SlideShare a Scribd company logo
PREPARED BY
KISHAN PATEL
VARIOUS METAHEURISTIC
ALGORITHMS FOR SECURING
VANET
OUTLINE
 INTODUCTION OF VANET
 SECURITY IN VANET
 ADVANTAGES AND DISADVANTAGES
 METAHEURISTIC
 METAHEURISTIC TECHNIQUES
 PROPERTIES OF METAHEURISTIC
 WHY METAHEURISTIC…?
 METAHEURISTIC ALGORITHMS
 SURVEY OF VARIOUS METAHEURISTIC
 CONCLUSION
 REFERENCES
INTRODUCTION OF VANET
 Vehicular ad hoc network (VANET) uses cars as mobile nodes in
a MANET to create a mobile network.
 Vehicular ad hoc networks are a subgroup of mobile ad hoc
networks (MANETs).
 Cars fall out of the signal range and drop out of the network,
other cars can join, by connecting vehicles to one another form a
wireless network called “Vehicular Ad Hoc Network.
 Due to high mobility, frequent changes in topology such
characteristics of this network that make routing decisions more
challenging.
3
SECURITY IN VANET
 The nature of VANETs could lead to malicious attacks.
o Predictable movement of nodes.
o High mobility of victim/attacker.
 Adversaries could break the system.
o Data sinkholes (black hole).
o Gray hole
o Feed false information.
o Flood the system.
 Security measures must be taken to avoid malicious attacks on the
system
4
ADVANTAGES AND DISADVANTAGES
Advantages
 Public Safety.
 Traffic Management.
 Traffic Coordination and Assistance.
 Traveller Information Support.
 Comfort.
 Air pollution emission measurement and reduction.
Disadvantages
 Flooding in route discovery initial phase.
 Wasted band width.
 Delay.
 Increasing network congestion.
 External sources for destination location.
5
METAHEURISTIC
 Heuristic means to find or to discover by trial and error. And meta
means higher level and metaheuristics generally perform better
than simple heuristics.
 The word "metaheuristic” can be considered as a "master strategy
that guides and modifies other heuristics to produce solutions.
Generally metaheuristic is used for solving problem in ad hoc
networks.
METAHUERISTIC TECHNIQUES
 There are two techniques:
 Online metaheuristic approach and Offline metaheuristic
approach.
 The main difference between them is the moment when they are
applied for solving problem.
1. Online metaheuristic approaches are used for decision making
or solving the problem during run time.
2. Offline metaheuristic approaches are useful when there is no
requirement for system to adapt change during runtime.
PROPERTIES OF METAHEURISTIC
1. Search process is influenced by Metaheuristic approch.
2. The main purpose of the search process is to find near to
optimal solutions.
3. It range from simple local search procedures to complex
processes.
4. They are non-deterministic.
5. They are not problem-specific
WHY METAHEURISTIC….?
1. Metaheuristics are used for solving the security and routing
problems in ad hoc networks.
2. Security problem in the network may be due to selfish and
malicious node. Metaheuristic approach can be used for
overcoming the problem of node misbehaving in ad hoc
networks.
3. For route optimization e.g selecting the shortest and quality
route from source to destination in the ad hoc networks.
4. Metaheuristic approach is also used for solving the supply
chain problems.
5. Metaheuristic approach is important for generating optimum set
of test data in software testing.
METAHEURISTIC ALGORITHMS
 Metaheuristic is a procedure for finding or select a lower
heuristic and provide a good solution to an optimization and
security problem with limited computation
capacity. Metaheuristics may make few assumptions about the
problems in ad hoc networks so it is used for a variety of
problems.
 As shown in next figure classification of metaheuristics. It
includes Ant colony optimization (ACO), Tabu search (TS),
scatter search(SS), Variable neighborhood search (VNS), Guided
local search (GLS), iterated local search (ILS), simulated
annealing (SA), evolutionary algorithms (EC) etc.
CONT…
 Ant colony optimization (ACO):
It is a population-based metaheuristic for the solution to the
difficult combinatorial optimization problems. The inspiring
source of ACO is behavior of real ants. This behavior empowers
ants to find shortest paths from food sources to their nest. While
walking from food sources to the nest, ants dregs a substance
