SlideShare una empresa de Scribd logo
1 de 22
PREPARED BY
KISHAN PATEL
VARIOUS METAHEURISTIC
ALGORITHMS FOR SECURING
VANET
OUTLINE
 INTODUCTION OF VANET
 SECURITY IN VANET
 ADVANTAGES AND DISADVANTAGES
 METAHEURISTIC
 METAHEURISTIC TECHNIQUES
 PROPERTIES OF METAHEURISTIC
 WHY METAHEURISTIC…?
 METAHEURISTIC ALGORITHMS
 SURVEY OF VARIOUS METAHEURISTIC
 CONCLUSION
 REFERENCES
INTRODUCTION OF VANET
 Vehicular ad hoc network (VANET) uses cars as mobile nodes in
a MANET to create a mobile network.
 Vehicular ad hoc networks are a subgroup of mobile ad hoc
networks (MANETs).
 Cars fall out of the signal range and drop out of the network,
other cars can join, by connecting vehicles to one another form a
wireless network called “Vehicular Ad Hoc Network.
 Due to high mobility, frequent changes in topology such
characteristics of this network that make routing decisions more
challenging.
3
SECURITY IN VANET
 The nature of VANETs could lead to malicious attacks.
o Predictable movement of nodes.
o High mobility of victim/attacker.
 Adversaries could break the system.
o Data sinkholes (black hole).
o Gray hole
o Feed false information.
o Flood the system.
 Security measures must be taken to avoid malicious attacks on the
system
4
ADVANTAGES AND DISADVANTAGES
Advantages
 Public Safety.
 Traffic Management.
 Traffic Coordination and Assistance.
 Traveller Information Support.
 Comfort.
 Air pollution emission measurement and reduction.
Disadvantages
 Flooding in route discovery initial phase.
 Wasted band width.
 Delay.
 Increasing network congestion.
 External sources for destination location.
5
METAHEURISTIC
 Heuristic means to find or to discover by trial and error. And meta
means higher level and metaheuristics generally perform better
than simple heuristics.
 The word "metaheuristic” can be considered as a "master strategy
that guides and modifies other heuristics to produce solutions.
Generally metaheuristic is used for solving problem in ad hoc
networks.
METAHUERISTIC TECHNIQUES
 There are two techniques:
 Online metaheuristic approach and Offline metaheuristic
approach.
 The main difference between them is the moment when they are
applied for solving problem.
1. Online metaheuristic approaches are used for decision making
or solving the problem during run time.
2. Offline metaheuristic approaches are useful when there is no
requirement for system to adapt change during runtime.
PROPERTIES OF METAHEURISTIC
1. Search process is influenced by Metaheuristic approch.
2. The main purpose of the search process is to find near to
optimal solutions.
3. It range from simple local search procedures to complex
processes.
4. They are non-deterministic.
5. They are not problem-specific
WHY METAHEURISTIC….?
1. Metaheuristics are used for solving the security and routing
problems in ad hoc networks.
2. Security problem in the network may be due to selfish and
malicious node. Metaheuristic approach can be used for
overcoming the problem of node misbehaving in ad hoc
networks.
3. For route optimization e.g selecting the shortest and quality
route from source to destination in the ad hoc networks.
4. Metaheuristic approach is also used for solving the supply
chain problems.
5. Metaheuristic approach is important for generating optimum set
of test data in software testing.
METAHEURISTIC ALGORITHMS
 Metaheuristic is a procedure for finding or select a lower
heuristic and provide a good solution to an optimization and
security problem with limited computation
capacity. Metaheuristics may make few assumptions about the
problems in ad hoc networks so it is used for a variety of
problems.
 As shown in next figure classification of metaheuristics. It
includes Ant colony optimization (ACO), Tabu search (TS),
scatter search(SS), Variable neighborhood search (VNS), Guided
local search (GLS), iterated local search (ILS), simulated
annealing (SA), evolutionary algorithms (EC) etc.
CONT…
 Ant colony optimization (ACO):
It is a population-based metaheuristic for the solution to the
difficult combinatorial optimization problems. The inspiring
source of ACO is behavior of real ants. This behavior empowers
ants to find shortest paths from food sources to their nest. While
walking from food sources to the nest, ants dregs a substance
