Abstract
In this paper, a comprehensive survey of evolutionary computation (EC) methods for cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are named based on the natural processes inspiring them, such as swarm intelligence (e.g., ant colony optimization, artificial bee colony, and particle swarm optimization), evolutionary algorithms (e.g., genetic algorithms, genetic programming, grammatical evolution, and differential evolution), artificial immune systems, and evolutionary games analyzing strategic interactions among different population types. We introduce these methods with their typical applications, and commonly used algorithms to improve cybersecurity within the scope of MANETs. Ongoing and speedy topology changes, multi-hop communication, non-hierarchical organization, and power and computational limitations are among the intrinsic characteristics of MANETs causing cybersecurity vulnerabilities. We describe basic defense mechanisms in MANETs for vulnerability detection, attack deterrence, prevention and recovery, and risk mitigation. We classify principal applications of EC as intrusion detection, trust management, and cryptography in cybersecurity systems to counter measure adversarial activities.
Similar content being viewed by others
References
2016 US Government Cybersecurity Report (2016) https://cdn2.hubspot.net/hubfs/533449/SecurityScorecard_2016_Govt_Cybersecurity_Report.pdf. Accessed 14 Mar 2018
KDD Cup 1999 Data (1999) https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed 14 Mar 2018
A Java-based evolutionary computation and genetic programming research system (2013) https://cs.gmu.edu/~eclab/projects/ecj/. Accessed 14 Mar 2018
The department of defense cyber strategy (2015) https://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf. Accessed 14 Mar 2018
Abass A, Hajimirsadeghi M, Mandayam N, Gajic Z (2016) Evolutionary game theoretic analysis of distributed denial of service attacks in a wireless network. In: Annual Conf. on information science and systems (CISS), pp 36–41
Aljarah I, Ludwig A (2013) Mapreduce intrusion detection system based on a particle swarm optimization clustering algorithm. In: IEEE Congr. on evolutionary computation (CEC), 2013 IEEE Congress on. IEEE, pp 955–962
Arenella G, de Santis F, Malandrino D (2014) BeeAdHocServiceDiscovery: A MANET service discovery algorithm based on bee colonies. In: 11th Int’l. Conf. on informatics in control, automation and robotics (ICINCO), pp 1–6
Arora S, Singhb P, Gupta A (2015) Adaptive selection of cryptographic protocols in wireless sensor networks using evolutionary game theory. In: Int’l. Conf. on information security and privacy (ICISP’15), 78, pp 358–366. Procedia Computer Science
Bäck T (1994) Selective pressure in evolutionary algorithms: a characterization of selection mechanisms. In: IEEE world Congr. on computational intelligence, Proc. of the 1st IEEE Conf. on evolutionary computation, pp 9–16
Bagga E, Adhikary E (2014) A review on various protocols and security issues in MANET. Int J Adv Res Comput Commun Eng 3:7478–7482
Baker J (1987) Reducing bias and inefficiency in the selection algorithm. In: J.J. Grefenstette (ed.) Proc. of the 2nd Int’l. Conf. on genetic algorithms on genetic algorithms and their application. Lawrence Erlbaum Associates, Publishers
Ball M, Qela B, Wesolkowski S (2015) A review of the use of computational intelligence in the design of military surveillance networks. In: Recent advances in computational intelligence in defense and security. Springer, pp 663–693
Barani K (2014) A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system. In: Iranian Conf. on intelligent systems (ICIS). IEEE, pp 1–6
Barani K, Abadi M (2012) BeeID: intrusion detection in AODV-based MANETs using artificial bee colony and negative selection algorithms. Int J Inf Secur ISC 4(1):25–39