called pheromone on the ground. This behavior is the basis for a
cooperative interaction for emerging of shortest paths.
 Tabu search :
It is a heuristic procedure for solving optimization problems.
Tabu search has obtained optimal and near to optimal solutions to
a wide variety of practical problems in varied applications such
as scheduling, character recognition.
CONT…
 Scatter Search (SS):
It is designed to operate on a set of points, which is called
reference points. It also captures information which is not present
in reference points. It takes advantage of auxiliary heuristic
methods.
 Variable neighbourhood search (VNS):
It is based on simple principal . It starts from feasible solution X
and from a predefined set of steps, chooses a random solution
within the neighborhood of X and move there if the solution is
better.
CONT…
 Simulated annealing :
It is a probabilistic metaheuristic for the global optimization
problem for finding a good approximation to the global optimum
for a given function in a large search space.
 Evolutionary computing:
Evolution is a process in which functioning deals with
chromosomes. The process takes place during the reproduction
stage. For e.g mutation and recombination. It is combination of
genetic algorithms, evolution strategies, evolutionary
programming and genetic programming.
SURVEY OF VARIOUS
METAHEURISTICS
16
Title Mechanism /
Algorithm
Purpose Methodology
TARA: Trusted Ant Colony Multi
Agent Based Routing Algorithm
for Mobile Ad-Hoc Networks.
TARA: Trusted Ant Colony Multi
Agent Based Routing Algorithm
To avoid trust value propagation. To
minimize the number of messages
been exchanged. To find the best
route for delivery.
Trust value of each node is directly
aped to the route and no need to
propagate the trust values like other
trusted protocols.
Trust Based QOS Protocol(TBQP)
using Metaheuristic
Genetic Algorithm for Optimizing
and
Securing MANET
Trust Based QOS Protocol (TBQP)
Using Meta-heuristic Genetic
Algorithm.
To provide QOS by selecting the
fittest shortest route among the
number of routes to provide
optimization. Acquaintance
And Authentication of packets for
routing in network.
Intriguing a trust based packet
delivering scheme for detecting and
isolating the malignant nodes using
the routing layer information. A
trust weigh is maintained and a
node is remunerated by decreasing
or increasing the trust weigh value.
If the trust weigh falls below a trust
threshold, node is marked as
malicious node.
Performance analysis of optimized
Trust AODV using ant Algorithms
Ant colony optimization To sustain security against the dos
attacks.
At agents can move freely to find
destination it will update positive
pheromone to the routing table. The
pheromone is deposited if node is
trusted.
17
Title Mechanism /
Algorithm
Purpose Methodology
Ant Colony and Load Balancing
Optimizations for AODV Routing
Protocol
Multi-Route AODV Ant routing
(MRAA)
Load balancing( LBMRAA)
To reduce
the routing overhead, buffer
overflow, end-to-end delay and
increase the performance
Data packets are balanced
over discovered paths and energy
consumption is distributed across
many nodes through network.
Secure Ant-Based Routing Protocol
for Wireless Sensor Network.
Secure Ant-Based Routing
Protocol(SARP)
To provide Route security in
network.
It uses two paths for data
forwarding to overcome the
problem of node failure and to
increase the efficiency of overall
network.
MANET link Performance using Ant
Colony
Optimization and Particle Swarm
Optimization
Algorithms.
Ant colony optimization and
Particle swarm optimization.
Finds the best solution over the
particle’s position and velocity with
the cost and minimum. End-to-end
delay.
Ant Colony Optimization
(ACO) algorithm uses mobile agents
as ants to discover feasible and best
path in a network and PSO finds the
best solution over the particle’s
position and velocity with the
objective of cost and minimum End-
to-end delay.
AntTrust: A Novel Ant Routing
Protocol forWireless Ad-hoc
Network Based on
Trust Between Nodes.
Ant Trust Routing Protocol To increase the security of route.
And malicious manipulations
of data packets.
AntTrust is located precisely in the
context of the security of routing. It
also facilitates malicious
