Next Article in Journal
Robust Looming Spatial Localization in Dim Light via Daubechies Wavelet-Fused ON/OFF Pathways
Previous Article in Journal
Artificial Neural Network-Based PID Parameter Estimation Using Black Kite Algorithm Hyperparameter Optimization for DC Motor Speed Control
Previous Article in Special Issue
A Bio-Inspired Data-Driven Hybrid Optimization Framework for Task Unit Partition in Cruise Itinerary Planning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Starfish Optimization Algorithm for Secure STAR-RIS Communications

1
Department of Computer Engineering and Information, College of Engineering, Wadi Ad Dwaser, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia
2
Computer Science Department, Faculty of Computers and Information, Mansoura University, Mansoura 35516, Egypt
3
School of Computer Science and Technologies, VIZJA University, 01-043 Warsaw, Poland
4
Department of Electrical Engineering, Faculty of Engineering, Suez University, Suez P.O. Box 43221, Egypt
*
Author to whom correspondence should be addressed.
Biomimetics 2026, 11(4), 243; https://doi.org/10.3390/biomimetics11040243
Submission received: 19 February 2026 / Revised: 5 March 2026 / Accepted: 31 March 2026 / Published: 3 April 2026

Abstract

This paper develops an intelligent Enhanced Starfish Optimization (ESFO) algorithm for optimizing a secure wireless communication infrastructure. The Starfish Optimization (SFO) algorithm is inspired by starfish biology, using the integrated modeling of the arm-based exploration, preying, and regeneration behaviors of starfish. To further enhance the exploitation capability of the standard Starfish Optimization (SFO), the proposed Enhanced Starfish Optimization (ESFO) integrates a fitness-based interacting mechanism within the exploitation phase. This innovative modification improves local search accuracy, preserves population diversity, and mitigates premature convergence without introducing additional control parameters. Moreover, the proposed Enhanced Starfish Optimization (ESFO) is designed for secure wireless transmission, which is considered one of the main topics in next-generation wireless network infrastructure. The investigated network addresses the use of Simultaneously Transmitting and Reflecting RIS (STAR-RIS) in the security of the physical layer. This implemented STAR-RIS has a coupled phase shift to create reflected and transmission links, unlike traditional Reconfigurable Intelligent Surface (RIS). In this regard, we create a safe beamforming architecture that optimizes both Base Station (BS) precoding vectors and STAR-RIS transmission/reflection coefficients. In order to validate the efficiency of the proposed Enhanced Starfish Optimization (ESFO) algorithm, it is compared to several benchmark optimizers such as standard Starfish Optimization (SFO), Dhole Optimizer (DO), Neural Network Algorithm (NNA), Crocodile Ambush Optimization Algorithm (CAOA), and white shark Optimizer (WSO). These comparisons include several scenarios based on the transmitted power threshold which is varied in the range of 20 to 70 dBm with step of 5 dBm. The simulation results show that the proposed Enhanced Star Fish Optimization (ESFO) algorithm consistently outperforms existing benchmark approaches. This study supports future intelligent communication infrastructures in terms of secrecy and achievable rates over a range of transmit power levels. In particular, ESFO improves performance by up to 20–25% while converging 40–50% faster than traditional optimization algorithms, demonstrating its usefulness and resilience in STAR-RIS-assisted secure communication systems. The suggested ESFO-enabled architecture outperforms standard RIS-based systems in terms of secrecy capacity, according to numerical studies, and low-resolution STAR-RIS phase-shifters are sufficient to ensure robust secrecy performance.

1. Introduction

Security, throughput, latency, energy efficiency, deployment cost, hardware complexity, and end-to-end dependability have all had to be compromised in 5th-generation cellular network (5G) due to the rapid growth of Internet of Things (IoT) networks and the proliferation of smart devices [1,2,3]. In order to fully address these trade-offs and meet the demanding network requirements [4,5,6,7], sixth-generation cellular networks (6G) are being developed.
One of the deployment technologies for 6G is the use of RIS in wireless applications.
An RIS can assist a transmitter and receiver in establishing a Line-of-Sight (LOS) link using arrays of antenna elements [8,9,10], even in the presence of obstacles or insufficient power received from the straight path to create a stable connection.
Conventional reflecting-only RISs have limited application flexibility and electromagnetic control since they can only influence the wireless environment in the half-space facing the array. This inherent constraint severely limits coverage, user accessibility, and the geographic degrees of freedom available for system optimization. To overcome these limitations, the notion of STAR-RIS has recently emerged [11]. Unlike standard RISs, STAR-RISs can split the incident electromagnetic wave into transmission and reflection components, allowing for intelligent signal manipulation on both sides of the surface [12,13]. This dual feature enables STAR-RISs to build a genuinely full-space controlled radio environment, providing wider coverage, better design flexibility, and improved performance for next-generation wireless networks.
The intrinsic connection between the transmission and reflection coefficients of realistic STAR-RIS topologies makes ensuring safe transmission in STAR-RIS-enabled networks difficult. In full-space mutual eavesdropping, where both users and eavesdroppers receive signals from the same surface, this coupling makes it challenging to concurrently optimize the BS beamformers and STAR-RIS phases [14,15]. Consequently, the non-convex secrecy-rate maximization problem arising from linked phase constraints and multiuser fairness requirements is beyond the capabilities of conventional RIS optimization techniques [16,17]. In order to effectively utilize the STAR-RIS’s capacity to send and reflect signals concurrently, an effective optimization framework is required to prevent information loss.
Metaheuristic optimization techniques have gained popularity for handling highly non-convex and large-scale optimization problems in wireless communications, where traditional analytical methods are generally unfeasible. Among these approaches, the Starfish Optimization (SFO) algorithm has recently emerged as a bio-inspired population-based strategy that replicates starfish hunting, mobility, and regeneration behaviors. Because of its simple form and low implementation complexity, SFO may strike a balance between global exploration and local exploitation, making it appropriate for complicated engineering problems involving several coupled variables.
Despite these benefits, the typical SFO approach has a few drawbacks when used to severely limited communication system optimization situations. For instance, its exploitation phase may experience premature convergence in strongly coupled search spaces, and its inflexible interaction method may hinder adaptability to changing system conditions. These disadvantages become more obvious in STAR-RIS-assisted secure communication systems, where linked transmission–reflection coefficients, secrecy restrictions, and full-space signal propagation cause substantial interdependencies among optimization variables. As a result, there is a need to upgrade the conventional SFO framework with problem-aware procedures that improve convergence stability, robustness, and solution quality while minimizing algorithmic complexity.
Bio-inspired intelligence has evolved as an effective paradigm for addressing complicated, nonlinear, and high-dimensional optimization challenges in current wireless communication systems. Biomimetics, in particular, uses behavioral mechanisms found in natural creatures to develop adaptive and durable optimization algorithms. Motivated by this approach, the suggested work is inspired by a starfish’s biological properties, which include decentralized decision-making, adaptive foraging, and its regenerating ability in dynamic situations. These characteristics are particularly appropriate for modeling resource allocation and configuration issues in STAR-RIS-assisted networks, where several linked variables, stringent physical limits, and quickly changing channel conditions coexist.
In this regard, the proposed Enhanced Starfish Optimization algorithm (ESFO) converts fundamental biological behaviors of starfish into algorithmic operators that govern exploration and exploitation in the optimization process. The preying behavior is linked to global and local search processes that allow for efficient exploration of the solution space, whereas the regeneration and interaction methods reflect the starfish’s ability to recover from adverse conditions and adapt through collective behavior. By incorporating these biomimetic principles into the optimization of beamforming and coupled STAR-RIS coefficients, the proposed framework not only improves secrecy performance but also demonstrates how biologically inspired intelligence can effectively address emerging challenges in intelligent wireless communication systems, thus aligning the manuscript with the core scope of biomimetics research.