called pheromone on the ground. This behavior is the basis for a
cooperative interaction for emerging of shortest paths.
 Tabu search :
It is a heuristic procedure for solving optimization problems.
Tabu search has obtained optimal and near to optimal solutions to
a wide variety of practical problems in varied applications such
as scheduling, character recognition.
CONT…
 Scatter Search (SS):
It is designed to operate on a set of points, which is called
reference points. It also captures information which is not present
in reference points. It takes advantage of auxiliary heuristic
methods.
 Variable neighbourhood search (VNS):
It is based on simple principal . It starts from feasible solution X
and from a predefined set of steps, chooses a random solution
within the neighborhood of X and move there if the solution is
better.
CONT…
 Simulated annealing :
It is a probabilistic metaheuristic for the global optimization
problem for finding a good approximation to the global optimum
for a given function in a large search space.
 Evolutionary computing:
Evolution is a process in which functioning deals with
chromosomes. The process takes place during the reproduction
stage. For e.g mutation and recombination. It is combination of
genetic algorithms, evolution strategies, evolutionary
programming and genetic programming.
SURVEY OF VARIOUS
METAHEURISTICS
16
Title Mechanism /
Algorithm
Purpose Methodology
TARA: Trusted Ant Colony Multi
Agent Based Routing Algorithm
for Mobile Ad-Hoc Networks.
TARA: Trusted Ant Colony Multi
Agent Based Routing Algorithm
To avoid trust value propagation. To
minimize the number of messages
been exchanged. To find the best
route for delivery.
Trust value of each node is directly
aped to the route and no need to
propagate the trust values like other
trusted protocols.
Trust Based QOS Protocol(TBQP)
using Metaheuristic
Genetic Algorithm for Optimizing
and
Securing MANET
Trust Based QOS Protocol (TBQP)
Using Meta-heuristic Genetic
Algorithm.
To provide QOS by selecting the
fittest shortest route among the
number of routes to provide
optimization. Acquaintance
And Authentication of packets for
routing in network.
Intriguing a trust based packet
delivering scheme for detecting and
isolating the malignant nodes using
the routing layer information. A
trust weigh is maintained and a
node is remunerated by decreasing
or increasing the trust weigh value.
If the trust weigh falls below a trust
threshold, node is marked as
malicious node.
Performance analysis of optimized
Trust AODV using ant Algorithms
Ant colony optimization To sustain security against the dos
attacks.
At agents can move freely to find
destination it will update positive
pheromone to the routing table. The
pheromone is deposited if node is
trusted.
17
Title Mechanism /
Algorithm
Purpose Methodology
Ant Colony and Load Balancing
Optimizations for AODV Routing
Protocol
Multi-Route AODV Ant routing
(MRAA)
Load balancing( LBMRAA)
To reduce
the routing overhead, buffer
overflow, end-to-end delay and
increase the performance
Data packets are balanced
over discovered paths and energy
consumption is distributed across
many nodes through network.
Secure Ant-Based Routing Protocol
for Wireless Sensor Network.
Secure Ant-Based Routing
Protocol(SARP)
To provide Route security in
network.
It uses two paths for data
forwarding to overcome the
problem of node failure and to
increase the efficiency of overall
network.
MANET link Performance using Ant
Colony
Optimization and Particle Swarm
Optimization
Algorithms.
Ant colony optimization and
Particle swarm optimization.
Finds the best solution over the
particle’s position and velocity with
the cost and minimum. End-to-end
delay.
Ant Colony Optimization
(ACO) algorithm uses mobile agents
as ants to discover feasible and best
path in a network and PSO finds the
best solution over the particle’s
position and velocity with the
objective of cost and minimum End-
to-end delay.
AntTrust: A Novel Ant Routing
Protocol forWireless Ad-hoc
Network Based on
Trust Between Nodes.
Ant Trust Routing Protocol To increase the security of route.
And malicious manipulations
of data packets.
AntTrust is located precisely in the
context of the security of routing. It