manipulations of data packets.
18
Title Mechanism /
Algorithm
Purpose Methodology
Mitigating Routing Misbehavior
Using Ant-Tabu-Based
Routing Algorithm for Wireless
Ad-Hoc Networks
Ant-Tabu-Based
Routing Algorithm(ATBR)
To mitigate the selfish nodes
problems and provide reliability in
a dynamic network.
To increase successful delivery
rate (SDR).
To decrease routing overhead
(RO).
To prevent from dos attacks to
enhance network performance.
Swarm intelligence based
approach for sinkhole attack
detection in wireless sensor
networks.
Proposed an Ant Colony
Optimization Attack Detection
(ACO-AD) algorithm and Ant
Colony Optimization Boolean
Expression Evolver Sign
Generation (ABXES).
To detect a sinkhole attack and to
identify an intruder in a wireless
sensor networks.
ACO-AD algorithm for detection of
sink hole attack, and ABXES
algorithm for distributing keys
among the group of node. And for
identification of the anomalous
connections without generation of
false positives and minimization of
storage in the sensor nodes.
Network Security Using Self
Organized Multi
Agent Swarms.
Self organized multi agent swarms
(SOMAS)
To provides a novel computer
network security management
framework.
SOMAS developmental aspects can
be improved in the approach,
methodology, an experimental
design and evaluation. Testing is
required for different agent rules
with scenario size
Title Mechanism /
Algorithm
Purpose Methodology
Sustaining Security in MANET:
Biometric Stationed Authentication
Protocol (BSAP) Inculcating Meta-
Heuristic Genetic Algorithm.
Biometric Stationed Authentication
Protocol (BSAP)
To sustain security in MANET
from DOS attacks.
Biometric cryptographic key is
produced to enhance security of
MANET. Hence data is protected
by applying three levels of security
by our prospective approach which
develops trust between various
nodes of ad-hoc network.
A memetic algorithm for enhancing
the robustness of scale-free
networks against malicious attacks.
Memetic algorithm To enhance the robustness of
networks against malicious attacks.
By using Hill climbing, Simulated
annealing, Smart rewiring and
memetic algorithms for solving the
problem of optimizing and security
in network .
A trust based clustering with ant
colony routing in Vanet.
Proposed a new Mobility-aware
Ant Colony Optimization Routing
(MAR-DYMO).
To decrease the routing overhead
by establishing creating trust in
between the nodes in vanet.
Trust in the routing algorithms in
terms of routing overhead. 20
random values are obtained for
different number of VANET nodes
and clusters and the average value
is presented.
A Survey on Anomaly Detection in
Network Intrusion
Detection System Using Particle
Swarm Optimization
Based Machine Learning
Techniques.
Particle swarm optimization
combined with Machine Learning
techniques for Anomaly Detection
in Network Intrusion Detection
System.
To enhance the performance of
intrusion detection system.
Recently developed IDS with single
techniques is insufficient against
increasing threats in the network.
So hybridization of techniques are
used to satisfy the increasing
demand of intelligent Intrusion
Detection System (IDS).
CONCLUSION
 The metaheuristic approach is currently attracting considerable
interest for research community to meet the rising need.
 The important advantage of metaheurisic approach is to provide
provably optimal solutions but they have potential to produce
good solutions in short amounts of time.
 In this paper we present a survey of various metaheuristic
algorithms and its functioning to overcome security and
optimization problem to improve the performance of ad hoc
networks.
CONT….
 In order to overcome the shortcoming of existing algorithms and
to enhance the robustness of an existing network against
malicious attacks various techniques are hybridized. We conclude
that metaheuristic approach can provide a best solution for
security and optimization problem with limited computation.
REFERENCES
 [1] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping
Misbehavior using Metaheuristic Approach: A Survey”,
International Conference on Electrical, Electronics, Signals,
Communication and Optimization (IEEE EESCO-2015), Issue
3, pages 1036-1041, 24-25 January 2015.

