Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past. However, to the best of our knowledge no attempts have been made to systematically analyze their security vulnerabilities. In this paper, we investigate the security vulnerabilities of BeeAdHoc, a well known power aware, Bio/Nature inspired routing protocol. Our analysis clearly demonstrates that the malicious nodes in an untrusted MANET, where BeeAdHoc is used for routing, can significantly disrupt the normal routing behavior. We then propose a security framework, BeeSec, for BeeAdHoc that enables it to counter the different types of threats. We also designed an empirical framework, embedded into a well known simulator, ns-2, to systematically validate the operational security of BeeSec. An interesting outcome of the research is that BeeSec, even with significant overhead of the security framework, achie...