Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Volume 16 , Issue 1 , PP: 176-188, 2025 | Cite this article as | XML | Html | PDF | Full Length Article

A New Descriptor Based on Machine Learning for Intrusion Detection in Wireless Sensor Networks WNSs

Esraa Saleh Alomari 1 , Oday Ali Hassen 2 * , Wisam Makki Salim 3 , Selvakumar Manickam 4 , Nur Azman Abu 5

  • 1 Computer Department, College of Education for Pure Sciences, Wasit University, Iraq - (ealomari@uowasit.edu.iq)
  • 2 Computer Department, College of Education for Pure Sciences, Wasit University, Iraq; Ministry of Education, Wasit Education Directorate. Iraq - (oday123456789.oa@gmail.com)
  • 3 College of Dentistry, Al-Iraqia University, Baghdad, Iraq - (wisam.m.salim@aliraqia.edu.iq)
  • 4 National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia - (selva@nav6.usm.my)
  • 5 Department of Information Technology, University Technical Malaysia Melaka, Hang Taya, Melaka 76100, Malaysia - (nura@utem.edu.my)
  • Doi: https://doi.org/10.54216/JISIoT.160115

    Received: November 28 2024 Revised: January 21, 2025 Accepted: February 17, 2025
    Abstract

    Wireless sensor networks have become a vital component of the infrastructure for many modern applications. With the increasing use of wireless sensor networks, the challenges facing these networks in the field of security are escalating and growing, and with the rapid advancement of wireless communication technology, these networks are exposed to increasing, complex and continuous threats. Our research is characterized by innovation in the field of security technology to enhance protection, repel attacks and detect intrusions, among these innovations are intrusion detection systems based on machine learning as a creative and new solution. In this research, we highlight the effectiveness of different machine learning algorithms, such as supervised and unsupervised learning, in detecting anomalies and intrusions within wireless sensor networks, as our goal focuses on enhancing the security of wireless sensor networks (WSNs) by adopting intrusion detection systems (IDS) based on machine learning techniques. In this context, with a focus on using the WSN-DS dataset. The results of this research showed that machine-learning models could improve the security efficiency of wireless sensor networks by achieving accuracy ranging from 91% to 99.7% and testing time ranging from 0.006 to 0.1249, which enhances the ability to effectively retrieve and detect threats in real time.

    Keywords :

    WSN , IDS , WSN-DS , Random Forest , Decision Tree , Logistic Regression , MLP

    References

    [1] R. Wazirali, R. Ahmad, A. Al-Amayreh, M. Al-Madi, and A. Khalifeh, “Secure watermarking schemes and their approaches in the IoT technology: An overview,” Electronics, vol. 10, p. 1744, 2021.

    [2] D. Kandris et al., “Applications of wireless sensor networks: An up-to-date survey,” IEEE Internet Things J., vol. 7, no. 3, pp. 577–602, Mar. 2020.

    [3] V. C. Gungor, B. Lu, and G. P. Hancke, “Opportunities and challenges of wireless sensor networks in smart grid,” IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557–3564, 2010.

    [4] M. Bouaziz and A. Rachedi, “A survey on mobility management protocols in wireless sensor networks based on 6LoWPAN technology,” Comput. Commun., vol. 74, pp. 3–15, 2016.

    [5] U. Ghugar and J. Pradhan, “NL-IDS: Trust-based intrusion detection system for network layer in wireless sensor networks,” in Proc. 5th Int. Conf. Parallel, Distrib. Grid Comput. (PDGC), 2018.

    [6] P. Laskov, D. Patrick, and C. Sch, “Learning intrusion detection: Supervised or unsupervised?” in Proc. Sept. 2005, pp. 50–57, 2014.

    [7] H. Liu and B. Lang, “Machine learning and deep learning methods for intrusion detection systems: A survey,” Appl. Sci., vol. 9, p. 4396, 2019.

    [8] R. Ahmad, R. Wazirali, and T. Abu-Ain, “Machine learning for wireless sensor networks security: An overview of challenges and issues,” Sensors, vol. 22, no. 13, p. 4730, 2022.

    [9] Z. Liu, G. Mohiuddin, Z. Jiangbin, M. Asim, and S. Wang, “Intrusion detection in wireless sensor network using enhanced empirical-based component analysis,” Future Gener. Comput. Syst., vol. 135, pp. 181–193, 2022.

    [10] V. Gowdhaman and R. D. Dhanapal, “An intrusion detection system for wireless sensor networks using deep neural network,” Soft Comput., 2021. DOI: 10.1007/s00500-021-06473-y.

    [11] W. Wang, H. Huang, Q. Li, F. He, and C. Sha, “Generalized intrusion detection mechanism for empowered intruders in wireless sensor networks,” IEEE Access, vol. 8, pp. 25170–25183, 2020.

    [12] Cateruccio et al., “Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance,” Inf. Fusion, vol. 52, Dec. 2019, pp. 13–30.

    [13] V. Sivagaminathan, M. Sharma, and S. K. Henge, “Intrusion detection systems for wireless sensor networks using computational intelligence techniques,” Cybersecurity, vol. 6, p. 27, 2023.

    [14] S. Ifzarne, H. Tabbaa, I. Hafidi, and N. Lamghari, “Anomaly detection using machine learning techniques in wireless sensor networks,” J. Phys. Conf. Ser., vol. 1743, no. 1, 2021.