More Related Content

What's hot

Autonomous car
Autonomous carAutonomous car
Autonomous car
Anil kale
 
Intelligent transportation system
Intelligent transportation systemIntelligent transportation system
Intelligent transportation system
Universiti Teknologi Malaysia
 
Smart parking
Smart parkingSmart parking
Smart parking
Manisha Mishra
 
Vinod_Autonomous_car_ppts
Vinod_Autonomous_car_pptsVinod_Autonomous_car_ppts
Vinod_Autonomous_car_pptsvinumukkati
 
Smart Parking
Smart ParkingSmart Parking
Smart Parking
Aditya Basu
 
Smart car parking system
Smart car parking systemSmart car parking system
Smart car parking system
Amit Shukla
 
Autonomous car Working (Deep learning)
Autonomous car Working (Deep learning)Autonomous car Working (Deep learning)
Autonomous car Working (Deep learning)
Bharath Chava
 
Driverless car
Driverless carDriverless car
Driverless car
Bhaskar Paul
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
Monaco Motors
 
Identifying Parking Spots from Surveillance Cameras using CNN
Identifying Parking Spots from Surveillance Cameras using CNNIdentifying Parking Spots from Surveillance Cameras using CNN
Identifying Parking Spots from Surveillance Cameras using CNN
IRJET Journal
 
Traffic Prediction for Intelligent Transportation System using Machine Learning
Traffic Prediction for Intelligent Transportation System using Machine LearningTraffic Prediction for Intelligent Transportation System using Machine Learning
Traffic Prediction for Intelligent Transportation System using Machine Learning
OmSuryawanshi9
 
The State Machine Compiler
The State Machine CompilerThe State Machine Compiler
The State Machine Compiler
François Perrad
 
Autonomous cars
Autonomous carsAutonomous cars
Autonomous cars
Amal Jose
 
V2V communications
V2V communicationsV2V communications
V2V communications
Sai Avinash
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
Bharat Bhushan
 
Autonomous car
Autonomous carAutonomous car
Autonomous car
Nilay Patel
 
AI simple search strategies
AI simple search strategiesAI simple search strategies
AI simple search strategies
Renas Rekany
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
Meghaj Mallick
 
Autonomous Car
Autonomous CarAutonomous Car
Autonomous Car
Jatin Sharma
 
4.3 techniques for turing machines construction
4.3 techniques for turing machines construction4.3 techniques for turing machines construction
4.3 techniques for turing machines construction
Sampath Kumar S
 

What's hot (20)

Autonomous car
Autonomous carAutonomous car
Autonomous car
 
Intelligent transportation system
Intelligent transportation systemIntelligent transportation system
Intelligent transportation system
 
Smart parking
Smart parkingSmart parking
Smart parking
 
Vinod_Autonomous_car_ppts
Vinod_Autonomous_car_pptsVinod_Autonomous_car_ppts
Vinod_Autonomous_car_ppts
 
Smart Parking
Smart ParkingSmart Parking
Smart Parking
 
Smart car parking system
Smart car parking systemSmart car parking system
Smart car parking system
 
Autonomous car Working (Deep learning)
Autonomous car Working (Deep learning)Autonomous car Working (Deep learning)
Autonomous car Working (Deep learning)
 
Driverless car
Driverless carDriverless car
Driverless car
 
Vehicle To Vehicle Communication System
Vehicle To Vehicle Communication SystemVehicle To Vehicle Communication System
Vehicle To Vehicle Communication System
 
Identifying Parking Spots from Surveillance Cameras using CNN
Identifying Parking Spots from Surveillance Cameras using CNNIdentifying Parking Spots from Surveillance Cameras using CNN
Identifying Parking Spots from Surveillance Cameras using CNN
 
Traffic Prediction for Intelligent Transportation System using Machine Learning
Traffic Prediction for Intelligent Transportation System using Machine LearningTraffic Prediction for Intelligent Transportation System using Machine Learning
Traffic Prediction for Intelligent Transportation System using Machine Learning
 
The State Machine Compiler
The State Machine CompilerThe State Machine Compiler
The State Machine Compiler
 