also facilitates malicious
manipulations of data packets.
18
Title Mechanism /
Algorithm
Purpose Methodology
Mitigating Routing Misbehavior
Using Ant-Tabu-Based
Routing Algorithm for Wireless
Ad-Hoc Networks
Ant-Tabu-Based
Routing Algorithm(ATBR)
To mitigate the selfish nodes
problems and provide reliability in
a dynamic network.
To increase successful delivery
rate (SDR).
To decrease routing overhead
(RO).
To prevent from dos attacks to
enhance network performance.
Swarm intelligence based
approach for sinkhole attack
detection in wireless sensor
networks.
Proposed an Ant Colony
Optimization Attack Detection
(ACO-AD) algorithm and Ant
Colony Optimization Boolean
Expression Evolver Sign
Generation (ABXES).
To detect a sinkhole attack and to
identify an intruder in a wireless
sensor networks.
ACO-AD algorithm for detection of
sink hole attack, and ABXES
algorithm for distributing keys
among the group of node. And for
identification of the anomalous
connections without generation of
false positives and minimization of
storage in the sensor nodes.
Network Security Using Self
Organized Multi
Agent Swarms.
Self organized multi agent swarms
(SOMAS)
To provides a novel computer
network security management
framework.
SOMAS developmental aspects can
be improved in the approach,
methodology, an experimental
design and evaluation. Testing is
required for different agent rules
with scenario size
Title Mechanism /
Algorithm
Purpose Methodology
Sustaining Security in MANET:
Biometric Stationed Authentication
Protocol (BSAP) Inculcating Meta-
Heuristic Genetic Algorithm.
Biometric Stationed Authentication
Protocol (BSAP)
To sustain security in MANET
from DOS attacks.
Biometric cryptographic key is
produced to enhance security of
MANET. Hence data is protected
by applying three levels of security
by our prospective approach which
develops trust between various
nodes of ad-hoc network.
A memetic algorithm for enhancing
the robustness of scale-free
networks against malicious attacks.
Memetic algorithm To enhance the robustness of
networks against malicious attacks.
By using Hill climbing, Simulated
annealing, Smart rewiring and
memetic algorithms for solving the
problem of optimizing and security
in network .
A trust based clustering with ant
colony routing in Vanet.
Proposed a new Mobility-aware
Ant Colony Optimization Routing
(MAR-DYMO).
To decrease the routing overhead
by establishing creating trust in
between the nodes in vanet.
Trust in the routing algorithms in
terms of routing overhead. 20
random values are obtained for
different number of VANET nodes
and clusters and the average value
is presented.
A Survey on Anomaly Detection in
Network Intrusion
Detection System Using Particle
Swarm Optimization
Based Machine Learning
Techniques.
Particle swarm optimization
combined with Machine Learning
techniques for Anomaly Detection
in Network Intrusion Detection
System.
To enhance the performance of
intrusion detection system.
Recently developed IDS with single
techniques is insufficient against
increasing threats in the network.
So hybridization of techniques are
used to satisfy the increasing
demand of intelligent Intrusion
Detection System (IDS).
CONCLUSION
 The metaheuristic approach is currently attracting considerable
interest for research community to meet the rising need.
 The important advantage of metaheurisic approach is to provide
provably optimal solutions but they have potential to produce
good solutions in short amounts of time.
 In this paper we present a survey of various metaheuristic
algorithms and its functioning to overcome security and
optimization problem to improve the performance of ad hoc
networks.
CONT….
 In order to overcome the shortcoming of existing algorithms and
to enhance the robustness of an existing network against
malicious attacks various techniques are hybridized. We conclude
that metaheuristic approach can provide a best solution for
security and optimization problem with limited computation.
REFERENCES
 [1] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping
Misbehavior using Metaheuristic Approach: A Survey”,
International Conference on Electrical, Electronics, Signals,
Communication and Optimization (IEEE EESCO-2015), Issue
3, pages 1036-1041, 24-25 January 2015.

