Skip to main content

Advertisement

Log in

Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks

  • Research Paper
  • Published:
Evolutionary Intelligence Aims and scope Submit manuscript

Abstract

In this paper, a comprehensive survey of evolutionary computation (EC) methods for cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are named based on the natural processes inspiring them, such as swarm intelligence (e.g., ant colony optimization, artificial bee colony, and particle swarm optimization), evolutionary algorithms (e.g., genetic algorithms, genetic programming, grammatical evolution, and differential evolution), artificial immune systems, and evolutionary games analyzing strategic interactions among different population types. We introduce these methods with their typical applications, and commonly used algorithms to improve cybersecurity within the scope of MANETs. Ongoing and speedy topology changes, multi-hop communication, non-hierarchical organization, and power and computational limitations are among the intrinsic characteristics of MANETs causing cybersecurity vulnerabilities. We describe basic defense mechanisms in MANETs for vulnerability detection, attack deterrence, prevention and recovery, and risk mitigation. We classify principal applications of EC as intrusion detection, trust management, and cryptography in cybersecurity systems to counter measure adversarial activities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

(adopted from [117])

Fig. 6
Fig. 7

(adopted from [63])

Fig. 8

(adopted from [63])

Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. 2016 US Government Cybersecurity Report (2016) https://cdn2.hubspot.net/hubfs/533449/SecurityScorecard_2016_Govt_Cybersecurity_Report.pdf. Accessed 14 Mar 2018

  2. KDD Cup 1999 Data (1999) https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 14 Mar 2018

  3. A Java-based evolutionary computation and genetic programming research system (2013) https://cs.gmu.edu/~eclab/projects/ecj/. Accessed 14 Mar 2018

  4. The department of defense cyber strategy (2015) https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf. Accessed 14 Mar 2018

  5. Abass A, Hajimirsadeghi M, Mandayam N, Gajic Z (2016) Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless network. In: Annual Conf. on information science and systems (CISS), pp 36–41

  6. Aljarah I, Ludwig A (2013) Mapreduce intrusion detection system based on a particle swarm optimization clustering algorithm. In: IEEE Congr. on evolutionary computation (CEC), 2013 IEEE Congress on. IEEE, pp 955–962

  7. Arenella G, de Santis F, Malandrino D (2014) BeeAdHocServiceDiscovery: A MANET service discovery algorithm based on bee colonies. In: 11th Int’l. Conf. on informatics in control, automation and robotics (ICINCO), pp 1–6

  8. Arora S, Singhb P, Gupta A (2015) Adaptive selection of cryptographic protocols in wireless sensor networks using evolutionary game theory. In: Int’l. Conf. on information security and privacy (ICISP’15), 78, pp 358–366. Procedia Computer Science

  9. Bäck T (1994) Selective pressure in evolutionary algorithms: a characterization of selection mechanisms. In: IEEE world Congr. on computational intelligence, Proc. of the 1st IEEE Conf. on evolutionary computation, pp 9–16

  10. Bagga E, Adhikary E (2014) A review on various protocols and security issues in MANET. Int J Adv Res Comput Commun Eng 3:7478–7482

    Google Scholar 

  11. Baker J (1987) Reducing bias and inefficiency in the selection algorithm. In: J.J. Grefenstette (ed.) Proc. of the 2nd Int’l. Conf. on genetic algorithms on genetic algorithms and their application. Lawrence Erlbaum Associates, Publishers

  12. Ball M, Qela B, Wesolkowski S (2015) A review of the use of computational intelligence in the design of military surveillance networks. In: Recent advances in computational intelligence in defense and security. Springer, pp 663–693

  13. Barani K (2014) A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system. In: Iranian Conf. on intelligent systems (ICIS). IEEE, pp 1–6

  14. Barani K, Abadi M (2012) BeeID: intrusion detection in AODV-based MANETs using artificial bee colony and negative selection algorithms. Int J Inf Secur ISC 4(1):25–39

