Title: Application of computational intelligence techniques for internet of things: an extensive survey

Authors: J. Shreyas; Anand Jumnal; S.M. Dilip Kumar; K.R. Venugopal

Addresses: Department of Computer Science of Engineering, University Visvesvaraya College of Engineering, Bangalore, India ' Department of Computer Science of Engineering, University Visvesvaraya College of Engineering, Bangalore, India ' Department of Computer Science of Engineering, University Visvesvaraya College of Engineering, Bangalore, India ' Department of Computer Science of Engineering, University Visvesvaraya College of Engineering, Bangalore, India

Abstract: The application of computational intelligence (CI) techniques to internet of things (IoT) is gaining popularity due to its capability of providing human-like knowledge, such as cognition, recognition, understanding, learning, and others. This paper attempts to provide an exhaustive survey of the available literature on IoT using CI techniques. In addition, detailed categorisation has been provided on the basis of different CI tools and their hybridisations used to tackle different problems of IoT. The potential benefits and utility of CI techniques in IoT are highlighted. The possible mapping of CI techniques to the real-world IoT problems is presented. The advantages and disadvantages of CI algorithms over traditional IoT solutions are discussed. A general evaluation of CI algorithms is presented, which will serve as a guide for using CI algorithms for IoT. Finally, some considerations regarding the recent trends and potential research directions are presented. An extensive bibliography is also included.

Keywords: artificial immune system; AIS; computational intelligence; fuzzy logic; genetic algorithms; internet of things; IoT; neural networks; swarm intelligence.

DOI: 10.1504/IJCISTUDIES.2020.109607

International Journal of Computational Intelligence Studies, 2020 Vol.9 No.3, pp.234 - 288

Received: 28 Aug 2019
Accepted: 07 Jan 2020

Published online: 16 Sep 2020 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article