Autonomous cars
Autonomous carsAutonomous cars
Autonomous cars
 
V2V communications
V2V communicationsV2V communications
V2V communications
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
 
Autonomous car
Autonomous carAutonomous car
Autonomous car
 
AI simple search strategies
AI simple search strategiesAI simple search strategies
AI simple search strategies
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Autonomous Car
Autonomous CarAutonomous Car
Autonomous Car
 
4.3 techniques for turing machines construction
4.3 techniques for turing machines construction4.3 techniques for turing machines construction
4.3 techniques for turing machines construction
 

Viewers also liked

Osi model
Osi modelOsi model
Osi model
Kishan Patel
 
ant colony algorithm
ant colony algorithmant colony algorithm
ant colony algorithm
bharatsharma88
 
Aco 03-04-2013
Aco 03-04-2013Aco 03-04-2013
Aco 03-04-2013
Ahmad Khan
 
Ant Colony Optimization: The Algorithm and Its Applications
Ant Colony Optimization: The Algorithm and Its ApplicationsAnt Colony Optimization: The Algorithm and Its Applications
Ant Colony Optimization: The Algorithm and Its Applications
adil raja
 
Classification with ant colony optimization
Classification with ant colony optimizationClassification with ant colony optimization
Classification with ant colony optimization
kamalikanath89
 
Show ant-colony-optimization-for-solving-the-traveling-salesman-problem
Show ant-colony-optimization-for-solving-the-traveling-salesman-problemShow ant-colony-optimization-for-solving-the-traveling-salesman-problem
Show ant-colony-optimization-for-solving-the-traveling-salesman-problem
jayatra
 
Ant Colony Optimization: Routing
Ant Colony Optimization: RoutingAnt Colony Optimization: Routing
Ant Colony Optimization: RoutingAdrian Wilke
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationMeenakshi Devi
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationvk1dadhich
 
CPU scheduling algorithms in OS
CPU scheduling algorithms in OSCPU scheduling algorithms in OS
CPU scheduling algorithms in OS
harini0810
 

Viewers also liked (11)

Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Osi model
Osi modelOsi model
Osi model
 
ant colony algorithm
ant colony algorithmant colony algorithm
ant colony algorithm
 
Aco 03-04-2013
Aco 03-04-2013Aco 03-04-2013
Aco 03-04-2013
 
Ant Colony Optimization: The Algorithm and Its Applications
Ant Colony Optimization: The Algorithm and Its ApplicationsAnt Colony Optimization: The Algorithm and Its Applications
Ant Colony Optimization: The Algorithm and Its Applications
 
Classification with ant colony optimization
Classification with ant colony optimizationClassification with ant colony optimization
Classification with ant colony optimization
 
Show ant-colony-optimization-for-solving-the-traveling-salesman-problem
Show ant-colony-optimization-for-solving-the-traveling-salesman-problemShow ant-colony-optimization-for-solving-the-traveling-salesman-problem
Show ant-colony-optimization-for-solving-the-traveling-salesman-problem
 
Ant Colony Optimization: Routing
Ant Colony Optimization: RoutingAnt Colony Optimization: Routing
Ant Colony Optimization: Routing
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
CPU scheduling algorithms in OS
CPU scheduling algorithms in OSCPU scheduling algorithms in OS
CPU scheduling algorithms in OS
 

Similar to Various Metaheuristic algorithms For Securing VANET

Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
ijceronline
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
Editor Jacotech
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEEBEBTECHSTUDENTPROJECTS
 
Implementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for ManetImplementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for Manet
IRJET Journal
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEEBEBTECHSTUDENTPROJECTS
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
IJARIIT
 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using aco
IJARIIT
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
IRJET Journal
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
IOSR Journals
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
IOSR Journals
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Natasha Barnett
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
ijsrd.com
 
I010525057
I010525057I010525057
I010525057
IOSR Journals
 
Fp3610261032
Fp3610261032Fp3610261032
Fp3610261032
IJERA Editor
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Editor IJCATR
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
chennaijp
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
Mukundhan Elumalai
 