Barolli L, Koyama A, Shiratori N A QoS routing method for ad-hoc networks based on genetic algorithm. Proc. of the 14th Int. Work. on database and expert systems applications (DEXA), pp 175–179
Beni G, Wang J (1989) Swarm intelligence. In: Proc. of seventh annual meeting of the robotics society of Japan. RSJ Press, pp 425–428
Bouhaddi M, Adi K, Radjef M (2016) Evolutionary game-based defense mechanism in the MANETs. In: Proc. of the 9th Int’l. Conf. on security of information and networks (SIN’16), pp 88–95
Brameier M, Banzhaf W (2001) A comparison of linear genetic programming and neural networks in medical data mining. IEEE Trans Evolut Comput 5(1):17–26
Brameier M, Banzhaf W (2007) Linear genetic programming. Springer Science & Business Media
Bretscher P, Cohn M (1970) A theory of self-nonself discrimination. Science 169:1042–1049
Camazine S, Deneubourg J, Franks N, Sneyd J, Theraulaz G, Bonabeau E (2001) Selforganization in biological systems. Princeton University Press, Princeton, NJ
de Campos L, de Oliveiraa R, Roisenbergb M (2016) Optimization of neural networks through grammatical evolution and a genetic algorithm. Expert Syst Appl 56:368–384
Caro GD, Dorigo M (1998) AntNet: distributed stigmergetic control for communication networks. J Artif Intell Res 9:317–365
Caro GD, Ducatelle F, Gambardella L (2005) AntHocNet: an adaptive nature-inspired algorithm for routing in mobile ad hoc networks. Emerg Telecomun Technol 16:443–455
Castro LD, Timmis J (2002) Artificial immune systems: a novel paradigm to pattern recognition. Artif Neural Netw Pattern Recognit 1:67–84
Cho J, Swami A, Shen I (2011) A survey on trust management for mobile ad-hoc networks. IEEE Commun Surveys Tutorials 14:562–583
Crosbie M, Spafford E (1995) Applying genetic programming to intrusion detection. In: Working notes for the AAAI symposium on genetic programming. MIT Press, MA, pp 1–8
Şen S (2015) A survey of intrusion detection systems using evolutionary computation. In: Bio-inspired computation in telecommunications, pp 73–94
Şen S, Clark J (2009) A grammatical evolution approach to intrusion detection on mobile ad hoc networks. In: Proc. of the 2nd ACM Conf. on wireless network security. AMC, pp 95–102
Şen S, Clark J, Tapiador J (2010) Power-aware intrusion detection in mobile ad hoc networks. Ad Hoc Netw 28:224–239
Cui W, Brabazon A, O’Neill M (2011) Evolving dynamic trade execution strategies using grammatical evolution. Int J Financial Markets Deriv 2(1–2):4–31
Dal D, Abraham S, Abraham A, Sanyal S, Sanglikar M (2008) Evolution induced secondary immunity: an artificial immune system based intrusion detection system. In: Computer information systems and industrial management applications (CISIM'08), pp 65–70
Dorigo M (1992) Optimization, learning and natural algorithms. Ph.D. thesis, Politecnico di Milano, Italy
Dorigo M, Socha K (2007) An introduction to ant colony optimization. In: Handbook of approximation algorithms and metaheuristics, pp 26-1. CRC Press, Boca Raton
Dorronsoro B, Ruiz P, Danoy G, Pigne Y, Bouvry P (2014) Evolutionary algorithms for mobile ad hoc networks. John Wiley & Sons
Eidenbenz S, Kumar V, Zust S (2006) Equilibria in topology control games for ad hoc networks. Mobile Netw Appl 11(2):143–159
Elsayed S, Sarker R, Slay J (2015) Evaluating the performance of a differential evolution algorithm in anomaly detection. In: 2015 IEEE Congr. on evolutionary computation (CEC), pp 2490–2497
Farmer J, Packard N, Perelson A (1986) The immune system, adaptation, and machine learning. Physica 22:187–204
Fidalcastro A, Baburaj E (2014) An advanced grammatical evolution approach for intrusion detection on multicast routing in MANET. In: 2014 Int’l. Conf. on information communication and embedded systems (ICICES)
Fischer S, Vöcking B (2005) Evolutionary game theory with applications to adaptive routing. Euro. Conf. on complex systems (ECCS), pp 1–6
