<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>C. Gu, Q. Zhu, An energy-aware routing protocol for mobile ad hoc networks based on route
energy comprehensive index, Wireless Personal Communications</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/CADSM52681.2021.9385263</article-id>
      <title-group>
        <article-title>Adaptive route formation in dynamic networks using genetic and diferential evolution techniques</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Stanislava Kudrenko</string-name>
          <email>stanislava@i.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anna Stoliar</string-name>
          <email>stoliarannanau@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Alkema</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valerii Kozlovskyi</string-name>
          <email>valerii.kozlovskyi@npp.kai.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Diana Kozlovska</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>1State University "Kyiv Aviation Institute"</institution>
          ,
          <addr-line>Liubomyra Huzara Ave., 1, Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2014</year>
      </pub-date>
      <volume>79</volume>
      <issue>2014</issue>
      <fpage>1557</fpage>
      <lpage>1570</lpage>
      <abstract>
        <p>This paper presents a comparative study of two evolutionary algorithms - Genetic Adaptive Optimization for Dynamic Mapping (GAODM) and Diferential Evolution (DE) - for adaptive route formation in dynamic wireless networks. These algorithms are evaluated in simulation environments featuring node mobility and various types of adversarial behavior, such as gray hole, black hole, flooding, and route hijacking attacks. Performance is assessed using five metrics: Packet Delivery Ratio (PDR), Average Delay, Routing Overhead, Stability Score, and Anomaly Avoidance Rate (AAR). Results indicate that while DE achieves faster convergence and lower overhead in benign conditions, GAODM consistently outperforms DE in hostile scenarios due to its adaptive crossover/mutation strategies and anomaly-aware fitness function. This makes GAODM a better candidate for security-sensitive or mission-critical networks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Adaptive routing</kwd>
        <kwd>Dynamic network topology</kwd>
        <kwd>Genetic algorithm (GA)</kwd>
        <kwd>Diferential evolution (DE)</kwd>
        <kwd>Evolutionary computation</kwd>
        <kwd>Route optimization</kwd>
        <kwd>Intelligent routing strategies</kwd>
        <kwd>Network performance optimization</kwd>
        <kwd>Metaheuristic algorithms</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Modern computer networks are increasingly shifting toward dynamic topologies, where nodes may
frequently join, leave, or change their position within the network. This trend is especially prominent
in decentralized systems such as vehicular ad hoc networks (VANETs), drone-based communication
frameworks, emergency response systems, and industrial IoT networks. In such contexts, routing
protocols must be capable of adapting rapidly to topological changes while maintaining low latency,
eficient resource usage, and resilience against disruptions.</p>
      <p>Traditional routing mechanisms, often designed for static or quasi-static environments, tend to
degrade under dynamic conditions. Moreover, networks operating in open or uncontrolled environments
are susceptible to trafic anomalies – including packet drops, unauthorized rerouting, and
denial-ofservice behaviors – which can arise either due to malicious attacks or unintentional system failures.
These anomalies may compromise the reliability, availability, and security of critical communications.</p>
      <p>In response to these challenges, evolutionary algorithms have gained attention as a viable class of
methods for adaptive route formation. Their ability to navigate complex, non-linear, and time-varying
search spaces makes them well-suited for multi-objective optimization tasks in network environments.
