Volume 16 , Issue 1 , PP: 176-188, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Esraa Saleh Alomari 1 , Oday Ali Hassen 2 * , Wisam Makki Salim 3 , Selvakumar Manickam 4 , Nur Azman Abu 5
Doi: https://doi.org/10.54216/JISIoT.160115
Wireless sensor networks have become a vital component of the infrastructure for many modern applications. With the increasing use of wireless sensor networks, the challenges facing these networks in the field of security are escalating and growing, and with the rapid advancement of wireless communication technology, these networks are exposed to increasing, complex and continuous threats. Our research is characterized by innovation in the field of security technology to enhance protection, repel attacks and detect intrusions, among these innovations are intrusion detection systems based on machine learning as a creative and new solution. In this research, we highlight the effectiveness of different machine learning algorithms, such as supervised and unsupervised learning, in detecting anomalies and intrusions within wireless sensor networks, as our goal focuses on enhancing the security of wireless sensor networks (WSNs) by adopting intrusion detection systems (IDS) based on machine learning techniques. In this context, with a focus on using the WSN-DS dataset. The results of this research showed that machine-learning models could improve the security efficiency of wireless sensor networks by achieving accuracy ranging from 91% to 99.7% and testing time ranging from 0.006 to 0.1249, which enhances the ability to effectively retrieve and detect threats in real time.
WSN , IDS , WSN-DS , Random Forest , Decision Tree , Logistic Regression , MLP
[1] R. Wazirali, R. Ahmad, A. Al-Amayreh, M. Al-Madi, and A. Khalifeh, “Secure watermarking schemes and their approaches in the IoT technology: An overview,” Electronics, vol. 10, p. 1744, 2021.
[2] D. Kandris et al., “Applications of wireless sensor networks: An up-to-date survey,” IEEE Internet Things J., vol. 7, no. 3, pp. 577–602, Mar. 2020.
[3] V. C. Gungor, B. Lu, and G. P. Hancke, “Opportunities and challenges of wireless sensor networks in smart grid,” IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557–3564, 2010.
[4] M. Bouaziz and A. Rachedi, “A survey on mobility management protocols in wireless sensor networks based on 6LoWPAN technology,” Comput. Commun., vol. 74, pp. 3–15, 2016.
[5] U. Ghugar and J. Pradhan, “NL-IDS: Trust-based intrusion detection system for network layer in wireless sensor networks,” in Proc. 5th Int. Conf. Parallel, Distrib. Grid Comput. (PDGC), 2018.
[6] P. Laskov, D. Patrick, and C. Sch, “Learning intrusion detection: Supervised or unsupervised?” in Proc. Sept. 2005, pp. 50–57, 2014.
[7] H. Liu and B. Lang, “Machine learning and deep learning methods for intrusion detection systems: A survey,” Appl. Sci., vol. 9, p. 4396, 2019.
[8] R. Ahmad, R. Wazirali, and T. Abu-Ain, “Machine learning for wireless sensor networks security: An overview of challenges and issues,” Sensors, vol. 22, no. 13, p. 4730, 2022.
[9] Z. Liu, G. Mohiuddin, Z. Jiangbin, M. Asim, and S. Wang, “Intrusion detection in wireless sensor network using enhanced empirical-based component analysis,” Future Gener. Comput. Syst., vol. 135, pp. 181–193, 2022.
[10] V. Gowdhaman and R. D. Dhanapal, “An intrusion detection system for wireless sensor networks using deep neural network,” Soft Comput., 2021. DOI: 10.1007/s00500-021-06473-y.
[11] W. Wang, H. Huang, Q. Li, F. He, and C. Sha, “Generalized intrusion detection mechanism for empowered intruders in wireless sensor networks,” IEEE Access, vol. 8, pp. 25170–25183, 2020.
[12] Cateruccio et al., “Short-long term anomaly detection in wireless sensor networks based on machine learning and multi-parameterized edit distance,” Inf. Fusion, vol. 52, Dec. 2019, pp. 13–30.