Fudenberg D, Tirole J (1991) Game theory. The MIT Press, Cambridge. MA
Gairing M, Monien B, Tiemann T (2005) Selfish routing with incomplete information. In: ACM Symp. on parallel algorithms and architectures, pp 203–212
Garnier S, Gautrais J, Theraulaz G (2007) The biological principles of swarm intelligence. Swarm Intell 1(1):3–31
Greensmith J, Aickelin U, Cayzer S (2005) Introducing dendritic cells as a novel immune-inspired algorithm for anomaly detection. In: Int’l. Conf. on artificial immune systems (ICARIS), pp 153–167
Gundry S, Zou J, Kusyk J, Sahin C, Uyar M (2013) Differential evolution based fault tolerant topology control in MANETs. In: IEEE military communications Conf. (MILCOM)
Güneş M, Sorges U, Bouazizi I (2002) ARA the ant-colony based routing algorithm for MANETs. In: Int’l. Work. on ad hoc networks (IWAHN), pp 79–85
Harmer P, Temple M (2013) An improved LFS engine for physical layer security augmentation in cognitive networks. In: Int. Conf. on computing, networking and communication, cognitive computing and networking, pp 719–723
Harmer P, Williams M, Temple M (2011) Using DE-optimized LFS processing to enhance 4G communication security. In: Proc. of Int’l. Conf. on 20th computer communicqtion and networks (ICCCN)
Harsanyi J (1967) Games with incomplete information played by ’Bayesian’ players, parts I, II and III. Manag Sci 14(3):159–182
van Hoesel S (2008) An overview of Stackelberg pricing in networks. Euro J Oper Res 189(3):1393–1402
Hofmeyr S, Forrest S (2000) Architecture for an artificial immune system. Evolut Comput 8(4):443–473
Holland J (1992) Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control and artificial intelligence. The MIT Press, Cambridge MA
Huang J, Berry R, Honig M (2006) Auction-based spectrum sharing. Mob Netw Appl 11(3):405–418
Ibrahim M, Alexander B (2013) Evolving decision-making functions in an autonomous robotic exploration strategy using grammatical evolution. In: Int’l. Conf. on intelligent robots and systems (IROS). IEEE, pp 4340–4346
Indirani G, Selvakumar K (2013) Handling cross-layer attacks using neighbors monitoring scheme and swarm intelligence in MANET. Int J Comp Appl Technol Res 2(1):41–48
Ji Z, Liu K (2008) Multi-stage pricing game for collusion-resistant dynamic spectrum allocation. IEEE J Sel Areas Commun 26(1):182–191
Jiang G, Shen S, Hu K, Huang L, Li H, Han R (2015) Evolutionary game-based secrecy rate adaptation in wireless sensor networks. Int J Distrib Sens Netw 11(3):1–13
Jiang T, Baras J (2004) Ant-based adaptive trust evidence distribution in MANET. In: 24th Int’l. Conf. on distributed computing systems workshops
Jim L, Gregory M (2016) A review of artificial immune system based security frameworks for MANET. Int J Commun Netw Syst Sci 9(1):1–18
Johnson D, Teredesai A, Saltarelli R (2005) Genetic programming in wireless sensor networks. In: European Conf. on genetic programming, vol 3447. Springer, pp 96–107
Kadri B, Moussaoui D, Feham M (2013) Agreensmith. Int Netw Secur 15(1):2231–5268
Kamal A, Warip M, Elshaikh M, Badlishah R (2016) Differential evolution (DE) algorithm to optimize Berkeley-MAC protocol for wireless sensor network. J Theor Appl Inf Technol 89(2):314–319
Karaboga D (2005) An idea based on honey bee swarm for numerical optimization. Technical report TR06, Erciyes University, Computer Engineering Department
Karaboga D, Basturk B (2007) Artificial bee colony (ABC) optimization algorithm for solving constrained optimization problems. In: Int. fuzzy systems association world congress. Springer, pp 789–798
Karaboga D, Okdem S, Ozturk C (2015) Cluster based wireless sensor network routing using artificial bee colony algorithm. Wirel Netw 18(7):847–860
Kavitha K, Kumari S, Phil M (2013) Particle swarm optimization for adaptive anomaly-based intrusion detection system using fuzzy controller. Int J Comput Trends Technol (IJCTT) 4(10):3536–3541
