Table of Contents
Journal of Artificial Evolution and Applications
Volume 2008 (2008), Article ID 236803, 16 pages
http://dx.doi.org/10.1155/2008/236803
Research Article

Swarm Intelligent Power-Aware Detection of Unauthorized and Compromised Nodes in MANETs

1Department of Electrical Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi 110025, India
2Department of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi 110025, India

Received 2 July 2007; Revised 14 October 2007; Accepted 15 November 2007

Academic Editor: Terence Soule

Copyright © 2008 Shabana Mehfuz and M. N. Doja. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. B. Reddy, I. Karthigeyan, B. S. Manoj, and C. S. R. Murthy, “Quality of service provisioning in ad hoc wireless networks: a survey of issues and solutions,” Ad Hoc Networks, vol. 4, no. 1, pp. 83–124, 2006. View at Publisher · View at Google Scholar
  2. S. Guo and O. Yang, “QoS-aware minimum energy multicast tree construction in wireless ad hoc networks,” Ad Hoc Networks, vol. 2, no. 3, pp. 217–229, 2004. View at Publisher · View at Google Scholar
  3. M. Dorigo and G. Di Caro, “The ant colony optimization meta- heuristic,” in New Ideas in Optimization, D. Corne, M. Dorigo, and F. Glover, Eds., pp. 11–32, McGraw-Hill, New York, NY, USA, 1999.
  4. E. M. Royer and C.-K. Toh, “A review of current routing protocols for ad hoc mobile wireless networks,” IEEE Personal Communications, vol. 6, no. 2, pp. 46–55, 1999. View at Publisher · View at Google Scholar
  5. C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers,” Computer Communications Review, vol. 24, no. 4, pp. 234–244, 1994. View at Publisher · View at Google Scholar
  6. C. E. Perkins and E. Royer, “Ad hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop Mobile Computing Systems Applications, pp. 90–100, New Orleans, La, USA, February 1999.
  7. Y.-C. Hu, D. B. Johnson, and A. Perrig, “SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks,” Ad Hoc Networks, vol. 1, no. 1, pp. 175–192, 2003. View at Publisher · View at Google Scholar
  8. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shield, and E. M. B-Royer, “A secure routing protocol for ad hoc networks,” in Proceedings of the 10th International Conference on Network Prorocols (ICNP '02), pp. 78–87, IEEE Press, Paris, France, November 2002.
  9. W. J. Gutjahr, “ACO algorithms with guaranteed convergence to the optimal solution,” Tech. Rep. ISDS 2001-02, University of Vienna, Vienna, Austria.
  10. T. Stutzle and M. Dorigo, “A short convergence proof for a class of ACO algorithms,” Tech. Rep. 35, IRIDIA, Brussels, Belgium, 2000.
  11. M. Günes and O. Spaniol, “Routing algorithms for mobile multihop ad hoc networks,” in Proceedings of International Workshop on Next Generation Network Technologies, pp. 20–24, October 2002.
  12. J. S. Baras and H. Mehta, “A probabilistic emergent routing algorithm for mobile ad hoc networks,” in Proceedings of the Conference on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt '03), Sophia-Antipolis, France, March 2003.
  13. M. Heissenbüttel and T. Braun, “Ants-based routing in large scale mobile ad hoc networks,” in Proceedings of the Kommunikation in Verteilten Systemen (KiVS '03), March 2003.
  14. M. Roth and S. Wicker, “Termite: emergent ad-hoc networking,” in Proceedings of the 2nd Mediterranean Workshop on Ad-Hoc Networks (MedHoc '03), Mahdia, Tunisia, June 2003.
  15. C.-C. Shen, C. Jaikaeo, C. Srisathapornphat, Z. Huang, and S. Rajagopalan, “Ad hoc networking with swarm intelligence,” in Proceedings of the 4th International Workshop on Ant Colony, Optimization and Swarm Intelligence (ANTS '04), vol. 3172 of Lecture Notes in Computer Science, pp. 262–269, Springer, Brussels, Belgium, September 2004.
  16. M. N. Doja and S. Mehfuz, “A comprehensive review of power conservation strategies for mobile ad hoc networks,” in Proceedings of International Conference on Wireless Networks, pp. 12–18, Hyderabad, India, December 2005.
  17. S. Singh, M. Woo, and C. S. Raghavendra, “Power aware routing in mobile ad hoc networks,” in Proceedings of the Annual International Conference on Mobile Computing and Networking (MOBICOM '98), pp. 181–190, Dallas, Tex, USA, October 1998.
  18. C.-K. Toh, “Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks,” IEEE Communications Magazine, vol. 39, no. 6, pp. 138–147, 2001. View at Publisher · View at Google Scholar
  19. Q. Li, J. Aslam, and D. Rus, “Online power-aware routing in wireless ad-hoc networks,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM '01), pp. 97–107, Rome, Italy, July 2001.
  20. M. Maleki, K. Dantu, and M. Pedram, “Power-aware source routing protocol for mobile ad hoc networks,” in Proceedings of International Symposium on Low Power Electronics and Design, Digest of Technical Papers, pp. 72–75, Monterey, Calif, USA, August 2002.
  21. R. Oppliger, Internet and Intranet Security, Artech House, Norwood, Mass, USA, 1998.
  22. A. Cardenas, N. Benammar, G. Papageorgiou, and J. Baras, “Cross-layered security analysis of wireless ad hoc networks,” in Proceedings of the 24th Army Science Conference, p. 3, Orlando, Fla, USA, November 2004.
  23. J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, “Adaptive security for multi-layer ad-hoc networks,” Wireless Communications and Mobile Computing, vol. 2, no. 5, pp. 533–547, 2002. View at Publisher · View at Google Scholar
  24. L. Blažević, L. Buttyán, S. Čapkun, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec, “Self-organization in mobile ad hoc networks: the approach of terminodes,” IEEE Communications Magazine, vol. 39, no. 6, pp. 166–173, 2001. View at Publisher · View at Google Scholar