1.1. Related Work

A wide range of studies have looked into how RISs can increase achievable rates. The study in [18] investigated an adaptive clustering strategy for RIS installations in environments with blockages or weak propagation circumstances. To address such limitations, the authors proposed a self-organized RIS-assisted (SORA) system that improves transmission capacity by dynamically changing RIS behavior. However, when channels are significantly damaged, a single RIS may be insufficient to ensure consistent communication between the base station and user equipment. To solve this constraint, the authors presented a cluster-based RIS cooperation approach (C-RCA) in which multiple RIS units collaborate by progressively reflecting signals across clusters, increasing link robustness and overall system performance.
In another line of study, the authors of [19] concentrated on maximizing the achievable rate in uplink multiantenna IoT systems enabled with RISs. Their work optimized RIS phase settings, transmit power distribution, and BS beamforming in cases involving a large number of mobile IoT devices. Because these parameters are continuous and the objective is not concave, the joint optimization job was defined as a Markov decision process. A deep deterministic policy gradient (DDPG) reinforcement learning technique was then used to find the best control actions, followed by a safe action-shaping procedure to assure viable judgments.
Physical Layer Security (PLS) and RIS-assisted PLS in wireless communication systems have been the subject of various studies over the past few years (see [20,21,22,23,24,25] and the included references). For example, the authors of [20] concentrated on maximizing artificial noise power and RIS phase shifts in order to secure RIS-aided multiuser massive MIMO systems. In the meantime, ref.
[21] proposed virtual partitioning of RIS components to maximize secrecy capacity under rate restrictions and improve physical layer security. In order to confirm increased secrecy rates by RIS incorporation in the system, the authors of [22] jointly optimized transmit precoding, fake noise covariance, and RIS phase shifts. Additionally, the RIS phase-shift design and hybrid beamforming design were implemented in [23] to improve the system sum secrecy rate.
The authors of [24] used the Taylor series approximation to maximize secrecy rate and minimize power in a single-user/eavesdropper multiple-input multiple-output (MIMO) system. In order to maximize secrecy rates in single-user MIMO simultaneous wireless information and power transfer systems, an imprecise block coordinate descent method was used in [25]. Authors in [26] examined how to maximize the secrecy rate in single-cell multiple-input single-output (MISO) networks while taking the minimal collected energy constraint into account. In order to maximize secrecy throughput in wireless-powered communication networks, the primal decomposition method was applied [27].
On the other hand, RIS-assisted PLS systems have been studied in [28,29,30,31], especially under various imperfect CSI situations. For example, utilizing low-resolution programmable reflecting elements in an RIS for multiantenna access points serving single-antenna users amid multiple eavesdroppers, the authors of [28] suggested cooperative solutions for secure communications. In the meantime, ref. [29] presented a secure multicast communication system that uses RISs to thwart jammers and eavesdroppers during multiuser transmission. The application of active RISs to maximize worst-case secrecy rates and weighted sum secrecy rates under various imperfect CSI situations was examined in the analysis carried out in [30]. In [31], however, the authors presented an RIS-assisted MIMO secure communication system that maximizes ergodic secrecy rates through a joint optimization approach under statistical CSI and derivations based on random matrix theory.
In particular, the authors of [32] investigated a STAR-RIS-assisted MIMO network to optimize the weighted sum rate through an energy splitting (ES) scheme, and [33] developed customized schemes for the ES protocol and optimized training patterns for the time switching (TS) protocol to achieve effective uplink channel estimation in STAR-RIS-assisted two-user systems.
Since then, a number of studies have expanded STAR-RIS applications to include PLS approaches in secure communication systems.
In order to reduce full-space mutual eavesdropping, the authors of [34] presented a STAR-RIS-assisted secure communication system that optimizes coupled phase-shift coefficients using a penalty-based secrecy beamforming method. In a similar vein, ref. [35] investigated a number of transmission protocols, such as ES, mode switching (MS), and TS, and suggested coupled beamforming and transmission/reflection coefficient tuning to maximize the weighted sum secrecy rate. Additionally, ref. [36] used STAR-RIS to modify the electromagnetic environment, allowing genuine users and the BS to communicate securely while accounting for the full and statistical CSI of eavesdroppers. Although it lacked a robust beamforming architecture, ref. [37] assessed secrecy performance while taking residual hardware defects into account.
The Star Fish Optimization (SFO) algorithm is a recently developed bio-inspired metaheuristic optimization technique, first introduced by Zhong et al. [38]. Drawing from the natural behaviors of starfish, such as their exploration for food, preying mechanisms, and regenerative abilities, the SFO algorithm is presented to address complex global optimization problems in the search space. As a population-based algorithm, it simulates a group of starfish agents navigating the solution space to find optimal or near-optimal solutions.
The SFO algorithm is formulated by initializing a population of agents randomly within the search bounds, then updating positions based on fitness evaluations as it operates through two primary phases: exploration and exploitation, inspired by starfish ecology. In the exploration phase, agents employ a hybrid strategy combining multidimensional searches involving vector-based movements that mimic broad environmental scanning. The exploitation phase incorporates a two-directional search and special movement patterns, reflecting starfish preying and regeneration behaviors [39]. Preying captures prey from opposite directions while regeneration is adapted from suboptimal states. This enables focused refinement around promising areas, with regeneration mechanisms helping to escape stagnation [40].
As mentioned in the original SFO study, the technique was tested on ten real-world engineering optimization issues and outperformed numerous benchmark methods [38].
SFO and its variants have been applied to diverse fields, leveraging its balance of exploration and exploitation for complex, real-world optimization. In smart cities, the SFO algorithm was adopted for tuning the hyperparameters of deep learning frameworks (e.g., CNN-BiGRU-CrAM) and for detecting intrusions within IoT networks [41]. Also, a discrete SFO version was developed for solving the routing of the traveling salesman problem to achieve shorter tours in logistics and graph applications [42]. Additionally, an enhanced SFO variant was presented and applied for ultra-wideband indoor positioning to refine back propagation neural networks [43]. The SFO algorithm was utilized and integrated with machine learning for mine water identification models using Kolmogorov–Arnold networks, enhancing accuracy in laser-induced fluorescence data analysis [44]. Different successful implementations of the SFO were presented such as fuel cell parameter estimation [45], economic emission dispatch [46], virtual power plant optimization with mobile storage considering renewable energy uncertainty [47], and energy management in graph attention fusion networks [48]. These diverse applications underscore the SFO algorithm’s versatility, efficiency and applicability. However, research has quickly progressed to enhancements addressing limitations like slow convergence or local optima trapping [43].

1.2. Research Motivation

The emergence of STAR-RIS technology opens up new possibilities for constructing fully programmable wireless environments by allowing signals to be transmitted and reflected simultaneously across the space domain. However, the real implementation of STAR-RIS involves coupled phase-shift limitations, complicating system design and limiting the effectiveness of traditional optimization approaches. At the same time, providing secure communication has become more difficult due to the broadcast nature of wireless channels and the presence of full-space mutual eavesdropping. These characteristics necessitate innovative optimization frameworks capable of constructing transmit beamforming and STAR-RIS coefficients simultaneously while respecting the intrinsic coupling structure. Existing convex or learning-based approaches frequently struggle with the ensuing substantially non-convex and multidimensional search space, highlighting the need for an efficient, adaptable, and robust optimization strategy. Motivated by the limitations of the standard SFO exploitation strategy, particularly its heavy reliance on the global best solution and reduced population diversity during later iterations, this study proposes an ESFO algorithm.

1.3. Main Contributions

This paper extends the original SFO by making specific improvements to overcome its shortcomings when used in STAR-RIS-assisted secure communication optimization situations. To maximize secrecy performance, the suggested technique develops the BS beamforming vectors and STAR-RIS coefficients simultaneously under practical coupling limitations. The proposed ESFO introduces an adaptive, fitness-based interacting mechanism within the exploitation phase, allowing starfish to adjust their movements based on collective fitness information rather than solely following the best individual. By probabilistically combining the original two-directional preying behavior with interaction-based local intensification and stochastic peer perturbations, ESFO strengthens exploitation accuracy while maintaining sufficient diversity. This improvement improves robustness against premature convergence while maintaining the original SFO’s simplicity and computing efficiency without the need for additional control parameters. The main contributions of this work can be stated as follows:
  • A new optimization framework for STAR-RIS-assisted secure communication is created, taking into consideration the coupled transmission–reflection phase-shift limitations.
  • A novel ESFO is proposed to efficiently address the ensuing highly non-convex secrecy-rate maximization issue.
  • To improve physical layer security under full-space mutual eavesdropping, BS beamforming and STAR-RIS coefficients are jointly optimized.
  • Comprehensive performance comparisons with established benchmark algorithms (standard SFO [38], DO [49], NNA [50,51], CAOA [52], and WSO [53,54]) show that the ESFO produces consistently superior secrecy rates.
  • Extensive simulations demonstrate the resilience, convergence behavior, and superiority of ESFO in coupled STAR-RIS systems with practical discrete phase resolutions.
The paper’s remaining sections are organized as follows: The system model is presented in Section 2. The construction of ESFO for an optimal coupled phase shift of STAR-RIS elements is described in Section 3. The simulation results to verify the effectiveness of the suggested strategy are included in Section 4Section 5 concludes with a presentation of the study’s findings.
Notation: Matrices and column vectors are shown by bold uppercase and lowercase letters, respectively. The symbols X 1 , X H , X T , and X stand for the inverse, conjugate transpose (Hermitian), transpose, and pseudo-inverse of a matrix X . The trace of matrix X is shown by the operator tr ( X ) and the Euclidean norm is represented by · . A circularly symmetric complex Gaussian vector with mean μ and covariance matrix Γ is represented by a random vector x CN ( μ , Γ ) . The set of all complex numbers is represented by the symbol C , whereas complex matrices and column vectors of dimensions N × M and N × 1 are denoted by C N × M and C N × 1 , respectively. The M × M identity matrix is denoted by  I M .

2. System Model

2.1. Communication Scenario and Channel Setup

We consider a secure downlink communication system in which a multiantenna BS, equipped with N b antennas, serves two authorized single-antenna users. One user is positioned on the transmission side of a STAR-RIS, known as the T-user, and the other on the reflection side, referred to as the R-user. Two single-antenna eavesdroppers, Ev 1 and Ev 2 , are situated near the T-user and R-user, respectively (as shown in Figure 1).
A STAR-RIS consisting of L passive elements is installed between the BS and the users to overcome obstruction and allow full-space signal modification. Due to barriers or extreme attenuation, the direct BS-to-user and BS-to-eavesdropper lines are presumed to be unavailable or negligible, so all communication is routed through the STAR-RIS. The BS-RIS channel is represented as G C L × N b , while the RIS-receiver links are denoted as g t , g r , g e 1 , g e 2 C L × 1 , corresponding to the T-user, R-user, Ev 1 , and Ev 2 , respectively. All channels follow a Rayleigh fading model and the perfect channel state information is assumed for analytical tractability.

2.2. Modeling of STAR-RIS Coupled Coefficients

A STAR-RIS consists of passive electromagnetic elements designed to simultaneously transmit and reflect the incident signal, allowing for full-space wireless coverage. The impinging electromagnetic wave is divided into two components for each STAR-RIS element: transmitted and reflected. This exclusive capability distinguishes STAR-RIS from traditional reflecting-only RIS and provides additional design flexibility.
The transmission and reflection responses of the -th STAR-RIS element are defined by complex coefficients
γ ( t ) = ρ ( t ) e j ψ ( t ) , γ ( r ) = ρ ( r ) e j ψ ( r ) ,
where ρ ( t ) and ρ ( r ) are the transmission and reflection amplitudes of element, respectively, whereas ψ ( t ) and ψ ( r ) identify the corresponding phase shifts introduced by the STAR-RIS element.
Due to practical STAR-RIS implementations being passive and lossless, the transmission and reflection coefficients are not mutually exclusive. Specifically, the total power spread by each element must be conserved, giving rise to the following energy-splitting constraint
ρ ( t ) + ρ ( r ) = 1 , = 1 : L .
Furthermore, electromagnetic boundary constraints dictate a deterministic phase connection between the transmitted and reflected components. As a result, the phase shifts are intrinsically related and must meet the following phase-coupling constraint
ψ ( t ) ψ ( r ) = π 2
This constraint reflects the fact that the transmitted and reflected waves have a fixed phase offset, which considerably limits the possible design space for STAR-RIS coefficients. The diagonal matrices indicate that the STAR-RIS’s collective transmission and reflection behaviors are
Γ t = diag γ 1 ( t ) , , γ L ( t ) , Γ r = diag γ 1 ( r ) , , γ L ( r ) ,
which describe the combined amplitude and phase responses of all STAR-RIS elements for the transmission and reflection links, respectively. These matrices shape the end-to-end channels and have a direct impact on the system’s secrecy performance.