    Google Scholar 

  15. Barolli L, Koyama A, Shiratori N A QoS routing method for ad-hoc networks based on genetic algorithm. Proc. of the 14th Int. Work. on database and expert systems applications (DEXA), pp 175–179

  16. Beni G, Wang J (1989) Swarm intelligence. In: Proc. of seventh annual meeting of the robotics society of Japan. RSJ Press, pp 425–428

  17. Bouhaddi M, Adi K, Radjef M (2016) Evolutionary game-based defense mechanism in the MANETs. In: Proc. of the 9th Int’l. Conf. on security of information and networks (SIN’16), pp 88–95

  18. Brameier M, Banzhaf W (2001) A comparison of linear genetic programming and neural networks in medical data mining. IEEE Trans Evolut Comput 5(1):17–26

    Article  MATH  Google Scholar 

  19. Brameier M, Banzhaf W (2007) Linear genetic programming. Springer Science & Business Media

  20. Bretscher P, Cohn M (1970) A theory of self-nonself discrimination. Science 169:1042–1049

    Article  Google Scholar 

  21. Camazine S, Deneubourg J, Franks N, Sneyd J, Theraulaz G, Bonabeau E (2001) Selforganization in biological systems. Princeton University Press, Princeton, NJ

    MATH  Google Scholar 

  22. de Campos L, de Oliveiraa R, Roisenbergb M (2016) Optimization of neural networks through grammatical evolution and a genetic algorithm. Expert Syst Appl 56:368–384

    Article  Google Scholar 

  23. Caro GD, Dorigo M (1998) AntNet: distributed stigmergetic control for communication networks. J Artif Intell Res 9:317–365

    MATH  Google Scholar 

  24. Caro GD, Ducatelle F, Gambardella L (2005) AntHocNet: an adaptive nature-inspired algorithm for routing in mobile ad hoc networks. Emerg Telecomun Technol 16:443–455

    Google Scholar 

  25. Castro LD, Timmis J (2002) Artificial immune systems: a novel paradigm to pattern recognition. Artif Neural Netw Pattern Recognit 1:67–84

    Google Scholar 

  26. Cho J, Swami A, Shen I (2011) A survey on trust management for mobile ad-hoc networks. IEEE Commun Surveys Tutorials 14:562–583

    Article  Google Scholar 

  27. Crosbie M, Spafford E (1995) Applying genetic programming to intrusion detection. In: Working notes for the AAAI symposium on genetic programming. MIT Press, MA, pp 1–8

  28. Şen S (2015) A survey of intrusion detection systems using evolutionary computation. In: Bio-inspired computation in telecommunications, pp 73–94

  29. Şen S, Clark J (2009) A grammatical evolution approach to intrusion detection on mobile ad hoc networks. In: Proc. of the 2nd ACM Conf. on wireless network security. AMC, pp 95–102

  30. Şen S, Clark J, Tapiador J (2010) Power-aware intrusion detection in mobile ad hoc networks. Ad Hoc Netw 28:224–239

    Article  Google Scholar 

  31. Cui W, Brabazon A, O’Neill M (2011) Evolving dynamic trade execution strategies using grammatical evolution. Int J Financial Markets Deriv 2(1–2):4–31

    Article  Google Scholar 

  32. Dal D, Abraham S, Abraham A, Sanyal S, Sanglikar M (2008) Evolution induced secondary immunity: an artificial immune system based intrusion detection system. In: Computer information systems and industrial management applications (CISIM'08), pp 65–70

  33. Dorigo M (1992) Optimization, learning and natural algorithms. Ph.D. thesis, Politecnico di Milano, Italy

  34. Dorigo M, Socha K (2007) An introduction to ant colony optimization. In: Handbook of approximation algorithms and metaheuristics, pp 26-1. CRC Press, Boca Raton

  35. Dorronsoro B, Ruiz P, Danoy G, Pigne Y, Bouvry P (2014) Evolutionary algorithms for mobile ad hoc networks. John Wiley & Sons

  36. Eidenbenz S, Kumar V, Zust S (2006) Equilibria in topology control games for ad hoc networks. Mobile Netw Appl 11(2):143–159

