Volume 1, Issue 1, ICCK Transactions on Wireless Networks
Volume 1, Issue 1, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
ICCK Transactions on Wireless Networks, Volume 1, Issue 1, 2025: 5-15

Open Access | Research Article | 19 June 2025
An Optimized Ensemble Approach for Securing Wireless Sensor Networks Against Attacks
1 Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India
* Corresponding Author: Shalli Rani, [email protected]
ARK: ark:/57805/twn.2025.109626
Received: 10 March 2025, Accepted: 26 May 2025, Published: 19 June 2025  
Abstract
Wireless Sensor Networks (WSNs) are prone to different security threats because of their open communication environment, distributed architecture, and resource constraints. For the security and integrity of a network to be ensured, robust intrusion detection systems (IDS) are required. The WSN-DS dataset has been used to provide an effective machine learning (ML) and Deep Learning (DL) based IDS and attack detection technique for WSNs. Several learning models, including K-Nearest Neighbors (KNN), Random Forest (RF), Decision Tree (DT), Convolutional Neural Networks (CNN), Support Vector Machine (SVM), Logistic Regression (LR), and Neural Networks (NN), are compared in terms of performance. Preprocessing methods of data encoding, normalization, and data splitting are applied to the dataset to improve classification performance. The effectiveness of these models is compared using large trials with significant performance metrics such as ROC-AUC, F1-score, accuracy, precision, and recall. The results indicate that the Optimized RF model has been optimized to achieve the optimal accuracy of 99.71\%, which outperforms other state-of-the-art approaches. Apart from pointing out the importance of ML in detecting WSN attacks, this research provides a promising way forward for enhancing network security through effective detection methods.

Graphical Abstract
An Optimized Ensemble Approach for Securing Wireless Sensor Networks Against Attacks

Keywords
wireless sensor networks
intrusion detection system
security
machine learning
deep learning
WSN-DS dataset