2.3. Signal Model

The BS delivers two confidential information-bearing symbols, x t and x r , intended for the T-user and R-user, respectively. These symbols are linearly precoded using beamforming vectors w t and w r C N b × 1 , where each symbol is assumed to have unit average power, i.e., E { | x t | 2 } = E { | x r | 2 } = 1 . The overlaid transmit signal emitted by the BS can thus be represented as
s = w t x t + w r x r , C N b × 1
which is subject to the total transmit power constraint discussed below. The received signal at a generic receiver χ { t , r } , which represents either the T-user or the R-user, after passing via the BS–STAR-RIS channel and being reshaped by the STAR-RIS coefficients, is given by
y χ = g χ H Γ χ G s + n χ , C 1 × 1
where G stands for the BS-to-STAR-RIS channel, g χ for the STAR-RIS-to-receiver channel, and Γ χ for the STAR-RIS transmission or reflection matrix, depending on the receiver’s position. Additive white Gaussian noise with a zero mean and variance σ 2 is modeled by the term n χ . By interpreting the unwanted signal as interference, each authorized user decodes its intended message.
With respect to STAR-RIS’s full-space radiation feature, passive eavesdroppers are inevitably able to detect confidential signals. The received signal at eavesdropper e k , k { 1 , 2 } , is expressed as
y e k = g e k H Γ η ( k ) G s + n e k ,
g e k represents the channel between the STAR-RIS and the k-th eavesdropper and η ( k ) { t , r } specifies whether the eavesdropper is located on the transmission or reflection side of the STAR-RIS. Similarly to legal users, the noise term n e k is treated as additive white Gaussian noise with variance σ 2 .
The achievable rate for the authorized user χ can be written as follows using the signal expressions mentioned above
R χ = log 2 1 + | g χ H Γ χ G w χ | 2 | g χ H Γ χ G w χ ¯ | 2 + σ 2 ,
where χ ¯ represents the unwanted user’s index ( χ { t , r } and χ ¯ { t , r , χ ¯ χ } ). Similarly, the rate at which the message meant for user χ can be decoded by eavesdropper e k is given by
R e k , χ = log 2 1 + | g e k H Γ χ G w χ | 2 | g e k H Γ χ G w χ ¯ | 2 + σ 2 .
Lastly, the non-negative difference between the highest rate that eavesdroppers may achieve and the genuine user rate is the secrecy rate that user χ can achieve. This is written as
C χ = R χ max R e 1 , χ , R e 2 , χ + .
where [ a ] + = max { a , 0 } .

2.4. Secure Joint Optimization Framework

By simultaneously adjusting the BS beamforming vectors and the STAR-RIS transmission/reflection parameters, we aim to ensure secure connection for both users. Our goal is to maximize the two legitimate users’ minimal secrecy rates. The formulation of the optimization problem is
max w t , w r , Γ t , Γ r min C t , C r
s . t . w t 2 + w r 2 P max ,
ρ ( t ) + ρ ( r ) = 1 , ,
ψ ( t ) ψ ( r ) = π 2 , ,
0 ρ ( t ) , ρ ( r ) 1 , ψ ( t ) , ψ ( r ) [ 0 , 2 π ) .
where P m a x denotes the transmit power budget at the BS, and (9b) refers to the overall power consumption constraint at the BS, whereas (9c) and (9d) represent the amplitude and phase-shift coupling constraints at the STAR-RIS, respectively.
The coupled STAR-RIS constraints, multiuser secrecy requirements, and joint BS-RIS design make this optimization issue highly non-convex, requiring the application of sophisticated global optimization techniques such as the proposed ESFO.

3. Proposed ESFO

3.1. Standard SFO

The SFO algorithm, introduced by Zhong et al. in 2025, is a bio-inspired metaheuristic that simulates starfish behavior via exploration and exploitation phases [38]. The exploration phase features a hybrid strategy of multidimensional searches, while the exploitation phase employs two-directional searching and regeneration mechanisms to refine solutions [55].

3.1.1. Step 1: Initialization

An initial population of starfish positions is generated X C N S F × D uniformly within the search space:
X i , j = l j + r 1 × ( u j l j ) ; i = 1 : N S F , j = 1 : D
where X i , j indicates the position of each starfish (i) considering the D-dimension while the population matrix of starfish positions is denoted by (X). Also, r 1 refers to a randomized value while the maximum and minimum bounds of each dimension j are symbolized by l j and u j . Then, the fitness of each starfish is estimated as f ( X i ) and the current best starfish ( X B s t ) is extracted.

3.1.2. Step 2: Exploration Phase

In this stage, a multidimensional search strategy is modeled by randomly selecting five dimensions representing the starfish’s five arms. Consequently, those dimensions are updated using a sine/cosine-based movement toward the global best:
X n e w i = X i + a 1 × ( X B s t X i ) × cos ( θ ) , if r 2 0.5 X i + a 1 × ( X B s t X i ) × sin ( θ ) , Else
Here, r 2 denotes independent random variables uniformly distributed in the interval ( 0 , 1 ) X n e w i illustrates the new position of the starfish (i) that upgrades its old position ( X n e w i ), and a 1 is the expansion coefficient controlling step magnitude while θ is the search angle controlling rotation based on the iteration ratio as follows:
a 1 = π × ( 2 r 3 1 )
θ = π 2 × 1 t t M X
where t and t M X are the current iteration number and its maximum count. r 3 denotes independent random variables uniformly distributed in the interval ( 0 , 1 ) .

3.1.3. Step 3: Exploitation Phase

In this phase, each starfish can follow preying or regeneration behavior. In the first behavior, starfish perform a parallel two-directional search where five distances are computed between the best starfish and five randomly selected starfish:
D i s t m = X B s t X i ; m = 1 , 2 , 3 , 4 , 5 and i = r a n d i ( 1 , N S F )
where D i s t m is the distance vector between global best and selected starfish (i). After that, only two distances are randomly chosen and the starfish position is updated by moving toward these directions:
X n e w i = X i + r 4 × D i s t m 1 + r 5 × D i s t m 2
where r 4 and r 5 are randomized values. This preying behavior encourages intensified local search while maintaining stochastic diversity.
In terms of the regeneration behavior, the worst starfish undergoes a regeneration process:
X n e w i = X W × e t N S F t M X
where X W indicates the worst starfish that has the highest objective. This simulates slow arm regeneration and introduces new genetic material into the population. This gradually pulls it toward the origin, enabling exploration of new areas.
In the SFO algorithm, the control between exploration and exploitation throughout the optimization process is implemented via a regulating parameter ( G P ). It represents the probability of activating the exploration phase, while 1-GP determines the likelihood of executing the exploitation. In this study, G P is set to 0.5, ensuring an equal probability of exploration and exploitation, which provides a balanced search behavior without introducing additional tuning complexity. This probabilistic control mechanism allows the SFO algorithm to dynamically alternate between global and local search modes, contributing to its robust convergence performance across different optimization problems.

3.1.4. Step 4: Boundary Control

In this phase, corrective boundary rules are applied for the control variables to ensure thwy stay within bounds after exploitation updates as follows:
X n e w i = X n e w i , if X n e w i l i u i , if X n e w i u i
then, the new fitness values are estimated for the new starfish positions, and the global best starfish is upgraded. Steps 2–4 are iterated multiple times until the process stops when the maximum number of iterations is reached. Algorithm 1 states the Pseudocode of the standard SFO.

3.2. Proposed Enhanced Version of SFO (ESFO)

In the typical SFO, exploitation is managed by a two-way preying mechanism as given in Equation (15), which is supplemented by a regeneration cycle performed to the lowest-performing person, as indicated in Equation (16). An enhanced exploitation framework is suggested for augmenting the typical SFO local search capacity. This change strengthens intensification, increases solution variation in attractive areas, and reduces the risk of early convergence by introducing an adaptable, fitness-based interacting method during the exploitation stage.
In the proposed ESFO, the exploitation phase is probabilistically divided into two complementary modes controlled by a uniformly distributed random variable. For each starfish, the algorithm selects between the standard preying behavior and a fitness-guided interaction mechanism:
X n e w i = Apply Equation ( 16 ) via standard SFO , if r 6 0.5 Apply proposed fitness - based interaction , Else
Here, r 6 denotes a random variable uniformly distributed in the interval ( 0 , 1 ) . The proposed fitness-based interaction mechanism adaptively adjusts the search direction of each solution according to its relative fitness with respect to the current population, thereby enhancing exploitation while avoiding premature convergence. This probabilistic branching introduces adaptive behavior without adding extra control parameters.
Algorithm 1 Standard SFO.
Require: 
Objective function f ( · ) ; population size N SF ; problem dimension D; lower and upper bounds l , u ; maximum number of iterations t max ; exploration probability G P
Ensure: 
Best solution X Bst and best fitness value f ( X Bst )
1:
Generate the initial population of starfish positions using Equation (1).
2:
Evaluate the fitness of each starfish f ( X i )
3:
Identify the current best starfish position X B s t .
4:
for  t = 1 to t M X  do
5:
    Generate a random number r ( 0 , 1 )
6:
    if  r < G P  then                                    ▹ activate the exploration phase
7:
        for  i = 1 to N SF  do
8:
           Compute rotation angle θ using Equation (3)
9:
           Compute expansion coefficient a 1 using Equation (4)
10:
         Update selected dimensions of X i using Equation (2)
11:
        end for
12:
    else                                        ▹ activate the exploitation phase
13:
        for  i = 1 to N SF  do
14:
           Randomly select five distinct dimensions corresponding to the starfish arms
15:
           Compute distance vectors using Equation (5)
16:
           Randomly select two distance vectors
17:
           Update each starfish position using the preying rule given in Equation (6).
18:
           Identify the worst-performing starfish X W
19:
           Apply regeneration process to X W using Equation (7)
20:
        end for
21:
    end if
22:
    Apply boundary constraints to all updated starfish positions using Equation (8).
23:
    Evaluate the fitness of the updated population.
24:
    Update the global best starfish X B s t if a better solution is found.
25:
end for
26:
return the best solution X B s t and its fitness value.
When the fitness-based interacting method is activated, a cumulative interaction vector D X i is constructed by aggregating the relative influence of all starfish in the population:
D X i = j = 1 N S F X j ( V C × X i ) × s i g n ( f i f j )
where f i and f j denote the fitness values of starfish i and j, s i g n ( · ) controls attraction toward better solutions and repulsion from inferior ones, and V C is a randomly generated interaction coefficient introducing stochastic perturbation as follows:
V C = r o u n d ( 1 + r 6 + r 1 )
where r 6 and r 7 denote two random values inside range [ 0 , 1 ] . This formulation enables collective learning by allowing each starfish to adapt its movement direction based on the fitness landscape. Also, two update rules are employed using the interaction vector D X i .
X n e w i = X B s t + ϵ D X i N S F , if r 7 0.1 X B s t + ϵ ( X R X M ) , Else
where ϵ ( 0 , 1 ) D is a random vector; ⊙ denotes element-wise multiplication; and X R and X M are two random starfish solutions that are unequally selected.
The upper rule is the intensified local exploitation that is activated with a small probability of 10% while the bottom rule illustrates the peer-based stochastic perturbation with a higher probability of 90%.
As shown, the proposed modification transforms the exploitation phase of SFO into a hybrid intensification framework that combines directional convergence toward the global best, fitness-aware collective interactions, and stochastic peer-based perturbations. This design enhances exploitation accuracy while maintaining sufficient diversity, thereby improving convergence stability and reducing the likelihood of stagnation in local optima. Moreover, the enhancement does not introduce additional control parameters, preserving the simplicity and usability of the original SFO. The ESFO steps are shown in Algorithm 2.
Algorithm 2 Proposed ESFO.
Require: 
Objective function f ( · ) ; population size N SF ; problem dimension D; lower and upper bounds l , u ; maximum number of iterations t M X ; exploration probability G P
Ensure: 
Best solution X Bst and best fitness value f ( X Bst )
1:
Generate the initial population of starfish positions using Equation (1)
2:
Evaluate the fitness of each starfish f ( X i )
3:
Identify the current best starfish position X B s t
4:
for  t = 1 to t M X  do
5:
    Generate a random number r ( 0 , 1 )
6:
    if  r < G P  then                                    ▹ activate the exploration phase
7:
        for  i = 1 to N SF  do
8:
           Compute rotation angle θ using Equation (3)
9:
           Compute expansion coefficient a 1 using Equation (4)
10:
         Update selected dimensions of X i using the sine/cosine-based exploration rule in Equation (2)
11:
        end for
12:
    else                                      ▹ activate the exploitation phase (ESFO)
13:
        for  i = 1 to N SF  do
14:
           Generate a random number r e ( 0 , 1 )
15:
           if  r e > 0.5  then                                     ▹ standard SFO exploitation
16:
               Randomly select five distinct dimensions corresponding to the starfish arms
17:
               Compute distance vectors between the global best and the selected starfish using Equation (5)
18:
               Randomly select two distance vectors
19:
               Update each starfish position using the two-directional preying rule given in Equation (6)
20:
           else                                   ▹ fitness-guided interaction mechanism
21:
               Compute the interaction coefficient V C using Equation (11)
22:
               Compute the cumulative interaction vector DX i using Equation (10)
23:
               Generate a random number r 7 ( 0 , 1 )
24:
               Update the starfish position using the enhanced exploitation rule in Equation (12)
25:
           end if
26:
           Identify the worst-performing starfish X W
27:
           Apply regeneration process to X W using Equation (7)
28:
        end for
29:
    end if
30:
    Apply boundary constraints to all updated starfish positions using Equation (8)
31:
    Evaluate the fitness of the updated population
32:
    Update the global best starfish X B s t if a better solution is found
33:
end for
34:
return the best solution X B s t and its fitness value
Table 1 compares the structural differences between the original SFO and proposed ESFO. As demonstrated, the proposed ESFO’s update rule incorporates two complementary components: (i) a bounded stochastic exploration term responsible for maintaining diversity in early stages; (ii) a fitness-weighted attraction term that strengthens directional movement toward high-secrecy configurations; and (iii) adaptive control parameters that dynamically adjust the balance between these components as iterations progress. This hierarchical transition mechanism explains the enhanced convergence stability and statistically superior confidence intervals over the original SFO.

