{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T13:48:58Z","timestamp":1776001738900,"version":"3.50.1"},"reference-count":37,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T00:00:00Z","timestamp":1710979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Guangdong Special Projects in Key Areas of General Universities","award":["2022ZDZX3008"],"award-info":[{"award-number":["2022ZDZX3008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Energy efficiency and security issues are the main concerns in wireless sensor networks (WSNs) because of limited energy resources and the broadcast nature of wireless communication. Therefore, how to improve the energy efficiency of WSNs while enhancing security performance has attracted widespread attention. In order to solve this problem, this paper proposes a new deep reinforcement learning (DRL)-based strategy, i.e., DeepNR strategy, to enhance the energy efficiency and security performance of WSN. Specifically, the proposed DeepNR strategy approximates the Q-value by designing a deep neural network (DNN) to adaptively learn the state information. It also designs DRL-based multi-level decision-making to learn and optimize the data transmission paths in real time, which eventually achieves accurate prediction and decision-making of the network. To further enhance security performance, the DeepNR strategy includes a defense mechanism that responds to detected attacks in real time to ensure the normal operation of the network. In addition, DeepNR adaptively adjusts its strategy to cope with changing network environments and attack patterns through deep learning models. Experimental results show that the proposed DeepNR outperforms the conventional methods, demonstrating a remarkable 30% improvement in network lifespan, a 25% increase in network data throughput, and a 20% enhancement in security measures.<\/jats:p>","DOI":"10.3390\/s24061993","type":"journal-article","created":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T04:34:46Z","timestamp":1710995686000},"page":"1993","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Security Enhancement for Deep Reinforcement Learning-Based Strategy in Energy-Efficient Wireless Sensor Networks"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4241-9964","authenticated-orcid":false,"given":"Liyazhou","family":"Hu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Macau University of Science and Technology, Macau 999078, China"},{"name":"Industrial Training Center, Guangdong Polytechnic Normal University, Guangzhou 510665, China"}]},{"given":"Chao","family":"Han","sequence":"additional","affiliation":[{"name":"China Mobile Jianshe Co., Ltd. Zhejiang Branch, Hangzhou 310013, China"}]},{"given":"Xiaojun","family":"Wang","sequence":"additional","affiliation":[{"name":"Industrial Training Center, Guangdong Polytechnic Normal University, Guangzhou 510665, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2035-0297","authenticated-orcid":false,"given":"Han","family":"Zhu","sequence":"additional","affiliation":[{"name":"Faculty of Applied Sciences, Macao Polytechnic University, Macau 999078, China"}]},{"given":"Jian","family":"Ouyang","sequence":"additional","affiliation":[{"name":"Industrial Training Center, Guangdong Polytechnic Normal University, Guangzhou 510665, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,3,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"5261","DOI":"10.1109\/JSYST.2023.3308775","article-title":"A Space Shift Keying-Based Optimization Scheme for Secure Communication in IIoT","volume":"17","author":"Zhu","year":"2023","journal-title":"IEEE Syst. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1166\/jmihi.2020.2691","article-title":"Image transmission over decode and forward based cooperative wireless multimedia sensor networks for Rayleigh fading channels in medical internet of things (MIoT) for remote health-care and health communication monitoring","volume":"10","author":"Ilhan","year":"2020","journal-title":"J. Med. Imaging Health Inform."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","article-title":"Wireless sensor networks: A survey","volume":"38","author":"Akyildiz","year":"2002","journal-title":"Comput. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2333","DOI":"10.1109\/LCOMM.2021.3067898","article-title":"A joint user scheduling and trajectory planning data collection strategy for the UAV-assisted WSN","volume":"25","author":"Wang","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Kim, J., Lee, D., Hwang, J., Hong, S., Shin, D., and Shin, D. (2021). Wireless sensor network (WSN) configuration method to increase node energy efficiency through clustering and location information. Symmetry, 13.","DOI":"10.3390\/sym13030390"},{"key":"ref_6","first-page":"921","article-title":"A novel communication framework between MANET and WSN in IoT based smart environment","volume":"13","author":"Tripathy","year":"2021","journal-title":"Int. J. Inf. Technol."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1016\/j.comcom.2019.10.003","article-title":"Cluster based data aggregation scheme for latency and packet loss reduction in WSN","volume":"149","author":"Devi","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_8","first-page":"100642","article-title":"Delay-aware data fusion in duty-cycled wireless sensor networks: A Q-learning approach","volume":"33","author":"Donta","year":"2022","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"102409","DOI":"10.1016\/j.adhoc.2020.102409","article-title":"A comprehensive survey on LEACH-based clustering routing protocols in Wireless Sensor Networks","volume":"114","author":"Daanoune","year":"2021","journal-title":"Ad Hoc Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"100368","DOI":"10.1016\/j.cosrev.2021.100368","article-title":"Successors of PEGASIS protocol: A comprehensive survey","volume":"39","author":"Khedr","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ahmad, R., Wazirali, R., and Abu-Ain, T. (2022). Machine learning for wireless sensor networks security: An overview of challenges and issues. Sensors, 22.","DOI":"10.3390\/s22134730"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"18192","DOI":"10.1109\/JSEN.2022.3193638","article-title":"Secrecy enhancement for SSK-based communications in wireless sensing systems","volume":"22","author":"Zhu","year":"2022","journal-title":"IEEE Sens. J."