Volume 19 , Issue 1 , PP: 184-200, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
P. Kalvikkarasi 1 * , K. Selvakumar 2
Doi: https://doi.org/10.54216/FPA.190115
Wireless Sensor Network (WSN) signifies a state-of-the-art technology that combines energy-effective sensors with wireless transmission services enabling prompt surveillance and data collecting from the nearby environments. Owing to the intrinsic features of WSNs, they face numerous challenges of security that range from resource-based attacks, like computational overload or energy depletion, to interception, eavesdropping, and tampering. With the hacked data, the attackers can replicate the same sensors and use clones in the corresponding WSNs. This kind of cloning of the sensors, which is comprised of the WSN, is called a clone attack. Since the replicated sensors formed by the attackers have parallel keys and information, therefore the clone attacks have become a great attack for WSN. To defend WSNs against cyberattacks, machine learning (ML) and deep learning (DL) were applied to classify malicious and normal traffic. This study designs an Attack Detection and Mitigation using Deep Learning with an Optimization Algorithm in Wireless Sensor Networks (ADMDL-OAWSN). The main objective of the ADMDL-OAWSN system is to improve security in cloned nodes for the cyberattack detection model. In the primary step, the data pre-processing employs the StandardScalar method to transform input data into a suitable format. Next, the proposed ADMDL-OAWSN model designs a crayfish optimization algorithm (COA) for the subset of the feature selection (FS) to pick the most related features from an input dataset. For the attack classification process, the convolutional neural network and bi-directional gated recurrent unit with attention mechanism (CNN-BiGRU-A) technique have been exploited. At last, the parameter tuning of the CNN-BiGRU-A is applied by the design of the secretary wolf bird optimization (SeWBO) algorithm. Extensive experiments have been conducted to validate the results of the ADMDL-OAWSN system. The simulation results revealed that the ADMDL-OAWSN system emphasized furtherance when compared to other recent systems
Attack Detection , Cloned Nodes , Deep Learning , Optimization Algorithm , Wireless Sensor Networks
[1] M. Premkumar and T. V. P. Sundararajan, "DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks," Microprocessors and Microsystems, vol. 79, p. 103278, 2020.
[2] M. N. U. Islam, A. Fahmin, M. S. Hossain, and M. Atiquzzaman, "Denial-of-service attacks on wireless sensor network and defense techniques," Wireless Personal Communications, vol. 116, pp. 1993–2021, 2021.
[3] V. L. Thing, "IEEE 802.11 network anomaly detection and attack classification: A deep learning approach," in Proc. IEEE Wireless Communications and Networking Conf. (WCNC), Mar. 2017, pp. 1–6.
[4] E. Gelenbe et al., "IoT network attack detection and mitigation," in Proc. 9th Mediterranean Conf. Embedded Computing (MECO), Jun. 2020, pp. 1–6.
[5] Y. E. Sagduyu, Y. Shi, and T. Erpek, "IoT network security from the perspective of adversarial deep learning," in Proc. 16th Annu. IEEE Int. Conf. Sensing, Communication, and Networking (SECON), Jun. 2019, pp. 1–9.
[6] R. Ahmad, R. Wazirali, and T. Abu-Ain, "Machine learning for wireless sensor networks security: An overview of challenges and issues," Sensors, vol. 22, no. 13, p. 4730, 2022.
[7] T. Kim, L. F. Vecchietti, K. Choi, S. Lee, and D. Har, "Machine learning for advanced wireless sensor networks: A review," IEEE Sensors Journal, vol. 21, no. 11, pp. 12379–12397, 2020.
[8] M. Aslam et al., "Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT," Sensors, vol. 22, no. 7, p. 2697, 2022.
[9] M. T. Kurniawan and S. Yazid, "Mitigation and detection strategy of DoS attack on wireless sensor network using blocking approach and intrusion detection system," in Proc. Int. Conf. Electrical, Communication, and Computer Engineering (ICECCE), Jun. 2020, pp. 1–5.
[10] A. R. W. Sait, I. Pustokhina, and M. Ilayaraja, "Mitigating DDoS attacks in wireless sensor networks using heuristic feature selection with deep learning model," Full Length Article, no. 2, pp. 65–5, 2021.
[11] P. Deepalakshmi and T. Kumanan, "Fake clones for adversaries detection with efficient relay selection in MWSN," in Proc. 2nd Int. Conf. Device Intelligence, Computing and Communication Technologies (DICCT), Mar. 2024, pp. 590–594.
[12] S. Bhuvana, S. K. Andrews, M. S. Josephine, and V. Jeyabalaraja, "Relative spectral feature analysis-based clone attack detection and enhance routing in wireless sensor networks using artificial neural networks," J. Data Acquisition and Processing, vol. 38, no. 3, p. 1770, 2023.
[13] R. Vatambeti et al., "Classification of HHO-based machine learning techniques for clone attack detection in WSN," Int. J. Computer Network and Information Security, vol. 15, pp. 1–15, 2023.
[14] P. E. David, "Automatic clone detection in wireless sensor networks using ANN," 2023.
[15] K. J. Nithya and K. Shyamala, "Entropy dove swarm optimization (EDSO) based cluster head selection and stacked ensemble learning-clone attack detection (SEL-CND) for wireless sensor network (WSN)," in Proc. OPJU Int. Technology Conf. (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0, Jun. 2024, pp. 1–13.
[16] M. Numan, F. Subhan, M. N. A. Khalid, W. Z. Khan, and H. Iida, "Clone node detection in static wireless sensor networks: A hybrid approach," J. Network and Computer Applications, vol. 232, p. 104018, 2024.
[17] S. C. V. Bhaskar et al., "Augmenting cybersecurity in WSN: AI-based clone attacks recognition framework," in Proc. Asian Conf. Communication and Networks (ASIANComNet), Oct. 2024, pp. 1–6.
[18] K. Hameed et al., "A context-aware information-based clone node attack detection scheme in Internet of Things," J. Network and Computer Applications, vol. 197, p. 103271, 2022.
[19] K. Barik, S. Misra, and R. Mohan, "Web-based phishing URL detection model using deep learning optimization techniques," Int. J. Data Science and Analytics, pp. 1–23, 2025.
[20] S. Chauhan, G. Vashishtha, R. Zimroz, and R. Kumar, "A crayfish-optimized wavelet filter and its application to fault diagnosis," arXiv preprint arXiv: 2502.08362, 2025.
[21] J. Yu et al., "Impact localization system of CFRP structure based on EFPI sensors," Sensors, vol. 25, no. 4, p. 1091, 2025.
[22] S. Mekala and P. K. Singamsetty, "A hybrid approach for pancreatic cancer detection in CT scans using secretary wolf bird optimization and deep learning," SSRN, 2025. Available: [Online]. Available: https://www.ssrn.com/abstract=5134659
[23] Kaggle, "Wireless sensor network dataset," Kaggle.com, 2025. [Online]. Available: https://www.kaggle.com/datasets/bassamkasasbeh1/wsnds
[24] H. Fares, A. D. Vibhute, Y. Mouniane, and H. Bouijij, "Intrusion detection in wireless sensor networks using machine learning," Procedia Computer Science, vol. 252, pp. 912–921, 2025.
[25] A. K. Alkhalifa et al., "Hybrid dung beetle optimization-based dimensionality reduction with deep learning-based cybersecurity solution on IoT environment," Alexandria Engineering J., vol. 111, pp. 148–159, 2025.