Two notable approaches within this class are the Genetic Adaptive Optimization for Dynamic Mapping
(GAODM) and the Diferential Evolution (DE) algorithm.</p>
      <p>GAODM incorporates biologically inspired mechanisms such as selection, crossover, and mutation,
along with adaptive features to adjust to topological shifts. DE, on the other hand, utilizes
vectorbased perturbation strategies and shows strong convergence in continuous spaces. Both methods
can be tailored not only for routing optimization, but also to support trafic anomaly detection and
intrusion-tolerant routing by embedding security-aware heuristics within the fitness evaluation process.</p>
      <p>This paper presents a comparative study of GAODM and DE in the context of route optimization
for dynamic networks. We evaluate their performance in terms of route stability, convergence speed,
computational eficiency, and ability to handle abnormal trafic conditions. Furthermore, we explore
how evolutionary strategies can contribute to secure and intelligent routing in networks with frequent
structural changes.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related work overview</title>
      <p>The problem of adaptive routing in dynamic networks has been widely studied in the context of
mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and recently, in more complex
systems such as vehicular networks, drone swarms, and industrial cyber-physical systems. Conventional
protocols like AODV, DSR, and OLSR ofer basic support for topology changes, but they often fail under
high mobility, node density, or adversarial conditions.</p>
      <p>To address these limitations, researchers have investigated intelligent and metaheuristic-based routing
techniques, which include algorithms inspired by genetics, swarm behavior, and evolutionary dynamics.
Among these, Genetic Algorithms (GA) have been explored for route discovery and optimization due to
their ability to balance exploration and exploitation in large solution spaces. For instance, authors in
[1] proposed a GA-based routing scheme for MANETs that adapts to changing topologies by encoding
multiple path features into chromosomes. Similarly, Diferential Evolution (DE) has been applied in [ 2]
for optimizing route selection based on link reliability and node energy consumption.</p>
      <p>Other notable works have introduced hybrid models. In [3], a GA-PSO combined approach was
applied to enhance route stability and reduce control overhead. Meanwhile, Ant Colony Optimization
(ACO)-based methods [4] focused on probabilistic path building, though with limited success in highly
dynamic scenarios due to convergence delays.</p>
      <p>On the security side, several studies have explored routing strategies robust against malicious nodes
and trafic anomalies. Anomaly-aware routing protocols [ 5] attempt to detect and avoid compromised
paths using metrics such as abnormal delay patterns, packet drop ratios, and sudden topology shifts.
Evolutionary algorithms have also been adapted to incorporate security-aware objectives, enabling
them to penalize risky or anomalous routes within their fitness evaluation functions [6, 7, 8, 9].</p>
      <p>Despite these eforts, a direct comparative analysis between GA-based and DE-based approaches in
the context of adaptive and intrusion-tolerant routing remains scarce. Most existing work either focuses
on routing performance alone or lacks integration with anomaly detection capabilities. Furthermore, a
few studies systematically evaluate how these algorithms perform under variable topologies and attack
scenarios using consistent metrics and simulation setups.</p>
      <p>This research aims to fill that gap by providing a side-by-side evaluation of GAODM and DE in
dynamic network environments, while explicitly incorporating trafic anomaly conditions and routing
security considerations into the optimization framework.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Problem statement</title>
      <p>Dynamic network environments, such as those found in mobile or mission-critical communication
systems, are characterized by continuous topological changes due to node mobility, varying signal
conditions, or the appearance and disappearance of links. In such scenarios, ensuring reliable and
secure route formation is a non-trivial challenge, especially when the network may also be subject to
trafic anomalies and malicious routing behavior.</p>
      <p>The core problem addressed in this work is the optimal formation of communication routes in a
network with dynamic topology, where routes must satisfy multiple criteria simultaneously:
• Adaptability – the routing method should quickly react to topological changes such as node
movement or failure;
• Eficiency – selected routes should minimize communication cost, latency, and energy
consumption;
• Stability – paths should remain valid for suficient time to reduce route discovery overhead;
• Security-awareness – routes should be resilient to trafic anomalies or intrusions, such as packet
dropping or rerouting by compromised nodes.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Evolutionary approaches to adaptive route formation</title>
      <sec id="sec-4-1">
        <title>4.1. Genetic adaptive optimization for dynamic mapping</title>
        <p>The Genetic Adaptive Optimization for Dynamic Mapping (GAODM) represents an advanced adaptation
of the classical genetic algorithm, purposefully designed to address the challenges posed by dynamic
and non-deterministic network environments. In this formulation, each individual in the population is
encoded as a linear sequence of intermediate nodes forming a potential communication path between a
designated source and destination. This representation ensures that each chromosome adheres to the
constraints of network connectivity and reflects the current topological state of the system.</p>
        <p>The evaluation of candidate routes is performed through a composite fitness function, integrating
multiple criteria such as delay, cost, stability, and anomaly resistance. This approach allows the
evolutionary process not only to search for high-performing routes but also to avoid paths that exhibit
temporal instability or are likely to be compromised by adversarial activity. The evolutionary cycle of
GAODM is characterized by a selection process that promotes diversity while guiding the population
toward fitter regions of the solution space. A crossover mechanism, inspired by partially mapped
crossover, is employed to exchange segments between parent chromosomes in a topology-aware
manner, preserving route validity and preventing loops. Mutation is introduced through targeted node
substitutions, which locally modify candidate routes without disrupting overall feasibility.</p>
        <p>What distinguishes GAODM is its ability to adapt internal parameters, such as mutation and crossover
probabilities, in response to observable changes in network conditions. For instance, increased mobility
or a sudden degradation in link quality may trigger more aggressive mutation to enhance exploration.
