-
CiteScore
-
Impact Factor
Volume 1, Issue 1, Next-Generation Computing Systems and Technologies
Volume 1, Issue 1, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
Next-Generation Computing Systems and Technologies, Volume 1, Issue 1, 2025: 18-32

Open Access | Research Article | 13 October 2025
A Graph-Aware Attention-Driven Ensemble Model for Robust Anomaly Detection in 6G-Enabled Wireless Sensor Networks
1 Department of Computer Science and Engineering, NIST University, Berhampur 761008, India
2 Tech Mahindra Ltd , Bhubaneswar 751023, India
* Corresponding Author: Santosh Kumar Kar, [email protected]
Received: 04 September 2025, Accepted: 17 September 2025, Published: 13 October 2025  
Abstract
The integration of sixth-generation (6G) networks with Wireless Sensor Networks (WSNs) creates unprecedented opportunities for developing secure and scalable smart city infrastructures. However, the proliferation of heterogeneous devices and exponential data growth demand more robust security solutions. While existing hybrid deep learning approaches combining convolutional, recurrent, and attention-based architectures show promise in attack detection, they face limitations including high false-positive rates, inadequate modeling of topological dependencies, and vulnerability to adversarial attacks. This paper presents an enhanced intrusion detection framework that integrates Graph Neural Networks (GNNs) for structural dependency learning, cross-attention mechanisms for feature fusion, and stacked ensemble classification for improved decision reliability. Evaluated on Kitsune, 5G-NIDD, and CICIDS-2018 datasets, the framework demonstrates strong adaptability across heterogeneous traffic scenarios and complex attack vectors. Experimental results show remarkable performance with 99.95\% detection accuracy, consistent F1-scores above 99\%, significantly reduced false alarms, and enhanced adversarial resilience. These findings validate the framework's scalability and practical readiness for securing next-generation 6G-enabled smart city infrastructures.

Graphical Abstract
A Graph-Aware Attention-Driven Ensemble Model for Robust Anomaly Detection in 6G-Enabled Wireless Sensor Networks

Keywords
6G security
wireless sensor networks
intrusion detection system
deep learning

