Volume 17 , Issue 1 , PP: 304-324, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Foad Salem Mubarek 1 , Akeel A.Thulnoon 2 * , Ahmed Mahdi Jubair 3
Doi: https://doi.org/10.54216/JISIoT.170122
The Internet of Things (IoT) has greatly changed many aspects of human life and is now a vast distributed systems network of interconnected devices that have embedded sensors; however, the battery life of these sensor nodes is limited and requires constant maintenance. Furthermore, IoT networks operating as distributed systems are vulnerable to security threats, like de-authentication and Disassociation Denial-of-Service attacks, which exploit vulnerabilities in Wi-Fi devices. While artificial intelligence, including machine learning, has been integrated into intrusion detection systems to enhance detection of cyberattacks, there is an increasing need for improved accuracy, scalability, efficiency, and IoT-specific security solutions. This paper proposed a novel model, Hybrid Optimization-based Clustering with CNN-Based De-Authentication (HOCCNN), designed to concurrently address both energy conservation and security issues in IoT-enabled heterogeneous wireless sensor networks (WSNs). The HOCCNN adopts a hierarchical clustering technique optimized using the bio-inspired Osprey Optimization Algorithm (OOA) for dynamic and energy-efficient Cluster Head (CH) selection. Additionally, we introduce a CNN model to detect and mitigate De-authentication attacks in HOCCNN by utilizing deep learning techniques and provide a more accurate threat detection solution even in the resource-constrained environment. The performance of HOCCNN was evaluated using MATLAB against existing baseline methods in terms of parameters like packet delivery ratio, network throughput, network lifetime, end-to-end delay, average energy consumption, data accuracy, and data overhead. The model demonstrates superiority over state-of-the-art baselines. Results show significant improvements. 99.1% accuracy in attack detection, 54.18% energy consumption, 6.76 s network lifetime, 0.985 packet delivery ratio, and 53.198 Mb/s throughput. These results prove that HOCCNN is a complete design to achieve scalable, secure, and energy-sustainable HWSNs in IoT.
Internet of Things (IoT) , Heterogeneous Wireless Sensor Networks , Hybrid Optimization , CNN-Based De-Authentication , Osprey Optimization Algorithm
[1] M. Trigka and E. Dritsas, "Wireless Sensor Networks: From Fundamentals and Applications to Innovations and Future Trends," IEEE Access, 2025, doi: 10.1109/access.2025.3572328.
[2] W. Osamy, A. M. Khedr, A. Salim, A. I. AlAli, and A. A. El-Sawy, "Recent studies utilizing artificial intelligence techniques for solving data collection, aggregation and dissemination challenges in wireless sensor networks: A review," Electron., vol. 11, no. 3, p. 313, 2022, doi: 10.3390/electronics11030313.
[3] A. Abba Ari et al., "Data collection in IoT networks: Architecture, solutions, protocols and challenges," IET Wirel. Sensor Syst., vol. 14, no. 4, pp. 85–110, 2024, doi: 10.1049/wss2.12080.
[4] M. Jubair et al., "Optimization of clustering in wireless sensor networks: Techniques and protocols," Appl. Sci., vol. 11, no. 23, p. 11448, 2021, doi: 10.3390/app112311448.
[5] M. Jubair, R. Hassan, A. H. M. Aman, and H. Sallehudin, "Social class particle swarm optimization for variable-length Wireless Sensor Network Deployment," Appl. Soft Comput., vol. 113, p. 107926, 2021, doi: 10.1016/j.asoc.2021.107926.
[6] D. B. Rawat and S. R. Reddy, "Software defined networking architecture, security and energy efficiency: A survey," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 325–346, 2016, doi: 10.1109/comst.2016.2618874.
[7] N. Chandnani and C. N. Khairnar, "An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs," Theor. Comput. Sci., vol. 929, pp. 95–113, 2022, doi: 10.1016/j.tcs.2022.06.032.
[8] P. Rosa, A. Souto, and J. Cecílio, "Light-SAE: A lightweight authentication protocol for large-scale IoT environments made with constrained devices," IEEE Trans. Netw. Service Manag., vol. 20, no. 3, pp. 2428–2441, 2023, doi: 10.1109/tnsm.2023.3275011.
[9] S. He, Q. Li, M. Khishe, A. Salih Mohammed, H. Mohammadi, and M. Mohammadi, "The optimization of nodes clustering and multi-hop routing protocol using hierarchical chimp optimization for sustainable energy efficient underwater wireless sensor networks," Wirel. Netw., vol. 30, no. 1, pp. 233–252, 2024, doi: 10.1007/s11276-023-03464-9.
[10] S. Ghazy, G. Kaddoum, and S. Singh, "Low-latency low-energy adaptive clustering hierarchy protocols for underwater acoustic networks," IEEE Access, vol. 11, pp. 50578–50594, 2023, doi: 10.1109/access.2023.3277395.
[11] A. Alimi et al., Network-on-Chip Topologies: Potentials, Technical Challenges, Recent Advances and Research Direction. London, U.K.: IntechOpen, 2021, doi: 10.5772/intechopen.97262.
[12] S. Lata, S. Mehfuz, and S. Urooj, "Secure and reliable WSN for Internet of Things: Challenges and enabling technologies," IEEE Access, vol. 9, pp. 161103–161128, 2021, doi: 10.1109/access.2021.3131367.
[13] R. Gupta, D. Srivastava, M. Sahu, S. Tiwari, R. K. Ambasta, and P. Kumar, "Artificial intelligence to deep learning: Machine intelligence approach for drug discovery," Mol. Divers., vol. 25, no. 3, pp. 1315–1360, 2021, doi: 10.1007/s11030-021-10217-3.
