An Intelligent Multi-Head Attention-Driven Temporal Convolutional Architecture for Intrusion Detection in Wireless Sensor Networks
Received: 23 September 2025 | Revised: 22 October 2025 | Accepted: 27 October 2025 | Online: 10 December 2025
Corresponding author: M. Pradeepa
Abstract
Wireless Sensor Networks (WSNs) have diverse uses but are prone to attacks due to their open deployment and low-cost devices. Preventive mechanisms are used to protect WSNs against certain types of attacks. Intrusion Detection Systems (IDSs) are essential as they prevent intruders from causing damage to the network. An IDS can gather information related to attack methods, helping prevent further damage. Deep Learning (DL) methods are widely applied in IDSs because they offer superior performance while processing uneven attacks in WSNs. This study presents an Intrusion Detection Framework for Securing WSNs using a Deep Representation Learning (IDFSWSN-DRL) model, aiming to develop an effective IDS to ensure real-time detection and mitigation of malicious activities. The data preprocessing stage applies robust scaling, label encoding, and data splitting to enhance data quality and support improved model accuracy. The Gazelle Optimization Algorithm (GOA) is employed for Feature Selection (FS). A Temporal Convolutional Network with Multi-Head Attention (TCN-MHA) is used for classification. Finally, the Catch Fish optimization Algorithm (CFA) is used for the hyperparameter tuning process. A comparison study of the IDFSWSN-DRL method illustrated a greater accuracy (99.69%) over recent models on the WSN-DS dataset.
Keywords:
wireless sensor networks, multi-head attention, intrusion detection, deep representation learning, attack, feature reductionDownloads
References
V. Gowdhaman and R. Dhanapal, "An intrusion detection system for wireless sensor networks using deep neural network," Soft Computing, vol. 26, no. 23, pp. 13059–13067, Dec. 2022. DOI: https://doi.org/10.1007/s00500-021-06473-y
T. M. Nguyen, H. H. P. Vo, and M. Yoo, "Enhancing Intrusion Detection in Wireless Sensor Networks Using a GSWO-CatBoost Approach," Sensors, vol. 24, no. 11, May 2024. DOI: https://doi.org/10.3390/s24113339
D. K. Madhuri, "A New Level Intrusion Detection System for Node Level Drop Attacks in Wireless Sensor Network," Journal of Algebraic Statistics, vol. 13, no. 1, pp. 159–168, May 2022.
S. Pundir, M. Wazid, D. P. Singh, A. K. Das, J. J. P. C. Rodrigues, and Y. Park, "Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges," IEEE Access, vol. 8, pp. 3343–3363, 2020. DOI: https://doi.org/10.1109/ACCESS.2019.2962829
S. M. S. Bukhari et al., "Secure and privacy-preserving intrusion detection in wireless sensor networks: Federated learning with SCNN-Bi-LSTM for enhanced reliability," Ad Hoc Networks, vol. 155, Mar. 2024, Art. no. 103407. DOI: https://doi.org/10.1016/j.adhoc.2024.103407
N. M. Alruhaily and D. M. Ibrahim, "A Multi-layer Machine Learning-based Intrusion Detection System for Wireless Sensor Networks," International Journal of Advanced Computer Science and Applications, vol. 12, no. 4, 2021. DOI: https://doi.org/10.14569/IJACSA.2021.0120437
R. Zhang and X. Xiao, "Intrusion Detection in Wireless Sensor Networks with an Improved NSA Based on Space Division," Journal of Sensors, vol. 2019, no. 1, 2019, Art. no. 5451263. DOI: https://doi.org/10.1155/2019/5451263
J. Srivastava and J. Prakash, "Deep learning-enabled energy optimization and intrusion detection for wireless sensor networks," OPSEARCH, vol. 62, no. 1, pp. 368–405, Mar. 2025. DOI: https://doi.org/10.1007/s12597-024-00791-z
A. Punitha, P. Ramani, P. Ezhilarasi, and S. Sridhar, "Dynamically stabilized recurrent neural network optimized with intensified sand cat swarm optimization for intrusion detection in wireless sensor network," Computers & Security, vol. 148, Jan. 2025, Art. no. 104094. DOI: https://doi.org/10.1016/j.cose.2024.104094
K. P. Sharma et al., "Hybrid Convolutional Neural Network for Robust Attack Detection in Wireless Sensor Networks," Internet Technology Letters, vol. 8, no. 6, 2025, Art. no. e650. DOI: https://doi.org/10.1002/itl2.650
B. Mopuru and Y. Pachipala, "Advancing IoT Security: Integrative Machine Learning Models for Enhanced Intrusion Detection in Wireless Sensor Networks," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 14840–14847, Aug. 2024. DOI: https://doi.org/10.48084/etasr.7641
S. Subramani and M. Selvi, "Multi-objective PSO based feature selection for intrusion detection in IoT based wireless sensor networks," Optik, vol. 273, Feb. 2023, Art. no. 170419. DOI: https://doi.org/10.1016/j.ijleo.2022.170419
S. Abbas et al., "Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks," PeerJ Computer Science, vol. 10, Jan. 2024, Art. no. e1793. DOI: https://doi.org/10.7717/peerj-cs.1793
G. Li, H. Ge, Y. Jiang, Y. Zhang, and X. Jin, "Non-destructive detection of early wheat germination via deep learning-optimized terahertz imaging," Plant Methods, vol. 21, no. 1, May 2025, Art. no. 75. DOI: https://doi.org/10.1186/s13007-025-01393-6
W. Fu et al., "Physics-Informed Temporal Attention Dynamic Convolution Network for Oil and Gas Well Production Forecasting." Social Science Research Network, June 20, 2025. DOI: https://doi.org/10.2139/ssrn.5312750
S. A. Alnefaie, A. Alkuhayli, A. M. Al-Shaalan, S. A. Alnefaie, A. Alkuhayli, and A. M. Al-Shaalan, "Optimizing Load Frequency Control of Multi-Area Power Renewable and Thermal Systems Using Advanced Proportional–Integral–Derivative Controllers and Catch Fish Algorithm," Fractal and Fractional, vol. 9, no. 6, May 2025. DOI: https://doi.org/10.3390/fractalfract9060355
"WSN-DS." Kaggle, [Online]. Available: https://www.kaggle.com/datasets/bassamkasasbeh1/wsnds.
M. Aljebreen et al., "Binary Chimp Optimization Algorithm with ML Based Intrusion Detection for Secure IoT-Assisted Wireless Sensor Networks," Sensors, vol. 23, no. 8, Apr. 2023. DOI: https://doi.org/10.3390/s23084073
F. F. Alruwaili, M. M. Asiri, F. S. Alrayes, S. S. Aljameel, A. S. Salama, and A. M. Hilal, "Red Kite Optimization Algorithm With Average Ensemble Model for Intrusion Detection for Secure IoT," IEEE Access, vol. 11, pp. 131749–131758, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3335124
H. Zhang, D. Upadhyay, M. Zaman, A. Jain, and S. Sampalli, "SC-MLIDS: Fusion-based Machine Learning Framework for Intrusion Detection in Wireless Sensor Networks," Ad Hoc Networks, vol. 175, Aug. 2025, Art. no. 103871. DOI: https://doi.org/10.1016/j.adhoc.2025.103871
K. Sedhuramalingam and N. Saravanakumar, "A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks," Egyptian Informatics Journal, vol. 27, Sept. 2024, Art. no. 100522. DOI: https://doi.org/10.1016/j.eij.2024.100522
Downloads
How to Cite
License
Copyright (c) 2025 M. Pradeepa, R. Ponnusamy

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