Kennedy J, Eberhart R (1995) A new optimizer using particle swarm theory. In: Proc. of the 6th Int’l. Symp. on micro machine and human science, pp 39–43
Kephart J (1994) A biologically inspired immune system for computers. In: Artificial life IV: Proc. of the 4th Int. Work. on the synthesis and simulation of living systems, pp 130–139
Khannous A, Rghioui A, Elouaai F, Bouhorma M (2016) Securing manet using the integration of concepts from diverse immune theories. J Theor Appl Inf Technol 88(1):35–50
Kim I, de Weck O (2005) Variable chromosome length genetic algorithm for progressive refinement in topology optimization. Struct Multidiscip Optim 29:445–456
Kim Y, Lee M (2014) Scheduling multi-channel and multi-timeslot in time constrained wireless sensor networks via simulated annealing and particle swarm optimization. IEEE Commun Mag 52:122–129
Komali R, MacKenzie A, Gilles R (2008) Effect of selfish node behavior on efficient topology design. IEEE Trans Mob Comput 7(9):1057–1070
Komathy K, Narayanasamy P (2008) Secure data forwarding against denial of service attack using trust based evolutionary game. In: Vehicular technology conference (VTC), pp 31–35
Koza J (1992) Genetic programming: on the programming of computers by means of natural selection. The MIT Press, Cambridge, MA
Koza J (1994) Genetic programming as a means for programming computers by natural selection. Stat Comput 4:87–112
Kuila P, Jana P (2014) A novel differential evolution based clustering algorithm for wireless sensor networks. Appl Soft Comput 25:414–425
Kumar B, Sekhar P, Papanna N, Bhushan B (2013) A survey on MANET security challenges and routing. Int J Comput Technol Appl 4(2):248–256
Kusyk J (2011) Game-theoretic and bio-inspired techniques for self-positioning autonomous mobile nodes. Ph.D. thesis, CUNY, New York, NY
Kusyk J, Sahin C, Uyar M, Urrea E, Gundry S (2011) Self organization of nodes in mobile ad hoc networks using evolutionary games and genetic algorithms. J Adv Res 2:253–264
Kusyk J, Urrea E, Sahin C, Uyar M (2012) Game theory and genetic algorithm based approach for self positioning of autonomous nodes. Int J Ad Hoc Sens Wirel Netw 16:93–118
Laskari E, Meletiou G, Vrahatis M (2004) Problems of cryptography as discrete optimization tasks. Nonlinear Anal 63:831–837
Lewontin RC (1961) Evolution and the theory of games. J Theor Biol 1:382–403
Li C, Antonsson A (2000) Variable length genomes for evolutionary algorithms. In: Genetic programming 1996: proc. of the first annual conf. MIT Press, pp 512–520
Li Y, Xu H, Cao Q, Li Z, Shen S (2015) Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks. Int J Distrib Sens Netw 11(2):1–12
Lim Y, Cheng P, Clark J, Rohatgi P (2008) Policy evolution with grammatical evolution. Lecture Notes Comput Sci Simul Evolut Learning 5361:71–80
MacKenzie A, DaSilva L (2006) Game theory for wireless engineers. Synth Lect Commun 1(1):1–86
Montana D (2010) Automatic tuning of communication protocols for vehicular ad hoc networks using metaheuristics. Eng Appl Artif Intell 23:795–805
Movahedi Z, Hosseini Z, Bayan F, Pujolle G (2016) Trust-distortion resistant trust management frameworks on mobile ad hoc networks: a survey. IEEE Commun Surveys Tutorials 18:1287–1309
Mukkamala S, Sung A, Abraham A (2004) Modeling intrusion detection systems using linear genetic programming approach. In: Int’l. Conf. on industrial, engineering and other applications of applied intelligent systems. Springer, pp 633–642
Nadeem A, Howarth M (2013) A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun Surveys Tutorials 15:2027–2045
Nash J (1950) The bargaining problem. Econometrica 18:155–162
Nash J (1950) Equilibrium points in n-person games. Proc Natl Acad Sci USA 36:48–49
Nash J (1951) Non-cooperative games. Ann Math 54:286–295
von Neumann J, Morgenstern O (1944) Theory of games and economic behavior. Princeton University Press, Princeton, NJ
