-
CiteScore
-
Impact Factor
Volume 1, Issue 1, ICCK Transactions on Wireless Networks
Volume 1, Issue 1, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
ICCK Transactions on Wireless Networks, Volume 1, Issue 1, 2025: 5-15

Open Access | Research Article | 19 June 2025
An Optimized Ensemble Approach for Securing Wireless Sensor Networks Against Attacks
1 Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India
* Corresponding Author: Shalli Rani, [email protected]
Received: 10 March 2025, Accepted: 26 May 2025, Published: 19 June 2025  
Abstract
Wireless Sensor Networks (WSNs) are prone to different security threats because of their open communication environment, distributed architecture, and resource constraints. For the security and integrity of a network to be ensured, robust intrusion detection systems (IDS) are required. The WSN-DS dataset has been used to provide an effective machine learning (ML) and Deep Learning (DL) based IDS and attack detection technique for WSNs. Several learning models, including K-Nearest Neighbors (KNN), Random Forest (RF), Decision Tree (DT), Convolutional Neural Networks (CNN), Support Vector Machine (SVM), Logistic Regression (LR), and Neural Networks (NN), are compared in terms of performance. Preprocessing methods of data encoding, normalization, and data splitting are applied to the dataset to improve classification performance. The effectiveness of these models is compared using large trials with significant performance metrics such as ROC-AUC, F1-score, accuracy, precision, and recall. The results indicate that the Optimized RF model has been optimized to achieve the optimal accuracy of 99.71\%, which outperforms other state-of-the-art approaches. Apart from pointing out the importance of ML in detecting WSN attacks, this research provides a promising way forward for enhancing network security through effective detection methods.

Graphical Abstract
An Optimized Ensemble Approach for Securing Wireless Sensor Networks Against Attacks

Keywords
wireless sensor networks
intrusion detection system
security
machine learning
deep learning
WSN-DS dataset

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Tan, X., Su, S., Huang, Z., Guo, X., Zuo, Z., Sun, X., & Li, L. (2019). Wireless sensor networks intrusion detection based on SMOTE and the random forest algorithm. Sensors, 19(1), 203.
    [CrossRef]   [Google Scholar]
  2. Salmi, S., & Oughdir, L. (2022). CNN-LSTM based approach for DOS attacks detection in wireless sensor networks. International Journal of Advanced Computer Science and Applications, 13(4).
    [CrossRef]   [Google Scholar]
  3. Ifzarne, S., Tabbaa, H., Hafidi, I., & Lamghari, N. (2021). Anomaly detection using machine learning techniques in wireless sensor networks. Journal of Physics: Conference Series, 1743(1), 012021.
    [CrossRef]   [Google Scholar]
  4. Saleh, H. M., Marouane, H., & Fakhfakh, A. (2024). Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning. IEEE Access, 12, 3825-3836.
    [CrossRef]   [Google Scholar]
  5. Sadia, H., Farhan, S., Haq, Y. U., Sana, R., Mahmood, T., Bahaj, S. A. O., & Rehman, A. (2024). Intrusion Detection System for Wireless Sensor Networks: A Machine Learning based Approach. IEEE Access.
    [CrossRef]   [Google Scholar]
  6. Tabbaa, H., Ifzarne, S., & Hafidi, I. (2023). An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks. Computing and Informatics, 42(4), 1013-1036.
    [CrossRef]   [Google Scholar]
  7. Ahmed, O. (2024). Enhancing Intrusion Detection in Wireless Sensor Networks through Machine Learning Techniques and Context Awareness Integration. International Journal of Mathematics, Statistics, and Computer Science, 2, 244–258.
    [CrossRef]   [Google Scholar]
  8. Biswas, P., & Samanta, T. (2021). Anomaly detection using ensemble random forest in wireless sensor network. International Journal of Information Technology, 13(5), 2043–2052.
    [CrossRef]   [Google Scholar]
  9. Ghadi, Y. Y., Mazhar, T., Al Shloul, T., Shahzad, T., Salaria, U. A., Ahmed, A., & Hamam, H. (2024). Machine learning solutions for the security of wireless sensor networks: A review. IEEE Access, 12, 12699–12719.
    [CrossRef]   [Google Scholar]
  10. Gowdhaman, V., & Dhanapal, R. (2022). An intrusion detection system for wireless sensor networks using deep neural network. Soft Computing, 26(23), 13059–13067.
    [CrossRef]   [Google Scholar]
  11. Haque, A., Chowdhury, N. U. R., Soliman, H., Hossen, M. S., Fatima, T., & Ahmed, I. (2023). Wireless sensor networks anomaly detection using machine learning: a survey. Intelligent Systems Conference, 491–506.
    [CrossRef]   [Google Scholar]
  12. Jeevaraj, D. (2023). Feature selection model using naive bayes ML algorithm for WSN intrusion detection system. International Journal of Electrical and Computer Engineering Systems, 14(2), 179–185.
    [CrossRef]   [Google Scholar]
  13. Karthikeyan, M., Manimegalai, D., & RajaGopal, K. (2024). Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection. Scientific Reports, 14(1), 231.
    [CrossRef]   [Google Scholar]
  14. Quincozes, S. E., Kazienko, J. F., & Quincozes, V. E. (2023). An extended evaluation on machine learning techniques for denial-of-service detection in wireless sensor networks. Internet of Things, 22, 100684.
    [CrossRef]   [Google Scholar]
  15. Raveendranadh, B., & Tamilselvan, S. (2023). An accurate attack detection framework based on exponential polynomial kernel-centered deep neural networks in the wireless sensor network. Transactions on Emerging Telecommunications Technologies, 34(3), e4726.
    [CrossRef]   [Google Scholar]
  16. Sakthimohan, M., Deny, J., & Rani, G. E. (2024). Secure deep learning-based energy efficient routing with intrusion detection system for wireless sensor networks. Journal of Intelligent & Fuzzy Systems, 46(4), 8587-8603.
    [CrossRef]   [Google Scholar]
  17. Sivagaminathan, V., Sharma, M., & Henge, S. K. (2023). Intrusion detection systems for wireless sensor networks using computational intelligence techniques. Cybersecurity, 6(1), 27.
    [CrossRef]   [Google Scholar]
  18. Subbiah, S., Anbananthen, K. S. M., Thangaraj, S., Kannan, S., & Chelliah, D. (2022). Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm. Journal of Communications and Networks, 24(2), 264–273.
    [CrossRef]   [Google Scholar]
  19. Bukhari, S. M. S., Zafar, M. H., Abou Houran, M., Moosavi, S. K. R., Mansoor, M., Muaaz, M., & Sanfilippo, F. (2024). Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability. Ad Hoc Networks, 155, 103407.
    [CrossRef]   [Google Scholar]
  20. Aljebreen, M., Alohali, M. A., Saeed, M. K., Mohsen, H., Al Duhayyim, M., Abdelmageed, A. A., Drar, S., & Abdelbagi, S. (2023). Binary chimp optimization algorithm with ML based intrusion detection for secure IoT-assisted wireless sensor networks. Sensors, 23(8), 4073.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Sharma, A., & Rani, S. (2025). An Optimized Ensemble Approach for Securing Wireless Sensor Networks Against Attacks. ICCK Transactions on Wireless Networks, 1(1), 5–15. https://doi.org/10.62762/TWN.2025.109626

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 20
PDF Downloads: 4

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
ICCK Transactions on Wireless Networks

ICCK Transactions on Wireless Networks

ISSN: request pending (Online) | ISSN: request pending (Print)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/