Table 2 Notations and their descriptions.

From: Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs

Notation

Description

\(\:G=\left(N,L\right)\)

MANET network graph, where \(\:N\) is the set of nodes and \(\:L\) is the set of links

\(\:S\)

Source node

\(\:D\)

Destination node

\(\:P\)

Original packet to be transmitted

\(\:{E}_{data}\)

Encrypted packet using ECC

\(\:\sigma\:\)

Digital signature of packet \(\:P\)

\(\:P{K}_{n},\:S{K}_{n}\)

Public and private key pair of node \(\:n\)

\(\:{T}_{n}\)

Trust value of node \(\:n\)

\(\:{E}_{n}\)

Residual energy of node \(\:n\)

\(\:{C}_{n}\)

Congestion level of node \(\:n\)

\(\:{T}_{avg}\)

Average trust value of nodes in route \(\:{R}_{i}\)

\(\:{E}_{avg}\)

Average residual energy of nodes in route \(\:{R}_{i}\)

\(\:{C}_{avg}\)

Average congestion level in route \(\:{R}_{i}\)

\(\:{R}_{i}\)

Candidate routing path \(\:i\) from source \(\:S\) to destination \(\:D\)

\(\:{R}_{opt}\)

Optimal routing path selected via EHO

\(\:K\)

Shared session key for encryption

\(\:\alpha\:,\beta\:,\gamma\:\)

Weighting factors in trust-based route selection

\(\:F\left({R}_{i}\right)\)

Fitness function for evaluating routing paths

\(\:Sign\left(S{K}_{S},P\right)\)

Signing function using the private key \(\:S{K}_{S}\)​ of Source \(\:S\)

\(\:Verify\left(P{K}_{S},\sigma\:,P\right)\)

Signature verification using the public key \(\:P{K}_{S}\)

\(\:Encrypt\left(K,P\right)\)

Encryption function using ECC session key \(\:K\)

\(\:Decrypt\left(K,{E}_{data}\right)\)

Decryption function using ECC session key \(\:K\)

\(\:ECC\_KeyExchange\left(P{K}_{S},P{K}_{D}\right)\)

Key exchange function between source SSS and destination \(\:D\)

\(\:KMeans\left({P}^{{\prime\:}}\right)\)

K-means clustering function for intrusion detection