Additionally, the algorithm incorporates a lightweight anomaly-monitoring heuristic into its fitness
evaluation strategy. Nodes or links associated with irregular trafic patterns – such as elevated delay,
packet loss, or rerouting anomalies – are penalized, resulting in a natural bias toward more secure and
robust paths.</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Diferential evolution</title>
        <p>Diferential Evolution (DE) is a well-established population-based metaheuristic optimization technique
that utilizes diferential perturbation strategies to evolve candidate solutions. Although originally
intended for continuous optimization problems, DE has been efectively adapted in this study to operate
within the discrete domain of routing in dynamic networks. Each individual in the DE population
encodes a possible path through a vector of node identifiers, which is subsequently mapped to a
valid route via a dedicated feasibility repair mechanism. This mapping ensures that all individuals
represent syntactically and semantically valid routing paths within the constraints of the current
network topology.</p>
        <p>The generation of new candidate solutions is accomplished by applying diferential mutation, wherein
the vector diference between two randomly selected individuals is scaled and added to a third, producing
a mutant vector. This process promotes diversity and enables the algorithm to explore uncharted regions
of the solution space. Once the mutant vector is generated, it undergoes crossover with the target
vector to form a trial solution, which is then evaluated using the same multi-objective fitness function
described earlier. A greedy selection mechanism retains the better of the two solutions, ensuring that
the population gradually converges toward optimal configurations.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Fitness function with anomaly penalty</title>
        <p>To make DE suitable for routing under uncertain and potentially hostile conditions, the original fitness
evaluation framework has been extended to include an anomaly-awareness component. Routes that
include nodes or links previously marked as suspicious – based on recent trafic behavior – receive
penalty adjustments, thereby reducing their likelihood of being selected in subsequent generations. This
enhancement allows DE not only to optimize classical network performance metrics, such as delay and
cost, but also to contribute to the overall robustness and security of the communication infrastructure.</p>
        <p>To efectively guide the optimization process in both GAODM and DE frameworks, we define a
composite fitness function that captures the multidimensional nature of the routing problem in dynamic
and potentially hostile networks. The function evaluates each candidate route based on a weighted sum
of four key metrics: delay, cost, stability, and anomaly risk. This multi-objective formulation enables a
balanced trade-of between performance, robustness, and security.</p>
        <p>Let  be a candidate path from a source node  to a destination node . The fitness function  ( ) is
defined as:</p>
        <p>( ) =  · ( ) +  · ( ) +  · (1 − ( )) +  · ( ),
where ( ) is the normalized end-to-end delay of the path  , ( ) is the normalized communication
cost, ( ) ∈ [0, 1] is the normalized stability score of the path, with higher values indicating more
stable routes, ( ) is the normalized anomaly penalty score, , , ,  ∈ R + are weighting coeficients
such that  +  +  +  = 1.</p>
        <p>The inclusion of (1 − ( ) ) ensures that higher stability reduces the total fitness score, thereby
favoring more stable paths. All components are normalized to lie in the interval [0, 1] to ensure
consistent scaling and allow meaningful combination.</p>
        <p>The delay metric ( ) reflects the cumulative time for a packet to travel along path  , aggregated
over all links as:
