Int J Performability Eng ›› 2022, Vol. 18 ›› Issue (2): 92-100.doi: 10.23940/ijpe.22.02.p3.92100
Previous Articles Next Articles
Bhushan Chaudhari
Contact:
* E-mail address: chaudharibs@gmail.com
About author:
Bhushan Chaudhari (Ph.D.) is faculty at Department of Information Technology, SVKM's Institute of Technology, Dhule. His research interest includes swarm intelligence, wireless sensor networks and machine learning. He has published more than 20 research papers in reputed international journals and conferences. He is active in research since last 15 years and is member of professional societies such as ACM, ISTE, CSI, IAENG (H.K.), IACSIT and IRED.
Bhushan Chaudhari. Role of Swarm Intelligence Algorithms on Secured Wireless Network Sensor Environment - A Comprehensive Review [J]. Int J Performability Eng, 2022, 18(2): 92-100.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
1. Pavani, M. and Rao, P.T.Adaptive Pso with Optimised Firefly Algorithms for Secure Cluster-based Routing in Wireless Sensor Networks. 2. Xue, J. and Shen, B, A Novel Swarm Intelligence Optimization Approach: Sparrow Search Algorithm. 3. Cao, L., Cai, Y. and Yue, Y.Swarm Intelligence-based Performance Optimization for Mobile Wireless Sensor Networks: Survey, Challenges, and Future Directions. 4. Niu W.J., Feng Z.K., Feng B.F., Xu Y.S., andMin Y.W.Parallel Computing and Swarm Intelligence Based Artificial Intelligence Model for Multi-step-ahead Hydrological Time Series Prediction. 5. Bui Q.T., Nguyen Q.H., Nguyen X.L., Pham V.D., Nguyen H.D., andPham V.M.Verification of Novel Integrations of Swarm Intelligence Algorithms into Deep Learning Neural Network for Flood Susceptibility Mapping. 6. Ochoa G.V., Forero J.D., andRojas J.P.A Comparative Energy and Exergy Optimization of a Supercritical-CO2 Brayton Cycle and Organic Rankine Cycle Combined System Using Swarm Intelligence Algorithms. 7. Singh, S.P. and Sharma, S.C.A PSO based Improved Localization Algorithm for Wireless Sensor Network. 8. Ramteke, R., Singh, S. and Malik, A.Optimized Routing Technique for IoT Enabled Software-defined Heterogeneous WSNS Using Genetic Mutation Based PSO. 9. Prithi, S. and Sumathi, S., 2020. LD2FA-PSO: A Novel Learning Dynamic Deterministic Finite Automata with PSO Algorithm for Secured Energy Efficient Routing in Wireless Sensor Network. 10. Dohare, I. and Singh, K.PSO-DEC: PSO Based Deterministic Energy Efficient Clustering Protocol for IoT. 11. Shakeri M.,Sadeghi-Niaraki, A., Choi, S.M. and Islam, S.M. Performance Analysis of IoT-Based Health and Environment WSN Deployment. 12. Anand, V. and Pandey, S.New approach of GA-PSO‐based Clustering and Routing in Wireless Sensor Networks. 13. Sun Z., Wei M., Zhang Z., andQu G.Secure Routing Protocol Based on Multi-objective Ant-colony-optimization for Wireless Sensor Networks. 14. Rathee M., Kumar S., Gandomi A.H., Dilip K., Balusamy B., andPatan R.Ant Colony Optimization Based Quality of Service Aware Energy Balancing Secure Routing Algorithm for Wireless Sensor Networks. 15. Zhang, Z., Li, J. and Xu, N.Robust Optimization Based on Ant Colony Optimization in the Data Transmission Path Selection of WSNS. 16. Nayyar, A. and Singh, R.Ant Colony Optimization (ACO) Based Routing Protocols for Wireless Sensor Networks (WSN): A survey. 17. Mousavi, S.K. and Ghaffari, A.Data Cryptography in the Internet of Things Using the Artificial Bee Colony Algorithm in a Smart Irrigation System. 18. Saoji M.A.Enhanced Artificial Bee Colony Algorithm with Mobile Sink Management to Improve Network Lifetime in WSN. 19. Raghav, R.S. and Dhavachelvan, P.A Secured Artificial Bee Colony (SABC) Algorithm for Finding Compromise Node in WSN. 20. Panda S., Srivastava S., Mohapatra S. and Kumar P.Performance Analysis of Wireless Sensor Networks Using Artificial Bee Colony Algorithm. In 21. Fotohi, R. and Bari, S.F.A Novel Countermeasure Technique to Protect Wsn Against Denial-of-sleep Attacks Using Firefly and Hopfield Neural Network (HNN) Algorithms. 