Similar to Various Metaheuristic algorithms For Securing VANET (20)

Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
Implementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for ManetImplementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for Manet
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using aco
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Ant
AntAnt
Ant
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
I010525057
I010525057I010525057
I010525057
 
Fp3610261032
Fp3610261032Fp3610261032
Fp3610261032
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
 
ant2
ant2ant2
ant2
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 

More from Kishan Patel

Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
Kishan Patel
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
Kishan Patel
 
ONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESSONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESS
Kishan Patel
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Kishan Patel
 
Universal Description, Discovery and Integration
Universal Description, Discovery and IntegrationUniversal Description, Discovery and Integration
Universal Description, Discovery and IntegrationKishan Patel
 
Real World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksReal World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc Networks
Kishan Patel
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem Kishan Patel
 

More from Kishan Patel (8)

Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
ONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESSONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESS
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
 
Universal Description, Discovery and Integration
Universal Description, Discovery and IntegrationUniversal Description, Discovery and Integration
Universal Description, Discovery and Integration
 
Real World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksReal World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc Networks
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem
 
Podcasting
PodcastingPodcasting
Podcasting
 

Recently uploaded

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 

Recently uploaded (20)

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 

Various Metaheuristic algorithms For Securing VANET

  • 1. PREPARED BY KISHAN PATEL VARIOUS METAHEURISTIC ALGORITHMS FOR SECURING VANET
  • 2. OUTLINE  INTODUCTION OF VANET  SECURITY IN VANET  ADVANTAGES AND DISADVANTAGES  METAHEURISTIC  METAHEURISTIC TECHNIQUES  PROPERTIES OF METAHEURISTIC  WHY METAHEURISTIC…?  METAHEURISTIC ALGORITHMS  SURVEY OF VARIOUS METAHEURISTIC  CONCLUSION  REFERENCES
  • 3. INTRODUCTION OF VANET  Vehicular ad hoc network (VANET) uses cars as mobile nodes in a MANET to create a mobile network.  Vehicular ad hoc networks are a subgroup of mobile ad hoc networks (MANETs).  Cars fall out of the signal range and drop out of the network, other cars can join, by connecting vehicles to one another form a wireless network called “Vehicular Ad Hoc Network.  Due to high mobility, frequent changes in topology such characteristics of this network that make routing decisions more challenging. 3
  • 4. SECURITY IN VANET  The nature of VANETs could lead to malicious attacks. o Predictable movement of nodes. o High mobility of victim/attacker.  Adversaries could break the system. o Data sinkholes (black hole). o Gray hole o Feed false information. o Flood the system.  Security measures must be taken to avoid malicious attacks on the system 4
  • 5. ADVANTAGES AND DISADVANTAGES Advantages  Public Safety.  Traffic Management.  Traffic Coordination and Assistance.  Traveller Information Support.  Comfort.  Air pollution emission measurement and reduction. Disadvantages  Flooding in route discovery initial phase.  Wasted band width.  Delay.  Increasing network congestion.  External sources for destination location. 5
  • 6. METAHEURISTIC  Heuristic means to find or to discover by trial and error. And meta means higher level and metaheuristics generally perform better than simple heuristics.  The word "metaheuristic” can be considered as a "master strategy that guides and modifies other heuristics to produce solutions. Generally metaheuristic is used for solving problem in ad hoc networks.
  • 7. METAHUERISTIC TECHNIQUES  There are two techniques:  Online metaheuristic approach and Offline metaheuristic approach.  The main difference between them is the moment when they are applied for solving problem. 1. Online metaheuristic approaches are used for decision making or solving the problem during run time. 2. Offline metaheuristic approaches are useful when there is no requirement for system to adapt change during runtime.
  • 8. PROPERTIES OF METAHEURISTIC 1. Search process is influenced by Metaheuristic approch. 2. The main purpose of the search process is to find near to optimal solutions. 3. It range from simple local search procedures to complex processes. 4. They are non-deterministic. 5. They are not problem-specific
