Table 1 Summary of the related works.

From: Enhanced lion swarm optimization and elliptic curve cryptography scheme for secure cluster head selection and malware detection in IoT-WSN

References

Methods used

Advantages

Limitations

8

Federated Generative Adversarial Networks (A3GANS) and two GAN-based algorithms

Effective privacy protection, improved accuracy by 8%, robust data privacy for Android users

Complexity in GAN-based algorithms and federated learning

9

Delay Conscious routing protocol

Effectively used to Multi point relay nodes

Several Problems including limited density, high speed nodes and abrupt dynamic topology.

7

Intrusion detection algorithm based on neighbour information

Better identification of sinkhole nodes, improved network performance, energy-efficient

Dependence on neighbour information, might not scale well in larger networks

10

Human-interactive, visual-based anomaly detection devices

Real-time wormhole attack detection, visual representation of security risks

Limited to IP-enabled WSNs, visual tool scalability concerns

11

Trust-based routing technique, FLION clustering

Enhanced security, energy-efficient routing, extended network lifespan

Potential overhead from multiple trust evaluations, complexity in implementation

13

Lion Swarm Optimization (LSO) with multi-agent frameworks

Improved global exploration capabilities, enhanced accuracy and efficiency

Increased computational overhead, complexity in multi-agent system integration

19

Swarm Intelligence-based Clustering Technique

Improve network throughput

Unbalanced power usage is a common concern in cluster based routing

22

Modified SSA for clustering and routing, polynomial time fitness function

Maximized network lifespan, efficient energy use

Complexity in fitness function formulation, potential overfitting

23

Distributed cluster head selection, multi-hop routing

Balanced energy consumption, avoided hotspot issues, effective for dense WSNs

Complexity in GNN implementation, potential scalability issues

24

Grid-based clustering, Type-3 fuzzy system

Enhanced network longevity, adaptable clustering

Complexity in fuzzy system, potential issues with real-time adaptability

25

Weighted Recurrent Neural Network, Enhanced Golf Optimization Algorithm (EGOA)

Effective vampire attack detection, optimized routing paths

Complexity in RNN and optimization algorithm, computational overhead

26

Boltzmann Selection Probability-centric Gravitational Search Algorithm (BSP-GSA), IECC, MUMLP

Secure data transmission, energy-aware routing, cloud storage integration

Complexity in multiple algorithm integration, potential latency in cloud storage

27

EPK-DNN, LS-BAT, DL-K-Means

High detection accuracy, robust against various attacks

High computational requirements, complexity in multi-algorithm integration

28

Adaptive Neuro-Fuzzy Inference System (ANFIS), MATLAB integration

Effective malicious node detection, adaptable classification

Performance degradation with increasing hostile nodes, complexity in MATLAB integration

29

K-means clustering, hybrid optimized machine learning techniques

High localization accuracy, effective routing threat detection

Dependence on specific datasets, complexity in hybrid model implementation

30

Modified k-means, Philippine Eagle (PE) optimization

Secure and efficient routing, improved detection rate

Potential issues with scalability, computational complexity

31

LEACH, Fuzzy interference rule, ANN

High specificity, accuracy, and sensitivity, effective data transmission

Potential energy consumption from ANN, complexity in the integration of multiple methods

32

Blockchain based identification Strategy

It is used to improve the level of compatibility among blockchain and IoT

End-to-end security is challenging due to the intricacy of IoT communication and different resource capacities.