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Dalal, B., and Kukarni, S. (2021). Wireless Sensor Networks: Design, Deployment and Applications, BoD\u2013Books on Demand.","DOI":"10.5772\/intechopen.97079"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.comcom.2021.12.015","article-title":"Graph-based deep learning for communication networks: A survey","volume":"185","author":"Jiang","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Jiang, K., Zhou, H., Zeng, D., and Wu, J. (2020, January 10\u201313). Multi-agent reinforcement learning for cooperative edge caching in internet of vehicles. Proceedings of the 2020 IEEE 17th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), Delhi, India.","DOI":"10.1109\/MASS50613.2020.00062"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2017.2743240","article-title":"Deep reinforcement learning: A brief survey","volume":"34","author":"Arulkumaran","year":"2017","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. (2001, January 16\u201321). SPINS: Security protocols for sensor networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy.","DOI":"10.1145\/381677.381696"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1698","DOI":"10.1109\/LCOMM.2015.2459698","article-title":"On minimizing energy consumption of duty-cycled wireless sensors","volume":"19","author":"Seo","year":"2015","journal-title":"IEEE Commun. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","article-title":"Graph based anomaly detection and description: A survey","volume":"29","author":"Akoglu","year":"2015","journal-title":"Data Min. Knowl. Discov."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ioannou, C., Vassiliou, V., and Sergiou, C. (2017, January 3\u20135). An intrusion detection system for wireless sensor networks. Proceedings of the 2017 24th International Conference on Telecommunications (ICT), Limassol, Cyprus.","DOI":"10.1109\/ICT.2017.7998271"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Li, G., Hari, S.K.S., Sullivan, M., Tsai, T., Pattabiraman, K., Emer, J., and Keckler, S.W. (2017, January 12\u201317). Understanding error propagation in deep learning neural network (DNN) accelerators and applications. Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, Denver, CO, USA.","DOI":"10.1145\/3126908.3126964"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"e5664","DOI":"10.1002\/dac.5664","article-title":"Multi-objective cluster head-based energy aware routing using optimized auto-metric graph neural network for secured data aggregation in Wireless Sensor Network","volume":"37","author":"Janarthanan","year":"2024","journal-title":"Int. J. Commun. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"102076","DOI":"10.1016\/j.phycom.2023.102076","article-title":"Enhancing network lifespan in wireless sensor networks using deep learning based Graph Neural Network","volume":"59","author":"Sivakumar","year":"2023","journal-title":"Phys. Commun."},{"key":"ref_24","first-page":"128","article-title":"Implement DNN technology by using wireless sensor network system based on IOT applications","volume":"10","author":"Hameed","year":"2022","journal-title":"Period. Eng. Nat. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Bhaskar, K.V., Kumanan, T., Southry, S.S., and Elangovan, V. (2023, January 6\u20138). Deep Neural Network Algorithm to Improve Link Reliability in Wireless Sensor Networks. Proceedings of the 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India.","DOI":"10.1109\/ICESC57686.2023.10193180"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"6279","DOI":"10.1109\/JIOT.2019.2957778","article-title":"Deep reinforcement learning (DRL): Another perspective for unsupervised wireless localization","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1613\/jair.301","article-title":"Reinforcement learning: A survey","volume":"4","author":"Kaelbling","year":"1996","journal-title":"J. Artif. Intell. Res."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"9595","DOI":"10.1109\/TWC.2023.3272348","article-title":"Distributed Deep Multi-Agent Reinforcement Learning for Cooperative Edge Caching in Internet-of-Vehicles","volume":"22","author":"Zhou","year":"2023","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_29","unstructured":"Wachi, A., and Sui, Y. (2020, January 13\u201318). Safe reinforcement learning in constrained Markov decision processes. Proceedings of the International Conference on Machine Learning, PMLR, Virtual Event."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1109\/TITS.2021.3107527","article-title":"AI based energy efficient routing protocol for intelligent transportation system","volume":"23","author":"Goswami","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2330","DOI":"10.1109\/JIOT.2021.3094465","article-title":"Deep reinforcement learning resource allocation in wireless sensor networks with energy harvesting and relay","volume":"9","author":"Zhao","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"104083","DOI":"10.1016\/j.dsp.2023.104083","article-title":"Secure transmission in wireless sensor networks via reconfigurable intelligent surface","volume":"140","author":"Amer","year":"2023","journal-title":"Digit. Signal Process."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1007\/BF00992698","article-title":"Q-learning","volume":"8","author":"Watkins","year":"1992","journal-title":"Mach. Learn."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1016\/j.comcom.2023.09.015","article-title":"Optimal path selection using reinforcement learning based ant colony optimization algorithm in IoT-Based wireless sensor networks with 5G technology","volume":"212","author":"Dubey","year":"2023","journal-title":"Comput. Commun."},{"key":"ref_35","first-page":"4661","article-title":"Low energy adaptive clustering hierarchy in wireless sensor network (LEACH)","volume":"5","author":"Yadav","year":"2014","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1016\/j.procs.2016.07.347","article-title":"Energy management in wireless sensor network using PEGASIS","volume":"92","author":"Mahakud","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"168","DOI":"10.2174\/2213275912666190404162447","article-title":"Enhanced adaptive distributed energy-efficient clustering (EADEEC) for wireless sensor networks","volume":"13","author":"Poluru","year":"2020","journal-title":"Recent Adv. Comput. Sci. Commun. (Former. Recent Patents Comput. Sci.)"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/6\/1993\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:17:07Z","timestamp":1760105827000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/6\/1993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,21]]},"references-count":37,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["s24061993"],"URL":"https:\/\/doi.org\/10.3390\/s24061993","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,21]]}}}