|
|
|
xi | |
|
|
|
xiii | |
| Preface |
|
xv | |
| Acknowledgments |
|
xvii | |
|
|
|
1 | (24) |
|
|
|
2 | (2) |
|
|
|
3 | (1) |
|
1.1.2 Mobile Ad Hoc networks |
|
|
4 | (1) |
|
1.2 History of Mobile Ad Hoc Networks |
|
|
4 | (3) |
|
1.2.1 Differences between Cellular Networks and MANETs |
|
|
5 | (1) |
|
1.2.2 Applications of Mobile Ad Hoc Networks |
|
|
6 | (1) |
|
1.3 Routing in Mobile Ad Hoc Networks |
|
|
7 | (2) |
|
1.3.1 Design Challenges for Routing Protocols |
|
|
8 | (1) |
|
1.4 Quality of Service (QoS) Issues |
|
|
9 | (1) |
|
1.5 Security Issues in MANETs |
|
|
9 | (2) |
|
|
|
11 | (2) |
|
1.7 Bio-Inspired Computing |
|
|
13 | (3) |
|
1.7.1 Swarm Intelligence Techniques |
|
|
14 | (2) |
|
1.7.2 Non-Swarm Intelligence Techniques |
|
|
16 | (1) |
|
|
|
16 | (1) |
|
1.9 Organization of the Book |
|
|
17 | (1) |
|
|
|
18 | (7) |
|
|
|
18 | (1) |
|
|
|
19 | (1) |
|
|
|
19 | (1) |
|
|
|
20 | (1) |
|
|
|
21 | (1) |
|
|
|
21 | (4) |
|
2 Nature-Inspired Routing Algorithms for MANETs |
|
|
25 | (30) |
|
2.1 Nature-Inspired Routing Algorithms |
|
|
27 | (1) |
|
2.2 Reason for Aggregation |
|
|
27 | (1) |
|
|
|
28 | (1) |
|
2.4 Ant Colony Strategy: Finding Shortest Path to Food Source |
|
|
28 | (2) |
|
2.5 Termite Hill Building |
|
|
30 | (1) |
|
|
|
31 | (3) |
|
|
|
34 | (1) |
|
2.8 Decision Making by Fish |
|
|
35 | (1) |
|
|
|
35 | (2) |
|
2.10 Asymptotic Behavior of Bird Flocks |
|
|
37 | (1) |
|
|
|
38 | (1) |
|
2.12 Behavioral Study of Non-Swarm Species |
|
|
38 | (1) |
|
|
|
38 | (1) |
|
2.14 Analogy between SI Techniques and MANETs Routing |
|
|
39 | (1) |
|
2.15 Ants and MANETs Routing |
|
|
39 | (1) |
|
2.16 Route Discovery Phase of Basic ACO Routing Algorithm |
|
|
40 | (1) |
|
|
|
41 | (4) |
|
|
|
45 | (1) |
|
2.19 Termites and MANETs Routing |
|
|
45 | (2) |
|
|
|
47 | (8) |
|
|
|
48 | (1) |
|
|
|
48 | (1) |
|
|
|
48 | (2) |
|
|
|
50 | (1) |
|
|
|
51 | (1) |
|
|
|
52 | (3) |
|
3 SI Solutions to Routing in MANETs |
|
|
55 | (34) |
|
3.1 Legacy Routing Protocols |
|
|
56 | (2) |
|
3.1.1 Ad Hoc On Demand Distance Vector Routing (AODV) |
|
|
56 | (1) |
|
3.1.2 Dynamic Source Routing (DSR) |
|
|
57 | (1) |
|
3.1.3 Drawbacks of Traditional Routing Algorithms |
|
|
58 | (1) |
|
3.2 Swarm Intelligence-Based Routing |
|
|
58 | (15) |
|
3.2.1 ACO Based Bio-Inspired Routing |
|
|
60 | (8) |
|
3.2.2 Bees-Based Routing Algorithms |
|
|
68 | (1) |
|
3.2.3 Flocks of Birds-Based Routing |
|
|
68 | (1) |
|
3.2.4 Termite-Based Routing Algorithms |
|
|
69 | (4) |
|
3.3 Non-SI Based Bio-Inspired Routing Algorithms |
|
|
73 | (1) |
|
3.4 Hybrid Bio-Inspired Routing Algorithms |
|
|
73 | (6) |
|
|
|
79 | (10) |
|
|
|
79 | (1) |
|
|
|
79 | (3) |
|
|
|
82 | (1) |
|
|
|
82 | (1) |
|
|
|
83 | (6) |
|
4 SI Solutions to QoS in MANETs |
|
|
89 | (36) |
|
4.1 QoS Parameter at Different Layers |
|
|
90 | (1) |
|
4.2 Providing QoS at Different Layers |
|
|
90 | (1) |
|
4.3 SI- and CLD-Based Solutions to QoS |
|
|
91 | (1) |
|
4.4 Taxonomy of SI-Based QoS Protocols |
|
|
91 | (21) |
|
4.4.1 Cross Layered-SI based QoS Protocols |
|
|
92 | (7) |
|
4.4.2 Bat-Termite: Novel Hybrid Bio-Inspired Routing |
|
|
99 | (6) |
|
4.4.3 Load-Balanced Bat-Termite: Novel Hybrid Bio-Inspired Routing |
|
|
105 | (5) |
|
4.4.4 Node Structure of Load-Balanced (LB) Bat-Termite |
|
|
110 | (2) |
|
4.5 Load-Balanced Termite: Novel Load Aware Bio-Inspired Routing |
|
|
112 | (4) |
|
4.5.1 Motivation for Development of LB-Termite Algorithm |
|
|
113 | (3) |
|
4.5.2 Working Principle of LB Termite Algorithm |
|
|
116 | (1) |
|
4.6 Comparative Study of Mobility Aware (MA) Termite, Bat-Termite, LB Bat-Termite and LB Termite Algorithms |
|
|
116 | (3) |
|
4.7 ACO-Based QoS-Aware Routing Algorithms |
|
|
119 | (1) |
|
|
|
120 | (5) |
|
|
|
121 | (4) |
|
5 SI Solutions to Security Issues in MANETs |
|
|
125 | (44) |
|
|
|
126 | (1) |
|
|
|
126 | (2) |
|
5.3 Classification of Security Attacks |
|
|
128 | (1) |
|
5.4 Security Threats at Different Layers |
|
|
129 | (13) |
|
|
|
130 | (2) |
|
|
|
132 | (1) |
|
|
|
133 | (7) |
|
|
|
140 | (2) |
|
|
|
142 | (1) |
|
|
|
142 | (9) |
|
5.5.1 Active Attack Prevention Approaches |
|
|
142 | (4) |
|
5.5.2 Passive Attack Prevention Approaches |
|
|
146 | (2) |
|
5.5.3 Intrusion Detection and Response Security Approaches |
|
|
148 | (3) |
|
5.6 SI Solutions to Secure Routing |
|
|
151 | (8) |
|
5.6.1 SI-based Non-Hybrid Approaches |
|
|
151 | (5) |
|
5.6.2 SI-Based Hybrid Approaches |
|
|
156 | (3) |
|
|
|
159 | (10) |
|
|
|
159 | (1) |
|
|
|
159 | (2) |
|
|
|
161 | (1) |
|
|
|
161 | (1) |
|
|
|
162 | (7) |
|
6 Conclusions and Future Directions |
|
|
169 | (4) |
|
|
|
169 | (1) |
|
|
|
170 | (3) |
|
|
|
171 | (2) |
| Index |
|
173 | |