Volume 10 , Issue 2 , PP: 01–10, 2026 | Cite this article as | XML | Html | PDF | Full Length Article
Raden Aur Aachman Azakiyullah 1 * , Aiswan Aumanti 2
Doi: https://doi.org/10.54216/IJWAC.100201
Wireless sensor IoT devices increasingly operate under strict energy, latency, and security constraints while generating high-frequency telemetry that cannot be forwarded continuously to remote clouds. This paper presents an event-selective fog microbatching model for wireless sensor streams in which local novelty scoring, fog-side buffering, risk-preserving retention, and energy-aware scheduling are jointly optimized. Unlike conventional anomaly-detection pipelines, the proposed method treats communication reduction as a primary design objective and binds it mathematically to attack-evidence preservation. A reduced feature-level experimental file following the public Edge-IIoTset label structure and selected network/sensor attributes is used to evaluate traffic selectivity, uplink reduction, fog latency, energy saving, and detection performance. The model assigns each observation window a novelty score, suppresses redundant low-information traffic, and groups retained events into load-aware microbatches at the nearest fog node. The proposed model is extended with stochastic retention bounds, microbatch-delay stability, radio-energy equations, and risk-constrained threshold calibration. Experimental results show that the design reduces uplink load and radio-energy consumption while preserving strong attack discrimination across distributed wireless sensor traffic. The findings support a broader use of fog computing as a selective communication-control layer for dense, security-sensitive wireless sensor IoT deployments.
Wireless sensor IoT , Fog computing , Event-selective transmission , Microbatching , Edge-IIoTset , Anomaly-aware scheduling
[1] M. A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. Janicke, “Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning,” IEEE Access, vol. 10, pp. 40281–40306, 2022, doi: 10.1109/ACCESS. 2022.3165809.
[2] E. C. P. Neto, S. Dadkhah, R. Ferreira, A. Zohourian, R. Lu, and A. A. Ghorbani, “CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment,” Sensors, vol. 23, no. 13, p. 5941, 2023, doi: 10.3390/s23135941.
[3] T. Al Nuaimi, S. Al Zaabi, M. Alyilieli, M. AlMaskari, S. Alblooshi, F. Alhabsi, M. F. B. Yusof, and A. Al Badawi, “A comparative evaluation of intrusion detection systems on the Edge-IIoT-2022 dataset,” Intelligent Systems with Applications, vol. 20, p. 200298, 2023, doi: 10.1016/j.iswa.2023.200298.
[4] A. Hazra, P. Rana, M. Adhikari, and T. Amgoth, “Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges,” Computer Science Review, vol. 48, p. 100549, 2023, doi: 10.1016/j.cosrev.2023.100549.
[5] N. Kumari, A. Yadav, and P. K. Jana, “Task offloading in fog computing: A survey of algorithms and optimization techniques,” Computer Networks, vol. 214, p. 109137, 2022, doi: 10.1016/j.comnet.2022.109137.
[6] G. K. Walia, M. Kumar, and S. S. Gill, “AI-empowered fog/edge resource management for IoT applications: A comprehensive review, research challenges, and future perspectives,” IEEE Communications Surveys & Tutorials, vol. 26, no. 1, pp. 619–669, 2024, doi: 10.1109/COMST.2023.3338015.
[7] N. F. Syed, M. Ge, and Z. Baig, “Fog-cloud based intrusion detection system using recurrent neural networks and feature selection for IoT networks,” Computer Networks, vol. 225, p. 109662, 2023, doi: 10.1016/j.comnet.2023.109662.
[8] S. Latif, W. Boulila, A. Koubaa, Z. Zou, and J. Ahmad, “DTL-IDS: An optimized intrusion detection framework using deep transfer learning and genetic algorithm,” Journal of Network and Computer Applications, vol. 221, p. 103784, 2024, doi: 10.1016/j.jnca.2023.103784.
[9] D. Javeed, M. S. Saeed, M. A. Adil, P. Kumar, and A. Jolfaei, “A federated learning-based zero trust intrusion detection system for Internet of Things,” Ad Hoc Networks, vol. 162, p. 103540, 2024, doi: 10.1016/j.adhoc.2024.103540.
