Table 16 Security evaluation of Sec-BIO vs. existing protocols.
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Attack type | AODV | E-AODV | Sec-BIO (proposed model) |
---|---|---|---|
Blackhole attack | High packet drop | Moderate defense | Trust-based routing & intrusion detection mitigate attack |
Greyhole attack | Difficult to detect | Partially addressed | Adaptive trust evaluation & K-means classification |
Wormhole attack | No defense | Limited detection | Hop-count analysis & timing-based detection |
Sybil attack | No authentication | Basic authentication | Digital signature verification & reputation tracking |