[14] Hemalatha Reddy, J. Sinjini, M. Priyadharshini, V. Indumathi, V. Bhavani, and T. Jahan, "Optimizing energy efficiency in wireless sensor networks using machine learning techniques," in Proc. Int. Conf. Inf. Manag. Eng., 2023, pp. 599–610, doi: 10.1007/978-981-97-9262-7_52.
[15] T. Kim, L. F. Vecchietti, K. Choi, S. Lee, and D. Har, "Machine learning for advanced wireless sensor networks: A review," IEEE Sensors J., vol. 21, no. 11, pp. 12379–12397, 2020, doi: 10.1109/jsen.2020.3035846.
[16] N. Waheed, X. He, M. Ikram, M. Usman, S. S. Hashmi, and M. Usman, "Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures," ACM Comput. Surv., vol. 53, no. 6, pp. 1–37, 2020, doi: 10.1145/3417987.
[17] T. C. Akinci, G. Erdemir, A. T. Zengin, S. Seker, and A. I. Idriss, "Machine learning-based error correction codes and communication protocols for power line communication: An overview," IEEE Access, vol. 11, pp. 124760–124781, 2023, doi: 10.1109/access.2023.3330690.
[18] M. Beko and S. Tomic, "Toward secure localization in randomly deployed wireless networks," IEEE Internet Things J., vol. 8, no. 24, pp. 17436–17448, 2021, doi: 10.1109/jiot.2021.3078216.
[19] Surenther, K. Sridhar, and M. K. Roberts, "Enhancing data transmission efficiency in wireless sensor networks through machine learning-enabled energy optimization: A grouping model approach," Ain Shams Eng. J., vol. 15, no. 4, p. 102644, 2024, doi: 10.1016/j.asej.2024.102644.
[20] N. R. Saadallah, S. A. Alabady, and F. Al-Turjman, "Energy-efficient cluster head selection via genetic algorithm," Al-Rafidain Eng. J., vol. 29, no. 1, pp. 12–25, 2024, doi: 10.33899/rengj.2023.143955.01293.
[21] S. K. Gebresilassie, J. Rafferty, L. Chen, Z. Cui, and M. Abu-Tair, "Transfer and CNN-based de-authentication (disassociation) DoS attack detection in IoT Wi-Fi networks," Electronics, vol. 12, no. 17, p. 3731, 2023, doi: 10.3390/electronics12173731.
[22] R. K. Singh, P. P. Puluckul, R. Berkvens, and M. Weyn, "Energy consumption analysis of LPWAN technologies and lifetime estimation for IoT application," Sensors, vol. 20, no. 17, p. 4794, 2020, doi: 10.3390/s20174794.
[23] M. D. Khan et al., "Energy harvested and cooperative enabled efficient routing protocol (EHCRP) for IoT-WBAN," Sensors, vol. 20, no. 21, p. 6267, 2020, doi: 10.3390/s20216267.
[24] Xu, M. Lu, H. Zhang, and C. Pan, "A novel multi-agent model for robustness with component failure and malware propagation in wireless sensor networks," Sensors, vol. 21, no. 14, p. 4873, 2021, doi: 10.3390/s21144873.
[25] S. Hao, Y. Hong, and Y. He, "An energy-efficient routing algorithm based on greedy strategy for energy harvesting wireless sensor networks," Sensors, vol. 22, no. 4, p. 1645, 2022, doi: 10.3390/s22041645.
[26] S. Sadeq, R. Hassan, H. Sallehudin, A. H. M. Aman, and A. H. Ibrahim, "Conceptual framework for future WSN-MAC protocol to achieve energy consumption enhancement," Sensors, vol. 22, no. 6, p. 2129, 2022, doi: 10.3390/s22062129.
[27] M. Bilal, E. U. Munir, and F. K. Alarfaj, "Hybrid clustering and routing algorithm with threshold-based data collection for heterogeneous wireless sensor networks," Sensors, vol. 22, no. 15, p. 5471, 2022, doi: 10.3390/s22155471.
[28] J.-W. Kim, J. Kim, and J. Lee, "Cross-layer MAC/routing protocol for reliability improvement of the Internet of Things," Sensors, vol. 22, no. 23, p. 9429, 2022, doi: 10.3390/s22239429.
[29] N. López-Vilos, C. Valencia-Cordero, R. D. Souza, and S. Montejo-Sánchez, "Clustering-based energy-efficient self-healing strategy for WSNs under jamming attacks," Sensors, vol. 23, no. 15, p. 6894, 2023, doi: 10.3390/s23156894.
[30] S. H. Abdul-Qawy et al., "An enhanced energy efficient protocol for large-scale IoT-based heterogeneous WSNs," Sci. Afr., vol. 21, p. e01807, 2023, doi: 10.1016/j.sciaf.2023.e01807.
[31] V. Pandiyaraju, S. Ganapathy, N. Mohith, and A. Kannan, "An optimal energy utilization model for precision agriculture in WSNs using multi-objective clustering and deep learning," J. King Saud Univ.-Comput. Inf. Sci., vol. 35, no. 10, p. 101803, 2023, doi: 10.1016/j.jksuci.2023.101803.
[32] S. Mohan and S. Panda, "Multi-factor optimized mobile sink data collection framework for hybrid WSN-LTE assisted IoT network," Heliyon, vol. 10, no. 5, 2024, doi: 10.1016/j.heliyon.2024.e25998.