Volume 10 , Issue 1 , PP: 28–41, 2026 | Cite this article as | XML | Html | PDF | Full Length Article
Ahmed Aziz 1 * , Mahmoud Abdel-Salam 2
Doi: https://doi.org/10.54216/IJWAC.100103
As wireless sensor networks (WSNs) and mobile ad hoc networks (MANETs) are (DoS) attacks has become a critical security concern in mission-critical wireless (DoS) attacks has become a critical security issue. This paper proposes ADML-IDS, an Adaptive Machine Learning Intrusion Detection System that integrates ensemble of Random Forest, XGBoost and Gradient Boosting classifiers using a Flooding, and Scheduling—as well as normal traffic. Flooding, Scheduling and normal traffic. Experiments are conducted on the open-source WSN-DS dataset, which contains 166,000 network observations using the LEACH hierarchical routing protocol with 23 features obtained from NS-2 simulation. The data preprocessing steps include Min- Max normalisation and Synthetic Minority Over-Sampling Technique (SMOTE) to balance classes, and importance-based feature selection to retain 19 features. A rigorous ten-fold crossvalidation strategy is followed. ADML-IDS achieves an overall accuracy of 99.57%, weighted F1-score of 0.9956 and AUC-ROC of 0.9985. AUC-ROC of 0.9985, outperforming each of the sub-classifiers and five state-of-the-art methods. Scalability experiments demonstrate that the accuracy of detection remains above network size reaches 200 nodes, and with a reasonable computational cost. A formal presentation of the energy-aware network model and ensemble decision rule is tables are also included along with a full description of the algorithm tables.
Wireless sensor networks , Ad hoc networks , Intrusion detection system , Ensemble machine learning , DoS attacks , LEACH protocol , WSN-DS dataset , Random Forest , XGBoost , Soft-voting classifier
[1] I. Almomani, B. Al-Kasasbeh, and M. Al-Akhras, “WSN-DS: A dataset for intrusion detection systems in wireless sensor networks,” Journal of Sensors, vol. 2016, pp. 1–16, 2016, doi: 10.1155/2016/4731953.
[2] V. K. Pandey, S. Prakash, T. K. Gupta, P. Sinha, T. Yang, R. S. Rathore, L. Wang, S. Tahir, and S. T. Bakhsh, “Enhancing intrusion detection in wireless sensor networks using a Tabu search based optimized random forest,” Scientific Reports, vol. 15, pp. 1–19, 2025, doi: 10.1038/s41598-025-03498-3.
[3] R. Meddeb, F. Jemili, B. Triki, and O. Korbaa, “A deep learning-based intrusion detection approach for mobile ad-hoc network,” Soft Computing, vol. 27, pp. 9425–9439, 2023, doi: 10.1007/s00500-023-08324-4.
[4] M. Prasad, S. Tripathi, and K. Dahal, “An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks,” Engineering Applications of Artificial Intelligence, vol. 119, p. 105760, 2023, doi: 10.1016/j.engappai.2022.105760.
[5] K. Rashid, Y. Saeed, A. Ali, F. Jamil, R. Alkanhel, and A. Muthanna, “An adaptive real-time malicious node detection framework using machine learning in vehicular ad-hoc networks (VANETs),” Sensors, vol. 23, no. 5, p. 2594, 2023, doi: 10.3390/s23052594.
[6] K. Murugan and T. Rajasekaran, “Optimizing mobile ad hoc network cluster based routing: Energy prediction via improved deep learning technique,” International Journal of Communication Systems, vol. 37, no. 8, p. e5777, 2024, doi: 10.1002/dac.5777.
[7] U. Srilakshmi, S. A. Alghamdi, V. A. Vuyyuru, N. Veeraiah, and Y. Alotaibi, “A secure optimization routing algorithm for mobile ad hoc networks,” IEEE Access, vol. 10, pp. 14260–14269, 2022, doi: 10.1109/ACCESS. 2022.3144679.
[8] X. Chen, G. Sun, T. Wu, L. Liu, H. Yu, and M. Guizani, “RANCE: A randomly centralized and on-demand clustering protocol for mobile ad hoc networks,” IEEE Internet of Things Journal, vol. 9, no. 23, pp. 23639– 23658, 2022, doi: 10.1109/JIOT.2022.3188679.
[9] K. Chandravanshi, G. Soni, and D. K. Mishra, “Design and analysis of an energy-efficient load balancing and bandwidth aware adaptive multipath n-channel routing approach in MANET,” IEEE Access, vol. 10, pp. 110003–110025, 2022, doi: 10.1109/ACCESS.2022.3213051.
[10] F. Safari, I. Savic, H. Kunze, and D. Gillis, “The diverse technology of MANETs: A survey of applications and challenges,” International Journal of Future Computer Communication, vol. 12, no. 2, pp. 37–48, 2023, doi: 10.18178/ijfcc.2023.12.2.601.
[11] J. Ryu and S. Kim, “Reputation-based opportunistic routing protocol using Q-learning for MANET attacked by malicious nodes,” IEEE Access, vol. 11, pp. 15126–15136, 2023, doi: 10.1109/ACCESS.2023.3244853.
[12] D. Godfrey, B. Suh, B. H. Lim, K. C. Lee, and K.-I. Kim, “An energy-efficient routing protocol with reinforcement learning in software-defined wireless sensor networks,” Sensors, vol. 23, no. 20, p. 8435, 2023, doi: 10.3390/s23208435.
[13] J. Singh, G. Singh, D. Gupta, G. Muhammad, and A. Nauman, “OCI-OLSR: An optimized control intervaloptimized link state routing-based efficient routing mechanism for ad-hoc networks,” Processes, vol. 11, no. 5, p. 1419, 2023, doi: 10.3390/pr11051419.
[14] V. K. Krishnamoorthy, I. Izonin, S. Subramanian, S. K. Shandilya, S. Velayutham, and T. R. Munichamy, “Energy saving optimization technique-based routing protocol in mobile ad-hoc network with IoT environment,” Energies, vol. 16, no. 3, p. 1385, 2023, doi: 10.3390/en16031385.
[15] A. H. Wheeb, R. Nordin, A. A. Samah, and D. Kanellopoulos, “Performance evaluation of standard and modified OLSR protocols for uncoordinated UAV ad-hoc networks in search and rescue environments,” Electronics, vol. 12, no. 6, p. 1334, 2023, doi: 10.3390/electronics12061334.
[16] N. V. Chawla, K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer, “SMOTE: Synthetic minority over sampling technique,” Journal of Artificial Intelligence Research, vol. 16, pp. 321–357, 2002, doi: 10.1613/jair.953.
[17] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay, “Scikit-learn: Machine learning in Python,” Journal of Machine Learning Research, vol. 12, pp. 2825–2830, 2011.
[18] M. A. Hefnawy, S. M. Darwish, and A. A. Elmasry, “Tuning the evaporation parameter in ACO MANET routing using a satisfaction-form game-theoretic approach,” IEEE Access, vol. 10, pp. 98004–98012, 2022, doi: 10.1109/ACCESS.2022.3206383.