  25. P. Kyasanur and N. H. Vaidya, “Detection and handling of MAC layer misbehavior in wireless networks,” in Proceedings of International Conference on Dependable Systems and Networks, pp. 173–182, San Francisco, Calif, USA, June 2003.
  26. Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 275–283, Boston, Mass, USA, August 2000.
  27. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Aridane: a secure on-demand routing protocol for ad hoc networks,” in Proceedings of the 8th International Conference on Mobile Computing and Networking (MOBICOM '02), pp. 12–23, ACM Press, Atlanta, Ga, USA, September 2002.
  28. Y. Hu, A. Perrig, and D. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), vol. 3, pp. 1976–1986, New York, NY, USA, June 2002.
  29. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” in Proceedings of International Conference on Network Protocols (ICNP '01), pp. 251–260, Riverside, Calif, USA, November 2001.
  30. L. Buttyán and J. Hubaux, “Enforcing service availability in mobile ad-hoc WANs,” in Proceedings of the 1st Annual International Symposium on Mobile Ad Hoc Networking and Computing, pp. 87–96, Boston, Mass, USA, August 2000. View at Publisher · View at Google Scholar
  31. J.-P. Hubaux, L. Buttyán, and S. Čapkun, “The quest for security in mobile ad hoc networks,” in Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '01), pp. 146–155, Long Beach, Calif, USA, October 2001.
  32. P. Papadimitratos, Z. J. Haas, and E. G. Sirer, “Path set selection in mobile ad hoc networks,” in Proceedings of the 3rd International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '02), pp. 1–11, Lausanne, Switzerland, June 2002.
  33. B. DeCleene, L. Dondeti, and S. Griffin et al., “Secure group communications for wireless networks,” in Proceedings of the IEEE Military Communications Conference (MILCOM '01), vol. 1, pp. 113–117, Washington, DC, USA, November 2001. View at Publisher · View at Google Scholar
  34. C. Perkins, “Ad hoc on-demand distance-vector routing (AODV),” 2001, IETF draft.
  35. B. Sun, K. Wu, and U. W. Pooch, “Towards adaptive intrusion detection in mobile ad hoc networks,” in Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '04), vol. 6, pp. 3551–3555, Dallas, Tex, USA, November 2004. View at Publisher · View at Google Scholar
  36. C. Douligeris and A. Mitrokotsa, “DDOS attacks and defense mechanisms: classification and state-of-the-art,” Computer Networks, vol. 44, no. 5, pp. 643–666, 2004. View at Publisher · View at Google Scholar
  37. I. Chlamtac, M. Conti, and J. J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003. View at Publisher · View at Google Scholar
  38. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” IEEE Wireless Communications, vol. 11, no. 1, pp. 38–47, 2004. View at Publisher · View at Google Scholar
  39. M. G. Zapata, “Secure Ad Hoc On-Demand Distance Vector (SAODV) Routing,” October 2001, IETF Internet-Draft, draft-guerreromanet-saodv-00.txt.
  40. Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,” in Proceedings of the Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 275–283, Boston, Mass, USA, August 2000.
  41. O. Kachirski and R. Guha, “Effective intrusion detection using multiple sensors in wireless ad hoc networks,” in Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS '03), vol. 2, pp. 57–65, Big Island, Hawaii, USA, February 2003. View at Publisher · View at Google Scholar
  42. J. Uroch, D. Johnson, and A. D. Maltz, “Thc dynamic source routing protocol for mobile ad hoc networks,” IETF Internet Draft, December 1998, http://www.ietf.org/internetdrafts/draft-ielf-manet-dsr-0l.txt.
  43. P. Papadimitratos and Z. Hass, “Secure routing for mobile ad hoc networks,” in Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS '02), pp. 27–31, San Antonio, Tex, USA, January 2002.
  44. S. R. Das, C. E. Perkins, and E. M. Royer, “Performance comparison of two on-demand routing protocols for ad hoc networks,” in Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00), vol. 1, pp. 3–12, Tel Aviv, Israel, March 2000.
  45. M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks,” Ad Hoc Networks, vol. 2, no. 1, pp. 1–22, 2004. View at Publisher · View at Google Scholar
  46. O. Guerra and M. Sánchez-Adame, “Network ad hoc routing algorithm: an application with bluetooth,” in Proceedings of the 17th International Conference on Electronics, Communications and Computers (CONIELECOMP '07) , p. 6, Cholula, Mexico, February 2007. View at Publisher · View at Google Scholar
  47. S. M. Bo, H. Xiao, A. Adereti, and J. A. Malcolm, “A performance comparison of wireless ad hoc network routing protocols under security attack,” in Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS '07), pp. 50–55, Manchester, UK, August 2007. View at Publisher · View at Google Scholar
  48. N. Asokan and P. Ginzboorg, “Key agreement in ad hoc networks,” Computer Communications, vol. 23, no. 17, pp. 1627–1637, 2000. View at Publisher · View at Google Scholar
  49. H. Krawczyk, M. Bellare, and R. Canetti, “HMAC: Keyed-hashing for message authentication,” February 1997, Request for Comments RFC 2104.
  50. R. Barr, March 2004, SWANS- Scalable wireless ad hoc network simulator: user guide and tutorial.
  51. R. Barr, September 2003, JiST-Java in simulation time: user guide and tutorial.
  52. L. M. Feeney, “An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks,” Mobile Networks and Applications, vol. 6, no. 3, pp. 239–249, 2001. View at Publisher · View at Google Scholar