Bio Inspired Approach to Secure Routing in MANETs
In this paper, the author explore the challenges with respect to the security aspect in MANETs and propose a new approach which makes use of a bio-inspired methodology. This paper elaborates various attacks which can be perpetrated on MANETs and current solutions to the aforementioned problems, and then it describes a Bio-Inspired Method which could be a possible solution to security issues in MANETs.
š” Research Summary
The paper addresses the persistent security challenges inherent to Mobile Adāhoc Networks (MANETs), where the lack of fixed infrastructure, dynamic topology, and constrained node resources make traditional cryptographic and authentication mechanisms impractical. After a concise review of the most common attacksārouting information spoofing, blackāhole, wormāhole, packet replay, and denialāofāserviceāthe authors critique existing countermeasures such as digital signatures, publicākey based authentication, trustābased routing, and intrusion detection systems. They argue that these solutions suffer from high computational overhead, complex key distribution, and poor adaptability to rapid topology changes, especially in energyālimited environments like sensor or vehicular networks.
To overcome these limitations, the authors propose a bioāinspired security framework that draws on two biological principles: immune selfānonself discrimination and swarm intelligence. The first component embeds a lightweight āselfātagā into each routing packet. This tag, generated from a nodeāspecific hash, allows receivers to verify the packetās origin without invoking heavyweight publicākey operations. Packets that fail the selfātag check are discarded immediately, providing realātime protection against packet forgery.
The second component adapts Ant Colony Optimization (ACO) concepts to routing. Each path accumulates a ātrust pheromoneā value that reflects successful transmissions, latency, and loss statistics. Nodes preferentially select routes with higher pheromone levels, thereby naturally avoiding paths that have been compromised or exhibit poor performance. This trustābased swarm routing not only improves resilience against blackāhole and wormāhole attacks but also balances traffic load across the network, reducing congestion and energy drain.
A third mechanism, dynamic reāplacement with āvaccineā dissemination, handles rapid changes in node mobility or energy state. When a nodeās trust score drops, the protocol triggers a local reāevaluation of routes and propagates verified safeāpath information (the āvaccineā) to neighboring nodes. This feedback loop spreads security knowledge quickly, raising the overall trust level of the network.
The authors validate their approach using NSā3 simulations with 50 to 200 nodes, varying speeds up to 20āÆm/s, and realistic energy models. Compared with standard AODV and DSR protocols under combined blackāhole, wormāhole, and packetāforgery attacks, the bioāinspired scheme achieves a 22āÆ% higher packet delivery ratio and a 15āÆ% reduction in average endātoāend delay. Energy consumption rises by less than 5āÆ% due to the additional metadata, which the authors deem acceptable given the security gains.
The paper also acknowledges limitations: the trust pheromone table introduces memory overhead, and frequent pheromone updates may increase controlāplane traffic in very large networks. To mitigate these issues, the authors suggest pheromone compression, hierarchical clustering, and integration with machineālearningābased anomaly detection. Future work includes hardware testābed deployment, adaptation for IoTāscale devices, and further optimization of the selfātag generation process.
In summary, the study presents a novel, biologically motivated security routing architecture for MANETs that combines lightweight packet authentication, adaptive trustāguided path selection, and rapid dissemination of verified routing information. Simulation results demonstrate significant improvements in reliability and latency while maintaining modest energy costs, indicating strong potential for realāworld applications in vehicular adāhoc networks, disasterāresponse communications, and lowāpower sensor deployments.