In order to improve the performance of PSO algorithm, number of its variants has been made. This paper presents detail overview of the basic concepts of PSO and its variants. Many variants of PSO have been developed due to improved speed of convergence and quality of solution found by Researchers. The Applications of PSO in Complex Environments is discussed. Modifications, both those already developed, and promising future application areas are reviewed. Observation and review of 117 related studies in the period between 1995 and 2015 on different variants of PSO algorithms are discussed along with their advantages and disadvantages.
Security has been a primary concern in almost all areas of computing and for the devices that are low on computing power it becomes more important. In this paper, a new class of computing device termed as Low Computing Power Device (LCPD) has been defined conceptually. The paper brings out common attributes, security requirements and security challenges of all kinds of low computing power devices in one place so that common security solutions for these can be designed and implemented rather than doing this for each individual device type. A survey of existing recent security solutions for different LCPDs hasve been presented here. This paper has also provided possible security solutions for LCPDs which include identification of countermeasures against different threats and attacks on these devices, and choosing appropriate cryptographic mechanism for implementing the countermeasures efficiently.
No abstract
Providing security has been always on priority in all areas of computing and communication, and for the systems that are low on computing power, implementing appropriate and efficient security mechanism has been a continuous challenge for the researchers. Radio Frequency Identification (RFID) system is such an environment, which requires the design and implementation of efficient security mechanism. Earlier, the security protocols for RFID based on hash functions and symmetric key cryptography have been proposed. But, due to high strength and requirement of less key size in elliptic curve cryptography, the focus of researchers has been on designing efficient security protocol for RFID based on elliptic curves. In this paper, an efficient elliptic curve signcryption based security protocol for RFID has been proposed, which provides mutual authentication, confidentiality, non-repudiation, integrity, availability, forward security, anonymity, and scalability. Moreover, the proposed protocol successfully provides resistance from replay attack, impersonation attack, location tracking attack, de-synchronization attack, denial of service attack, man-in-the-middle attack, cloning attack, and key-compromise attack. Results have revealed that the proposed protocol is efficient than the other related protocols as it takes less computational time and storage cost, especially for the tag, making it ideal to be used for RFID systems.
The sensors deployed inside a wireless sensor network (WSN) have limited energy sources, significantly impacting the network throughput. This article's research objective is to increase network lifetime by developing an energy-efficient layered-based routing algorithm for WSNs using the grey wolf optimization (LBR-GWO) algorithm. In this, the grey wolf's leadership hierarchy has followed, which improves the network's energy capability. The entire region of the deployed nodes divides into four layers. In these nodes, layer one is chosen as cluster heads. If more than two nodes are present in layer one, then the cluster head is selected based on the game theory model; otherwise, the decision is made based on the node's residual energy. While the existing algorithm has several complex control parameter points, the current algorithm has fewer complex parameters. Therefore, in comparison to other algorithms, this algorithm is easy to apply in cluster-based sensor networks. Simulation findings prove the LBR-GWO algorithm supremacy for balancing energy consumption across the nodes and improving the network's lifetime compared to the LEACH, HEED, and PSO protocols.
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
: With technological advancements, the use of many kinds of computing devices has given birth to a new era of computing. RFID tags, smart cards, and wireless sensors are the low computing power devices, which are being used massively in sensitive applications. Therefore, securing these low computing environments has become a great concern. In this paper, an elliptic curve signcryption based security framework for securing low computing power devices has been proposed which provides mutual authentication, confidentiality, non-repudiation, forward secrecy, integrity, availability, key privacy, and anonymity. In addition to this, the proposed security framework has the capability to resist replay attack, de-synchronization attack, impersonation attack, key-compromise attack, location tracking attack, denial of service attack, and man-in-the-middle attack. Results have revealed that the proposed framework is efficient in terms of computational time as compared to the other related schemes. The proposed protocol presented in this paper can be used as a building block in designing efficient security protocols for all kinds of low computing power devices including RFID, wireless sensors, and smart cards.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.