institution.
References
Panda, N., Pattanayak, B.K.: Defense against co-operative black-hole attack and gray-hole attack in MANET. Int. J. Eng. Technol. 7(3.4), 84–89 (2018)
Panda, P., Gadnayak, K.K., Panda, N.: MANET attacks and their countermeasures: a survey. Int. J. Comput. Sci. Mobile Comput. (IJCSMC) 2(11), 319–330 (2013)
Alhamdy, S.A.S., Noudehi, A.N., Majdara, M.: Solving traveling salesman problem (TSP) using ants colony (ACO) algorithm and comparing with tabu search, simulated annealing and genetic algorithm. J. Appl. Sci. Res. (2012)
Dorigo, M., et al. (eds.): Ant Colony Optimization and Swarm Intelligence: 6th International Conference, ANTS 2008, Brussels, Belgium, September 22–24, 2008, Proceedings, vol. 5217. Springer (2008)
Dorigo, M., Blum, C.: Ant colony optimization theory: a survey. Theoret. Comput. Sci. 344(2–3), 243–278 (2005)
Dorigo, M., Maniezzo, V., Colorni, A.: Ant system: optimization by a colony of cooperating agents. IEEE Trans. Syst. Man Cybern. B (Cybern.) 26(1), 29–41 (1996)
Stützle, T., Hoos, H.H.: MAX–MIN ant system. Future Gener. Comput. Syst. 16(8), 889–914 (2000)
Dorigo, M., Gambardella, L.M.: Ant colony system: a cooperative learning approach to the traveling salesman problem. IEEE Trans. Evol. Comput. 1(1), 53–66 (1997)
Kapoor, V., Abraham, V.S., Singh, R.: Elliptic curve cryptography. Ubiquity 2008(5), 7:1–7:8 (2008)
Vijayalakshmi, V., Palanivelu, T.: Secure antnet routing algorithm for scalable adhoc networks using elliptic curve cryptography. J. Comput. Sci. 3(12), 939–943 (2007)
Mehfuz, S., Doja, M.N.: Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs. J. Artif. Evol. Appl. 2008 (2008)
Barr, R.: Swans-Scalable Wireless Ad Hoc Network Simulator (2004)
Indirani, G., Selvakumar, K.: Swarm based detection and defense technique for malicious attacks in mobile ad hoc networks. Int. J. Comput. Appl. 50(19), 1–6 (2012)
Jia, Q., Sun, K., Stavrou, A.: Capman: capability-based defense against multi-path denial of service (dos) attacks in manet. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN). IEEE (2011)
Sowmya, K., Rakesh, T., Hudedagaddi, D.P.: Detection and prevention of blackhole attack in MANET using ACO. Int. J. Comput. Sci. Netw. Secur. 12(5), 21 (2012)
Memarmoshrefi, P., Zhang, H., Hogrefe, D.: Investigation of a bioinspired security mechanism in mobile ad hoc networks. In: Proceedings of the WiMob, pp. 709–716 (2013)
Memarmoshrefi, P., Zhang, H., Hogrefe, D.: Social insect-based sybil attack detection in mobile ad-hoc networks. In: Proceedings of the 8th International Conference on Bioinspired Information and Communications Technologies, pp. 141–148 (2014)
Sridhar, S., Baskaran, R.: Ant based trustworthy routing in mobile ad hoc networks spotlighting quality of service. Am. J. Comput. Sci. Inf. Technol. (AJCSIT), 3(1), 64–73 (2015)
Shanthi, K., Murugan, D.: Pair-wise key agreement and hop-by-hop authentication protocol for MANET. Wireless Netw. 23(4), 1025–1033 (2017)
Reddy, K.C., Nalla, D.: Identity based authenticated group key agreement protocol. In: International Conference on Cryptology in India. Springer, Berlin (2002)
Zhu, S., et al.: LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks. In: Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops, 2003. IEEE (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Panda, N., Pattanayak, B.K. (2020). ACO-Based Secure Routing Protocols in MANETs. In: Patnaik, S., Ip, A., Tavana, M., Jain, V. (eds) New Paradigm in Decision Science and Management. Advances in Intelligent Systems and Computing, vol 1005. Springer, Singapore. https://doi.org/10.1007/978-981-13-9330-3_18
Download citation
DOI: https://doi.org/10.1007/978-981-13-9330-3_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9329-7
Online ISBN: 978-981-13-9330-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)