Más contenido relacionado

La actualidad más candente

Cruise control systems
Cruise control systemsCruise control systems
Cruise control systemsYusha Patel
 
Adaptive cruise control
Adaptive cruise controlAdaptive cruise control
Adaptive cruise controlJinu Joy
 
Popular search algorithms
Popular search algorithmsPopular search algorithms
Popular search algorithmsMinakshi Atre
 
Embedded system in automobile
Embedded system in automobile Embedded system in automobile
Embedded system in automobile Swaraj Nayak
 
Evolutionary computing - soft computing
Evolutionary computing - soft computingEvolutionary computing - soft computing
Evolutionary computing - soft computingSakshiMahto1
 
Flowchart of GA
Flowchart of GAFlowchart of GA
Flowchart of GAIshucs
 
Architecture Design for Deep Neural Networks I
Architecture Design for Deep Neural Networks IArchitecture Design for Deep Neural Networks I
Architecture Design for Deep Neural Networks IWanjin Yu
 
Autonomous car
Autonomous carAutonomous car
Autonomous carAnil kale
 
Fuzzy control and its applications
Fuzzy control and its applicationsFuzzy control and its applications
Fuzzy control and its applicationsjeevithaelangovan
 
Machine learning Lecture 2
Machine learning Lecture 2Machine learning Lecture 2
Machine learning Lecture 2Srinivasan R
 
ML_Unit_1_Part_B
ML_Unit_1_Part_BML_Unit_1_Part_B
ML_Unit_1_Part_BSrimatre K
 
collision avoidance system,automobile technology,safety systems in car
collision avoidance system,automobile technology,safety systems in carcollision avoidance system,automobile technology,safety systems in car
collision avoidance system,automobile technology,safety systems in carSai Ram Vakkalagadda
 
collision warning assistance system
collision warning assistance systemcollision warning assistance system
collision warning assistance systemsubbu cancan k
 
Particle swarm optimization
Particle swarm optimizationParticle swarm optimization
Particle swarm optimizationMahesh Tibrewal
 
Self driving cars -
Self driving cars - Self driving cars -
Self driving cars - Hany G. Amer
 
Autonomous car.ppt
Autonomous car.pptAutonomous car.ppt
Autonomous car.pptDerLee5
 

La actualidad más candente (20)

Cruise control systems
Cruise control systemsCruise control systems
Cruise control systems
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Adaptive cruise control
Adaptive cruise controlAdaptive cruise control
Adaptive cruise control
 
Popular search algorithms
Popular search algorithmsPopular search algorithms
Popular search algorithms
 
Embedded system in automobile
Embedded system in automobile Embedded system in automobile
Embedded system in automobile
 
Evolutionary computing - soft computing
Evolutionary computing - soft computingEvolutionary computing - soft computing
Evolutionary computing - soft computing
 
Firefly algorithm
Firefly algorithmFirefly algorithm
Firefly algorithm
 
Flowchart of GA
Flowchart of GAFlowchart of GA
Flowchart of GA
 
Truth management system
Truth  management systemTruth  management system
Truth management system
 
Architecture Design for Deep Neural Networks I
Architecture Design for Deep Neural Networks IArchitecture Design for Deep Neural Networks I
Architecture Design for Deep Neural Networks I
 
Autonomous car
Autonomous carAutonomous car
Autonomous car
 
Fuzzy control and its applications
Fuzzy control and its applicationsFuzzy control and its applications
Fuzzy control and its applications
 
Machine learning Lecture 2
Machine learning Lecture 2Machine learning Lecture 2
Machine learning Lecture 2
 
ML_Unit_1_Part_B
ML_Unit_1_Part_BML_Unit_1_Part_B
ML_Unit_1_Part_B
 
Support Vector Machines ( SVM )
Support Vector Machines ( SVM ) Support Vector Machines ( SVM )
Support Vector Machines ( SVM )
 
collision avoidance system,automobile technology,safety systems in car
collision avoidance system,automobile technology,safety systems in carcollision avoidance system,automobile technology,safety systems in car
collision avoidance system,automobile technology,safety systems in car
 
collision warning assistance system
collision warning assistance systemcollision warning assistance system
collision warning assistance system
 
Particle swarm optimization
Particle swarm optimizationParticle swarm optimization
Particle swarm optimization
 
