You are on page 1of 4

Salp swarm algorithm

This section presents the SSA and describes its main ele-
ments. It also includes explanations on the convergence,
exploitation, and exploration of this algorithm.
2.1 Inspiration of SSA
Over 1.2 million species of marine organisms already
cataloged in a central database [31]. Most of these species
have the same behaviors and features, such as communi-
cating methods, locomotor performance, and looking for
food. Salp is a kind of marine organism which belongs to
the family of Salpidae. Its shape is highly similar to jel-
lyfishes, cylindrical shape with openings at the end which
pump water through their gelatinous bodies to move
Salp swarm algorithm
This section presents the SSA and describes its main ele-
ments. It also includes explanations on the convergence,
exploitation, and exploration of this algorithm.
2.1 Inspiration of SSA
Over 1.2 million species of marine organisms already
cataloged in a central database [31]. Most of these species
have the same behaviors and features, such as communi-
cating methods, locomotor performance, and looking for
food. Salp is a kind of marine organism which belongs to
the family of Salpidae. Its shape is highly similar to jel-
lyfishes, cylindrical shape with openings at the end which
pump water through their gelatinous bodies to move
It also includes explanations on the convergence,
exploitation, and exploration of this algorithm.
2.1 Inspiration of SSA
Over 1.2 million species of marine organisms already
cataloged in a central database [31]. Most of these species
have the same behaviors and features, such as communi-
cating methods, locomotor performance, and looking for
food. Salp is a kind of marine organism which belongs to
the family of Salpidae. Its shape is highly similar to jel-
lyfishes, cylindrical shape with openings at the end which
pump water through their gelatinous bodies to move an
Salp swarm algorithm

1. It also includes explanations on the convergence, exploitation, and exploration of this algorithm.

2. Communicating methods, locomotor performance, and looking for food. Salp is a kind of marine organism
which belongs to the family of Salpidae. Its shape is highly similar to jel-lyfishes, cylindrical shape with
openings at the end which pump water through their gelatinous bodies to move an

feed by internal feeding filters. Figure 4a shows the shape


of a salp.
As mentioned above, the marine organisms share some
behavior such as swarming behavior. For example, for fish,
it is called the school of fish [32], while for salps it is called
salp chain (see Fig. 4b). Although their living environ-
ments are extremely difficult to access, the biological
researchers believe that this behavior helps the salps for
achieving better locomotion and foragin
Feed by internal feeding filters. Figure 4a shows the shape of a salp.As mentioned above, the marine organisms
share somebehavior such as swarming behaviour. For example, for fish, it is called the school of fish [32], while
for salps it is called alp chain (see Fig. 4b). Although their living environ-ments are extremely difficult to access,
the biological researchers believe that this behaviour helps the salps for achieving better locomotion and foragin
variety of populations and improves the local searchability
of the algorithm
variety of populations and improves the local searchabilityof the algorithm

author Title Proposed Model Methods Future Analysis

Ning YE An Efficient Elliptic Curve Authentication: Traditional cryptographic algorithms


Authentication Cryptography authentication between user cannot reach the lightweight, lack of
and Access secured and terminal nodes ensures mutual authentication between user
Control Scheme authentication only the legitimate user can and nodes, not suit to the open
for Perception protocol for WSN access the network. environment of IoT
Layer of Internet Key establishment: session
of Thing keys should be created
between the user and nodes
for secure communication.
Gai-Ge Wang Chaotic Krill Herd Krill Herd Fewer parameters to adjust Less parameters
algorithm (KH)Algorithm compared with other Time complexity
chaotic KH population-based
(CKH) optimization methods.
Chanapha Security and combination of comparative analysis Less concentration in privacy and
Butpheng 1 Privacy in IoT- IoT-based e- privacy and security issues security solutions for IoT-cloud-based
Cloud-Based e- Health systems e-Health systems, such as automatic
Health Systems integrated with identification scheme
intelligent focus more on the scalability of big
systems data for healthcare problems by the
simulation of diverse privacy and
security approaches
SuHyun Kim1 IoT device proxy re- sharing and manag- Data communication not achieved
security based on encryption ing data using the secured and more attacks
proxy re- security features conventional cipher Difficulty in applying the
encryption by using elliptic algorithm on lightweight conventional cipher algorithm to
curve devices in various lightweight devices.
cryptosystem- circumstances. additional computation in the
based polynomial
in lightweight equation compared to existing
devices. attribute-based encryption
Methods, since it provides more
functions.
Thirumarai A modified salp modified salp (i) Medical imaging data Medical images where the
Selvi a, 2021 swarm algorithm swarm algorithm are transmitted in the secure transmission of image such as weak
(SSA) combined whale network in safe from the security, small key space and high
with a chaotic optimization hackers computational time
coupled map algorithm (ii) Medical imaging data
lattices (CML) coupled map can be shared quickly and
approach for the lattice algorithm easily between health care
secured encryption compresses and providers and departments.
and compression encrypts the The chaotic system based
of medical images image different encryption
during data algorithms using researches
transmission is analyzed
Mohammed Lightweight flexible Better performance Less secured encryption done
Abbas Fadhil Al- cryptography lightweight regarding encryption time size of memory use and the
Husainy 2021 system for IoT compared to AES encryption time by using logical and
encryption
devices using keys generation to achieve rotate operations are huge
system
DNA high randomness in the
keys in order to make the
keys hard to break by the
attackers
S. Alexander ETSET: Enhanced Enhanced Tiny symmetric Encryption computation
Suresh SDBa Tiny Symmetric Symmetric technique to secure the data complexity, a strong, lightweight
2021 Encryption Encryption transmitted between IoT security technique
Techniques to Technique devices. Security mechanism turnaround time
Secure Data max time taken
Transmission delays and less efficiency.
among IoT
Devices
(Sreeja Rajesh A Secure and Novel Tiny Tiny encryption In Future Integrate and implement
et.al,2019)[-] Efficient Symmetric algorithm (TEA) this algorithm for data transfer in
Lightweight
Encryption 64-bit PT/ and key of 128 ad hoc, sensor and fog networks.
Symmetric
Encryption Algorithm bits.
Scheme for (NTSA)
Transfer of Text 32 cycles/two rounds,
Files between resulting in 64 rounds.
Embedded IoT
Devices The PT /two halves, v0
and v1, with 32 bits
each.

128-bit key is divided


into four 32-bit partial
keys k1, k2, k3, and k4.

Nasrollah Certificate less Certificate less Eight PPT algorithms


Pakniat authenticated Authenticated 1. Setup Industrial Internet of Things.
et.al,2020)[-] encryption with Encryption 2. Extract Partial
keyword search: with Keyword Private Key Computational and
Enhanced 3. Set Private Key communication complexities show
Search
security model 4. Set Public Key that security is achieved at some
(CLAEKS)
and a concrete 5. CLAEKS affordable cost.
construction for 6. Process
industrial IoT 7. Trap door Gen
8. Test

Marko Šarac Increasing Block chain The development of a The server will be optimized to be
et.al,2021)[-] privacy and security interface for IoT compatible with a variety of
security by devices. cryptographic algorithms
integrating a • Adding of IP mapping therefore will be able to be used
Blockchain for all devices on security with a wider range of IoT devices.
Secure Interface interface.
into an IoT • Adding of Block chain
Device Security to prevent access of
Gateway third parties to interface,
Architecture provide trust between
devices and increase
reliability due to being in
the closed decentralized
network.
.

You might also like