[13] V. Sivagaminathan, M. Sharma, and S. K. Henge, “Intrusion detection systems for wireless sensor networks using computational intelligence techniques,” Cybersecurity, vol. 6, p. 27, 2023.
[14] S. Ifzarne, H. Tabbaa, I. Hafidi, and N. Lamghari, “Anomaly detection using machine learning techniques in wireless sensor networks,” J. Phys. Conf. Ser., vol. 1743, no. 1, 2021.
[15] I. Almomani, B. Al-Kasasbeh, and M. AL-Akhras, “WSN-DS: A dataset for intrusion detection systems in wireless sensor networks,” J. Sensors, vol. 2016, p. 4731953, 2016.
[16] M. Kubat, An Introduction to Machine Learning, Berlin/Heidelberg, Germany: Springer, 2021.
[17] M. J. Khudair, H. A. Abd Ali, and S. M. Darwish, “A quantum-inspired ant colony optimization approach for exploring routing gateways in mobile ad hoc networks,” Electronics, vol. 12, no. 5, p. 1171, 2023.
[18] Z. H. Noori, S. K. Ebis, and D. Saad, “An information security engineering framework for modeling packet filtering firewall using neutrosophic petri nets,” Computers, vol. 12, no. 10, 2022.
[19] Y. Y. Ghadi et al., “Machine learning solution for the security of wireless sensor network,” IEEE Access, 2024.
[20] V. N. N. Tam and C. T. Thanh, “Enhancing wireless sensor network security with machine learning,” in Proc. Comput. Sci. Online Conf., Cham: Springer Nature Switzerland, Apr. 2024, pp. 604–626.
[21] O. A. Khashan, “Dual-stage machine learning approach for advanced malicious node detection in WSNs,” Ad Hoc Netw., vol. 166, p. 103672, 2025.
[22] O. Ahmed, “Enhancing intrusion detection in wireless sensor networks through machine learning techniques and context awareness integration,” Int. J. Math. Stat. Comput. Sci., vol. 2, pp. 244–258, 2024.
[23] P. R. Jayanthi et al., “An improved dynamic traffic routing protocols for WSNs using machine learning,” in Proc. 15th Int. Conf. Comput. Commun. Netw. Technol. (ICCCNT), 2024, pp. 1–6.
[24] A. Darabseh and M. Faizan, “Outlier detection in wireless sensor networks using machine learning and statistical-based approaches,” Revue d’Intell. Artif., vol. 38, no. 4, 2024.
[25] Z. Hao, M. Li, W. Yang, and X. Li, “Evaluation of UAV spraying quality based on 1D-CNN model and wireless multi-sensors system,” Inf. Process. Agric., vol. 11, no. 1, pp. 65–79, 2024.
[26] T. Roy and S. K. Shome, “Optimization of RNN-LSTM model using NSGA-II algorithm for IoT-based fire detection framework,” IETE J. Res., vol. 70, no. 7, pp. 6239–6254, 2024.
[27] B. C. Sengodan et al., “Variational autoencoders for network lifetime enhancement in wireless sensors,” Sensors, vol. 24, no. 17, p. 5630, 2024.
[28] Q. Li, Y. Ma, and Y. Wu, “Utilize DBN and DBSCAN to detect selective forwarding attacks in event-driven wireless sensors networks,” Eng. Appl. Artif. Intell., vol. 126, p. 107122, 2023.
[29] S. P. Kumar, S. Garg, E. Alabdulkreem, and A. B. Miled, “Advanced generative adversarial network for optimizing layout of wireless sensor networks,” Sci. Rep., vol. 14, no. 1, p. 32139, 2024.
[30] K. Ramu et al., “Deep learning-infused hybrid security model for energy optimization and enhanced security in wireless sensor networks,” SN Comput. Sci., vol. 5, no. 7, p. 848, 2024.