Int J Performability Eng ›› 2022, Vol. 18 ›› Issue (2): 92-100.doi: 10.23940/ijpe.22.02.p3.92100

Previous Articles     Next Articles

Role of Swarm Intelligence Algorithms on Secured Wireless Network Sensor Environment - A Comprehensive Review

Bhushan Chaudhari   

  1. Department of Information Technology, SVKM's Institute of Technology, Dhule, 424001, India
  • Contact: * E-mail address: chaudharibs@gmail.com
  • About author:Bhushan Chaudhari (Ph.D.) is faculty at Department of Information Technology, SVKM's Institute of Technology, Dhule. His research interest includes swarm intelligence, wireless sensor networks and machine learning. He has published more than 20 research papers in reputed international journals and conferences. He is active in research since last 15 years and is member of professional societies such as ACM, ISTE, CSI, IAENG (H.K.), IACSIT and IRED.

Abstract: Wireless Sensor Network presumed great global wide interest from organizations and researchers mainly due to their significant importance in the wireless transmission of huge information. Despite their adorable performance in obtaining effective QoS parameters, they are highly susceptible to security attacks that strongly affect the network performance and user privacy. Several security mechanisms for solving these security issues were proposed in the existing works. In recent years, emerging trends in the WSN tends to work on very complex sensor arrangement scenarios. Various limitations prevail during data collection like data aggregation, node election, load balancing etc. As a result, it is mandatory to provide strong attention for the feasibility and applicability of WSN features in accordance with the perspectives of IoT. This paper explored and depicted the security and various other problems of optimization algorithms, particularly swarm intelligence algorithm in WSN. These algorithms possess strong applicability and obtained better experimental results in resolving complex practical issues. Desirable properties of intelligence algorithms like adaptability, scalability, and robustness were discussed in this review. Highly preferred optimization algorithms like Particle swarm optimization (PSO), Ant colony optimization (ACO) and Artificial Bee colony algorithms (ABC) are deeply analyzed to provide insights on their effectiveness in WSN security. Finally, after analyzing open research and challenges, special attention would be paid in the optimization algorithm to put forward the development of security trends.

Key words: wireless sensor network, security, swarm intelligence algorithm, PSO, ABC, ACO