Secured Multi-Objective Optimisation-Based Protocol for Reliable Data Transmission in Underwater Wireless Sensor Networks

Article


Sahi, A.. 2025. "Secured Multi-Objective Optimisation-Based Protocol for Reliable Data Transmission in Underwater Wireless Sensor Networks." Mesopotamian Journal of Cyber Security. 5 (1), p. 216–239. https://doi.org/10.58496/MJCS/2025/015
Article Title

Secured Multi-Objective Optimisation-Based Protocol for Reliable Data Transmission in Underwater Wireless Sensor Networks

Article CategoryArticle
AuthorsSahi, A.
Journal TitleMesopotamian Journal of Cyber Security
Journal Citation5 (1), p. 216–239
Number of Pages24
Year2025
PublisherMesopotamian Academic Press
Place of PublicationIraq
ISSN2958-6542
Digital Object Identifier (DOI)https://doi.org/10.58496/MJCS/2025/015
Web Address (URL)https://mesopotamian.press/journals/index.php/CyberSecurity/article/view/752
Abstract

Underwater wireless sensor network (UWSN) requirements have increased beyond applications in environmental monitoring and underwater exploration to military surveillance. The complex underwater environment raises many challenges due to high propagation delays, limited bandwidth, high error rates, and dynamic underwater currents. Most traditional clustering algorithms do not consider the multifaceted requirements of UWSNs. In most cases, a single objective is optimised at the cost of other essential factors, such as energy consumption, network robustness, and data transmission reliability. This paper proposes a new UWSN protocol based on the tiger beetle optimisation (TBO) algorithm for multiobjective K-means clustering (TBO-MOK). The protocol comprises adaptive search procedures motivated by tiger beetle hunting behaviors and lightweight AES-based encryption for data security. TBO-MOK is excellent in multiobjective optimisation since it simultaneously considers performance metrics of more than one aspect. Many problems are resolved by TBO-MOK, which optimises all the involved performance metrics to provide balanced energy usage and robust communication links. Comprehensive simulations demonstrate that TBO-MOK outperforms the traditional LEACH, PSO, and GA approaches in grossly enhancing network lifetime, energy efficiency, load balancing, and data transmission reliability. These results show the potential of TBO-MOK to provide a more effective and resilient solution for UWSNs.

Contains Sensitive ContentDoes not contain sensitive content
ANZSRC Field of Research 2020460299. Artificial intelligence not elsewhere classified
400906. Electronic sensors
Byline AffiliationsSchool of Mathematics, Physics and Computing
Permalink -

https://research.usq.edu.au/item/zwy99/secured-multi-objective-optimisation-based-protocol-for-reliable-data-transmission-in-underwater-wireless-sensor-networks