4. Numerical Results

This section presents numerical simulations to assess the performance of the proposed ESFO method. Figure 1 shows a three-dimensional Cartesian coordinate system with a BS at (0, 0, 0) m and a STAR-RIS with L passive elements deployed at (50, 0, 0) m. The intended users on the transmission and reflection sides are positioned at (50, 5, 0) m and (50, −5, 0) m, respectively, whereas the two eavesdroppers Ev 1 and Ev 2 are located at (50, 10, 0) m and (50, −10, 0) m.
The channel modeling takes into account both small-scale fading effects and large-scale path loss. In particular, the BS–STAR-RIS channel G and the STAR-RIS–receiver channels g t , g r , g e 1 , and g e 2 are modeled as Rayleigh fading channels with distance-dependent attenuation. They can be written as h = L 0 d α h ˜ , where h ˜ represents the small-scale fading component with independent and identically distributed complex Gaussian entries with zero mean and unit variance. In this case, d is the matching link distance, α is the path-loss exponent, and L 0 is the reference path loss at a unit distance. The reference path loss in the simulations is set to L 0 = 30 dB, the BS–STAR-RIS link’s path-loss exponent is selected as α BS = 2.2 , and the STAR-RIS-to-user and STAR-RIS-to-eavesdropper links are defined by α T , S = α R , S = α E 1 , S = α E 2 , S = 2.5 . The convergence threshold is set to ε th = 10 3 , the noise power is fixed at σ 2 = 105 dBm, and the algorithm-related parameters are chosen as c 1 = c 2 = 0.99 . Additionally, to guarantee statistically reliable performance evaluation, all numerical results are averaged over 100 independent realizations.
To evaluate the effectiveness of the proposed ESFO algorithm, simulation results are divided into four parts. First, a statistical comparison is performed by calculating the mean, maximum, minimum, and standard deviation of the objective values obtained by the proposed technique and numerous benchmark algorithms. Second, box plots and histograms are used to provide a thorough visual representation of the performance distribution, emphasizing the proposed algorithm’s robustness and superiority. Third, convergence curves are shown to illustrate convergence behavior and show that the suggested methodology has a faster convergence speed than competing methods. Finally, the suggested ESFO algorithm achieves significant performance increases, as measured by its achievable rate performance.
All simulations were carried out using MATLAB R2022a. The experiments were executed on the a workstation with an Intel Core i7 CPU (3.6 GHz) and 16 GB RAM, running Windows 11 (64-bit). All algorithms were developed in identical software and hardware conditions to ensure fair computational comparison and reproducibility of the reported findings.

4.1. Statistical Outcomes

Table 2 shows the statistical findings of the proposed ESFO method versus CAOA, DO, NNA, standard SFO, and WSO under various transmit power constraints P max . It has been observed that ESFO consistently delivers the highest mean secrecy performance, with relative improvements of up to several tens of percent compared to the benchmark algorithms at all power constraint levels. In particular, when compared to CAOA and DO, ESFO gives an average performance improvement of 15–30%, outperforming NNA and WSO by 10–25%, demonstrating its superior optimization capabilities. Compared to the standard SFO, the suggested approach results in an extra 8–15% improvement, demonstrating the efficacy of the proposed fitness-guided interaction and adaptive exploitation mechanisms. Furthermore, ESFO’s minimum secrecy values are much greater than those of competing approaches, suggesting increased robustness and reduced performance deterioration, while the maximum values show that ESFO is capable of achieving superior global solutions. Although a slight rise in standard deviation is observed at higher power levels, this behavior reflects ESFO’s improved exploration ability, which effectively prevents premature convergence.
Figure 2 illustrates the average objective function values for CAOA, DO, NNA, standard SFO, ESFO, and WSO at various transmit power levels ( P max = [ 20 : 70 ] dBm). As power constraints grow, all algorithms begin to increase in their objective values. However, performance changes at P max = 30 dBm as the objective value decreases. This occurs because as the power constraint is increased, the achievable rate of intended users and eavesdroppers grows as well. The suggested ESFO consistently outperforms all existing algorithms in average objective values across the whole power range. In particular, ESFO provides an average improvement of 10–20% over CAOA and DO, 8–15% over NNA and WSO, and 5–10% over standard SFO at medium and high power levels. These relative improvements become more evident as transmit power increases, proving ESFO’s effectiveness in utilizing the expanded possible area and verifying its better optimization capabilities in STAR-RIS-assisted secure communication systems.

4.2. Performance Analysis

Figure 3 depicts box plots of the objective function values acquired by CAOA, DO, NNA, standard SFO, ESFO, and WSO across 100 independent runs. The suggested ESFO algorithm has the greatest median value of any approach, but its interquartile range is reduced by around 20–35% when compared to CAOA, DO, and NNA, showing increased stability. Furthermore, the spread between the minimum and maximum values of ESFO is significantly narrower than that of the benchmark algorithms, indicating greater resistance to random initialization.
Figure 4 presents the histogram distributions of the objective function values acquired by CAOA, DO, NNA, standard SFO, ESFO, and WSO across 100 independent runs for a range of power constraints (20 to 45 dBm). Results indicate that the proposed ESFO algorithm generates a highly concentrated distribution around higher objective values, with more than 65–75% of runs falling within the top performance range. In contrast, the benchmark algorithms have broader distributions, with a major fraction of their outputs pushed toward lower goal values. Specifically, ESFO raises the likelihood of achieving high-quality solutions by 20–30% when compared to CAOA and DO, and by 10–20% when compared to NNA, SFO, and WSO. This tighter distribution and increased occurrence of near-optimal solutions illustrate ESFO’s durability and reliability, demonstrating its exceptional ability to regularly achieve high-performance solutions in STAR-RIS-assisted secure communication optimization issues.

4.3. Comparative Convergence Analysis

Figure 5 compares the average convergence behavior of the proposed ESFO technique to standard SFO, DO, CAOA, NNA, and WSO. All algorithms show rapid improvement during the initial iterations; however, ESFO converges faster and achieves a higher goal value with fewer iterations. In particular, ESFO achieves near-stable convergence in around 40–50% fewer iterations than CAOA and DO, and 25–35% fewer iterations than NNA and WSO. Compared to the traditional SFO, the suggested modifications allow ESFO to accelerate convergence by about 15–20% while avoiding premature stagnation. These findings demonstrate that the adaptive exploitation and fitness-guided interaction mechanisms built into ESFO successfully balance exploration and exploitation, resulting in faster and more consistent convergence in STAR-RIS-assisted secure communication optimization.

4.4. Achievable Rates

Table 3 compares the proposed ESFO algorithm’s achievable rates to those reached by CAOA, DO, NNA, standard SFO, and WSO at various transmit power thresholds P max = [ 20 , 30 , 50 ] dBm. It shows the achievable secrecy rates for legitimate T-users and R-users, indicating the most reliable transmission rates while maintaining confidentiality from prospective eavesdroppers. As expected, the achievable rates of all algorithms rise with available transmit power as signal strength improves and the feasible solution space expands. Nonetheless, ESFO regularly obtains the highest possible rates at all power levels. At P max = 20 dBm, ESFO increases the achievable rate by around 8–15% compared to CAOA and DO, and by about 5–10% compared to NNA and WSO. When the power threshold is raised to P max = 30 dBm, the performance advantage of ESFO becomes more obvious, reaching 12–20% over CAOA and DO, and roughly 8–12% over standard SFO. At high transmit power ( P max = 50 dBm), ESFO maintains a distinct performance advantage, achieving up to 20–25% higher attainable rates than the weakest-performing benchmarks while beating regular SFO by 10–15% on average. These findings show that the proposed ESFO algorithm successfully utilizes higher power resources and provides significant performance improvements in STAR-RIS-assisted secure communication systems.