O’Neill M, Ryan C (2001) Grammatical evolution. IEEE Trans Evolut Comput 5:349–358
Pan M, Liang S, Xiong H, Chen J, Li G (2006) A novel bargaining based dynamic spectrum management scheme in reconfigurable systems. In: Int. Conf. on systems and networks communications (ICSNC'06), pp 54
Parham P (2009) The immune system, 3rd edn. Garland Science
Pathan A (2010) Security of self-organizing networks: MANET, WSN, WMN, VANET. Auerbach Publications, Taylor & Francis Group
Qiu Y, Chen Z, Xu L (2010) Active defense model of wireless sensor networks based on evolutionary game theory. In: 6th Int’l. Conf. on wireless communications networking and mobile computing (WiCOM), pp 1–4
Reina D, Ruiz P, Ciobanu R, Toral S, Dorronsoro B, Dobre C (2016) A survey on the application of evolutionary algorithms for mobile multihop ad hoc network optimization problems. Int J Distrib Sens Netw 12(2):1–13
Robinson Y, Rajaram M (2015) Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks. Sci World J 1–9
Ruan N, Gao L, Zhu H, Jia W, Li X, Hu Q (2016) Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game. In: IEEE 36th Int. Conf. on distributed computing systems (ICDCS), pp 364–373
Ryan C, O’Neill M (1998) Grammatical evolution: a steady state approach. Late Breaking Papers, Genetic Programming, pp 180–185
Sahin C, Urrea E, Uyar M, Conner M, Bertoli G, Pizzo C (2010) Design of genetic algorithms for topology control of unmanned vehicles. Spec Issue Int J Appl Decis Sci (IJADS) Decis Support Syst Unmanned Vehicles 3(3):221–238
Sahin C, Urrea E, Uyar M, Conner M, Hokelek I, Bertoli G, Pizzo C (2008) Genetic algorithms for self-spreading nodes in MANETs. In: Proc. of the 10th annual conf. on genetic and evolutionary computation (GECCO), pp 1141–1142
Sahoo D, Rai SC, Pradhan S (2009) Threshold cryptography & genetic algorithm based secure key exchange for mobile hosts. In: IEEE Int’l. advance computing Conf. (IACC). IEEE, pp 1297–1302
Sahoo R, Singh M, Sahoo B, Majumder K, Ray S, Sarkar S (2013) A light weight trust based secure and energy efficient clustering in wireless sensor network: Honey bee mating intelligence approach. In: First Int’l. Conf. on computational intelligence: modeling techniques and applications (CIMTA), vol 10, pp 515–523
Sarafijanovic S, Boudec JL (2004) An artificial immune system for misbehavior detection in mobile ad-hoc networks with virtual thymus, clustering, danger signal, and memory detectors. In: Int’l. Conf. on artificial immune systems (ICARIS), pp 342–356
Sasikala E, Nandhakumar N (2015) An intelligent technique to detect jamming attack in wireless sensor networks (WSNs). Int J Fuzzy Syst 17:76–83
Seredynski M, Bouvry P (2009) Evolutionary game theoretical analysis of reputation-based packet forwarding in civilian mobile ad hoc networks. In: Parallel & Distributed Processing (IPDPS), IEEE Int, Symp, pp 1–8
Shamshirband S, Anuar N, Kiah L, Rohani V, Patković D, Misra S, Kahan A (2014) Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks. J Netw Comput Appl 42:102–117
Shen S, Jiang C, Jiang H, Guo L, Cao Q (2013) Evolutionary game based dynamics of trust decision in WSNs. In: Int’l. Conf. on sensor network security technology and privacy communication system, pp 1–4
Sindhuja K, Devi SP (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inf Technol (IJCSIT) 5:414–416
Smith J, Price G (1973) The logic of animal conflict. Nature 246:15–18
Song D, Heywood M, Zincir-Heywood A (2003) A linear genetic programming approach to intrusion detection. In: Genetic and evolutionary computation conference (GECCO’03), pp 2325–2336
Storn R (1996) On the usage of differential evolution for function optimization. In: Fuzzy information processing society, 1996. NAFIPS., 1996 Biennial Conf. of the North American, pp 519–523
Storn R, Price K (1995) Differential evolution: a simple and efficient adaptive scheme for global optimization over continuous spaces. J Global Optim 23(1):341–359