    Article  Google Scholar 

  37. Elsayed S, Sarker R, Slay J (2015) Evaluating the performance of a differential evolution algorithm in anomaly detection. In: 2015 IEEE Congr. on evolutionary computation (CEC), pp 2490–2497

  38. Farmer J, Packard N, Perelson A (1986) The immune system, adaptation, and machine learning. Physica 22:187–204

    MathSciNet  Google Scholar 

  39. Fidalcastro A, Baburaj E (2014) An advanced grammatical evolution approach for intrusion detection on multicast routing in MANET. In: 2014 Int’l. Conf. on information communication and embedded systems (ICICES)

  40. Fischer S, Vöcking B (2005) Evolutionary game theory with applications to adaptive routing. Euro. Conf. on complex systems (ECCS), pp 1–6

  41. Fudenberg D, Tirole J (1991) Game theory. The MIT Press, Cambridge. MA

    MATH  Google Scholar 

  42. Gairing M, Monien B, Tiemann T (2005) Selfish routing with incomplete information. In: ACM Symp. on parallel algorithms and architectures, pp 203–212

  43. Garnier S, Gautrais J, Theraulaz G (2007) The biological principles of swarm intelligence. Swarm Intell 1(1):3–31

    Article  Google Scholar 

  44. Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Int’l. Conf. on artificial immune systems (ICARIS), pp 153–167

  45. Gundry S, Zou J, Kusyk J, Sahin C, Uyar M (2013) Differential evolution based fault tolerant topology control in MANETs. In: IEEE military communications Conf. (MILCOM)

  46. Güneş M, Sorges U, Bouazizi I (2002) ARA the ant-colony based routing algorithm for MANETs. In: Int’l. Work. on ad hoc networks (IWAHN), pp 79–85

  47. Harmer P, Temple M (2013) An improved LFS engine for physical layer security augmentation in cognitive networks. In: Int. Conf. on computing, networking and communication, cognitive computing and networking, pp 719–723

  48. Harmer P, Williams M, Temple M (2011) Using DE-optimized LFS processing to enhance 4G communication security. In: Proc. of Int’l. Conf. on 20th computer communicqtion and networks (ICCCN)

  49. Harsanyi J (1967) Games with incomplete information played by ’Bayesian’ players, parts I, II and III. Manag Sci 14(3):159–182

    Article  MathSciNet  MATH  Google Scholar 

  50. van Hoesel S (2008) An overview of Stackelberg pricing in networks. Euro J Oper Res 189(3):1393–1402

    Article  MathSciNet  MATH  Google Scholar 

  51. Hofmeyr S, Forrest S (2000) Architecture for an artificial immune system. Evolut Comput 8(4):443–473

    Article  Google Scholar 

  52. Holland J (1992) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control and artificial intelligence. The MIT Press, Cambridge MA

    Google Scholar 

  53. Huang J, Berry R, Honig M (2006) Auction-based spectrum sharing. Mob Netw Appl 11(3):405–418

    Article  Google Scholar 

  54. Ibrahim M, Alexander B (2013) Evolving decision-making functions in an autonomous robotic exploration strategy using grammatical evolution. In: Int’l. Conf. on intelligent robots and systems (IROS). IEEE, pp 4340–4346

  55. Indirani G, Selvakumar K (2013) Handling cross-layer attacks using neighbors monitoring scheme and swarm intelligence in MANET. Int J Comp Appl Technol Res 2(1):41–48

    Google Scholar 

  56. Ji Z, Liu K (2008) Multi-stage pricing game for collusion-resistant dynamic spectrum allocation. IEEE J Sel Areas Commun 26(1):182–191

    Article  Google Scholar 

  57. Jiang G, Shen S, Hu K, Huang L, Li H, Han R (2015) Evolutionary game-based secrecy rate adaptation in wireless sensor networks. Int J Distrib Sens Netw 11(3):1–13

    Article  Google Scholar 

  58. Jiang T, Baras J (2004) Ant-based adaptive trust evidence distribution in MANET. In: 24th Int’l. Conf. on distributed computing systems workshops