where , denotes the estimated transmission and processing delay on link (, ). It is normalized
with respect to the maximum observed delay across all candidate paths.</p>
        <p>The communication cost ( ) accounts for resource usage, such as the number of hops, energy
expenditure, or estimated bandwidth consumption. In its simplest form, it can be approximated as:
( ) =</p>
        <p>∑︁ ,,
,)∈
( ) =</p>
        <p>∑︁ ,,
(,)∈
where , ∈ [0, 1] denotes historical or predicted stability of link (, ).</p>
        <p>The anomaly penalty ( ) quantifies the security risk associated with the path. It incorporates the
anomaly scores derived from real-time monitoring of trafic behaviors such as excessive delay, packet
drop, or erratic transmission patterns:
( ) =) =
1</p>
        <p>∑︁  ,,
| | (,)∈
where , ∈ [0, 1] is the anomaly score of link (, ), estimated using lightweight statistical or heuristic
models (e.g., EWMA or moving average of abnormal behavior indicators.)</p>
        <p>By appropriately tuning the coeficients , , ,  the function can be adapted to prioritize latency
(e.g., in time-sensitive applications), energy eficiency (e.g., in WSNs), or security (e.g., in tactical or
mission-critical environments).</p>
        <p>This fitness formulation enables the evolutionary algorithms to perform guided search in a highly
constrained and dynamic solution space, promoting the discovery of routes that are eficient, robust,
and resilient to adversarial interference.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Simulation scenarios and input data</title>
      <p>To evaluate the performance, adaptability, and resilience of the proposed evolutionary routing
algorithms, we constructed a series of simulation scenarios using a custom-developed Python-based
simulation framework. This environment provides full control over all relevant aspects of the
experiment – including network topology, node mobility, trafic generation, anomaly injection, and routing
behavior – enabling a reproducible and extensible platform for rigorous testing.</p>
      <p>The decision to use a self-built simulator, rather than existing tools such as NS-3 or OMNeT++, was
driven by the need for high configurability, direct integration of GAODM and DE algorithms, and the
ability to inject specific anomaly models into the simulation process. The simulator implements a
discrete-event architecture, where time progresses in fixed increments, and node positions, links, trafic
states, and evolutionary algorithm iterations are updated at each step.</p>
      <p>All input data for the simulations are synthetically generated within the system, ensuring consistency
across scenarios and allowing deterministic replication under controlled parameters. The initialization
phase of each simulation includes the following components:
• Network topology is established by randomly placing N=50 mobile nodes within a 1000×1000
meter area. Nodes follow the Random Waypoint Mobility Model, which reflects non-deterministic
real-world movement patterns. Connectivity is determined in real time using Euclidean distance
calculations with a fixed transmission range of 250 meters, dynamically updating the adjacency
matrix of the network.
• Trafic generation is based on stochastic modeling. Source-destination pairs are selected uniformly
at random, and packets are generated according to a Poisson process with an average rate of 5
packets per second. This approach simulates realistic and burst-tolerant network loads.
• Anomaly behavior is injected based on predefined configuration files. Each scenario includes a
ifxed percentage of anomalous nodes (e.g., 10–20%), selected at random at simulation start. These
nodes exhibit malicious behaviors such as black hole attacks (total packet dropping), gray hole
attacks (intermittent dropping), flooding (mass transmission of irrelevant packets), and route
hijacking (false metric advertisement). The simulation records and timestamps all packet events
for subsequent analysis.
