-
CiteScore
-
Impact Factor
Volume 1, Issue 1, ICCK Transactions on Wireless Networks
Volume 1, Issue 1, 2025
Submit Manuscript Edit a Special Issue
Article QR Code
Article QR Code
Scan the QR code for reading
Popular articles
ICCK Transactions on Wireless Networks, Volume 1, Issue 1, 2025: 32-41

Open Access | Research Article | 27 June 2025
Bridging WSN and the Metaverse: An AI-Powered Hybrid Model for Cyber Threat Mitigation
1 Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura 140401, Punjab, India
* Corresponding Author: Shalli Rani, [email protected]
Received: 28 February 2025, Accepted: 26 May 2025, Published: 27 June 2025  
Abstract
Wireless Sensor Networks (WSNs) have emerged as a fundamental technology in modern digital ecosystems, enabling real-time data acquisition and communication. Their integration with the metaverse enhances immersive experiences by providing real-time environmental data, motion tracking, and networked interactions. However, the fusion of WSNs with the metaverse introduces significant security challenges, including network vulnerabilities, data privacy concerns, latency issues, and scalability constraints, which hinder seamless operation. To address these challenges, Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) techniques have been leveraged to enhance network security, optimize resource management, and improve data processing efficiency. AI-driven models facilitate anomaly detection, predictive maintenance, and real-time decision-making, making WSN-based metaverse environments more resilient and adaptive. A hybrid DL and ML model is proposed, integrating Convolutional Neural Networks (CNNs) and Bidirectional Long Short-Term Memory (Bi-LSTM) for feature extraction, followed by XGBoost for classification. The model achieves 99.64% accuracy, 96.39% balanced accuracy, 99.65% precision, 99.64% recall, and 99.73% ROC-AUC score, outperforming existing approaches. The results demonstrate its effectiveness in detecting security threats within WSN-based metaverse environments while ensuring computational efficiency and real-time attack detection.

Graphical Abstract
Bridging WSN and the Metaverse: An AI-Powered Hybrid Model for Cyber Threat Mitigation

Keywords
wireless network
5G
AI
network virtualization
6G

Data Availability Statement
Data will be made available on request.

Funding
This work was supported without any funding.

Conflicts of Interest
The authors declare no conflicts of interest.

Ethical Approval and Consent to Participate
Not applicable.