  59. Jim L, Gregory M (2016) A review of artificial immune system based security frameworks for MANET. Int J Commun Netw Syst Sci 9(1):1–18

    Google Scholar 

  60. Johnson D, Teredesai A, Saltarelli R (2005) Genetic programming in wireless sensor networks. In: European Conf. on genetic programming, vol 3447. Springer, pp 96–107

  61. Kadri B, Moussaoui D, Feham M (2013) Agreensmith. Int Netw Secur 15(1):2231–5268

    Google Scholar 

  62. Kamal A, Warip M, Elshaikh M, Badlishah R (2016) Differential evolution (DE) algorithm to optimize Berkeley-MAC protocol for wireless sensor network. J Theor Appl Inf Technol 89(2):314–319

    Google Scholar 

  63. Karaboga D (2005) An idea based on honey bee swarm for numerical optimization. Technical report TR06, Erciyes University, Computer Engineering Department

  64. Karaboga D, Basturk B (2007) Artificial bee colony (ABC) optimization algorithm for solving constrained optimization problems. In: Int. fuzzy systems association world congress. Springer, pp 789–798

  65. Karaboga D, Okdem S, Ozturk C (2015) Cluster based wireless sensor network routing using artificial bee colony algorithm. Wirel Netw 18(7):847–860

    Article  Google Scholar 

  66. Kavitha K, Kumari S, Phil M (2013) Particle swarm optimization for adaptive anomaly-based intrusion detection system using fuzzy controller. Int J Comput Trends Technol (IJCTT) 4(10):3536–3541

  67. Kennedy J, Eberhart R (1995) A new optimizer using particle swarm theory. In: Proc. of the 6th Int’l. Symp. on micro machine and human science, pp 39–43

  68. Kephart J (1994) A biologically inspired immune system for computers. In: Artificial life IV: Proc. of the 4th Int. Work. on the synthesis and simulation of living systems, pp 130–139

  69. Khannous A, Rghioui A, Elouaai F, Bouhorma M (2016) Securing manet using the integration of concepts from diverse immune theories. J Theor Appl Inf Technol 88(1):35–50

    Google Scholar 

  70. Kim I, de Weck O (2005) Variable chromosome length genetic algorithm for progressive refinement in topology optimization. Struct Multidiscip Optim 29:445–456

    Article  Google Scholar 

  71. Kim Y, Lee M (2014) Scheduling multi-channel and multi-timeslot in time constrained wireless sensor networks via simulated annealing and particle swarm optimization. IEEE Commun Mag 52:122–129

    Article  Google Scholar 

  72. Komali R, MacKenzie A, Gilles R (2008) Effect of selfish node behavior on efficient topology design. IEEE Trans Mob Comput 7(9):1057–1070

    Article  Google Scholar 

  73. Komathy K, Narayanasamy P (2008) Secure data forwarding against denial of service attack using trust based evolutionary game. In: Vehicular technology conference (VTC), pp 31–35

  74. Koza J (1992) Genetic programming: on the programming of computers by means of natural selection. The MIT Press, Cambridge, MA

    MATH  Google Scholar 

  75. Koza J (1994) Genetic programming as a means for programming computers by natural selection. Stat Comput 4:87–112

    Article  Google Scholar 

  76. Kuila P, Jana P (2014) A novel differential evolution based clustering algorithm for wireless sensor networks. Appl Soft Comput 25:414–425

    Article  Google Scholar 

  77. Kumar B, Sekhar P, Papanna N, Bhushan B (2013) A survey on MANET security challenges and routing. Int J Comput Technol Appl 4(2):248–256

    Google Scholar 

  78. Kusyk J (2011) Game-theoretic and bio-inspired techniques for self-positioning autonomous mobile nodes. Ph.D. thesis, CUNY, New York, NY

  79. Kusyk J, Sahin C, Uyar M, Urrea E, Gundry S (2011) Self organization of nodes in mobile ad hoc networks using evolutionary games and genetic algorithms. J Adv Res 2:253–264