• Algorithm parameters, such as population size, number of generations, crossover and mutation
probabilities (GAODM), and diferential scaling factors (DE), are specified in a JSON-based
configuration file. This file also contains flags for activating or deactivating anomaly penalties
and adjusting the weights used in the fitness function.</p>
      <p>To rigorously evaluate the proposed routing strategies under varying network conditions, we define
ifve distinct simulation scenarios. These scenarios are constructed to systematically vary two primary
factors: node mobility intensity and the type and prevalence of trafic anomalies.</p>
      <p>The first scenario (S1) serves as a control case. It represents a low-mobility environment where nodes
move slowly (1 to 3 meters per second) and no anomalous behavior is present. This baseline allows for
measuring the optimal performance of the algorithms in ideal, stable conditions without adversarial
interference.</p>
      <p>In scenario S2, mobility remains low (1-3 m/s), but the network includes gray hole nodes, which
selectively drop packets. These nodes behave normally most of the time but occasionally discard transit
data. This scenario reflects subtle, hard-to-detect adversarial activity in otherwise benign environments.
Approximately 10% of nodes exhibit this behavior.</p>
      <p>Scenario S3 increases node mobility to a moderate level (4-7 m/s) and introduces black hole attacks,
in which compromised nodes consistently drop all received packets. This more aggressive form of
disruption afects 15% of the nodes and simulates a moderately mobile yet hostile network.</p>
      <p>In scenario S4, the network continues to operate under moderate mobility (4-7 m/s), but combines
two types of adversarial behavior: gray hole attacks and flooding. The latter involves malicious nodes
generating excessive amounts of bogus trafic, degrading performance by overwhelming the routing
infrastructure. In total, 20% of the nodes in this scenario exhibit some form of malicious activity, making
this one of the most complex and challenging setups.</p>
      <p>The fifth scenario (S5) explores the behavior of the algorithms under high-mobility conditions (8-10
m/s). It features route hijacking, where malicious nodes inject false routing metrics to attract trafic and
misdirect it. Although only 10% of the nodes are malicious, the high speed and deceptive nature of this
attack make it particularly dificult to counteract.</p>
      <p>Together, these scenarios ofer a comprehensive testbed for assessing the robustness, adaptability,
and security sensitivity of the GAODM and DE algorithms. Each configuration targets a specific aspect
of real-world network dynamics – from benign but mobile topologies to environments where multiple,
simultaneous threats challenge route stability and integrity.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Results and discussion</title>
      <p>This section presents and analyzes the performance of the proposed routing approaches – GAODM and
Diferential Evolution – across five distinct simulation scenarios. Each scenario represents a diferent
combination of mobility level and adversarial conditions. The results are evaluated using five key
metrics: Packet Delivery Ratio (PDR), Average End-to-End Delay, Routing Overhead, Stability Score,
and Anomaly Avoidance Rate (AAR). A summary of the detailed results is provided in Table 1.</p>
      <sec id="sec-6-1">
        <title>6.1. Scenario S1 (baseline, no anomalies)</title>
        <p>Under ideal network conditions without any adversarial nodes, both algorithms achieved high
performance. GAODM reached a PDR of 97.7% with a stability score of 0.92, while DE slightly underperformed
with a PDR of 96.8% and stability score of 0.89. Notably, DE achieved a lower average delay (97.3 ms vs.
114.3 ms), reflecting its faster convergence and more direct route selection. However, GAODM exhibited
higher route stability and moderate overhead, making it preferable for long-term operational eficiency.</p>
      </sec>
      <sec id="sec-6-2">
        <title>6.2. Scenario S2 (gray hole attacks, low mobility)</title>
        <p>In the presence of 10% selectively malicious nodes, GAODM continued to demonstrate higher resilience
with a PDR of 93.4% and AAR of 96.5%. DE, in contrast, sufered a noticeable drop in PDR (89.1%) and
anomaly avoidance rate (90.1%), suggesting that its population dynamics were more susceptible to path
contamination. The diference in stability (0.89 vs. 0.80) again highlighted GAODM’s ability to avoid
unstable or suspicious paths through adaptive genetic operations.