  • 9. WHY METAHEURISTIC….? 1. Metaheuristics are used for solving the security and routing problems in ad hoc networks. 2. Security problem in the network may be due to selfish and malicious node. Metaheuristic approach can be used for overcoming the problem of node misbehaving in ad hoc networks. 3. For route optimization e.g selecting the shortest and quality route from source to destination in the ad hoc networks. 4. Metaheuristic approach is also used for solving the supply chain problems. 5. Metaheuristic approach is important for generating optimum set of test data in software testing.
  • 10. METAHEURISTIC ALGORITHMS  Metaheuristic is a procedure for finding or select a lower heuristic and provide a good solution to an optimization and security problem with limited computation capacity. Metaheuristics may make few assumptions about the problems in ad hoc networks so it is used for a variety of problems.  As shown in next figure classification of metaheuristics. It includes Ant colony optimization (ACO), Tabu search (TS), scatter search(SS), Variable neighborhood search (VNS), Guided local search (GLS), iterated local search (ILS), simulated annealing (SA), evolutionary algorithms (EC) etc.
  • 11.
  • 12. CONT…  Ant colony optimization (ACO): It is a population-based metaheuristic for the solution to the difficult combinatorial optimization problems. The inspiring source of ACO is behavior of real ants. This behavior empowers ants to find shortest paths from food sources to their nest. While walking from food sources to the nest, ants dregs a substance called pheromone on the ground. This behavior is the basis for a cooperative interaction for emerging of shortest paths.  Tabu search : It is a heuristic procedure for solving optimization problems. Tabu search has obtained optimal and near to optimal solutions to a wide variety of practical problems in varied applications such as scheduling, character recognition.
  • 13. CONT…  Scatter Search (SS): It is designed to operate on a set of points, which is called reference points. It also captures information which is not present in reference points. It takes advantage of auxiliary heuristic methods.  Variable neighbourhood search (VNS): It is based on simple principal . It starts from feasible solution X and from a predefined set of steps, chooses a random solution within the neighborhood of X and move there if the solution is better.
  • 14. CONT…  Simulated annealing : It is a probabilistic metaheuristic for the global optimization problem for finding a good approximation to the global optimum for a given function in a large search space.  Evolutionary computing: Evolution is a process in which functioning deals with chromosomes. The process takes place during the reproduction stage. For e.g mutation and recombination. It is combination of genetic algorithms, evolution strategies, evolutionary programming and genetic programming.
  • 16. 16 Title Mechanism / Algorithm Purpose Methodology TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks. TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm To avoid trust value propagation. To minimize the number of messages been exchanged. To find the best route for delivery. Trust value of each node is directly aped to the route and no need to propagate the trust values like other trusted protocols. Trust Based QOS Protocol(TBQP) using Metaheuristic Genetic Algorithm for Optimizing and Securing MANET Trust Based QOS Protocol (TBQP) Using Meta-heuristic Genetic Algorithm. To provide QOS by selecting the fittest shortest route among the number of routes to provide optimization. Acquaintance And Authentication of packets for routing in network. Intriguing a trust based packet delivering scheme for detecting and isolating the malignant nodes using the routing layer information. A trust weigh is maintained and a node is remunerated by decreasing or increasing the trust weigh value. If the trust weigh falls below a trust threshold, node is marked as malicious node. Performance analysis of optimized Trust AODV using ant Algorithms Ant colony optimization To sustain security against the dos attacks. At agents can move freely to find destination it will update positive pheromone to the routing table. The pheromone is deposited if node is trusted.