    Article  Google Scholar 

  80. Kusyk J, Urrea E, Sahin C, Uyar M (2012) Game theory and genetic algorithm based approach for self positioning of autonomous nodes. Int J Ad Hoc Sens Wirel Netw 16:93–118

    Google Scholar 

  81. Laskari E, Meletiou G, Vrahatis M (2004) Problems of cryptography as discrete optimization tasks. Nonlinear Anal 63:831–837

    Article  MATH  Google Scholar 

  82. Lewontin RC (1961) Evolution and the theory of games. J Theor Biol 1:382–403

    Article  Google Scholar 

  83. Li C, Antonsson A (2000) Variable length genomes for evolutionary algorithms. In: Genetic programming 1996: proc. of the first annual conf. MIT Press, pp 512–520

  84. Li Y, Xu H, Cao Q, Li Z, Shen S (2015) Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks. Int J Distrib Sens Netw 11(2):1–12

    Article  Google Scholar 

  85. Lim Y, Cheng P, Clark J, Rohatgi P (2008) Policy evolution with grammatical evolution. Lecture Notes Comput Sci Simul Evolut Learning 5361:71–80

    Article  Google Scholar 

  86. MacKenzie A, DaSilva L (2006) Game theory for wireless engineers. Synth Lect Commun 1(1):1–86

    Google Scholar 

  87. Montana D (2010) Automatic tuning of communication protocols for vehicular ad hoc networks using metaheuristics. Eng Appl Artif Intell 23:795–805

    Article  Google Scholar 

  88. Movahedi Z, Hosseini Z, Bayan F, Pujolle G (2016) Trust-distortion resistant trust management frameworks on mobile ad hoc networks: a survey. IEEE Commun Surveys Tutorials 18:1287–1309

    Article  Google Scholar 

  89. Mukkamala S, Sung A, Abraham A (2004) Modeling intrusion detection systems using linear genetic programming approach. In: Int’l. Conf. on industrial, engineering and other applications of applied intelligent systems. Springer, pp 633–642

  90. Nadeem A, Howarth M (2013) A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun Surveys Tutorials 15:2027–2045

    Article  Google Scholar 

  91. Nash J (1950) The bargaining problem. Econometrica 18:155–162

    Article  MathSciNet  MATH  Google Scholar 

  92. Nash J (1950) Equilibrium points in n-person games. Proc Natl Acad Sci USA 36:48–49

    Article  MathSciNet  MATH  Google Scholar 

  93. Nash J (1951) Non-cooperative games. Ann Math 54:286–295

    Article  MathSciNet  MATH  Google Scholar 

  94. von Neumann J, Morgenstern O (1944) Theory of games and economic behavior. Princeton University Press, Princeton, NJ

    MATH  Google Scholar 

  95. O’Neill M, Ryan C (2001) Grammatical evolution. IEEE Trans Evolut Comput 5:349–358

    Article  Google Scholar 

  96. Pan M, Liang S, Xiong H, Chen J, Li G (2006) A novel bargaining based dynamic spectrum management scheme in reconfigurable systems. In: Int. Conf. on systems and networks communications (ICSNC'06), pp 54

  97. Parham P (2009) The immune system, 3rd edn. Garland Science

  98. Pathan A (2010) Security of self-organizing networks: MANET, WSN, WMN, VANET. Auerbach Publications, Taylor & Francis Group

  99. Qiu Y, Chen Z, Xu L (2010) Active defense model of wireless sensor networks based on evolutionary game theory. In: 6th Int’l. Conf. on wireless communications networking and mobile computing (WiCOM), pp 1–4

  100. Reina D, Ruiz P, Ciobanu R, Toral S, Dorronsoro B, Dobre C (2016) A survey on the application of evolutionary algorithms for mobile multihop ad hoc network optimization problems. Int J Distrib Sens Netw 12(2):1–13

    Article  Google Scholar 

  101. Robinson Y, Rajaram M (2015) Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. Sci World J 1–9

  102. Ruan N, Gao L, Zhu H, Jia W, Li X, Hu Q (2016) Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game. In: IEEE 36th Int. Conf. on distributed computing systems (ICDCS), pp 364–373