Self driving cars -
Self driving cars - Self driving cars -
Self driving cars -
 
Autonomous car.ppt
Autonomous car.pptAutonomous car.ppt
Autonomous car.ppt
 

Destacado

Aco 03-04-2013
Aco 03-04-2013Aco 03-04-2013
Aco 03-04-2013Ahmad Khan
 
Ant Colony Optimization: The Algorithm and Its Applications
Ant Colony Optimization: The Algorithm and Its ApplicationsAnt Colony Optimization: The Algorithm and Its Applications
Ant Colony Optimization: The Algorithm and Its Applicationsadil raja
 
Classification with ant colony optimization
Classification with ant colony optimizationClassification with ant colony optimization
Classification with ant colony optimizationkamalikanath89
 
Show ant-colony-optimization-for-solving-the-traveling-salesman-problem
Show ant-colony-optimization-for-solving-the-traveling-salesman-problemShow ant-colony-optimization-for-solving-the-traveling-salesman-problem
Show ant-colony-optimization-for-solving-the-traveling-salesman-problemjayatra
 
Ant Colony Optimization: Routing
Ant Colony Optimization: RoutingAnt Colony Optimization: Routing
Ant Colony Optimization: RoutingAdrian Wilke
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationMeenakshi Devi
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimizationvk1dadhich
 
CPU scheduling algorithms in OS
CPU scheduling algorithms in OSCPU scheduling algorithms in OS
CPU scheduling algorithms in OSharini0810
 

Destacado (11)

Issues of routing in vanet
Issues of routing in vanetIssues of routing in vanet
Issues of routing in vanet
 
Osi model
Osi modelOsi model
Osi model
 
ant colony algorithm
ant colony algorithmant colony algorithm
ant colony algorithm
 
Aco 03-04-2013
Aco 03-04-2013Aco 03-04-2013
Aco 03-04-2013
 
Ant Colony Optimization: The Algorithm and Its Applications
Ant Colony Optimization: The Algorithm and Its ApplicationsAnt Colony Optimization: The Algorithm and Its Applications
Ant Colony Optimization: The Algorithm and Its Applications
 
Classification with ant colony optimization
Classification with ant colony optimizationClassification with ant colony optimization
Classification with ant colony optimization
 
Show ant-colony-optimization-for-solving-the-traveling-salesman-problem
Show ant-colony-optimization-for-solving-the-traveling-salesman-problemShow ant-colony-optimization-for-solving-the-traveling-salesman-problem
Show ant-colony-optimization-for-solving-the-traveling-salesman-problem
 
Ant Colony Optimization: Routing
Ant Colony Optimization: RoutingAnt Colony Optimization: Routing
Ant Colony Optimization: Routing
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
Ant colony optimization
Ant colony optimizationAnt colony optimization
Ant colony optimization
 
CPU scheduling algorithms in OS
CPU scheduling algorithms in OSCPU scheduling algorithms in OS
CPU scheduling algorithms in OS
 

Similar a Various Metaheuristic algorithms For Securing VANET

Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Editor Jacotech
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEEBEBTECHSTUDENTPROJECTS
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...IEEEBEBTECHSTUDENTSPROJECTS
 
Implementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for ManetImplementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for ManetIRJET Journal
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEEBEBTECHSTUDENTPROJECTS
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...IJARIIT
 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoIJARIIT
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Editor IJCATR
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Patternchennaijp
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstractMukundhan Elumalai
 

Similar a Various Metaheuristic algorithms For Securing VANET (20)

Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
Implementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for ManetImplementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for Manet
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using aco
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
Ant
AntAnt
Ant
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
I010525057
I010525057I010525057
I010525057
 
Fp3610261032
Fp3610261032Fp3610261032
Fp3610261032
 
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
Simulation Based Analysis of Bee Swarm Inspired Hybrid Routing Protocol Param...
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
 
ant2
ant2ant2
ant2
 
2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract2013 2014 ieee projects titles with abstract
2013 2014 ieee projects titles with abstract
 

Más de Kishan Patel

Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc NetworksKishan Patel
 
ONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESSONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESSKishan Patel
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Kishan Patel
 
Universal Description, Discovery and Integration
Universal Description, Discovery and IntegrationUniversal Description, Discovery and Integration
Universal Description, Discovery and IntegrationKishan Patel
 
Real World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksReal World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksKishan Patel
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem Kishan Patel
 

Más de Kishan Patel (8)

Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
ONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESSONTOLOGY BASED DATA ACCESS
ONTOLOGY BASED DATA ACCESS
 
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
Avoiding Packet Dropping Misbehavior in VANET using Trust Based Ant Colony Op...
 