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Tan, X., Su, S., Huang, Z., Guo, X., Zuo, Z., Sun, X., & Li, L. (2019). Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm. Sensors, 19(1), 203.
    [CrossRef]   [Google Scholar]
  2. Salmi, S., & Oughdir, L. (2022). CNN-LSTM based approach for DOS attacks detection in wireless sensor networks. International Journal of Advanced Computer Science and Applications, 13(4).
    [CrossRef]   [Google Scholar]
  3. Ifzarne, S., Tabbaa, H., Hafidi, I., & Lamghari, N. (2021). Anomaly detection using machine learning techniques in wireless sensor networks. Journal of Physics: Conference Series, 1743(1), 012021.
    [CrossRef]   [Google Scholar]
  4. Saleh, H. M., Marouane, H., & Fakhfakh, A. (2024). Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning. IEEE Access, 12, 3825-3836.
    [CrossRef]   [Google Scholar]
  5. Sadia, H., Farhan, S., Haq, Y. U., Sana, R., Mahmood, T., Bahaj, S. A. O., & Rehman, A. (2024). Intrusion Detection System for Wireless Sensor Networks: A Machine Learning based Approach. IEEE Access.
    [CrossRef]   [Google Scholar]
  6. Tabbaa, H., Ifzarne, S., & Hafidi, I. (2023). An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks. Computing and Informatics, 42(4), 1013-1036.
    [CrossRef]   [Google Scholar]
  7. Ahmed, O. (2024). Enhancing Intrusion Detection in Wireless Sensor Networks through Machine Learning Techniques and Context Awareness Integration. International Journal of Mathematics, Statistics, and Computer Science, 2, 244–258.
    [CrossRef]   [Google Scholar]
  8. Biswas, P., & Samanta, T. (2021). Anomaly detection using ensemble random forest in wireless sensor network. International Journal of Information Technology, 13(5), 2043–2052.
    [CrossRef]   [Google Scholar]
  9. Ghadi, Y. Y., Mazhar, T., Al Shloul, T., Shahzad, T., Salaria, U. A., Ahmed, A., & Hamam, H. (2024). Machine learning solutions for the security of wireless sensor networks: A review. IEEE Access, 12, 12699–12719.
    [CrossRef]   [Google Scholar]
  10. Gowdhaman, V., & Dhanapal, R. (2022). An intrusion detection system for wireless sensor networks using deep neural network. Soft Computing, 26(23), 13059–13067.
    [CrossRef]   [Google Scholar]
  11. Haque, A., Chowdhury, N. U. R., Soliman, H., Hossen, M. S., Fatima, T., & Ahmed, I. (2023). Wireless sensor networks anomaly detection using machine learning: a survey. Intelligent Systems Conference, 491–506.
    [CrossRef]   [Google Scholar]
  12. Jeevaraj, D. (2023). Feature selection model using naive bayes ML algorithm for WSN intrusion detection system. International Journal of Electrical and Computer Engineering Systems, 14(2), 179–185.
    [CrossRef]   [Google Scholar]
  13. Karthikeyan, M., Manimegalai, D., & RajaGopal, K. (2024). Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection. Scientific Reports, 14(1), 231.
    [CrossRef]   [Google Scholar]
  14. Quincozes, S. E., Kazienko, J. F., & Quincozes, V. E. (2023). An extended evaluation on machine learning techniques for denial-of-service detection in wireless sensor networks. Internet of Things, 22, 100684.
    [CrossRef]   [Google Scholar]
  15. Raveendranadh, B., & Tamilselvan, S. (2023). An accurate attack detection framework based on exponential polynomial kernel-centered deep neural networks in the wireless sensor network. Transactions on Emerging Telecommunications Technologies, 34(3), e4726.
    [CrossRef]   [Google Scholar]
  16. Sakthimohan, M., Deny, J., & Rani, G. E. (2024). Secure deep learning-based energy efficient routing with intrusion detection system for wireless sensor networks. Journal of Intelligent & Fuzzy Systems, 46(4), 8587-8603.
    [CrossRef]   [Google Scholar]
  17. Sivagaminathan, V., Sharma, M., & Henge, S. K. (2023). Intrusion detection systems for wireless sensor networks using computational intelligence techniques. Cybersecurity, 6(1), 27.
    [CrossRef]   [Google Scholar]
  18. Subbiah, S., Anbananthen, K. S. M., Thangaraj, S., Kannan, S., & Chelliah, D. (2022). Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm. Journal of Communications and Networks, 24(2), 264–273.
    [CrossRef]   [Google Scholar]
  19. Bukhari, S. M. S., Zafar, M. H., Abou Houran, M., Moosavi, S. K. R., Mansoor, M., Muaaz, M., & Sanfilippo, F. (2024). Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability. Ad Hoc Networks, 155, 103407.
    [CrossRef]   [Google Scholar]
  20. Aljebreen, M., Alohali, M. A., Saeed, M. K., Mohsen, H., Al Duhayyim, M., Abdelmageed, A. A., Drar, S., & Abdelbagi, S. (2023). Binary chimp optimization algorithm with ML based intrusion detection for secure IoT-assisted wireless sensor networks. Sensors, 23(8), 4073.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Sharma, A., & Rani, S. (2025). An Optimized Ensemble Approach for Securing Wireless Sensor Networks Against Attacks. ICCK Transactions on Wireless Networks, 1(1), 5–15. https://doi.org/10.62762/TWN.2025.109626
Export Citation
RIS Format
Compatible with EndNote, Zotero, Mendeley, and other reference managers
RIS format data for reference managers
TY  - JOUR
AU  - Sharma, Anshika
AU  - Rani, Shalli
PY  - 2025
DA  - 2025/06/19
TI  - An Optimized Ensemble Approach for Securing Wireless Sensor Networks Against Attacks
JO  - ICCK Transactions on Wireless Networks
T2  - ICCK Transactions on Wireless Networks
JF  - ICCK Transactions on Wireless Networks
VL  - 1
IS  - 1
SP  - 5
EP  - 15
DO  - 10.62762/TWN.2025.109626
UR  - https://www.icck.org/article/abs/TWN.2025.109626
KW  - wireless sensor networks
KW  - intrusion detection system
KW  - security
KW  - machine learning
KW  - deep learning
KW  - WSN-DS dataset
AB  - Wireless Sensor Networks (WSNs) are prone to different security threats because of their open communication environment, distributed architecture, and resource constraints. For the security and integrity of a network to be ensured, robust intrusion detection systems (IDS) are required. The WSN-DS dataset has been used to provide an effective machine learning (ML) and Deep Learning (DL) based IDS and attack detection technique for WSNs. Several learning models, including K-Nearest Neighbors (KNN), Random Forest (RF), Decision Tree (DT), Convolutional Neural Networks (CNN), Support Vector Machine (SVM), Logistic Regression (LR), and Neural Networks (NN), are compared in terms of performance. Preprocessing methods of data encoding, normalization, and data splitting are applied to the dataset to improve classification performance. The effectiveness of these models is compared using large trials with significant performance metrics such as ROC-AUC, F1-score, accuracy, precision, and recall. The results indicate that the Optimized RF model has been optimized to achieve the optimal accuracy of 99.71\%, which outperforms other state-of-the-art approaches. Apart from pointing out the importance of ML in detecting WSN attacks, this research provides a promising way forward for enhancing network security through effective detection methods.
SN  - 3068-7721
PB  - Institute of Central Computation and Knowledge
LA  - English
ER  - 
BibTeX Format
Compatible with LaTeX, BibTeX, and other reference managers
BibTeX format data for LaTeX and reference managers
@article{Sharma2025An,
  author = {Anshika Sharma and Shalli Rani},
  title = {An Optimized Ensemble Approach for Securing Wireless Sensor Networks Against Attacks},
  journal = {ICCK Transactions on Wireless Networks},
  year = {2025},
  volume = {1},
  number = {1},
  pages = {5-15},
  doi = {10.62762/TWN.2025.109626},
  url = {https://www.icck.org/article/abs/TWN.2025.109626},
  abstract = {Wireless Sensor Networks (WSNs) are prone to different security threats because of their open communication environment, distributed architecture, and resource constraints. For the security and integrity of a network to be ensured, robust intrusion detection systems (IDS) are required. The WSN-DS dataset has been used to provide an effective machine learning (ML) and Deep Learning (DL) based IDS and attack detection technique for WSNs. Several learning models, including K-Nearest Neighbors (KNN), Random Forest (RF), Decision Tree (DT), Convolutional Neural Networks (CNN), Support Vector Machine (SVM), Logistic Regression (LR), and Neural Networks (NN), are compared in terms of performance. Preprocessing methods of data encoding, normalization, and data splitting are applied to the dataset to improve classification performance. The effectiveness of these models is compared using large trials with significant performance metrics such as ROC-AUC, F1-score, accuracy, precision, and recall. The results indicate that the Optimized RF model has been optimized to achieve the optimal accuracy of 99.71\\%, which outperforms other state-of-the-art approaches. Apart from pointing out the importance of ML in detecting WSN attacks, this research provides a promising way forward for enhancing network security through effective detection methods.},
  keywords = {wireless sensor networks, intrusion detection system, security, machine learning, deep learning, WSN-DS dataset},
  issn = {3068-7721},
  publisher = {Institute of Central Computation and Knowledge}
}

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 718
PDF Downloads: 289

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and Permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
ICCK Transactions on Wireless Networks

ICCK Transactions on Wireless Networks

ISSN: 3068-7721 (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/