{"title":"基于海狮启发策略的无线传感器网络边界监控双层安全节能模型。","authors":"Jayachandran J, Vimaladevi K","doi":"10.1038/s41598-025-07999-z","DOIUrl":null,"url":null,"abstract":"<p><p>In recent years, networks of sensors have gained significant attention for security-sensitive applications, such as border monitoring, where network durability, efficiency, and security are of utmost importance. In sensor networks, security related measure will often lead to an increase in energy consumption, hence, designing efficient energy conserving protocols with robust data aggregation methods are crucial in line with better duty-cycling idle nodes in the network. This paper presents a Dual Layer Sea Lion Optimization algorithm (DL-SLnOA) model, a bio-inspired, clustering and routing that focuses on energy efficiency and security to enhance performance under challenging conditions. The proposed DL-SLnOA combines the SLnO algorithm with a dual-layer security framework to optimize the selection of Cluster Heads (CHs) by using adaptive exploration and exploitation methods, which dynamically position CHs to balance energy consumption, proximity, and trustworthiness. DL-SLnOA first layer incorporates dynamic trust score update to ensure only reliable nodes participate in communication and second layer implements anomaly detection methods, which are used to identify malicious behaviour with inherent high detection rates and least false positive rates. Unlike other methods, this solution tends to firmly segregate legitimate from malicious nodes, thereby reinforcing the network. The simulation results for selective forwarding attacks with 10 malicious nodes in 100 iterations detected threats within 7 rounds with a packet transmission efficiency of 97.9%, while for wormhole attacks detection within 2 rounds, packet transmission efficiency of 98.3%, and average energy consumption of about 0.122J, significantly increasing the network lifetime. These improvements that provide an energy-efficient and secure platform strongly reinforce the network against security threats by further extending the life span of the network, making DL-SLnOA a scalable solution.</p>","PeriodicalId":21811,"journal":{"name":"Scientific Reports","volume":"15 1","pages":"24974"},"PeriodicalIF":3.9000,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12246056/pdf/","citationCount":"0","resultStr":"{\"title\":\"A dual layer secure and energy-efficient model for border surveillance using sea lion inspired strategy in wireless sensor networks.\",\"authors\":\"Jayachandran J, Vimaladevi K\",\"doi\":\"10.1038/s41598-025-07999-z\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p><p>In recent years, networks of sensors have gained significant attention for security-sensitive applications, such as border monitoring, where network durability, efficiency, and security are of utmost importance. In sensor networks, security related measure will often lead to an increase in energy consumption, hence, designing efficient energy conserving protocols with robust data aggregation methods are crucial in line with better duty-cycling idle nodes in the network. This paper presents a Dual Layer Sea Lion Optimization algorithm (DL-SLnOA) model, a bio-inspired, clustering and routing that focuses on energy efficiency and security to enhance performance under challenging conditions. The proposed DL-SLnOA combines the SLnO algorithm with a dual-layer security framework to optimize the selection of Cluster Heads (CHs) by using adaptive exploration and exploitation methods, which dynamically position CHs to balance energy consumption, proximity, and trustworthiness. DL-SLnOA first layer incorporates dynamic trust score update to ensure only reliable nodes participate in communication and second layer implements anomaly detection methods, which are used to identify malicious behaviour with inherent high detection rates and least false positive rates. Unlike other methods, this solution tends to firmly segregate legitimate from malicious nodes, thereby reinforcing the network. The simulation results for selective forwarding attacks with 10 malicious nodes in 100 iterations detected threats within 7 rounds with a packet transmission efficiency of 97.9%, while for wormhole attacks detection within 2 rounds, packet transmission efficiency of 98.3%, and average energy consumption of about 0.122J, significantly increasing the network lifetime. These improvements that provide an energy-efficient and secure platform strongly reinforce the network against security threats by further extending the life span of the network, making DL-SLnOA a scalable solution.</p>\",\"PeriodicalId\":21811,\"journal\":{\"name\":\"Scientific Reports\",\"volume\":\"15 1\",\"pages\":\"24974\"},\"PeriodicalIF\":3.9000,\"publicationDate\":\"2025-07-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12246056/pdf/\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific Reports\",\"FirstCategoryId\":\"103\",\"ListUrlMain\":\"https://doi.org/10.1038/s41598-025-07999-z\",\"RegionNum\":2,\"RegionCategory\":\"综合性期刊\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"MULTIDISCIPLINARY SCIENCES\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific Reports","FirstCategoryId":"103","ListUrlMain":"https://doi.org/10.1038/s41598-025-07999-z","RegionNum":2,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
A dual layer secure and energy-efficient model for border surveillance using sea lion inspired strategy in wireless sensor networks.
In recent years, networks of sensors have gained significant attention for security-sensitive applications, such as border monitoring, where network durability, efficiency, and security are of utmost importance. In sensor networks, security related measure will often lead to an increase in energy consumption, hence, designing efficient energy conserving protocols with robust data aggregation methods are crucial in line with better duty-cycling idle nodes in the network. This paper presents a Dual Layer Sea Lion Optimization algorithm (DL-SLnOA) model, a bio-inspired, clustering and routing that focuses on energy efficiency and security to enhance performance under challenging conditions. The proposed DL-SLnOA combines the SLnO algorithm with a dual-layer security framework to optimize the selection of Cluster Heads (CHs) by using adaptive exploration and exploitation methods, which dynamically position CHs to balance energy consumption, proximity, and trustworthiness. DL-SLnOA first layer incorporates dynamic trust score update to ensure only reliable nodes participate in communication and second layer implements anomaly detection methods, which are used to identify malicious behaviour with inherent high detection rates and least false positive rates. Unlike other methods, this solution tends to firmly segregate legitimate from malicious nodes, thereby reinforcing the network. The simulation results for selective forwarding attacks with 10 malicious nodes in 100 iterations detected threats within 7 rounds with a packet transmission efficiency of 97.9%, while for wormhole attacks detection within 2 rounds, packet transmission efficiency of 98.3%, and average energy consumption of about 0.122J, significantly increasing the network lifetime. These improvements that provide an energy-efficient and secure platform strongly reinforce the network against security threats by further extending the life span of the network, making DL-SLnOA a scalable solution.
期刊介绍:
We publish original research from all areas of the natural sciences, psychology, medicine and engineering. You can learn more about what we publish by browsing our specific scientific subject areas below or explore Scientific Reports by browsing all articles and collections.
Scientific Reports has a 2-year impact factor: 4.380 (2021), and is the 6th most-cited journal in the world, with more than 540,000 citations in 2020 (Clarivate Analytics, 2021).
•Engineering
Engineering covers all aspects of engineering, technology, and applied science. It plays a crucial role in the development of technologies to address some of the world''s biggest challenges, helping to save lives and improve the way we live.
•Physical sciences
Physical sciences are those academic disciplines that aim to uncover the underlying laws of nature — often written in the language of mathematics. It is a collective term for areas of study including astronomy, chemistry, materials science and physics.
•Earth and environmental sciences
Earth and environmental sciences cover all aspects of Earth and planetary science and broadly encompass solid Earth processes, surface and atmospheric dynamics, Earth system history, climate and climate change, marine and freshwater systems, and ecology. It also considers the interactions between humans and these systems.
•Biological sciences
Biological sciences encompass all the divisions of natural sciences examining various aspects of vital processes. The concept includes anatomy, physiology, cell biology, biochemistry and biophysics, and covers all organisms from microorganisms, animals to plants.
•Health sciences
The health sciences study health, disease and healthcare. This field of study aims to develop knowledge, interventions and technology for use in healthcare to improve the treatment of patients.