Universal Description, Discovery and Integration
Universal Description, Discovery and IntegrationUniversal Description, Discovery and Integration
Universal Description, Discovery and Integration
 
Real World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc NetworksReal World Testbeds Emulation for Mobile Ad-hoc Networks
Real World Testbeds Emulation for Mobile Ad-hoc Networks
 
Overview of Modem
Overview of Modem Overview of Modem
Overview of Modem
 
Podcasting
PodcastingPodcasting
Podcasting
 

Último

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Último (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 

Various Metaheuristic algorithms For Securing VANET

  • 1. PREPARED BY KISHAN PATEL VARIOUS METAHEURISTIC ALGORITHMS FOR SECURING VANET
  • 2. OUTLINE  INTODUCTION OF VANET  SECURITY IN VANET  ADVANTAGES AND DISADVANTAGES  METAHEURISTIC  METAHEURISTIC TECHNIQUES  PROPERTIES OF METAHEURISTIC  WHY METAHEURISTIC…?  METAHEURISTIC ALGORITHMS  SURVEY OF VARIOUS METAHEURISTIC  CONCLUSION  REFERENCES
  • 3. INTRODUCTION OF VANET  Vehicular ad hoc network (VANET) uses cars as mobile nodes in a MANET to create a mobile network.  Vehicular ad hoc networks are a subgroup of mobile ad hoc networks (MANETs).  Cars fall out of the signal range and drop out of the network, other cars can join, by connecting vehicles to one another form a wireless network called “Vehicular Ad Hoc Network.  Due to high mobility, frequent changes in topology such characteristics of this network that make routing decisions more challenging. 3
  • 4. SECURITY IN VANET  The nature of VANETs could lead to malicious attacks. o Predictable movement of nodes. o High mobility of victim/attacker.  Adversaries could break the system. o Data sinkholes (black hole). o Gray hole o Feed false information. o Flood the system.  Security measures must be taken to avoid malicious attacks on the system 4
  • 5. ADVANTAGES AND DISADVANTAGES Advantages  Public Safety.  Traffic Management.  Traffic Coordination and Assistance.  Traveller Information Support.  Comfort.  Air pollution emission measurement and reduction. Disadvantages  Flooding in route discovery initial phase.  Wasted band width.  Delay.  Increasing network congestion.  External sources for destination location. 5
  • 6. METAHEURISTIC  Heuristic means to find or to discover by trial and error. And meta means higher level and metaheuristics generally perform better than simple heuristics.  The word "metaheuristic” can be considered as a "master strategy that guides and modifies other heuristics to produce solutions. Generally metaheuristic is used for solving problem in ad hoc networks.
  • 7. METAHUERISTIC TECHNIQUES  There are two techniques:  Online metaheuristic approach and Offline metaheuristic approach.  The main difference between them is the moment when they are applied for solving problem. 1. Online metaheuristic approaches are used for decision making or solving the problem during run time. 2. Offline metaheuristic approaches are useful when there is no requirement for system to adapt change during runtime.
  • 8. PROPERTIES OF METAHEURISTIC 1. Search process is influenced by Metaheuristic approch. 2. The main purpose of the search process is to find near to optimal solutions. 3. It range from simple local search procedures to complex processes. 4. They are non-deterministic. 5. They are not problem-specific
  • 9. WHY METAHEURISTIC….? 1. Metaheuristics are used for solving the security and routing problems in ad hoc networks. 2. Security problem in the network may be due to selfish and malicious node. Metaheuristic approach can be used for overcoming the problem of node misbehaving in ad hoc networks. 3. For route optimization e.g selecting the shortest and quality route from source to destination in the ad hoc networks. 4. Metaheuristic approach is also used for solving the supply chain problems. 5. Metaheuristic approach is important for generating optimum set of test data in software testing.
  • 10. METAHEURISTIC ALGORITHMS  Metaheuristic is a procedure for finding or select a lower heuristic and provide a good solution to an optimization and security problem with limited computation capacity. Metaheuristics may make few assumptions about the problems in ad hoc networks so it is used for a variety of problems.  As shown in next figure classification of metaheuristics. It includes Ant colony optimization (ACO), Tabu search (TS), scatter search(SS), Variable neighborhood search (VNS), Guided local search (GLS), iterated local search (ILS), simulated annealing (SA), evolutionary algorithms (EC) etc.