References
  1. Murgai, V., Lolabhattu, V. R. R., Stimpson, R., Tripathi, E., & Chickala, S. (2024). Securing the metaverse: Traffic application classification and anomaly detection. In 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) (pp. 111--117). IEEE.
    [CrossRef]   [Google Scholar]
  2. Gupta, B. B., Gaurav, A., & Chui, K. T. (2023). Deep CNN Based Anomaly Detection in Centralized Metaverse Environment. In 2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1--6). IEEE.
    [CrossRef]   [Google Scholar]
  3. Rathore, S., & Park, J. H. (2018). Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing, 72, 79--89.
    [CrossRef]   [Google Scholar]
  4. Liu, J., Kantarci, B., & Adams, C. (2020). Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. In Proceedings of the 2nd ACM workshop on wireless security and machine learning (pp. 25--30). ACM.
    [CrossRef]   [Google Scholar]
  5. Sarker, I. H., Abushark, Y. B., Alsolami, F., & Khan, A. I. (2020). Intrudtree: a machine learning based cyber security intrusion detection model. Symmetry, 12(5), 754.
    [CrossRef]   [Google Scholar]
  6. Musleh, D., Alotaibi, M., Alhaidari, F., Rahman, A., & Mohammad, R. M. (2023). Intrusion detection system using feature extraction with machine learning algorithms in IoT. Journal of Sensor and Actuator Networks, 12(2), 29.
    [CrossRef]   [Google Scholar]
  7. Gao, X., Shan, C., Hu, C., Niu, Z., & Liu, Z. (2019). An adaptive ensemble machine learning model for intrusion detection. IEEE Access, 7, 82512--82521.
    [CrossRef]   [Google Scholar]
  8. Yu, Y., & Bian, N. (2020). An intrusion detection method using few-shot learning. IEEE Access, 8, 49730--49740.
    [CrossRef]   [Google Scholar]
  9. Kurniawan, Y. I., Razi, F., Nofiyati, N., Wijayanto, B., & Hidayat, M. L. (2021). Naive Bayes modification for intrusion detection system classification with zero probability. Bulletin of Electrical Engineering and Informatics, 10(5), 2751--2758.
    [CrossRef]   [Google Scholar]
  10. Truong, V. T., & Le, L. B. (2023). MetaCIDS: Privacy-preserving collaborative intrusion detection for metaverse based on blockchain and online federated learning. IEEE Open Journal of the Computer Society, 4, 253-266.
    [CrossRef]   [Google Scholar]
  11. Wang, X., Guo, Q., Ning, Z., Guo, L., Wang, G., Gao, X., & Zhang, Y. (2024). Integration of Sensing, Communication, and Computing for Metaverse: A Survey. ACM Computing Surveys, 56(10), 1--38.
    [CrossRef]   [Google Scholar]
  12. Salmi, S., & Oughdir, L. (2023). Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network. Journal of Big Data, 10(1), 17.
    [CrossRef]   [Google Scholar]
  13. Saleh, H. M., Marouane, H., & Fakhfakh, A. (2024). Stochastic gradient descent intrusions detection for wireless sensor network attack detection system using machine learning. IEEE Access, 12, 3825-3836.
    [CrossRef]   [Google Scholar]
  14. Moundounga, A. R. A., & Satori, H. (2024). Stochastic machine learning based attacks detection system in wireless sensor networks. Journal of Network and Systems Management, 32(1), 17.
    [CrossRef]   [Google Scholar]
  15. Lai, T. T., Tran, T. P., Cho, J., & Yoo, M. (2023). DoS attack detection using online learning techniques in wireless sensor networks. Alexandria Engineering Journal, 85, 307--319.
    [CrossRef]   [Google Scholar]
  16. Moudoud, H., Abou El Houda, Z., & Brik, B. (2024). Advancing security and trust in wsns: A federated multi-agent deep reinforcement learning approach. IEEE Transactions on Consumer Electronics, 70(1), 123--134.
    [CrossRef]   [Google Scholar]
  17. Panda, N., & Supriya, M. (2023). Blackhole attack prediction in wireless sensor networks using support vector machine. In Advances in Signal Processing, Embedded Systems and IoT (pp. 321--331). Springer.
    [CrossRef]   [Google Scholar]
  18. Gu, J., & Lu, S. (2021). An effective intrusion detection approach using SVM with naïve Bayes feature embedding. Computers & Security, 103, 102158.
    [CrossRef]   [Google Scholar]
  19. Chakir, O., Rehaimi, A., Sadqi, Y., Alaoui, E. A. A., Krichen, M., Gaba, G. S., & Gurtov, A. (2023). An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0. Journal of King Saud University-Computer and Information Sciences, 35(3), 103-119.
    [CrossRef]   [Google Scholar]
  20. Logeswari, G., Bose, S., & Anitha, T. (2023). An intrusion detection system for sdn using machine learning. Intelligent Automation & Soft Computing, 35(1), 867--880.
    [CrossRef]   [Google Scholar]
  21. Kuo, S. Y., Tseng, F. H., & Chou, Y. H. (2023). Metaverse intrusion detection of wormhole attacks based on a novel statistical mechanism. Future Generation Computer Systems, 143, 179--190.
    [CrossRef]   [Google Scholar]
  22. Khan, L. U., Guizani, M., Yaqoob, I., Niyato, D., Al-Fuqaha, A., & Hong, C. S. (2024). A survey on metaverse-empowered 6G wireless systems: a security perspective. Internet of Things, 25, 101325.
    [CrossRef]   [Google Scholar]
  23. Kashyap, D., & Sood, M. (2023). A Precursor to a Review of Security Scenario in Metaverse with Reference to the Security Protocols in Wireless Communication and IoT. In The International Conference on Recent Innovations in Computing (pp. 483--500). Springer.
    [CrossRef]   [Google Scholar]
  24. Ali, M., Naeem, F., Kaddoum, G., & Hossain, E. (2023). Metaverse communications, networking, security, and applications: Research issues, state-of-the-art, and future directions. IEEE Communications Surveys & Tutorials, 26(2), 1238--1278.
    [CrossRef]   [Google Scholar]

Cite This Article
APA Style
Vashisht, S., & Rani, S. (2025). Bridging WSN and the Metaverse: An AI-Powered Hybrid Model for Cyber Threat Mitigation. ICCK Transactions on Wireless Networks, 1(1), 32–41. https://doi.org/10.62762/TWN.2025.750033

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 11
PDF Downloads: 3

Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions
CC BY Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.
ICCK Transactions on Wireless Networks

ICCK Transactions on Wireless Networks

ISSN: request pending (Online) | ISSN: request pending (Print)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/