This scenario introduced aggressive adversarial behavior under increasing network mobility. GAODM
maintained reasonable delivery success (88.7%) and a high anomaly avoidance rate (91.2%), while DE
dropped to a PDR below 86% in several runs. Average delay increased across both methods, but the gap
in routing overhead widened, with GAODM incurring higher computational and communication costs
due to more frequent re-evaluations of route viability.</p>
      </sec>
      <sec id="sec-6-3">
        <title>6.4. Scenario S4 (mixed attacks, moderate mobility)</title>
        <p>Scenario S4, combining gray hole and flooding behaviors, placed significant strain on both routing
methods. GAODM continued to outperform DE in anomaly mitigation (AAR 89%) and maintained
better route stability, albeit at the cost of higher overhead. DE, while exhibiting faster execution cycles,
sufered from lower PDR ( 80–83%) and occasional route oscillations, indicating convergence toward
suboptimal or deceptive paths in the presence of conflicting routing information.</p>
      </sec>
      <sec id="sec-6-4">
        <title>6.5. Scenario S5 (route hijacking, high mobility)</title>
        <p>In this highly dynamic and deceptive environment, GAODM once again proved more robust, sustaining
PDR levels above 90% and AAR near 93%. DE struggled with route misdirection and instability, resulting
in lower anomaly avoidance and slightly increased delay variance. Despite its comparative eficiency in
simpler topologies, DE’s lack of built-in path validation mechanisms made it vulnerable to adversarial
influence under route hijacking conditions.</p>
      </sec>
      <sec id="sec-6-5">
        <title>6.6. General observations</title>
        <p>Across all scenarios, GAODM demonstrated stronger adaptability and anomaly resistance due to its use
of dynamic crossover and mutation operators, as well as its fitness function’s explicit penalization of
anomalous paths. While DE consistently achieved faster convergence and lower overhead in benign
settings, it was more prone to degradation under adversarial conditions. These findings suggest that
GAODM may be better suited for mission-critical or security-sensitive applications, whereas DE could
be leveraged in scenarios where eficiency and simplicity are prioritized over robustness.</p>
        <p>Comparative analysis validates the efectiveness of embedding anomaly-awareness and adaptive
evolutionary dynamics into routing algorithms for dynamic networks. Future improvements could
explore hybrid schemes that combine the convergence speed of DE with the adaptability of GAODM, or
integrate learning-based anomaly detection modules to further enhance routing decisions in uncertain
environments.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions</title>
      <p>This paper presented a comparative study of two evolutionary algorithms –GAODM and DE – applied
to the task of adaptive route formation in dynamic wireless networks. The simulation environment
was designed to reflect realistic conditions, including variable node mobility and a spectrum of trafic
anomalies such as black hole, gray hole, flooding, and route hijacking attacks. The proposed evaluation
framework incorporated five performance metrics: packet delivery ratio, average end-to-end delay,
routing overhead, route stability, and anomaly avoidance rate.</p>
      <p>The results of our simulations clearly indicate that GAODM consistently outperforms DE under
adversarial conditions. Its integration of adaptive genetic operators and an anomaly-aware fitness
function allows it to maintain high delivery success and routing stability even in the presence of
deceptive or malicious nodes. In contrast, DE demonstrates superior convergence speed and lower
routing overhead in benign environments but exhibits reduced robustness when the network is exposed
to attack vectors that exploit the absence of security-aware mechanisms. The efectiveness of GAODM
is particularly evident in scenarios involving route hijacking and combined attack strategies, where it
achieved higher AAR and significantly reduced packet loss compared to DE. Overall, this study validates
the utility of multi-objective evolutionary optimization in the design of routing protocols for mobile
and dynamic network environments. The trade-of between computational eficiency and adaptive
resilience underscores the importance of selecting routing strategies based on the specific operational
context. For mission-critical or security-sensitive deployments, algorithms like GAODM that integrate
anomaly mitigation directly into the route discovery process ofer a compelling advantage.</p>
      <p>Future research will build upon these findings in several directions. First, hybridization strategies
that combine the fast convergence of DE with the adaptive security mechanisms of GAODM could
lead to more balanced and eficient routing solutions. Second, integrating machine learning-based
anomaly detection techniques – such as lightweight neural networks or decision-tree ensembles –
could enhance real-time responsiveness to novel or evolving attack types. Third, the scalability of the
proposed approaches will be evaluated in larger networks with hundreds of nodes to examine their