  • 11.
  • 12. CONT…  Ant colony optimization (ACO): It is a population-based metaheuristic for the solution to the difficult combinatorial optimization problems. The inspiring source of ACO is behavior of real ants. This behavior empowers ants to find shortest paths from food sources to their nest. While walking from food sources to the nest, ants dregs a substance called pheromone on the ground. This behavior is the basis for a cooperative interaction for emerging of shortest paths.  Tabu search : It is a heuristic procedure for solving optimization problems. Tabu search has obtained optimal and near to optimal solutions to a wide variety of practical problems in varied applications such as scheduling, character recognition.
  • 13. CONT…  Scatter Search (SS): It is designed to operate on a set of points, which is called reference points. It also captures information which is not present in reference points. It takes advantage of auxiliary heuristic methods.  Variable neighbourhood search (VNS): It is based on simple principal . It starts from feasible solution X and from a predefined set of steps, chooses a random solution within the neighborhood of X and move there if the solution is better.
  • 14. CONT…  Simulated annealing : It is a probabilistic metaheuristic for the global optimization problem for finding a good approximation to the global optimum for a given function in a large search space.  Evolutionary computing: Evolution is a process in which functioning deals with chromosomes. The process takes place during the reproduction stage. For e.g mutation and recombination. It is combination of genetic algorithms, evolution strategies, evolutionary programming and genetic programming.
  • 16. 16 Title Mechanism / Algorithm Purpose Methodology TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm for Mobile Ad-Hoc Networks. TARA: Trusted Ant Colony Multi Agent Based Routing Algorithm To avoid trust value propagation. To minimize the number of messages been exchanged. To find the best route for delivery. Trust value of each node is directly aped to the route and no need to propagate the trust values like other trusted protocols. Trust Based QOS Protocol(TBQP) using Metaheuristic Genetic Algorithm for Optimizing and Securing MANET Trust Based QOS Protocol (TBQP) Using Meta-heuristic Genetic Algorithm. To provide QOS by selecting the fittest shortest route among the number of routes to provide optimization. Acquaintance And Authentication of packets for routing in network. Intriguing a trust based packet delivering scheme for detecting and isolating the malignant nodes using the routing layer information. A trust weigh is maintained and a node is remunerated by decreasing or increasing the trust weigh value. If the trust weigh falls below a trust threshold, node is marked as malicious node. Performance analysis of optimized Trust AODV using ant Algorithms Ant colony optimization To sustain security against the dos attacks. At agents can move freely to find destination it will update positive pheromone to the routing table. The pheromone is deposited if node is trusted.
  • 17. 17 Title Mechanism / Algorithm Purpose Methodology Ant Colony and Load Balancing Optimizations for AODV Routing Protocol Multi-Route AODV Ant routing (MRAA) Load balancing( LBMRAA) To reduce the routing overhead, buffer overflow, end-to-end delay and increase the performance Data packets are balanced over discovered paths and energy consumption is distributed across many nodes through network. Secure Ant-Based Routing Protocol for Wireless Sensor Network. Secure Ant-Based Routing Protocol(SARP) To provide Route security in network. It uses two paths for data forwarding to overcome the problem of node failure and to increase the efficiency of overall network. MANET link Performance using Ant Colony Optimization and Particle Swarm Optimization Algorithms. Ant colony optimization and Particle swarm optimization. Finds the best solution over the particle’s position and velocity with the cost and minimum. End-to-end delay. Ant Colony Optimization (ACO) algorithm uses mobile agents as ants to discover feasible and best path in a network and PSO finds the best solution over the particle’s position and velocity with the objective of cost and minimum End- to-end delay. AntTrust: A Novel Ant Routing Protocol forWireless Ad-hoc Network Based on Trust Between Nodes. Ant Trust Routing Protocol To increase the security of route. And malicious manipulations of data packets. AntTrust is located precisely in the context of the security of routing. It also facilitates malicious manipulations of data packets.
