Table 1 Comparison of existing security approaches in MANETs.
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Study | Technique used | Strengths | Weaknesses and limitations |
---|---|---|---|
Guided Whale Optimization Algorithm (GWOA)23 | Multi-objective optimization + Trust-based routing | Enhances packet delivery and minimizes overhead | Lacks encryption, making it vulnerable to data interception |
EAACK (Enhanced Adaptive Acknowledgment)24 | RSA encryption + P2P-ACK protocol | Prevents packet dropping and improves routing security | High computational overhead due to RSA encryption |
ACHIO (Adaptive Coronavirus Herd Immunity Optimizer)25 | Chaotic map-based encryption for MANET-IoT | Achieves 86.02% encryption accuracy | Increased processing time for larger datasets |
Distributed Clustering Algorithm Dependent IDS (DCAIDS)26 | Intrusion detection via clustering | Reduces delay and prevents unauthorized access | Energy consumption is high due to continuous monitoring |
Optimized Link State Routing (OLSR) Protocol27 | Proactive routing with real-time updates | Suitable for military applications with dynamic topology | High routing overhead; security vulnerabilities persist |
Refined Adaptive Harris Hawks Optimization (RAHHO)28 | Adaptive security parameter updates | Strong attack detection with dynamic adjustments | Computationally expensive; unsuitable for real-time use |
Authentication-Based Associate Neighbor Node Selection (AANNS)29 | Trust metric using signal strength & energy | Prioritizes reliable nodes to prevent Sybil & blackhole attacks | Not scalable for large, dynamic networks |
Active Routing Authentication System (AAS)30 | BAN logic for authentication | Increases packet delivery by 18.4%, resists route spoofing | Authentication delays; requires specific protocol integration |
Cooperative Self-Scheduling Secure Routing Protocol (CoS3RP)31 | Elite Sparrow Search Algorithm (ESSA) + Multipath Optimal Distance Selection (MODS) | Reduces latency, improves routing and security | Requires high computational power for clustering |
ATAODV (Multi-Agent System)32 | Aggregated Trust (AT) + Routing Agent (RA) | Provides two-layer security with authentication & route trust | Additional processing delays in establishing trust values |
Kangaroo-based IDS with Bi-LSTM33 | Deep learning + TriChain Blockchain | Secure routing with improved intrusion detection | Complexity in route discovery; higher processing overhead |
Graph Theory-Based Optimization for MANET34 | Machine learning-based network security | Efficient in handling large datasets and detecting anomalies | Requires extensive data collection and model training |
Swarm Intelligence-based Secure AODV (SIS-AODV)35 | ECC encryption + Ant Colony Optimization | Strong authentication and non-repudiation with lightweight hashing | Moderate overhead due to cryptographic operations |