22. Shankar, K. and Elhoseny, M.Multiple Share Creation with Optimal Hash Function for Image Security in WSN Aid of OGWO. In 23. Gurram G.V., Chowdary N.S., andBiradar R.L.Optimization of Keys Using Grey-Wolf Optimization for Secure Path Key Establishment Schemes in Wireless Sensor Networks. 24. Kasyoka, P., Kimwele, M. and Angolo, S.M.Multi‐user Broadcast Authentication Scheme for Wireless Sensor Network based on Elliptic Curve Cryptography. 25. et BELKAIBECH, L.A.G.H.O.U.E.G. and et Dounia, R. 26. Fotohi R.,Firoozi Bari, S. and Yusefi, M. Securing Wireless Sensor Networks Against Denial‐of‐sleep Attacks Using Rsa Cryptography Algorithm and Interlock Protocol. 27. Nguyen, B.H., Xue, B. and Zhang, M.A Survey on Swarm Intelligence Approaches to Feature Selection in Data Mining. 28. Varol Altay, E. and Alatas, B. Performance Analysis of Multi-objective Artificial Intelligence Optimization Algorithms in Numerical Association Rule Mining. 29. Zhao X., Wang C., Su J., andWang J.Research and Application Based on the Swarm Intelligence Algorithm and Artificial Intelligence for Wind Farm Decision System. 30. Slowik, A. and Kwasnicka, H.Nature Inspired Methods and Their Industry Applications—Swarm Intelligence Algorithms. |
[1] | Sneh Prabha and Neetu Sardana. Optimizing Latent Dirichlet Allocation using Metaheuristic Technique: A Comparative Study [J]. Int J Performability Eng, 2025, 21(3): 131-140. |
[2] | Vikas, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Trust Management in WSN using ML for Detection of DDoS Attacks [J]. Int J Performability Eng, 2025, 21(3): 157-167. |
[3] | Vikas Kumar, Charu Wahi, Bharat Bhushan Sagar, and Manisha Manjul. Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment [J]. Int J Performability Eng, 2024, 20(9): 541-551. |
[4] | Sudeep Varshney, Hoor Fatima, Preeti Dubey, Amit Kumar Upadhyay, and Sarthak Tyagi. Plug and Play Device for In-Depth RAM Data Repository [J]. Int J Performability Eng, 2024, 20(8): 520-528. |
[5] | Mohan Krishnan O, Srinithi J, Sri Harshitha P, Ilamughi M, and Antony Seba P. Gesture Vault: Revolutionizing ATMs with Touchless Technology [J]. Int J Performability Eng, 2024, 20(7): 413-420. |
[6] | Ajeet Kumar Sharma and Rakesh Kumar. IoT Malware Detection and Dynamic Analysis of MQTT Simulated Network [J]. Int J Performability Eng, 2024, 20(7): 451-459. |
[7] | Abhishek Gupta and Jaspreet Singh. Data-Driven Security Framework for VANET using Firefly and ANN [J]. Int J Performability Eng, 2024, 20(6): 344-354. |
[8] | Vikas Verma, Arun Malik, and Isha Batra. Analyzing and Classifying Malware Types on Windows Platform using an Ensemble Machine Learning Approach [J]. Int J Performability Eng, 2024, 20(5): 312-318. |
[9] | Neha Kashyap, Sapna Sinha, and Vineet Kansal. A Hybrid Lightweight Method of ABE with SHA1 Algorithm for Securing the IoT Data on Cloud [J]. Int J Performability Eng, 2024, 20(3): 131-138. |
[10] | Kanchan Bala Jaswal and Pawan Thakur. Efficiency and Security in WSN Routing through Hybrid Algorithm Fusion [J]. Int J Performability Eng, 2024, 20(3): 167-176. |
[11] | Shweta Bhardwaj, Seema Rawat, and Hima Bindu Maringanti. Intrusion Detection with Ant Colony Optimization Based Feature Selection and XGboost Classifier [J]. Int J Performability Eng, 2024, 20(11): 649-657. |
[12] | Rashmi Kushwah. Navigating the Cybersecurity Landscape: Vulnerabilities, Mitigation Strategies and Future Outlooks [J]. Int J Performability Eng, 2024, 20(11): 688-698. |
[13] | Kukreja Bhawna, Kumar Malik Sanjay, and Sharma Ajay. A Novel Citadel Security Framework for Cyber Data using CryptSteg Techniques [J]. Int J Performability Eng, 2024, 20(10): 591-601. |
[14] | Divya Singhal, Laxmi Ahuja, and Ashish Seth. An Insight into Combating Security Attacks for Smart Grid [J]. Int J Performability Eng, 2022, 18(7): 512-520. |
[15] | Savitha A. C., M. N. Jayaram, and Mallikarjuna Swamy S.. Development of Energy Efficient and Secure Routing Protocol for M2M Communication [J]. Int J Performability Eng, 2022, 18(6): 426-433. |
|