  • 17. 17 Title Mechanism / Algorithm Purpose Methodology Ant Colony and Load Balancing Optimizations for AODV Routing Protocol Multi-Route AODV Ant routing (MRAA) Load balancing( LBMRAA) To reduce the routing overhead, buffer overflow, end-to-end delay and increase the performance Data packets are balanced over discovered paths and energy consumption is distributed across many nodes through network. Secure Ant-Based Routing Protocol for Wireless Sensor Network. Secure Ant-Based Routing Protocol(SARP) To provide Route security in network. It uses two paths for data forwarding to overcome the problem of node failure and to increase the efficiency of overall network. MANET link Performance using Ant Colony Optimization and Particle Swarm Optimization Algorithms. Ant colony optimization and Particle swarm optimization. Finds the best solution over the particle’s position and velocity with the cost and minimum. End-to-end delay. Ant Colony Optimization (ACO) algorithm uses mobile agents as ants to discover feasible and best path in a network and PSO finds the best solution over the particle’s position and velocity with the objective of cost and minimum End- to-end delay. AntTrust: A Novel Ant Routing Protocol forWireless Ad-hoc Network Based on Trust Between Nodes. Ant Trust Routing Protocol To increase the security of route. And malicious manipulations of data packets. AntTrust is located precisely in the context of the security of routing. It also facilitates malicious manipulations of data packets.
  • 18. 18 Title Mechanism / Algorithm Purpose Methodology Mitigating Routing Misbehavior Using Ant-Tabu-Based Routing Algorithm for Wireless Ad-Hoc Networks Ant-Tabu-Based Routing Algorithm(ATBR) To mitigate the selfish nodes problems and provide reliability in a dynamic network. To increase successful delivery rate (SDR). To decrease routing overhead (RO). To prevent from dos attacks to enhance network performance. Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks. Proposed an Ant Colony Optimization Attack Detection (ACO-AD) algorithm and Ant Colony Optimization Boolean Expression Evolver Sign Generation (ABXES). To detect a sinkhole attack and to identify an intruder in a wireless sensor networks. ACO-AD algorithm for detection of sink hole attack, and ABXES algorithm for distributing keys among the group of node. And for identification of the anomalous connections without generation of false positives and minimization of storage in the sensor nodes. Network Security Using Self Organized Multi Agent Swarms. Self organized multi agent swarms (SOMAS) To provides a novel computer network security management framework. SOMAS developmental aspects can be improved in the approach, methodology, an experimental design and evaluation. Testing is required for different agent rules with scenario size
  • 19. Title Mechanism / Algorithm Purpose Methodology Sustaining Security in MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta- Heuristic Genetic Algorithm. Biometric Stationed Authentication Protocol (BSAP) To sustain security in MANET from DOS attacks. Biometric cryptographic key is produced to enhance security of MANET. Hence data is protected by applying three levels of security by our prospective approach which develops trust between various nodes of ad-hoc network. A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Memetic algorithm To enhance the robustness of networks against malicious attacks. By using Hill climbing, Simulated annealing, Smart rewiring and memetic algorithms for solving the problem of optimizing and security in network . A trust based clustering with ant colony routing in Vanet. Proposed a new Mobility-aware Ant Colony Optimization Routing (MAR-DYMO). To decrease the routing overhead by establishing creating trust in between the nodes in vanet. Trust in the routing algorithms in terms of routing overhead. 20 random values are obtained for different number of VANET nodes and clusters and the average value is presented. A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques. Particle swarm optimization combined with Machine Learning techniques for Anomaly Detection in Network Intrusion Detection System. To enhance the performance of intrusion detection system. Recently developed IDS with single techniques is insufficient against increasing threats in the network. So hybridization of techniques are used to satisfy the increasing demand of intelligent Intrusion Detection System (IDS).
  • 20. CONCLUSION  The metaheuristic approach is currently attracting considerable interest for research community to meet the rising need.  The important advantage of metaheurisic approach is to provide provably optimal solutions but they have potential to produce good solutions in short amounts of time.  In this paper we present a survey of various metaheuristic algorithms and its functioning to overcome security and optimization problem to improve the performance of ad hoc networks.
  • 21. CONT….  In order to overcome the shortcoming of existing algorithms and to enhance the robustness of an existing network against malicious attacks various techniques are hybridized. We conclude that metaheuristic approach can provide a best solution for security and optimization problem with limited computation.
  • 22. REFERENCES  [1] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey”, International Conference on Electrical, Electronics, Signals, Communication and Optimization (IEEE EESCO-2015), Issue 3, pages 1036-1041, 24-25 January 2015.