A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Network Security with Openssl
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
PPSN'06 Proceedings of the 9th international conference on Parallel Problem Solving from Nature
BeeHiveGuard: a step towards secure nature inspired routing algorithms
EuroGP'06 Proceedings of the 2006 international conference on Applications of Evolutionary Computing
IEEE Transactions on Neural Networks
IEEE Network: The Magazine of Global Internetworking
A sense of danger: dendritic cells inspired artificial immune system for manet security
Proceedings of the 10th annual conference on Genetic and evolutionary computation
A survey: algorithms simulating bee swarm intelligence
Artificial Intelligence Review
BeeAIS: artificial immune system security for nature inspired, MANET routing protocol, BeeADHoc
ICARIS'07 Proceedings of the 6th international conference on Artificial immune systems
Hi-index | 0.00 |
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past. However, to the best of our knowledge no attempts have been made to systematically analyze their security vulnerabilities. In this paper, we investigate the security vulnerabilities of BeeAdHoc, a well known power aware, Bio/Nature inspired routing protocol. Our analysis clearly demonstrates that the malicious nodes in an untrusted MANET, where BeeAdHoc is used for routing, can significantly disrupt the normal routing behavior. We then propose a security framework, BeeSec, for BeeAdHoc that enables it to counter the different types of threats. We also designed an empirical framework, embedded into a well known simulator, ns-2, to systematically validate the operational security of BeeSec. An interesting outcome of the research is that BeeSec, even with significant overhead of the security framework, achieves better performance as compared to state-of-the-art, non-secure, classical routing protocols AODV and DSR.