Enhancing Security in Wireless Sensor Networks: A Machine Learning-based DoS Attack Detection
Received: 3 March 2024 | Revised: 11 October 2024 and 21 October 2024 | Accepted: 4 December 2024 | Online: 2 February 2025
Corresponding author: Saleh Al-Sharaeh
Abstract
The Internet of Things (IoT) is based on Wireless Sensor Networks (WSNs), which are essential for many applications. Denial of Service (DoS) attacks are a major risk for WSNs due to their open architecture and limited resources. This paper investigates how different Machine Learning (ML) methods can be used to identify DoS attacks and mitigate their effects. The predictions from several models were combined using the ensemble method to increase overall accuracy, while explainable Artificial Intelligence (AI) techniques were also deployed to enhance transparency and understanding. To compare the performance of both hard and soft ensemble methods, the WSN Dataset (WSN-DS) and the WSN Blackhole, Flooding, and Selective Forwarding (WSN-BFSF) dataset were utilized. The ensemble techniques aggregated predictions from multiple models to improve overall accuracy, while both showed high accuracy for both datasets. With an accuracy of 98.12%, the soft ensemble technique slightly outperformed the hard ensemble technique for the WSN-DS dataset, which had an accuracy of 97.97%. For the WSN-BFSF dataset, the hard ensemble technique achieved an accuracy of 99.967%, while the soft ensemble technique achieved an excellent accuracy of 100%.
Keywords:
security, wireless sensor networks, machine learning, DoS attack detectionDownloads
References
K. Gulati, R. S. Kumar Boddu, D. Kapila, S. L. Bangare, N. Chandnani, and G. Saravanan, "A review paper on wireless sensor network techniques in Internet of Things (IoT)," Materials Today: Proceedings, vol. 51, no. 1, pp. 161–165, Jan. 2022.
I. Ali, I. Ahmedy, A. Gani, M. U. Munir, and M. H. Anisi, "Data Collection in Studies on Internet of Things (IoT), Wireless Sensor Networks (WSNs), and Sensor Cloud (SC): Similarities and Differences," IEEE Access, vol. 10, pp. 33909–33931, 2022.
D. Kandris, C. Nakas, D. Vomvas, and G. Koulouras, "Applications of Wireless Sensor Networks: An Up-to-Date Survey," Applied System Innovation, vol. 3, no. 1, Mar. 2020, Art. no. 14.
F. Alawad and F. A. Kraemer, "Value of Information in Wireless Sensor Network Applications and the IoT: A Review," IEEE Sensors Journal, vol. 22, no. 10, pp. 9228–9245, May 2022.
M. A. Elsadig, "Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach," IEEE Access, vol. 11, pp. 83537–83552, Aug. 2023.
M. N. U. Islam, A. Fahmin, Md. S. Hossain, and M. Atiquzzaman, "Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques," Wireless Personal Communications, vol. 116, no. 3, pp. 1993–2021, Feb. 2021.
A. Cetinkaya, H. Ishii, and T. Hayakawa, "An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses," Entropy, vol. 21, no. 2, Feb. 2019, Art. no. 210.
S. Balaji and T. Sasilatha, "Detection of denial of service attacks by domination graph application in wireless sensor networks," Cluster Computing, vol. 22, no. 6, pp. 15121–15126, Nov. 2019.
M. Premkumar and T. V. P. Sundararajan, "DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks," Microprocessors and Microsystems, vol. 79, Nov. 2020, Art. no. 103278.
A. Huseinović, S. Mrdović, K. Bicakci, and S. Uludag, "A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid," IEEE Access, vol. 8, pp. 177447–177470, Sep. 2020.
E. Suryaprabha and N. M. Saravana Kumar, "Enhancement of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network," Soft Computing, vol. 24, no. 14, pp. 10681–10691, Jul. 2020.
M. A. Elsadig, A. Altigani, and M. Abuelaila, "Security Issues and Challenges on Wireless Sensor Networks," International Journal of Advanced Trends in Computer Science and Engineering, vol. 8, no. 4, pp. 1551–1559, Aug. 2019.
M. B. Apsara, P. Dayananda, and C. N. Sowmyarani, "A Review on Secure Group Key Management Schemes for Data Gathering in Wireless Sensor Networks," Engineering, Technology & Applied Science Research, vol. 10, no. 1, pp. 5108–5112, Feb. 2020.
R. Wazirali and R. Ahmad, "Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime," Computers, Materials & Continua, vol. 70, no. 3, pp. 4922–4946, Oct. 2021.
S. Ismail, Z. El Mrabet, and H. Reza, "An Ensemble-Based Machine Learning Approach for Cyber-Attacks Detection in Wireless Sensor Networks," Applied Sciences, vol. 13, no. 1, Jan. 2023, Art. no. 30.
G. Liu, H. Zhao, F. Fan, G. Liu, Q. Xu, and S. Nazir, "An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs," Sensors, vol. 22, no. 4, Feb. 2022, Art. no. 1407.
K. Lakshmi Narayanan, R. Santhana Krishnan, E. Golden Julie, Y. Harold Robinson, and V. Shanmuganathan, "Machine Learning Based Detection and a Novel EC-BRTT Algorithm Based Prevention of DoS Attacks in Wireless Sensor Networks," Wireless Personal Communications, vol. 127, no. 1, pp. 479–503, Nov. 2022.
I. Almomani, B. Al-Kasasbeh, and M. AL-Akhras, "WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks," Journal of Sensors, vol. 2016, no. 1, 2016, Art. no. 4731953.
M. Dener, C. Okur, S. Al, and A. Orman, "WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks," IEEE Internet of Things Journal, vol. 11, no. 2, pp. 2109–2125, Jan. 2024.
T. M. Barros, P. A. Souza Neto, I. Silva, and L. A. Guedes, "Predictive Models for Imbalanced Data: A School Dropout Perspective," Education Sciences, vol. 9, no. 4, Nov. 2019, Art. no. 275.
D.-X. Zhou, "Theory of deep convolutional neural networks: Downsampling," Neural Networks, vol. 124, pp. 319–327, Apr. 2020.
H. Tabbaa, S. Ifzarne, and I. Hafidi, "An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks," Computing and Informatics, vol. 42, no. 4, pp. 1013–1036, Dec. 2023.
S. Salmi and L. Oughdir, "Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network," Journal of Big Data, vol. 10, no. 1, Feb. 2023, Art. no. 17.
Downloads
How to Cite
License
Copyright (c) 2024 Ghadeer Al Sukkar, Saleh Al-Sharaeh

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.