Malicious Node Detection and Path Malicious Node Detection and Path Malicious Node Detection and Path Malicious Node Detection and Path Optimization: Optimization: Optimization: A R A R eview

Detection of a malicious node in neighbourhood is a requirement because otherwise that node may cause incorrect dec isions or energy depletion. The methods to detect malicious n ode include the role-based trust approach, event-based trust approa ch, collaborative trust approach, and agent-based trust approach, neu ral-based approach. After malicious node detection we need to either correct it or choose another path. For choosing path we nee d to select optimized path from alternatives available. An opti mization method that requires moderate memory and computational resources and produces good results is desirable. Swarm Intellige nce is subfield of provides solution for complex optimization probl ems which are not easily tackled by other approaches. SI mainly c onsists on Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and Honeybees paradigms.

[1]  Neeru Singla A Dynamic Network Reconstruction Approach using ACO , 2012 .

[2]  Ganesh K. Venayagamoorthy,et al.  Particle Swarm Optimization in Wireless-Sensor Networks: A Brief Survey , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[3]  Anna Felkner How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks , 2012 .

[4]  Tzung-Pei Hong,et al.  Allocating Multiple Base Stations under General Power Consumption by the Particle Swarm Optimization , 2007, 2007 IEEE Swarm Intelligence Symposium.

[5]  Huafeng Wu,et al.  Event-based Trust Framework Model in Wireless Sensor Networks , 2008, 2008 International Conference on Networking, Architecture, and Storage.

[6]  Zulfiqar Ali,et al.  Analysis of Routing Protocols in AD HOC and Sensor Wireless Networks Based on Swarm Intelligence , 2013 .

[7]  Muddassar Farooq,et al.  Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions , 2011, Inf. Sci..

[8]  Mohammed Bouhorma,et al.  New Routing Algorithm Based on ACO Approach for Lifetime Optimization in Wireless Sensor Networks , 2012 .

[9]  Derviş Karaboğa,et al.  Artificial bee colony algorithm for dynamic deployment of wireless sensor networks , 2012, Turkish Journal of Electrical Engineering and Computer Sciences.

[10]  Yoon-Hwa Choi,et al.  Neighbor-Based Malicious Node Detection in Wireless Sensor Networks , 2012 .

[11]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[12]  Yenumula B. Reddy,et al.  TRUST -BASED APPROACH IN WIRELESS SENSOR NETWORKS USING AN AGENT TO EACH CLUSTER , 2012 .

[13]  Gianluca Aloi,et al.  Particle swarm optimization schemes based on consensus for wireless sensor networks , 2012, PM2HW2N '12.