Download files


Published Version
15.pdf
License: CC BY 4.0
File access level: Anyone

  • 1
    total views
  • 0
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

Enhanced Polycystic Ovary Syndrome Diagnosis Model Leveraging a K-means Based Genetic Algorithm and Ensemble Approach
Faris, Najlaa, Sahi, Aqeel, Diykh, Mohammed, Abdulla, Shahab and Siuly, Siuly. 2025. "Enhanced Polycystic Ovary Syndrome Diagnosis Model Leveraging a K-means Based Genetic Algorithm and Ensemble Approach." Intelligence-Based Medicine. https://doi.org/10.1016/j.ibmed.2025.100253
SGDM-GRU: Spectral Graph Deep Learning Based Gated Recurrent Unit Model for Accurate Fake News Detection
Sahi, Aqeel, Albdair, Mostfa, Diykh, Mohammed, Abdulla, Shahab, Alghayab, Hadi, Aljebur, Kaled and Alkhafaji, Sarmad K.D.. 2025. "SGDM-GRU: Spectral Graph Deep Learning Based Gated Recurrent Unit Model for Accurate Fake News Detection." Expert Systems with Applications. 281. https://doi.org/10.1016/j.eswa.2025.127572
Layered Model Stacking: Enhancing DDoS Detection Through Advanced Ensemble Machine Learning Techniques
Haddad, Nabeel Mahdy, Sahi, Aqeel, Diykh, Mohammed, Aljbur, Kaled, Kutfan, Ali, Abdulla, Shahab and Al-Hraishawi, Hayder. 2025. "Layered Model Stacking: Enhancing DDoS Detection Through Advanced Ensemble Machine Learning Techniques ." Chen, F. (ed.) 2024 IEEE Region 10 Conference (TENCON 2024). Singapore 01 - 04 Dec 2024 IEEE. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/TENCON61640.2024.10902823
EEG based over-complete rational dilation wavelet transform coupled with autoregressive for motor imagery classification
Ghayab, Hadi Ratham Al, Li, Yan, Diykh, Mohammed, Sahi, Aqeel, Abdulla, Shahab and Alkhuwaylidee, Ahmed Rashid. 2025. "EEG based over-complete rational dilation wavelet transform coupled with autoregressive for motor imagery classification." Expert Systems with Applications. 269 (126433). https://doi.org/10.1016/j.eswa.2025.126433
A Review of the State of the Art in Privacy and Security in the eHealth Cloud
Sahi, Aqeel, Lai, David and Li, Yan. 2021. "A Review of the State of the Art in Privacy and Security in the eHealth Cloud." IEEE Access. 9, pp. 104127-104141. https://doi.org/10.1109/ACCESS.2021.3098708
An efficient hash based parallel block cipher mode of operation
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "An efficient hash based parallel block cipher mode of operation." 3rd IEEE International Conference on Computer and Communication Systems (ICCCS 2018). Nagoya, Japan 27 - 30 Apr 2018 New York, United States.
Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption
Sahi, Aqeel, Lai, David and Li, Yan. 2018. "Three-party password-based authenticated key exchange protocol based on the computational Diffie-Hellman assumption." International Journal of Communication Networks and Distributed Systems. 21 (4), pp. 560-581. https://doi.org/10.1504/IJCNDS.2018.095373
Securing clouds using cryptography and traffic classification
Khader Al-Nassar, Aqeel Sahi. 2018. Securing clouds using cryptography and traffic classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland. https://doi.org/10.26192/5c0de0e2f69e0
An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment
Sahi, Aqeel, Lai, David, Li, Yan and Diykh, Mohammed. 2017. "An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment ." IEEE Access. 5, pp. 6036-6048. https://doi.org/10.1109/ACCESS.2017.2688460
An energy efficient TCP DoS attacks mitigation method in cloud computing
Sahi, Aqeel, Lai, David and Li, Yan. 2017. "An energy efficient TCP DoS attacks mitigation method in cloud computing." Al-Jumaily, Adel Ali, Barifcani, Ahmed and Al-Jumaily, Ahmed (ed.) 1st MoHESR and HCED Iraqi Scholars Conference in Australasia 2017 (ISCA 2017). Melbourne, Australia 05 - 06 Dec 2017 Melbourne, Australia.
Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan
Sahi, Aqeel, Lai, David and Li, Yan. 2016. "Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan." Computers in Biology and Medicine. 78, pp. 1-8. https://doi.org/10.1016/j.compbiomed.2016.09.003
Parallel encryption mode for probabilistic scheme to secure data in the cloud
Sahi, Aqeel, Lai, David and Li, Yan. 2015. "Parallel encryption mode for probabilistic scheme to secure data in the cloud." 10th International Conference on Information Technology and Applications (ICITA 2015). Sydney, Australia 01 - 04 Jul 2015 Australia.
Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol
Khader, Aqeel Sahi and Lai, David. 2015. "Preventing man-in-the-middle attack in Diffie-Hellman key exchange protocol." 22nd International Conference on Telecommunications (ICT2015). Sydney, Australia 27 - 29 Apr 2015 United States. https://doi.org/10.1109/ICT.2015.7124683