Table 2 Notations and their descriptions.
From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Notation | Description |
---|---|
\(\:G=\left(N,L\right)\) | MANET network graph, where \(\:N\) is the set of nodes and \(\:L\) is the set of links |
\(\:S\) | Source node |
\(\:D\) | Destination node |
\(\:P\) | Original packet to be transmitted |
\(\:{E}_{data}\) | Encrypted packet using ECC |
\(\:\sigma\:\) | Digital signature of packet \(\:P\) |
\(\:P{K}_{n},\:S{K}_{n}\) | Public and private key pair of node \(\:n\) |
\(\:{T}_{n}\) | Trust value of node \(\:n\) |
\(\:{E}_{n}\) | Residual energy of node \(\:n\) |
\(\:{C}_{n}\) | Congestion level of node \(\:n\) |
\(\:{T}_{avg}\) | Average trust value of nodes in route \(\:{R}_{i}\) |
\(\:{E}_{avg}\) | Average residual energy of nodes in route \(\:{R}_{i}\) |
\(\:{C}_{avg}\) | Average congestion level in route \(\:{R}_{i}\) |
\(\:{R}_{i}\) | Candidate routing path \(\:i\) from source \(\:S\) to destination \(\:D\) |
\(\:{R}_{opt}\) | Optimal routing path selected via EHO |
\(\:K\) | Shared session key for encryption |
\(\:\alpha\:,\beta\:,\gamma\:\) | Weighting factors in trust-based route selection |
\(\:F\left({R}_{i}\right)\) | Fitness function for evaluating routing paths |
\(\:Sign\left(S{K}_{S},P\right)\) | Signing function using the private key \(\:S{K}_{S}\) of Source \(\:S\) |
\(\:Verify\left(P{K}_{S},\sigma\:,P\right)\) | Signature verification using the public key \(\:P{K}_{S}\) |
\(\:Encrypt\left(K,P\right)\) | Encryption function using ECC session key \(\:K\) |
\(\:Decrypt\left(K,{E}_{data}\right)\) | Decryption function using ECC session key \(\:K\) |
\(\:ECC\_KeyExchange\left(P{K}_{S},P{K}_{D}\right)\) | Key exchange function between source SSS and destination \(\:D\) |
\(\:KMeans\left({P}^{{\prime\:}}\right)\) | K-means clustering function for intrusion detection |