4.5. Robustness, Variability and Confidence Interval Analysis

The robustness of the compared algorithms was evaluated. Also, two recent algorithms (ECO, SSO) were additionally implemented in this evaluation. The Educational Competition Optimizer (ECO) is a recently introduced metaheuristic algorithm proposed in 2024 by J. Lian et al. [56]. It is conceptually inspired by the hierarchical and competitive dynamics observed across different educational stages—namely elementary, middle, and high school levels. ECO models the progressive intensification of competition, where the number of participants decreases while performance pressure increases, by structuring the optimization process into three sequential phases. This staged mechanism enables a balance between exploration and exploitation throughout the search process. Owing to its robust search capability, ECO has been successfully deployed in a variety of engineering applications, including constrained optimization problems [57,58], coordination of overcurrent relays in renewable-based microgrids [59], parameter estimation in fuel cells [60], and frequency regulation in PV-integrated power systems [61].
In parallel, the Somersaulting Spider Optimizer (SSO), introduced in 2025, represents a novel class of bio-inspired metaheuristics derived from the unique locomotion behavior of the somersaulting or flic-flac spider. This desert-adapted species exhibits the two distinct movement strategies of a rapid somersaulting motion for escape and a slower rolling motion for exploration and foraging. These strategies were mathematically abstracted within SSO to balance global exploration and local exploitation. It has demonstrated promising performance and has been successfully hybridized with machine learning techniques, particularly in enhancing predictive modeling accuracy for applications such as concrete compressive strength estimation using advanced regression models [62].
For CAOA, DO, SFO, NNA, WSO, ECO, SSO, and ESFO, the variance and coefficient of variation (CV) are reported, as shown in Table 4. As reported, ESFO clearly outperforms all competing methods in terms of robustness. At a P max of 30 dBm, the ESFO achieves the lowest variance ( 4.48 × 10 2 ) among all algorithms. Compared to CAOA, DO, SFO, NNA, and WSO, ESFO reduces variance by approximately 56.1%, 61.2%, 58.6%, 43.7%, and 69.3%, respectively. These substantial reductions confirm that ESFO exhibits significantly less dispersion in its obtained solutions, reflecting superior convergence stability.
Similarly, ESFO records the lowest coefficient of variation (CV = 0.0908), indicating the strongest robustness relative to its mean performance. In quantitative terms, ESFO improves CV by 58.2% compared to CAOA, 55.9% relative to DO, 36.4% compared to NNA, 53.1% against SFO, and 59.3% compared with WSO. This demonstrates that ESFO not only produces higher-quality solutions but does so with markedly improved consistency across repeated executions.
Beyond robustness, the 95% bootstrap confidence intervals (CIs) of the mean objective values further highlight the superiority of ESFO in this maximization problem. ESFO achieves the highest mean objective range, with a confidence interval of [2.2465, 2.3953], which is entirely separated from the intervals of all other algorithms. The lower bound of ESFO alone exceeds the upper bounds of CAOA, DO, SFO, and WSO, confirming statistically and practically superior performance.
Similar findings are attained at other threshold powers of 35, 40 and 45 dBm. Therefore, these results demonstrate that ESFO achieves the best trade-off between solution quality and robustness, delivering not only the highest objective values but also the most stable and repeatable performance among all compared algorithms. This robustness advantage is particularly important for real-world optimization problems, where consistency across runs is as critical as achieving high objective values.

4.6. Hypothesis Analysis

In order to conduct hypothesis testing, the Wilcoxon signed-rank test results across several threshold power ( P max of 30, 35, 40 and 45 dBm) scenarios are implemented, as shown in Table 5. The results confirm the statistical superiority of ESFO in most operating conditions. For a P max of 30 and 35 dBm, ESFO demonstrates consistent and statistically significant improvements over all competing algorithms, with extremely small p-values (≤9.71 × 10 5 ), indicating strong dominance and reliable convergence behavior.
At a P max of 40 dBm, ESFO maintains statistically significant superiority over DO, NNA, SFO, and WSO. However, the comparison with CAOA becomes statistically insignificant ( p = 0.147 ), suggesting comparable performance between ESFO and CAOA under this specific operating condition. This indicates that CAOA temporarily narrows the performance gap at intermediate power limits. When P max increases to 45 dBm, ESFO regains clear and statistically significant dominance over all algorithms, reaffirming its robustness and scalability under higher operating constraints. The consistently high signed-rank values in ESFO vs. WSO comparisons further highlight the strong and systematic advantage of ESFO. Thus, these results demonstrate that ESFO delivers stable, statistically significant performance gains across varying system capacities, confirming its effectiveness and robustness under different operational scenarios.

4.7. Computational Complexity and Runtime Analysis

The “Big O notation,” a widely used mathematical notation used in computer sciences [63], could be utilized to do a computational complexity analysis of metaheuristic methods. To begin, N S F represents the total number of solutions per iteration, while t M X is the maximum iteration count. The first phase representing the exploration feature simulates either the multidimensional searching or vector-based movements of the agent. Addressing this phase, the computational complexity is O ( t M X × N S F 2 × f ( x ) ) , where f ( x ) is the evaluation of the fitness function. The second phase regarding exploitation incorporates either the two-directional search or special movement patterns. The complexity part in computing this phase is O ( t M X × N S F 2 × f ( x ) ) . Consequentially, the total computational complexity records O ( t M X × N S F × f ( x ) ) . The suggested ESFO has comparable computational complexity to the other methods used (standard SFO, CAOA, DO, NNA, and WSO) in terms of Big O notation. The computational cost of these techniques for our RIS issue is O ( 2000 ) , with a population size of 20 and 100 iterations.
To supplement the theoretical analysis, actual execution times and memory usage were measured in MATLAB using the same hardware and software environments. The results are summarized in Table 6.
Table 6 displays the elapsed runtime in seconds and MATLAB memory consumption in MB for each compared algorithm. The proposed ESFO has an elapsed time of 1.3842 s, which is less than the majority of the algorithms used, including SFO, DO, CAOA, and NNA, and just slightly more than WSO, exhibiting competitive computational efficiency. In terms of memory consumption, all algorithms have similar levels (about 3298–3353 MB), with ESFO consuming 3353 MB, which is still within the same computational scale as the other approaches.
The improved resilience metrics given in the experimental section are due to the modified interaction dynamics of ESFO. First, the fitness-based interaction minimizes random drift in high-dimensional space. Second, the adaptive exploration technique reduces premature convergence. Third, a controlled search focus on high-quality regions helps to stabilize late-stage refining.
These approaches work together to reduce dispersion in final solutions over independent runs, yielding lower variance, smaller coefficients of variation, and persistent statistical dominance. As a result, the statistical improvements are more than just descriptive outcomes; they reflect structural behavioral changes in the search dynamics of the proposed ESFO algorithm.

4.8. Benchmark Validation and Scalability Analysis

To validate the ESFO and SFO’s efficiency, they are applied to three benchmark issues linked to the CEC 2017 competition [64]. The three functions are: (F1) shifted and rotated Rastrigins, (F2) shifted and rotated noncontinuous Rastrigins, and (F3) hybrid function 1 ( N = 1 ). They are evaluated with multiple dimensions of 2, 10, and 30 to investigate scalability, with each dimension’s bounds ranging from −100 to 100.
For each benchmark, 50 different runs are performed using both the proposed ESFO and the standard SFO. Table 7 shows the best, average, worst, and standard deviations. Table 7 shows that the suggested ESFO outperforms the original SFO in terms of efficacy and scalability. In the low-dimensional scenario ( D = 2 ), both algorithms attain identical optimal values for all benchmark functions (F1–F3) with zero standard deviation, demonstrating that both methods can identify the global optimum in simple search spaces.
However, as the dimensionality increases, the superiority of ESFO becomes more apparent. For D = 10 , ESFO consistently produces lower best, average, and worst values in all three functions. For example, in F1, average fitness rises from 520.4874 (SFO) to 516.4368 (ESFO), while standard deviation falls from 5.8615 to 5.1179, indicating greater robustness. Similarly, the average value of F2 is dropped from 822.7479 to 820.6951 and F3 from 1104.9692 to 1104.9072. Although the gains at D = 10 are minor, they continuously favor ESFO in terms of solution quality and stability.
The performance disparity widens dramatically at D = 30 , illustrating ESFO’s scalability advantage. In F1, the average fitness value reduces significantly from 725.9997 (SFO) to 650.8450 (ESFO), reflecting an improvement of roughly 10.35%. Similarly, for F2, the average value improves from 1022.9398 to 939.4327 (about 8.17%), and for F3, from 1317.6335 to 1262.9772 (about 4.15%). Furthermore, ESFO typically obtains lower worst-case values and lower standard deviations, particularly in F2 and F3, where the dispersion reduction suggests greater convergence stability in high-dimensional and complex environments.

5. Conclusions

This paper presents an enhanced variant of the Starfish Optimization (SFO) algorithm designed to improve the exploitation capability of the standard SFO while preserving its inherent simplicity and low parameter dependency. The modified exploitation framework enhances starfish movements by utilizing collective fitness information, improving local search accuracy and minimizing premature convergence, all without adding control parameters. This maintains the computational efficiency of the original SFO. The integration of preying behavior with the interaction-based strategy creates a hybrid mechanism that is robust and adaptable to various optimization landscapes. The obtained results demonstrate that Enhanced Starfish Optimization (ESFO) provides superior convergence behavior and solution quality compared to the standard SFO, particularly for complex, nonlinear, and multimodal optimization problems. These findings highlight the effectiveness of the proposed enhancement and confirm the potential of ESFO as a competitive and reliable optimization tool. Future work may extend ESFO to constrained and multi-objective optimization problems, as well as explore adaptive control schemes and hybridization with problem-specific heuristics to further improve performance in large-scale and real-world applications.

Author Contributions

Conceptualization, A.S.A. and A.M.S.; methodology, A.S.A.; software, A.M.S.; validation, M.G., A.S.A. and S.S.; formal analysis, A.S.A.; investigation, A.M.S.; resources, M.G.; data curation, S.S.; writing—original draft preparation, A.S.A.; writing—review and editing, A.M.S.; visualization, M.G.; supervision, S.S.; project administration, S.S.; funding acquisition, M.G. All authors have read and agreed to the published version of the manuscript.

Funding

Prince Sattam bin Abdulaziz University—PSAU/2025/01/32910.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The datasets generated during and/or analyzed during the current study are available in the https://doi.org/10.5281/zenodo.19243208 repository.