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
Chittaranjan Mahapatra is an employee of Tech Mahindra Ltd, Bhubaneswar 751023, India.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Khan, W., Usama, M., Khan, M. S., Saidani, O., Al Hamadi, H., Alnazzawi, N., ... & Ahmad, J. (2025). Enhancing security in 6G-enabled wireless sensor networks for smart cities: a multi-deep learning intrusion detection approach. Frontiers in Sustainable Cities, 7, 1580006.
    [CrossRef]   [Google Scholar]
  2. Saeed, M. M., Saeed, R. A., Abdelhaq, M., Alsaqour, R., Hasan, M. K., & Mokhtar, R. A. (2023). Anomaly detection in 6G networks using machine learning methods. Electronics, 12(15), 3300.
    [CrossRef]   [Google Scholar]
  3. Chavan, P., Hanumanthappa, H., Satish, E. G., Manoli, S., Supreeth, S., Rohith, S., & Ramaprasad, H. C. (2024). Enhanced hybrid intrusion detection system with attention mechanism using deep learning. SN Computer Science, 5(5), 534.
    [CrossRef]   [Google Scholar]
  4. Jithish, J., Mahalingam, N., Wang, B., & Yeo, K. S. (2025). Towards enhancing security for upcoming 6G-ready smart grids through federated learning and cloud solutions. Cybersecurity, 8(1), 61.
    [CrossRef]   [Google Scholar]
  5. Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine learning for wireless sensor networks security: An overview of challenges and issues. Sensors, 22(13), 4730.
    [CrossRef]   [Google Scholar]
  6. Kalodanis, K., Papapavlou, C., & Feretzakis, G. (2025). Enhancing Security in 5G and Future 6G Networks: Machine Learning Approaches for Adaptive Intrusion Detection and Prevention. Future Internet, 17(7), 312.
    [CrossRef]   [Google Scholar]
  7. Alghamdi, R., Alhadrami, R., Alhothali, D., Almorad, H., Faisal, A., Helal, S., ... & Alouini, M. S. (2020). Intelligent surfaces for 6G wireless networks: A survey of optimization and performance analysis techniques. IEEE access, 8, 202795-202818.
    [CrossRef]   [Google Scholar]
  8. Pujol-Perich, D., Suárez-Varela, J., Cabellos-Aparicio, A., & Barlet-Ros, P. (2022). Unveiling the potential of graph neural networks for robust intrusion detection. ACM SIGMETRICS Performance Evaluation Review, 49(4), 111-117.
    [CrossRef]   [Google Scholar]
  9. Gupta, B. B., Chui, K. T., Gaurav, A., & Arya, V. (2023, October). Deep learning based cyber attack detection in 6G wireless networks. In 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall) (pp. 1-5). IEEE.
    [CrossRef]   [Google Scholar]
  10. Soliman, A. (2025). The Future of Internet of Things and Multimodal Language Models in 6G Networks: Opportunities and Challenges. arXiv preprint arXiv:2504.13971.
    [Google Scholar]
  11. Sharma, A., & Rani, S. (2025). Enhancing 6G-IoT Network Security: A Trustworthy and Responsible AI-Driven Stacked-Hybrid Model for Attack Detection. IEEE Internet of Things Journal.
    [CrossRef]   [Google Scholar]
  12. Caville, E., Lo, W. W., Layeghy, S., & Portmann, M. (2022). Anomal-E: A self-supervised network intrusion detection system based on graph neural networks. Knowledge-based systems, 258, 110030.
    [CrossRef]   [Google Scholar]
  13. Chang, L., & Branco, P. (2021). Graph-based solutions with residuals for intrusion detection: The modified e-graphsage and e-resgat algorithms. arXiv preprint arXiv:2111.13597.
    [Google Scholar]
  14. Ibitoye, O., Shafiq, O., & Matrawy, A. (2019, December). Analyzing adversarial attacks against deep learning for intrusion detection in IoT networks. In 2019 IEEE global communications conference (GLOBECOM) (pp. 1-6). IEEE.
    [CrossRef]   [Google Scholar]
  15. Lo, W. W., Layeghy, S., Sarhan, M., Gallagher, M., & Portmann, M. (2022, April). E-GraphSAGE: A Graph Neural Network based Intrusion Detection System for IoT. In NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium (pp. 1-9). IEEE.
    [CrossRef]   [Google Scholar]
  16. Pajouh, H. H., Javidan, R., Khayami, R., Dehghantanha, A., & Choo, K. K. R. (2016). A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks. IEEE Transactions on Emerging Topics in Computing, 7(2), 314-323.
    [CrossRef]   [Google Scholar]
  17. Bosman, H. H., Iacca, G., Tejada, A., Wörtche, H. J., & Liotta, A. (2017). Spatial anomaly detection in sensor networks using neighborhood information. Information Fusion, 33, 41-56.
    [CrossRef]   [Google Scholar]
  18. Nguyen, V. L., Lin, P. C., Cheng, B. C., Hwang, R. H., & Lin, Y. D. (2021). Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Communications Surveys & Tutorials, 23(4), 2384-2428.
    [CrossRef]   [Google Scholar]
  19. Wang, M., Zhu, T., Zhang, T., Zhang, J., Yu, S., & Zhou, W. (2020). Security and privacy in 6G networks: New areas and new challenges. Digital Communications and Networks, 6(3), 281-291.
    [CrossRef]   [Google Scholar]
  20. Ribeiro, M. T., Singh, S., & Guestrin, C. (2016, August). " Why should i trust you?" Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 1135-1144).
    [CrossRef]   [Google Scholar]
  21. Siriwardhana, Y., Porambage, P., Liyanage, M., & Ylianttila, M. (2021, June). AI and 6G security: Opportunities and challenges. In 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit) (pp. 616-621). IEEE.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Kar, S. K., Subudhi, B. U., Mishra, B. K., & Mahapatra, C. (2025). A Graph-Aware Attention-Driven Ensemble Model for Robust Anomaly Detection in 6G-Enabled Wireless Sensor Networks. Next-Generation Computing Systems and Technologies, 1(1), 18–32. https://doi.org/10.62762/NGCST.2025.333764

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 161
PDF Downloads: 52

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
Next-Generation Computing Systems and Technologies

Next-Generation Computing Systems and Technologies

ISSN: pending (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/