Stützle T, Hoos H (2000) MAX-MIN ant system. Future Gener Comput Syst 16:889–914
Tahta U, Şen S, Can A (2015) Gentrust: A genetic trust management model for peer-to-peer systems. Appl Soft Comput 34:693–704
Taylor P, Jonker L (1978) Evolutionary stable strategies and game dynamics. Math Biosci 16:76–83
Troiano L, Birtolo C, Armenise R (2016) Searching optimal menu layouts by linear genetic programming. J Ambient Intell Hum Comput 7(2):239–256
Urrea E, Sahin C, Hokelek I, Uyar M, Conner M, Bertoli G, Pizzo C (2009) Bio-inspired topology control for knowledge sharing mobile agents. Ad Hoc Netw 7(4):677–689
Varshney P, Bibhu V, Sahoo B, Gupta A (2014) Quantitative review of malicious node detection of mobile ad-hoc network. Int J Comput Math Sci (IJCMS) 3:102–110
Victoire T, Sakthivel M (2011) A refined differential evolution algorithm based fuzzy classifier for intrusion detection. Euro J Sci Res 65(2):246–259
Visu P, Janet J, Kannan E, Koteeswaran S (2012) Optimal energy management in wireless adhoc network using artificial bee colony based routing protocol. Euro J Sci Res 74(2):301–307
Walters R (2016) Cyber attacks on US companies in 2016. The Heritage Foundation 4289, pp 1–5
Wang B, Liu K, Clancy T (2008) Evolutionary game framework for behavior dynamics in cooperative spectrum sensing. IEEE global telecommunications conference (GLOBECOM), pp 1–5
Wang X, Ding L, Bi D (2010) Reputation-enabled self-modification for target sensing in wireless sensor networks. IEEE Trans Instrum Meas 59:171–179
Wang X, Osagie E, Thulasiraman P, Thulasiram R (2009) HOPNET: A hybrid ant colony optimization routing algorithm for mobile ad hoc network. Ad Hoc Netw 7:690705
Wang X, Wu Y, Ren Y, Feng R, Yu N, Wan J (2013) An evolutionary game-based trust cooperative stimulation model for large scale MANETs. Int J Distrib Sens Netw 13:245017
Watkins A, Timmis J, Boggess L (2004) Artificial immune recognition system (AIRS): an immune-inspired supervised learning algorithm. Genet Program Evolv Mach 5(3):291–317
Wedde H, Farooq M, Pannenbaecker T, Vogel B, Mueller C, Meth J, Jeruschkat R (1995) Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. In: 7th annual conf. on genetic and evolutionary computation (GECCO’05), pp 153–160
Weibull J (1997) Evolutionary game theory. The MIT Press, Cambridge, MA
Weise T (2006) Genetic programming for sensor networks. Technical report, University of Kassel, Germany
Wu Y, Zhao Y, Riguidel M, Wang G, Yi P (2015) Security and trust management in opportunistic networks: a survey. Secur Commun Netw 8(9):1812–1827
Wulandari G, Rismawan W, Saadah S (2015) Differential evolution for the cryptanalysis of transposition cipher. In: 3rd Int’l. Conf. on information and comm. tech. (ICoICT), pp 45–48
Wyner A (1975) The wire-tap channel. Bell Syst Tech J 54:1355–1387
Zou J, Gundry S, Uyar M, Kusyk J, Sahin C (2016) Bio-inspired topology control mechanism for unmanned underwater vehicles. In: Recent advances in computational intelligence in defense and security. Springer, pp 727–752
Acknowledgements
This research is supported by D01_W911SR-14-2-0001-0014. The contents of this document represent the views of the authors and are not necessarily the official views of, or endorsed by, the US Government, Department of Defense, Department of the Army or US Army Communications-Electronic RD&E Center. Dr. Cem Safak Sahin is currently an MIT Lincoln Laboratory employee; no Laboratory funding or resources were used to produce the result/findings reported in this publication.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kusyk, J., Uyar, M.U. & Sahin, C.S. Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks. Evol. Intel. 10, 95–117 (2018). https://doi.org/10.1007/s12065-018-0154-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12065-018-0154-4