  • 18. 18 Title Mechanism / Algorithm Purpose Methodology Mitigating Routing Misbehavior Using Ant-Tabu-Based Routing Algorithm for Wireless Ad-Hoc Networks Ant-Tabu-Based Routing Algorithm(ATBR) To mitigate the selfish nodes problems and provide reliability in a dynamic network. To increase successful delivery rate (SDR). To decrease routing overhead (RO). To prevent from dos attacks to enhance network performance. Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks. Proposed an Ant Colony Optimization Attack Detection (ACO-AD) algorithm and Ant Colony Optimization Boolean Expression Evolver Sign Generation (ABXES). To detect a sinkhole attack and to identify an intruder in a wireless sensor networks. ACO-AD algorithm for detection of sink hole attack, and ABXES algorithm for distributing keys among the group of node. And for identification of the anomalous connections without generation of false positives and minimization of storage in the sensor nodes. Network Security Using Self Organized Multi Agent Swarms. Self organized multi agent swarms (SOMAS) To provides a novel computer network security management framework. SOMAS developmental aspects can be improved in the approach, methodology, an experimental design and evaluation. Testing is required for different agent rules with scenario size
  • 19. Title Mechanism / Algorithm Purpose Methodology Sustaining Security in MANET: Biometric Stationed Authentication Protocol (BSAP) Inculcating Meta- Heuristic Genetic Algorithm. Biometric Stationed Authentication Protocol (BSAP) To sustain security in MANET from DOS attacks. Biometric cryptographic key is produced to enhance security of MANET. Hence data is protected by applying three levels of security by our prospective approach which develops trust between various nodes of ad-hoc network. A memetic algorithm for enhancing the robustness of scale-free networks against malicious attacks. Memetic algorithm To enhance the robustness of networks against malicious attacks. By using Hill climbing, Simulated annealing, Smart rewiring and memetic algorithms for solving the problem of optimizing and security in network . A trust based clustering with ant colony routing in Vanet. Proposed a new Mobility-aware Ant Colony Optimization Routing (MAR-DYMO). To decrease the routing overhead by establishing creating trust in between the nodes in vanet. Trust in the routing algorithms in terms of routing overhead. 20 random values are obtained for different number of VANET nodes and clusters and the average value is presented. A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques. Particle swarm optimization combined with Machine Learning techniques for Anomaly Detection in Network Intrusion Detection System. To enhance the performance of intrusion detection system. Recently developed IDS with single techniques is insufficient against increasing threats in the network. So hybridization of techniques are used to satisfy the increasing demand of intelligent Intrusion Detection System (IDS).
  • 20. CONCLUSION  The metaheuristic approach is currently attracting considerable interest for research community to meet the rising need.  The important advantage of metaheurisic approach is to provide provably optimal solutions but they have potential to produce good solutions in short amounts of time.  In this paper we present a survey of various metaheuristic algorithms and its functioning to overcome security and optimization problem to improve the performance of ad hoc networks.
  • 21. CONT….  In order to overcome the shortcoming of existing algorithms and to enhance the robustness of an existing network against malicious attacks various techniques are hybridized. We conclude that metaheuristic approach can provide a best solution for security and optimization problem with limited computation.
  • 22. REFERENCES  [1] Kishan Patel, Rutvij Jhaveri, “Addressing Packet Dropping Misbehavior using Metaheuristic Approach: A Survey”, International Conference on Electrical, Electronics, Signals, Communication and Optimization (IEEE EESCO-2015), Issue 3, pages 1036-1041, 24-25 January 2015.