Acknowledgments

This research was funded by Prince Sattam bin Abdulaziz University grant number PSAU/2025/01/32910.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Pan, S.; Zhang, X.M. Cooperative Gigabit Content Distribution With Network Coding for mmWave Vehicular Networks. IEEE Trans. Mob. Comput. 2024, 23, 1863–1877. [Google Scholar] [CrossRef]
  2. Mehmeti, F.; Rosenberg, C. How Expensive is Consistency? Performance Analysis of Consistent Rate Provisioning to Mobile Users in Cellular Networks. IEEE Trans. Mob. Comput. 2019, 18, 1098–1115. [Google Scholar] [CrossRef]
  3. Alwakeel, A.S. Integrated approach for antenna reduction and enhanced channel estimation in massive MIMO systems using semi-passive intelligent reflecting surfaces. Phys. Commun. 2025, 72, 102793. [Google Scholar] [CrossRef]
  4. Xue, Q.; Ji, C.; Ma, S.; Guo, J.; Xu, Y.; Chen, Q.; Zhang, W. A Survey of Beam Management for mmWave and THz Communications Towards 6G. IEEE Commun. Surv. Tutor. 2024, 26, 1520–1559. [Google Scholar] [CrossRef]
  5. Minovski, D.; Ögren, N.; Mitra, K.; Åhlund, C. Throughput Prediction Using Machine Learning in LTE and 5G Networks. IEEE Trans. Mob. Comput. 2023, 22, 1825–1840. [Google Scholar] [CrossRef]
  6. Yi, X.; Li, J.; Liu, Y.; Kong, L.; Shao, Y.; Chen, G.; Liu, X.; Mumtaz, S.; Rodrigues, J.J.P.C. ArguteDUB: Deep Learning Based Distributed Uplink Beamforming in 6G-Based IoV. IEEE Trans. Mob. Comput. 2024, 23, 2551–2565. [Google Scholar] [CrossRef]
  7. Farghaly, S.I.; Ismail, M.I.; Fouda, M.M.; Alwakeel, A.S. Tight Approximation of Achievable Rates in RIS-Based Multi-User MIMO Systems Under Channel Estimation Constraints. IEEE Open J. Commun. Soc. 2025, 6, 1299–1327. [Google Scholar] [CrossRef]
  8. Tarek, Z.; Gafar, M.G.; Sarhan, S.; Shaheen, A.M.; Alwakeel, A.S. Integrating Reconfigurable Intelligent Surface and Modified Aquila Optimization for Enhancing Wireless Communication Capacity. IEEE Internet Things J. 2025, 12, 10012–10031. [Google Scholar] [CrossRef]
  9. Saad, W.; Bennis, M.; Chen, M. A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems. IEEE Netw. 2020, 34, 134–142. [Google Scholar] [CrossRef]
  10. Tarek, Z.; Gafar, M.; Sarhan, S.; Shaheen, A.M.; Alwakeel, A.S. RIS-aided jellyfish search optimization for multiuser wireless networks improvement. Veh. Commun. 2025, 51, 100863. [Google Scholar] [CrossRef]
  11. Liu, Y.; Mu, X.; Xu, J.; Schober, R.; Hao, Y.; Poor, H.V.; Hanzo, L. STAR: Simultaneous Transmission and Reflection for 360° Coverage by Intelligent Surfaces. IEEE Wirel. Commun. 2021, 28, 102–109. [Google Scholar] [CrossRef]
  12. Mu, X.; Liu, Y.; Guo, L.; Lin, J.; Schober, R. Simultaneously Transmitting and Reflecting (STAR) RIS Aided Wireless Communications. IEEE Trans. Wirel. Commun. 2022, 21, 3083–3098. [Google Scholar] [CrossRef]
  13. Yang, S.; Zhang, J.; Xia, W.; Gao, H.; Zhu, H. Joint Power and Discrete Amplitude Allocation for STAR-RIS-Aided NOMA System. IEEE Trans. Veh. Technol. 2022, 71, 13382–13386. [Google Scholar] [CrossRef]
  14. Wang, W.; Ni, W.; Tian, H.; Yang, Z.; Huang, C.; Wong, K.K. Safeguarding NOMA Networks via Reconfigurable Dual-Functional Surface Under Imperfect CSI. IEEE J. Sel. Top. Signal Process. 2022, 16, 950–966. [Google Scholar] [CrossRef]
  15. Han, Y.; Li, N.; Liu, Y.; Zhang, T.; Tao, X. Artificial Noise Aided Secure NOMA Communications in STAR-RIS Networks. IEEE Wirel. Commun. Lett. 2022, 11, 1191–1195. [Google Scholar] [CrossRef]
  16. Niu, H.; Liang, X. Weighted Sum-Rate Maximization for STAR-RISs-Aided Networks With Coupled Phase-Shifters. IEEE Syst. J. 2023, 17, 1083–1086. [Google Scholar] [CrossRef]
  17. Alwakeel, A.S.; El-Rifaie, A.M.; Moustafa, G.; Shaheen, A.M. Newton Raphson based optimizer for optimal integration of FAS and RIS in wireless systems. Results Eng. 2025, 25, 103822. [Google Scholar] [CrossRef]
  18. Xiao, B.; Tian, Y.; Li, W.; Kho, Y.H.; Wang, X.; Zhu, C.; Liu, H. Performance Analysis of Adaptive RIS-Assisted Clustering Strategies in Downlink Communication Systems. IEEE Internet Things J. 2023, 10, 4520–4530. [Google Scholar] [CrossRef]
  19. Hua, D.T.; Do, Q.T.; Dao, N.N.; Nguyen, T.V.; Shumeye Lakew, D.; Cho, S. Learning-Based Reconfigurable-Intelligent-Surface-Aided Rate-Splitting Multiple Access Networks. IEEE Internet Things J. 2023, 10, 17603–17619. [Google Scholar] [CrossRef]
  20. Yang, D.; Xu, J.; Xu, W.; Huang, Y.; Lu, Z. Secure Communication for Spatially Correlated RIS-Aided Multiuser Massive MIMO Systems: Analysis and Optimization. IEEE Commun. Lett. 2023, 27, 797–801. [Google Scholar] [CrossRef]
  21. Arzykulov, S.; Celik, A.; Nauryzbayev, G.; Eltawil, A.M. Artificial Noise and RIS-Aided Physical Layer Security: Optimal RIS Partitioning and Power Control. IEEE Wirel. Commun. Lett. 2023, 12, 992–996. [Google Scholar] [CrossRef]
  22. Hong, S.; Pan, C.; Ren, H.; Wang, K.; Nallanathan, A. Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface. IEEE Trans. Commun. 2020, 68, 7851–7866. [Google Scholar] [CrossRef]
  23. Pala, S.; Taghizadeh, O.; Katwe, M.; Singh, K.; Li, C.P.; Schmeink, A. Secure RIS-Assisted Hybrid Beamforming Design with Low-Resolution Phase Shifters. IEEE Trans. Wirel. Commun. 2024, 23, 10198–10212. [Google Scholar] [CrossRef]
  24. Cumanan, K.; Ding, Z.; Sharif, B.; Tian, G.Y.; Leung, K.K. Secrecy Rate Optimizations for a MIMO Secrecy Channel with a Multiple-Antenna Eavesdropper. IEEE Trans. Veh. Technol. 2014, 63, 1678–1690. [Google Scholar] [CrossRef]
  25. Shi, Q.; Xu, W.; Wu, J.; Song, E.; Wang, Y. Secure Beamforming for MIMO Broadcasting with Wireless Information and Power Transfer. IEEE Trans. Wirel. Commun. 2015, 14, 2841–2853. [Google Scholar] [CrossRef]
  26. Liu, L.; Zhang, R.; Chua, K.C. Secrecy Wireless Information and Power Transfer with MISO Beamforming. IEEE Trans. Signal Process. 2014, 62, 1850–1863. [Google Scholar] [CrossRef]
  27. Liu, X.; Gao, Y.; Guo, M.; Sha, N. Secrecy Throughput Optimization for the WPCNs with Non-Linear EH Model. IEEE Access 2019, 7, 59477–59490. [Google Scholar] [CrossRef]
  28. Wang, J.; Zhang, J.; Lu, J.; Wang, J.; Zhang, Q.; Wang, D. Secrecy Rate Analysis for RIS-Aided Multi-User MISO System over Rician Fading Channel. J. Commun. Inf. Netw. 2023, 8, 48–56. [Google Scholar] [CrossRef]
  29. Lin, S.; Xu, Y.; Wang, H.; Gu, J.; Liu, J.; Ding, G. Secure Multicast Communications via RIS Against Eavesdropping and Jamming with Imperfect CSI. IEEE Trans. Veh. Technol. 2023, 72, 16805–16810. [Google Scholar] [CrossRef]
  30. Dong, L.; Li, Y.; Cheng, W.; Huo, Y. Robust and Secure Transmission Over Active Reconfigurable Intelligent Surface Aided Multi-User System. IEEE Trans. Veh. Technol. 2023, 72, 11515–11531. [Google Scholar] [CrossRef]
  31. Liu, J.; Zhang, J.; Zhang, Q.; Wang, J.; Sun, X. Secrecy rate analysis for reconfigurable intelligent surface-assisted mimo communications with statistical CSI. China Commun. 2021, 18, 52–62. [Google Scholar] [CrossRef]
  32. Niu, H.; Chu, Z.; Zhou, F.; Xiao, P.; Al-Dhahir, N. Weighted Sum Rate Optimization for STAR-RIS-Assisted MIMO System. IEEE Trans. Veh. Technol. 2022, 71, 2122–2127. [Google Scholar] [CrossRef]
  33. Wu, C.; You, C.; Liu, Y.; Gu, X.; Cai, Y. Channel Estimation for STAR-RIS-Aided Wireless Communication. IEEE Commun. Lett. 2022, 26, 652–656. [Google Scholar] [CrossRef]
  34. Zhang, Z.; Wang, Z.; Liu, Y.; He, B.; Lv, L.; Chen, J. Security Enhancement for Coupled Phase-Shift STAR-RIS Networks. IEEE Trans. Veh. Technol. 2023, 72, 8210–8215. [Google Scholar] [CrossRef]
  35. Niu, H.; Chu, Z.; Zhou, F.; Zhu, Z. Simultaneous Transmission and Reflection Reconfigurable Intelligent Surface Assisted Secrecy MISO Networks. IEEE Commun. Lett. 2021, 25, 3498–3502. [Google Scholar] [CrossRef]
  36. Zhang, Z.; Chen, J.; Liu, Y.; Wu, Q.; He, B.; Yang, L. On the Secrecy Design of STAR-RIS Assisted Uplink NOMA Networks. IEEE Trans. Wirel. Commun. 2022, 21, 11207–11221. [Google Scholar] [CrossRef]
  37. Li, X.; Zheng, Y.; Zeng, M.; Liu, Y.; Dobre, O.A. Enhancing Secrecy Performance for STAR-RIS NOMA Networks. IEEE Trans. Veh. Technol. 2023, 72, 2684–2688. [Google Scholar] [CrossRef]
  38. Zhong, C.; Li, G.; Meng, Z.; Li, H.; Yildiz, A.R.; Mirjalili, S. Starfish optimization algorithm (SFOA): A bio-inspired metaheuristic algorithm for global optimization compared with 100 optimizers. Neural Comput. Appl. 2025, 37, 3641–3683. [Google Scholar] [CrossRef]
  39. Cao, W.; Mao, J.; Zeng, W.; Ni, J. Modified starfish optimization algorithm based on pheromone attraction strategy and its engineering application. J. Supercomput. 2025, 81, 1545. [Google Scholar] [CrossRef]