  103. Ryan C, O’Neill M (1998) Grammatical evolution: a steady state approach. Late Breaking Papers, Genetic Programming, pp 180–185

  104. Sahin C, Urrea E, Uyar M, Conner M, Bertoli G, Pizzo C (2010) Design of genetic algorithms for topology control of unmanned vehicles. Spec Issue Int J Appl Decis Sci (IJADS) Decis Support Syst Unmanned Vehicles 3(3):221–238

    Google Scholar 

  105. Sahin C, Urrea E, Uyar M, Conner M, Hokelek I, Bertoli G, Pizzo C (2008) Genetic algorithms for self-spreading nodes in MANETs. In: Proc. of the 10th annual conf. on genetic and evolutionary computation (GECCO), pp 1141–1142

  106. Sahoo D, Rai SC, Pradhan S (2009) Threshold cryptography & genetic algorithm based secure key exchange for mobile hosts. In: IEEE Int’l. advance computing Conf. (IACC). IEEE, pp 1297–1302

  107. Sahoo R, Singh M, Sahoo B, Majumder K, Ray S, Sarkar S (2013) A light weight trust based secure and energy efficient clustering in wireless sensor network: Honey bee mating intelligence approach. In: First Int’l. Conf. on computational intelligence: modeling techniques and applications (CIMTA), vol 10, pp 515–523

  108. Sarafijanovic S, Boudec JL (2004) An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal, and memory detectors. In: Int’l. Conf. on artificial immune systems (ICARIS), pp 342–356

  109. Sasikala E, Nandhakumar N (2015) An intelligent technique to detect jamming attack in wireless sensor networks (WSNs). Int J Fuzzy Syst 17:76–83

    Article  Google Scholar 

  110. Seredynski M, Bouvry P (2009) Evolutionary game theoretical analysis of reputation-based packet forwarding in civilian mobile ad hoc networks. In: Parallel & Distributed Processing (IPDPS), IEEE Int, Symp, pp 1–8

  111. Shamshirband S, Anuar N, Kiah L, Rohani V, Patković D, Misra S, Kahan A (2014) Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J Netw Comput Appl 42:102–117

    Article  Google Scholar 

  112. Shen S, Jiang C, Jiang H, Guo L, Cao Q (2013) Evolutionary game based dynamics of trust decision in WSNs. In: Int’l. Conf. on sensor network security technology and privacy communication system, pp 1–4

  113. Sindhuja K, Devi SP (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5:414–416

    Google Scholar 

  114. Smith J, Price G (1973) The logic of animal conflict. Nature 246:15–18

    Article  MATH  Google Scholar 

  115. Song D, Heywood M, Zincir-Heywood A (2003) A linear genetic programming approach to intrusion detection. In: Genetic and evolutionary computation conference (GECCO’03), pp 2325–2336

  116. Storn R (1996) On the usage of differential evolution for function optimization. In: Fuzzy information processing society, 1996. NAFIPS., 1996 Biennial Conf. of the North American, pp 519–523

  117. Storn R, Price K (1995) Differential evolution: a simple and efficient adaptive scheme for global optimization over continuous spaces. J Global Optim 23(1):341–359

    MATH  Google Scholar 

  118. Stützle T, Hoos H (2000) MAX-MIN ant system. Future Gener Comput Syst 16:889–914

    Article  MATH  Google Scholar 

  119. Tahta U, Şen S, Can A (2015) Gentrust: A genetic trust management model for peer-to-peer systems. Appl Soft Comput 34:693–704

    Article  Google Scholar 

  120. Taylor P, Jonker L (1978) Evolutionary stable strategies and game dynamics. Math Biosci 16:76–83

    Google Scholar 

  121. Troiano L, Birtolo C, Armenise R (2016) Searching optimal menu layouts by linear genetic programming. J Ambient Intell Hum Comput 7(2):239–256