    [15] I. Almomani, B. Al-Kasasbeh, and M. AL-Akhras, “WSN-DS: A dataset for intrusion detection systems in wireless sensor networks,” J. Sensors, vol. 2016, p. 4731953, 2016.

    [16] M. Kubat, An Introduction to Machine Learning, Berlin/Heidelberg, Germany: Springer, 2021.

    [17] M. J. Khudair, H. A. Abd Ali, and S. M. Darwish, “A quantum-inspired ant colony optimization approach for exploring routing gateways in mobile ad hoc networks,” Electronics, vol. 12, no. 5, p. 1171, 2023.

    [18] Z. H. Noori, S. K. Ebis, and D. Saad, “An information security engineering framework for modeling packet filtering firewall using neutrosophic petri nets,” Computers, vol. 12, no. 10, 2022.

    [19] Y. Y. Ghadi et al., “Machine learning solution for the security of wireless sensor network,” IEEE Access, 2024.

    [20] V. N. N. Tam and C. T. Thanh, “Enhancing wireless sensor network security with machine learning,” in Proc. Comput. Sci. Online Conf., Cham: Springer Nature Switzerland, Apr. 2024, pp. 604–626.

    [21] O. A. Khashan, “Dual-stage machine learning approach for advanced malicious node detection in WSNs,” Ad Hoc Netw., vol. 166, p. 103672, 2025.

    [22] O. Ahmed, “Enhancing intrusion detection in wireless sensor networks through machine learning techniques and context awareness integration,” Int. J. Math. Stat. Comput. Sci., vol. 2, pp. 244–258, 2024.

    [23] P. R. Jayanthi et al., “An improved dynamic traffic routing protocols for WSNs using machine learning,” in Proc. 15th Int. Conf. Comput. Commun. Netw. Technol. (ICCCNT), 2024, pp. 1–6.

    [24] A. Darabseh and M. Faizan, “Outlier detection in wireless sensor networks using machine learning and statistical-based approaches,” Revue d’Intell. Artif., vol. 38, no. 4, 2024.

    [25] Z. Hao, M. Li, W. Yang, and X. Li, “Evaluation of UAV spraying quality based on 1D-CNN model and wireless multi-sensors system,” Inf. Process. Agric., vol. 11, no. 1, pp. 65–79, 2024.

    [26] T. Roy and S. K. Shome, “Optimization of RNN-LSTM model using NSGA-II algorithm for IoT-based fire detection framework,” IETE J. Res., vol. 70, no. 7, pp. 6239–6254, 2024.

    [27] B. C. Sengodan et al., “Variational autoencoders for network lifetime enhancement in wireless sensors,” Sensors, vol. 24, no. 17, p. 5630, 2024.

    [28] Q. Li, Y. Ma, and Y. Wu, “Utilize DBN and DBSCAN to detect selective forwarding attacks in event-driven wireless sensors networks,” Eng. Appl. Artif. Intell., vol. 126, p. 107122, 2023.

    [29] S. P. Kumar, S. Garg, E. Alabdulkreem, and A. B. Miled, “Advanced generative adversarial network for optimizing layout of wireless sensor networks,” Sci. Rep., vol. 14, no. 1, p. 32139, 2024.

    [30] K. Ramu et al., “Deep learning-infused hybrid security model for energy optimization and enhanced security in wireless sensor networks,” SN Comput. Sci., vol. 5, no. 7, p. 848, 2024.

    Cite This Article As :
    Saleh, Esraa. , Ali, Oday. , Makki, Wisam. , Manickam, Selvakumar. , Azman, Nur. A New Descriptor Based on Machine Learning for Intrusion Detection in Wireless Sensor Networks WNSs. Journal of Intelligent Systems and Internet of Things, vol. , no. , 2025, pp. 176-188. DOI: https://doi.org/10.54216/JISIoT.160115
    Saleh, E. Ali, O. Makki, W. Manickam, S. Azman, N. (2025). A New Descriptor Based on Machine Learning for Intrusion Detection in Wireless Sensor Networks WNSs. Journal of Intelligent Systems and Internet of Things, (), 176-188. DOI: https://doi.org/10.54216/JISIoT.160115
    Saleh, Esraa. Ali, Oday. Makki, Wisam. Manickam, Selvakumar. Azman, Nur. A New Descriptor Based on Machine Learning for Intrusion Detection in Wireless Sensor Networks WNSs. Journal of Intelligent Systems and Internet of Things , no. (2025): 176-188. DOI: https://doi.org/10.54216/JISIoT.160115
    Saleh, E. , Ali, O. , Makki, W. , Manickam, S. , Azman, N. (2025) . A New Descriptor Based on Machine Learning for Intrusion Detection in Wireless Sensor Networks WNSs. Journal of Intelligent Systems and Internet of Things , () , 176-188 . DOI: https://doi.org/10.54216/JISIoT.160115
    Saleh E. , Ali O. , Makki W. , Manickam S. , Azman N. [2025]. A New Descriptor Based on Machine Learning for Intrusion Detection in Wireless Sensor Networks WNSs. Journal of Intelligent Systems and Internet of Things. (): 176-188. DOI: https://doi.org/10.54216/JISIoT.160115
    Saleh, E. Ali, O. Makki, W. Manickam, S. Azman, N. "A New Descriptor Based on Machine Learning for Intrusion Detection in Wireless Sensor Networks WNSs," Journal of Intelligent Systems and Internet of Things, vol. , no. , pp. 176-188, 2025. DOI: https://doi.org/10.54216/JISIoT.160115