[10] D. Attique, H. Wang, and P. Wang, “Fog-assisted deep-learning-empowered intrusion detection system for RPL-based resource-constrained smart industries,” Sensors, vol. 22, no. 23, p. 9416, 2022, doi: 10.3390/s22239416.
[11] M. Tawfik, “Optimized intrusion detection in IoT and fog computing using ensemble learning and advanced feature selection,” PLOS ONE, vol. 19, no. 8, p. e0304082, 2024, doi: 10.1371/journal.pone.0304082.
[12] T. Rehman, N. Tariq, F. A. Khan, and S. U. Rehman, “FFL-IDS: A fog-enabled federated learning-based intrusion detection system to counter jamming and spoofing attacks for the Industrial Internet of Things,” Sensors, vol. 25, no. 1, p. 10, 2025, doi: 10.3390/s25010010.
[13] H. Zhou, H. Zou, W. Li, D. Li, and Y. Kuang, “HiViTIDS: An efficient network intrusion detection method based on vision transformer,” Sensors, vol. 25, no. 6, p. 1752, 2025, doi: 10.3390/s25061752.
[14] Z. Abou El Houda, B. Brik, and L. Khoukhi, “Why should I trust your IDS?: An explainable deep learning framework for intrusion detection systems in Internet of Things networks,” IEEE Open Journal of the Communications Society, vol. 3, pp. 1164–1176, 2022, doi: 10.1109/OJCOMS.2022.3188750.
[15] A. Hazra, P. K. Donta, T. Amgoth, and S. Dustdar, “Cooperative transmission scheduling and computation offloading with collaboration of fog and cloud for Industrial IoT applications,” IEEE Internet of Things Journal, vol. 10, no. 5, pp. 3944–3953, 2023, doi: 10.1109/JIOT.2022.3150070.
[16] X. Zhou, Y. Hu, J.Wu,W. Liang, J. Ma, and Q. Jin, “Distribution bias aware collaborative generative adversarial network for imbalanced deep learning in Industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 19, no. 1, pp. 570–580, 2023, doi: 10.1109/TII.2022.3170149.
[17] M. H. Bhavsar, Y. B. Bekele, K. Roy, J. C. Kelly, and D. Limbrick, “FL-IDS: Federated learning-based intrusion detection system using edge devices for transportation IoT,” IEEE Access, vol. 12, pp. 52215–52226, 2024, doi:10.1109/ACCESS.2024.3386631.
[18] Z. Jin, J. Zhou, B. Li, X. Wu, and C. Duan, “FLIIDS: A novel federated learning-based incremental intrusion detection system,” Future Generation Computer Systems, vol. 151, pp. 57–70, 2024, doi: 10.1016/j.future.2023.09.019.
[19] M. Abd Elaziz, I. A. Fares, A. Dahou, and M. Shrahili, “Federated learning framework for IoT intrusion detection using tab transformer and nature-inspired hyperparameter optimization,” Frontiers in Big Data, vol. 8, p. 1526480, 2025, doi: 10.3389/fdata.2025.1526480.
[20] C. D. Luu, H. H. Nguyen, V. Q. Nguyen, and N.-S. Vu, “Novel deep learning-based IoT network attack detection using magnet loss optimization,” Internet of Things, vol. 33, p. 101680, 2025, doi: 10.1016/j.iot.2025.101680.
[21] I. Attiya, M. Abd Elaziz, and I. Issawi, “An improved hunger game search optimizer based IoT task scheduling in cloud–fog computing,” Internet of Things, vol. 26, p. 101196, 2024, doi: 10.1016/j.iot.2024.101196.
[22] T. Tsokov and H. Kostadinov, “Dynamic network-aware container allocation in Cloud/Fog computing with mobile nodes,” Internet of Things, vol. 26, p. 101211, 2024, doi: 10.1016/j.iot.2024.101211.
[23] S. Rahman, S. Pal, S. Mittal, T. Chawla, and C. Karmakar, “SYN-GAN: A robust intrusion detection system using GAN-based synthetic data for IoT security,” Internet of Things, vol. 26, p. 101212, 2024, doi: 10.1016/j.iot.2024.101212.