computational and routing performance at scale. Additionally, cross-layer optimization techniques may
be explored to align routing decisions with MAC-layer contention and transport-layer reliability.</p>
      <p>These ongoing developments aim to advance the design of intelligent, secure, and adaptive routing
frameworks capable of supporting the complex and dynamic requirements of next-generation wireless
communication systems.</p>
    </sec>
    <sec id="sec-8">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <volume>1007</volume>
          /s11277-014-1946-1. [2]
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Dhurandher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Woungang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Garg</surname>
          </string-name>
          , Gaer:
          <article-title>Genetic algorithm-based</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <source>computing 69</source>
          (
          <year>2014</year>
          )
          <fpage>1183</fpage>
          -
          <lpage>1214</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11227-014-1195-9. [3]
          <string-name>
            <given-names>P.</given-names>
            <surname>Pawan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Jain</surname>
          </string-name>
          ,
          <article-title>Genetic algorithm-based routing protocol for energy</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>eficient routing in manets</article-title>
          , volume
          <volume>638</volume>
          <source>of Advances in Intelligent Systems and Computing</source>
          , Springer,
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <year>2018</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-10-6005-
          <issue>2</issue>
          _
          <fpage>4</fpage>
          . [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Choudhary</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <article-title>An eficient approach for power aware routing protocol for manets</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>using genetic algorithm</article-title>
          , volume
          <volume>841</volume>
          <source>of Advances in Intelligent Systems and Computing</source>
          , Springer,
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <year>2019</year>
          , pp.
          <fpage>133</fpage>
          -
          <lpage>138</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-13-2285-3_
          <fpage>17</fpage>
          . [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahuja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <article-title>An energy eficient approach for routing in manets using ga and aco</article-title>
          , International
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>Journal of Science and Research (IJSR) 3</source>
          (
          <year>2014</year>
          )
          <fpage>1044</fpage>
          -
          <lpage>1049</lpage>
          . [6]
          <string-name>
            <given-names>J.</given-names>
            <surname>Park</surname>
          </string-name>
          , et al.,
          <article-title>The energy-eficient probabilistic routing in manets</article-title>
          , in: Frontier and Innovation in
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Future</given-names>
            <surname>Computing</surname>
          </string-name>
          ,
          <year>2014</year>
          , pp.
          <fpage>773</fpage>
          -
          <lpage>784</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -94-017-8798-7_
          <fpage>87</fpage>
          . [7]
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Marais</surname>
          </string-name>
          ,
          <article-title>An accuracy and availability estimation of aircraft</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>positioning by navigational aids</article-title>
          ,
          <source>in: 2018 IEEE 5th International Conference on Methods and</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>Systems of Navigation and Motion Control (MSNMC)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .1109/MSNMC.
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          8576276. [8]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          , et al.,
          <article-title>Relative navigation for vehicle formation movement</article-title>
          ,
          <source>in: 2022 IEEE 3rd KhPI</source>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <source>Week on Advanced Technology (KhPIWeek)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/KhPIWeek57572.
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          9916414. [9]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ivashchuk</surname>
          </string-name>
          , et al.,
          <article-title>A configuration analysis of Ukrainian flight routes network</article-title>
          ,
          <source>in: Experience</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>of Designing and Application of CAD Systems in Microelectronics (CADSM)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>6</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>