  40. Taleb, S.M.; Baiche, K.; Ivanova, G.; Meraihi, Y.; Ramdane-Cherif, A.; Mirjalili, S. Optimization of Optical Network Units Placement Using Generalized Opposition Based-Learning Starfish Optimization Algorithm. In Proceedings of the 2025 International Conference on Computer Systems and Technologies (CompSysTech), Ruse, Bulgaria, 27–28 June 2025; pp. 1–8. [Google Scholar] [CrossRef]
  41. Alkhalifa, A.K.; Aljebreen, M.; Alanazi, R.; Ahmad, N.; Alrusaini, O.; Aljehane, N.O.; Alqazzaz, A.; Alkhiri, H. Leveraging hybrid deep learning with starfish optimization algorithm based secure mechanism for intelligent edge computing in smart cities environment. Sci. Rep. 2025, 15, 33069. [Google Scholar] [CrossRef]
  42. Aktaş, M.; Kiliç, F. Discrete Starfish Optimization Algorithm for Symmetric Travelling Salesman Problem. IEEE Access 2025, 13, 102675–102687. [Google Scholar] [CrossRef]
  43. Liu, Y.; Fu, M.; Liu, Z.; Liu, H.; Peng, W.; Li, L.; Yang, Y.; Zhou, X.; Jia, C. An Enhanced Starfish Optimization Algorithm via Joint Strategy and Its Application in Ultra-Wideband Indoor Positioning. Biomimetics 2025, 10, 338. [Google Scholar] [CrossRef]
  44. Yan, P.; Zhao, Y.; Wang, P.; Hao, S.; Ziqi, W.; Guodong, L. Mine water identification model combining LIF with SFOA-CNN-LSTM and KAN networks: A case study of huainan mining area. Eng. Res. Express 2025, 7, 035231. [Google Scholar] [CrossRef]
  45. Singla, M.K.; Aljaidi, M.; Gupta, J.; Jangir, P.; Arpita; Kumar, R.; Jangid, R.; EI-Kenawy, E.S.M.; Alharbi, A.H. Enhanced mathematical modeling of PEM fuel cells using the starfish optimization algorithm. Ionics 2025, 31, 13229–13268. [Google Scholar] [CrossRef]
  46. Mohanachandran, D.K. Starfish Optimization Algorithm for Economic Emission Dispatch with Chance Constraints and Wind Power Integration. J. Inf. Syst. Eng. Manag. 2025, 10, 177–187. [Google Scholar] [CrossRef]
  47. Tang, Z.; Liang, T.; Mi, D.; Huang, Z.; Jing, Y.; Wu, H. Multi-objective optimization of virtual power plant with mobile storage considering renewable energy uncertainty and multiple flexible loads. J. Energy Storage 2026, 143, 119605. [Google Scholar] [CrossRef]
  48. Stanislaus, R.; Vengadachalam, N.; Somasundaram, P.; Karthick, B. Hybrid Starfish Optimization and Graph Attention Fusion Network for efficient energy management in photovoltaic-integrated smart grids. J. Energy Storage 2026, 141, 119277. [Google Scholar] [CrossRef]
  49. Mohammed, B.O.; Aghdasi, H.S.; Salehpour, P. Dhole optimization algorithm: A new metaheuristic algorithm for solving optimization problems. Clust. Comput. 2025, 28, 430. [Google Scholar] [CrossRef]
  50. Sadollah, A.; Sayyaadi, H.; Yadav, A. A dynamic metaheuristic optimization model inspired by biological nervous systems: Neural network algorithm. Appl. Soft Comput. 2018, 71, 747–782. [Google Scholar] [CrossRef]
  51. El-Rifaie, A.M.; Abid, S.; Ginidi, A.R.; Shaheen, A.M. Fractional Order PID Controller Based-Neural Network Algorithm for LFC in Multi-Area Power Systems. Eng. Rep. 2025, 7, e70028. [Google Scholar] [CrossRef]
  52. Xu, X. Crocodile Ambush Optimization Algorithm: A new bio-inspired metaheuristic algorithm for solving optimization problems. Array 2025, 28, 100529. [Google Scholar] [CrossRef]
  53. Braik, M.; Hammouri, A.; Atwan, J.; Al-Betar, M.A.; Awadallah, M.A. White Shark Optimizer: A novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowl.-Based Syst. 2022, 243, 108457. [Google Scholar] [CrossRef]
  54. Hassan, M.H.; Kamel, S.; Selim, A.; Shaheen, A.; Yu, J.; El-Sehiemy, R. Efficient economic operation based on load dispatch of power systems using a leader white shark optimization algorithm. Neural Comput. Appl. 2024, 36, 10613–10635. [Google Scholar] [CrossRef]
  55. Almutairi, S.Z.; Shaheen, A.M. An Adaptive Fitness-Guided Starfish Optimization Framework for Optimal Power Flow Operation. Mathematics 2026, 14, 909. [Google Scholar] [CrossRef]
  56. Lian, J.; Zhu, T.; Ma, L.; Wu, X.; Heidari, A.A.; Chen, Y.; Chen, H.; Hui, G. The educational competition optimizer. Int. J. Syst. Sci. 2024, 55, 3185–3222. [Google Scholar] [CrossRef]
  57. Tang, W.; Shi, S.; Lu, Z.; Lin, M.; Cheng, H. EDECO: An enhanced educational competition optimizer for numerical optimization problems. Biomimetics 2025, 10, 176. [Google Scholar] [CrossRef]
  58. Li, N.; Miao, Z.; Zhou, S.; Zhou, H.; Wang, M.; Liu, Z. An Enhanced Educational Competition Optimizer Integrating Multiple Mechanisms for Global Optimization Problems. Biomimetics 2025, 10, 719. [Google Scholar] [CrossRef]
  59. Draz, A.; Alqahtani, M.H.; Aljumah, A.S.; El-Fergany, A.A.; Shaheen, A.M. Digital overcurrent relays coordination in renewable microgrids utilizing several operating characteristics using educational competition optimizer. Energy Rep. 2025, 13, 6251–6266. [Google Scholar] [CrossRef]
  60. Aljaidi, M.; Jangir, P.; Arpita; Agrawal, S.P.; Pandya, S.B.; Parmar, A.; Alkoradees, A.F.; Jangid, R.; Agrawal, T.R. A novel educational competition optimizer for precise parameter optimization in proton exchange membrane fuel cells. Ionics 2025, 31, 10777–10803. [Google Scholar] [CrossRef]
  61. Ekinci, S.; Izci, D.; Can, O.; Bajaj, M.; Blazek, V. Frequency regulation of PV-reheat thermal power system via a novel hybrid educational competition optimizer with pattern search and cascaded PDN-PI controller. Results Eng. 2024, 24, 102958. [Google Scholar] [CrossRef]
  62. Eid, M.M.; Alhussan, A.A.; Mattar, E.A.; Khodadadi, N.; El-Kenawy, E.S.M. Concrete Strength Prediction Using Machine Learning and Somersaulting Spider Optimizer. Comput. Model. Eng. Sci. 2026, 146. [Google Scholar] [CrossRef]
  63. Sarhan, S.; El-Sehiemy, R.A.; Shaheen, A.M.; Gafar, M. TLBO merged with studying effect for economic environmental energy management in high voltage AC networks hybridized with multi-terminal DC lines. Appl. Soft Comput. 2023, 143, 110426. [Google Scholar] [CrossRef]
  64. Shen, Y.; Liang, Z.; Kang, H.; Sun, X.; Chen, Q. A modified jSO algorithm for solving constrained engineering problems. Symmetry 2021, 13, 63. [Google Scholar] [CrossRef]
Figure 1. Proposed STAR-RIS model.
Figure 1. Proposed STAR-RIS model.
Biomimetics 11 00243 g001
Figure 2. Average objective function for (CAOA, DO, NNA, SFO, ESFO, and WSO) optimization algorithms at different power thresholds.
Figure 2. Average objective function for (CAOA, DO, NNA, SFO, ESFO, and WSO) optimization algorithms at different power thresholds.
Biomimetics 11 00243 g002
Figure 3. Box plot obtained by CAOA, DO, NNA, SFO, ESFO, and WSO over 100 runs.
Figure 3. Box plot obtained by CAOA, DO, NNA, SFO, ESFO, and WSO over 100 runs.
Biomimetics 11 00243 g003
Figure 4. Histogram obtained by CAOA, DO, NNA, SFO, ESFO, and WSO over 100 runs.
Figure 4. Histogram obtained by CAOA, DO, NNA, SFO, ESFO, and WSO over 100 runs.
Biomimetics 11 00243 g004aBiomimetics 11 00243 g004b
Figure 5. Average convergence rates of different optimization algorithms (proposed ESFO, standard SFO, DO, CAOA, NNA, and WSO).
Figure 5. Average convergence rates of different optimization algorithms (proposed ESFO, standard SFO, DO, CAOA, NNA, and WSO).
Biomimetics 11 00243 g005
Table 1. Structural differences between original SFO and proposed ESFO.
Table 1. Structural differences between original SFO and proposed ESFO.
AspectOriginal SFOProposed ESFO
Exploration StrategyFixed stochastic exploration behaviorAdaptive exploration with iteration-dependent regulation
Exploitation MechanismStandard attraction toward elite solutionsFitness-guided weighted attraction with adaptive intensity
Exploration–Exploitation BalanceImplicit and static balanceExplicit and dynamically controlled transition mechanism
Behavior Under Strong Variable CouplingMay stagnate in tightly coupled regionsEnhanced directional pressure mitigates stagnation
Population ContractionNatural convergence without structured controlControlled contraction improving stability and robustness
Observed Performance ImpactModerate variance across runsReduced variance, narrower confidence intervals, and improved robustness
Table 2. Statistical outcomes of the proposed ESFO against other benchmark algorithms (CAOA, DO, NNA, standard SFO, and WSO).
Table 2. Statistical outcomes of the proposed ESFO against other benchmark algorithms (CAOA, DO, NNA, standard SFO, and WSO).
Optimization Algorithms
CAOADONNASFOESFOWSO
P max =
20 dBm
Min1.0899021.0580371.0966271.1879771.2658130.789727603
Max1.5708491.857171.9139151.7475251.8843831.68924829
Mean1.304911.4525381.6106471.4998851.7031371.194636865
STD0.1170440.2069340.1641450.1735250.1717630.200845882
P max =
25 dBm
Min1.3942691.4980221.6709461.4518111.852341.24717459
Max2.0089522.1924692.2455812.2341142.3512942.068451958
Mean1.6933411.8705561.9907011.9812692.1827261.745447764