    Article  Google Scholar 

  122. Urrea E, Sahin C, Hokelek I, Uyar M, Conner M, Bertoli G, Pizzo C (2009) Bio-inspired topology control for knowledge sharing mobile agents. Ad Hoc Netw 7(4):677–689

    Article  Google Scholar 

  123. Varshney P, Bibhu V, Sahoo B, Gupta A (2014) Quantitative review of malicious node detection of mobile ad-hoc network. Int J Comput Math Sci (IJCMS) 3:102–110

    Google Scholar 

  124. Victoire T, Sakthivel M (2011) A refined differential evolution algorithm based fuzzy classifier for intrusion detection. Euro J Sci Res 65(2):246–259

    Google Scholar 

  125. Visu P, Janet J, Kannan E, Koteeswaran S (2012) Optimal energy management in wireless adhoc network using artificial bee colony based routing protocol. Euro J Sci Res 74(2):301–307

    Google Scholar 

  126. Walters R (2016) Cyber attacks on US companies in 2016. The Heritage Foundation 4289, pp 1–5

  127. Wang B, Liu K, Clancy T (2008) Evolutionary game framework for behavior dynamics in cooperative spectrum sensing. IEEE global telecommunications conference (GLOBECOM), pp 1–5

  128. Wang X, Ding L, Bi D (2010) Reputation-enabled self-modification for target sensing in wireless sensor networks. IEEE Trans Instrum Meas 59:171–179

    Article  Google Scholar 

  129. Wang X, Osagie E, Thulasiraman P, Thulasiram R (2009) HOPNET: A hybrid ant colony optimization routing algorithm for mobile ad hoc network. Ad Hoc Netw 7:690705

    Google Scholar 

  130. Wang X, Wu Y, Ren Y, Feng R, Yu N, Wan J (2013) An evolutionary game-based trust cooperative stimulation model for large scale MANETs. Int J Distrib Sens Netw 13:245017

    Article  Google Scholar 

  131. Watkins A, Timmis J, Boggess L (2004) Artificial immune recognition system (AIRS): an immune-inspired supervised learning algorithm. Genet Program Evolv Mach 5(3):291–317

    Article  Google Scholar 

  132. Wedde H, Farooq M, Pannenbaecker T, Vogel B, Mueller C, Meth J, Jeruschkat R (1995) Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. In: 7th annual conf. on genetic and evolutionary computation (GECCO’05), pp 153–160

  133. Weibull J (1997) Evolutionary game theory. The MIT Press, Cambridge, MA

    MATH  Google Scholar 

  134. Weise T (2006) Genetic programming for sensor networks. Technical report, University of Kassel, Germany

  135. Wu Y, Zhao Y, Riguidel M, Wang G, Yi P (2015) Security and trust management in opportunistic networks: a survey. Secur Commun Netw 8(9):1812–1827

    Article  Google Scholar 

  136. Wulandari G, Rismawan W, Saadah S (2015) Differential evolution for the cryptanalysis of transposition cipher. In: 3rd Int’l. Conf. on information and comm. tech. (ICoICT), pp 45–48

  137. Wyner A (1975) The wire-tap channel. Bell Syst Tech J 54:1355–1387

    Article  MathSciNet  MATH  Google Scholar 

  138. Zou J, Gundry S, Uyar M, Kusyk J, Sahin C (2016) Bio-inspired topology control mechanism for unmanned underwater vehicles. In: Recent advances in computational intelligence in defense and security. Springer, pp 727–752

Download references

Acknowledgements

This research is supported by D01_W911SR-14-2-0001-0014. The contents of this document represent the views of the authors and are not necessarily the official views of, or endorsed by, the US Government, Department of Defense, Department of the Army or US Army Communications-Electronic RD&E Center. Dr. Cem Safak Sahin is currently an MIT Lincoln Laboratory employee; no Laboratory funding or resources were used to produce the result/findings reported in this publication.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Umit Uyar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kusyk, J., Uyar, M.U. & Sahin, C.S. Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol. Intel. 10, 95–117 (2018). https://doi.org/10.1007/s12065-018-0154-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12065-018-0154-4

Keywords

Navigation