STD0.144470.1953980.1447830.2043850.1182860.191156736
P max =
30 dBm
Min0.9488420.9230451.0229660.8883751.4293560.994425067
Max2.0520122.2606762.3425362.1943332.4594792.308712147
Mean1.4704611.6510211.9769481.6977552.332361.711466863
STD0.3193980.3398440.2820740.3290210.211710.381960673
P max =
35 dBm
Min0.318640.1835010.2523110.1937960.7121360.205713244
Max1.8670271.710792.210211.9977872.4976582.408904577
Mean0.8195540.72971.0050260.8819152.2643261.031505042
STD0.3519060.4781960.5121570.409770.4931430.575481151
P max =
40 dBm
Min0.1712140.0533580.1297650.0590790.0706920.038570288
Max1.6818780.7945731.3674470.8695142.4978051.451835824
Mean0.6313510.1811950.4674370.3313452.2169070.282714334
STD0.3721740.1564830.3463360.2123230.5992510.285885354
P max =
45 dBm
Min0.0280110.0142680.0340040.019090.0229180.0124168
Max1.4837321.8864910.4837840.7952862.4993040.819430151
Mean0.4917530.1128310.1894410.1763722.0545930.11186297
STD0.3873440.3368120.1287040.1907840.7775810.150910018
P max =
50 dBm
Min0.0109070.0056640.0101830.0060790.0073060.003949056
Max0.8158880.8111190.1665792.1619222.4997520.351601263
Mean0.1956870.0492770.0549930.1332461.8831230.039873808
STD0.2082430.1452410.0369120.3926510.8928150.063615415
Table 3. Achievable rates of the proposed ESFO against other benchmark algorithms (CAOA, DO, NNA, standard SFO, and WSO) for different power thresholds ( P max = [ 20 , 30 , 50 ] dBm).
Table 3. Achievable rates of the proposed ESFO against other benchmark algorithms (CAOA, DO, NNA, standard SFO, and WSO) for different power thresholds ( P max = [ 20 , 30 , 50 ] dBm).
Optimization Algorithms
CAOADONNASFOESFOWSO
P max =
20 dBm
R t 2.4073983.1005653.2678212.7726273.1411492.5687512
R e 1 , t 0.8365491.2433961.3436591.0251011.2532570.912635647
R e 2 , t 0.8365491.2433961.3436591.0251011.2532570.912635647
R r 2.9976943.1014493.2250453.1677453.1482972.690310913
R e 1 , r 1.244171.2341381.311131.359821.2639131.023797266
R e 2 , r 1.244171.2341381.311131.359821.2639131.023797266
C t 1.5708491.857171.9241621.7475251.8878921.656115553
C r 1.7535241.8673111.9139151.8079251.8843831.666513646
P max =
30 dBm
R t 5.4135867.3567275.962086.6623097.8355735.178353681
R e 1 , t 3.3615744.920063.6195434.3992095.3673312.958800406
R e 2 , t 3.3615744.920063.6195434.3992095.3673312.958800406
R r 4.2194864.8184148.2360694.8587967.3702664.611254449
R e 1 , r 2.0665482.5577385.8243912.6644634.9107872.397967649
R e 2 , r 2.0665482.5577385.8243912.6644634.9107872.397967649
C t 2.0520122.4366672.3425362.2631012.4682412.219553274
C r 2.1529382.2606762.4116792.1943332.4594792.2132868
P max =
50 dBm
R t 9.81204811.5532813.786410.1222218.069329.587738121
R e 1 , t 8.99616110.5074713.13277.63166515.569489.383933432
R e 2 , t 8.99616110.5074713.13277.63166515.569489.383933432
R r 11.1150312.609147.34661716.2215814.893646.82381551
R e 1 , r 10.1798311.798027.18003814.0596612.393896.762619653
R e 2 , r 10.1798311.798027.18003814.0596612.393896.762619653
C t 0.8158881.0458010.6537032.4905592.4998420.203804689
C r 0.9352010.8111190.1665792.1619222.4997520.061195857
Table 4. Robustness, variability analysis and mean objective values with 95% confidence intervals.
Table 4. Robustness, variability analysis and mean objective values with 95% confidence intervals.
P max  = 30 dBm
AlgorithmVarianceCV95% CI (Mean Objective)
CAOA 1.020152 × 10 1 0.2172[1.359380, 1.584173]
NNA 7.956571 × 10 2 0.1427[1.871415, 2.070773]
ESFO 4.482115 × 10 2 0.0908[2.246508, 2.395268]
SFO 1.082551 × 10 1 0.1938[1.580677, 1.809525]
DO 1.154941 × 10 1 0.2058[1.531005, 1.770250]
WSO 1.458940 × 10 1 0.2232[1.569907, 1.843350]
ECO 8.330408 × 10 2 0.1374[1.990323, 2.197432]
SSO 1.606386 × 10 2 0.0569[2.178347, 2.266937]
P max = 35 dBm
AlgorithmVarianceCV95% CI (Mean Objective)
CAOA 1.238377 × 10 1 0.4294[0.7024033, 0.9481089]
DO 2.286711 × 10 1 0.6553[0.5710979, 0.9042849]
NNA 2.623046 × 10 1 0.5096[0.8327426, 1.1846810]
SFO 1.679114 × 10 1 0.4646[0.7457331, 1.0340040]
ESFO 2.431900 × 10 1 0.2178[2.0729660, 2.4185930]
WSO 3.311786 × 10 1 0.5579[0.8336210, 1.2377810]
ECO 3.347758 × 10 1 0.3477[1.457329, 1.859964]
SSO 1.435254 × 10 1 0.2103[1.664649, 1.928561]
P max = 40 dBm
AlgorithmVarianceCV95% CI (Mean Objective)
CAOA 1.385137 × 10 1 0.5895[0.5059435, 0.7665772]
DO 2.448687 × 10 2 0.8636[0.1342849, 0.2420868]
NNA 1.199483 × 10 1 0.7409[0.3533313, 0.5947798]
SFO 4.508111 × 10 2 0.6408[0.2599604, 0.4087579]
ESFO 3.591019 × 10 1 0.2703[1.9812210, 2.4026960]
WSO 8.173044 × 10 2 1.0112[0.1933152, 0.3918948]
ECO 3.611527 × 10 1 0.5858[0.8186055, 1.236426]
SSO 1.539777 × 10 1 0.4121[0.8248328, 1.097589]
P max = 45 dBm
AlgorithmVarianceCV95% CI (Mean Objective)
CAOA 1.500356 × 10 1 0.7877[0.3622092, 0.6305467]
DO 1.134425 × 10 1 2.9851[0.0423361, 0.2418184]
NNA 1.656463 × 10 2 0.6794[0.1477881, 0.2384155]
SFO 3.639862 × 10 2 1.0817[0.1159729, 0.2496978]
ESFO 6.046327 × 10 1 0.3785[1.7643330, 2.3052050]
WSO 2.277383 × 10 2 1.3491[0.0696177, 0.1731505]
ECO 4.393845 × 10 1 1.0857[0.3922489, 0.8604678]
SSO 4.998676 × 10 2 0.4872[0.3832307, 0.5389469]
Table 5. Wilcoxon signed-rank test results for different P max levels ( α = 0.05).
Table 5. Wilcoxon signed-rank test results for different P max levels ( α = 0.05).
Case 1:  P max = 30 dBm
Comparisonp-ValueSigned-RankSignificance
CAOA vs. ESFO 3.182 × 10 6 6Significant
DO vs. ESFO 5.706 × 10 4 65Significant
NNA vs. ESFO 2.564 × 10 2 124Significant
SFO vs. ESFO 1.477 × 10 4 48Significant
ESFO vs. WSO 3.182 × 10 6 459Significant
ESFO vs. ECO 1.197 × 10 3 75Significant
ESFO vs. SSO 2.957 × 10 3 88Significant
Case 2: P max = 35 dBm
Comparisonp-ValueSigned-RankSignificance
CAOA vs. ESFO 1.734 × 10 6 0Significant
DO vs. ESFO 2.879 × 10 6 5Significant
NNA vs. ESFO 9.711 × 10 5 43Significant
SFO vs. ESFO 1.734 × 10 6 0Significant
ESFO vs. WSO 4.729 × 10 6 455Significant
ESFO vs. ECO 4.196 × 10 4 61Significant
ESFO vs. SSO 8.307 × 10 4 70Significant
Case 3: P max = 40 dBm
Comparisonp-ValueSigned-RankSignificance
CAOA vs. ESFO 1.47 × 10 1 282Not significant
DO vs. ESFO 3.182 × 10 6 6Significant
NNA vs. ESFO 2.353 × 10 6 3Significant
SFO vs. ESFO 1.734 × 10 6 0Significant
ESFO vs. WSO 2.127 × 10 6 463Significant
ESFO vs. ECO 9.316 × 10 6 17Significant
ESFO vs. SSO 2.163 × 10 5 26Significant
Case 4: P max = 45 dBm
Comparisonp-ValueSigned-RankSignificance
CAOA vs. ESFO 6.339 × 10 6 13Significant
DO vs. ESFO 1.921 × 10 6 1Significant
NNA vs. ESFO 2.127 × 10 6 2Significant
SFO vs. ESFO 2.127 × 10 6 2Significant
ESFO vs. WSO 1.921 × 10 6 464Significant
ESFO vs. ECO 1.238 × 10 5 20Significant
ESFO vs. SSO 3.882 × 10 6 8Significant
Table 6. Runtime and memory consumption comparison.
Table 6. Runtime and memory consumption comparison.
AlgorithmElapsed Time (s)MATLAB Memory Used (MB)
SFO1.464573341
DO1.54033298
CAOA2.22173326
WSO1.14063321
NNA1.51863345
Proposed ESFO1.38423353
Table 7. Performance comparison between SFO and ESFO on selected CEC 2017 benchmark functions under different dimensions.
Table 7. Performance comparison between SFO and ESFO on selected CEC 2017 benchmark functions under different dimensions.
(i) Dimension = 2
F1F2F3
SFOESFOSFOESFOSFOESFO
Best50050080080011001100
Average50050080080011001100
Worst50050080080011001100
SD000000
(ii) Dimension = 10
F1F2F3
SFOESFOSFOESFOSFOESFO
Best508.6591507.9597808.3378804.97481101.6251100.995
Average520.4874516.4368822.7479820.69511104.9691104.907
Worst533.8736530.8437841.7806837.80831112.121110.945
SD5.8614895.1179218.3850968.1873542.4981862.290491
(iii) Dimension = 30
F1F2F3
SFOESFOSFOESFOSFOESFO
Best659.6658603.475953.8448866.32731205.091156.77
Average725.9997650.8451022.94939.43271317.6331262.977
Worst804.9961719.92421108.061031.5651534.3081434.881
SD35.7349234.3039936.9381931.5804467.6313761.9013
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gafar, M.; Sarhan, S.; Shaheen, A.M.; Alwakeel, A.S. A Novel Starfish Optimization Algorithm for Secure STAR-RIS Communications. Biomimetics 2026, 11, 243. https://doi.org/10.3390/biomimetics11040243

AMA Style

Gafar M, Sarhan S, Shaheen AM, Alwakeel AS. A Novel Starfish Optimization Algorithm for Secure STAR-RIS Communications. Biomimetics. 2026; 11(4):243. https://doi.org/10.3390/biomimetics11040243

Chicago/Turabian Style

Gafar, Mona, Shahenda Sarhan, Abdullah M. Shaheen, and Ahmed S. Alwakeel. 2026. "A Novel Starfish Optimization Algorithm for Secure STAR-RIS Communications" Biomimetics 11, no. 4: 243. https://doi.org/10.3390/biomimetics11040243

APA Style

Gafar, M., Sarhan, S., Shaheen, A. M., & Alwakeel, A. S. (2026). A Novel Starfish Optimization Algorithm for Secure STAR-RIS Communications. Biomimetics, 11(4), 243. https://doi.org/10.3390/biomimetics11040243

Article Metrics

Back to TopTop