Wireless Sensor Networks (WSNs) are increasingly deployed in diverse and resource-constrained environments, making them prime targets for a variety of security threats, including the infiltration of malicious nodes. This article proposes a novel hybrid framework that integrates advanced feature selection techniques and robust classification algorithms to enhance intrusion detection capabilities in WSNs. Leveraging the LEACH (Low-Energy Adaptive Clustering Hierarchy) routing protocol, our approach efficiently organizes sensor nodes into clusters, optimizing energy consumption while enabling effective monitoring of network activities. The hybrid feature selection mechanism systematically identifies the most relevant attributes from network traffic, reducing dimensionality and improving the accuracy of the intrusion detection system (IDS). Subsequently, state-of-the-art classification models are deployed to analyse the selected features, enabling precise detection and classification of malicious behaviours within the network. Experimental results demonstrate that the proposed system significantly outperforms conventional IDS solutions in terms of detection rate, false positive rate, and energy efficiency. The integration of LEACH protocol with hybrid IDS not only strengthens security but also prolongs the operational lifetime of WSN deployments, making it a viable solution for secure and resilient wireless sensing applications.
This work introduced a hybrid feature selection and classification IDS integrated with the LEACH protocol, significantly improving detection accuracy and extending the lifetime of WSNs. The system combines advanced data selection, adaptive machine learning, and energy-efficient clustering, overcoming key challenges in WSN security. Experiments across various network sizes showed the proposed approach consistently outperformed standard IDSs like SVM and RF, achieving higher detection rates, fewer false positives, and better energy balance. The framework is practical for deployment in real-world IoT, smart environments, and critical infrastructure. Future directions include adding real-time learning, integrating trust and secure routing protocols, validating on hardware testbeds, and adapting to new attack types further advancing secure and resilient WSN operation.
References
[1]W. B. Heintzelman et al., โAn application-specific protocol architecture for wireless microsensor networks,โ IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660โ670, 2002.
[2]R. Roman et al., โApplying intrusion detection systems to wireless sensor networks,โ in Consumer Commun. Netw. Conf., 2006, pp. 640โ644.
[3]Y. Zhang et al., โOutlier detection techniques for wireless sensor networks,โ IEEE Commun. Surveys Tuts., vol. 12, no. 2, pp. 159โ170, 2017.
[4]D. Singh et al., “A novel deep learning-based IDS in clustered WSNs,” Measurement, vol. 187, 110278, 2023.
[5]J. Li et al., โHybrid feature selection and random forest for network anomaly detection,โ Sensors, vol. 22, no. 4, 1508, 2022.
[6]A.-S. K. Pathan et al., โSecurity in wireless sensor networks,โ Int. J. Compute. Theory Eng., vol. 1, no. 5, pp. 365โ371, 2018.
[7]Y. Yadav et al., โAn intelligent IDS for WSN using SVM,โ Int. J. Info. Mgmt., vol. 52, 2020.
[8]S. K. Jaiswal and H. S. Gour, โReview of clustering-based routing in WSNs,โ Wireless Networks, vol. 27, 2021.
[9]N. Mistry et al., โAdvances in secure data aggregation in WSNs: A survey,โ J. Netw. Comput. Appl., vol. 41, 2016.
[10]B. Sun et al., โIntrusion detection techniques in WSNs,โ IEEE Wireless Commun., vol. 15, no. 5, pp. 56โ63, 2008.
[11]X. Wang et al., โA survey on intrusion detection in WSNs,โ Wireless Commun. and Mobile Comput., 2018.
[12]M. Jyothi, N. Kumaravel, โAnalysis of algorithms for intrusion detection in WSNs,โ Procedia Comput. Sci., vol. 133, 2018.
[13]S. Krishnan et al., โRouting attacks and defenses in WSNs,โ IEEE Commun. Surveys Tuts., vol. 18, 2016.
[14]A. V. Senthil Kumar, โFeature selection in IDS: An overview,โ J. King Saud Univ., vol. 34, 2022.
[15]A. R. Jyothi, R. V. Prasad, โSecure routing in WSNs,โ Comput. Networks, vol. 151, 2019.
[16]S. Kazemian et al., โImproved LEACH for IDS in WSNs,โ Int. J. Comput. Appl., vol. 180, 2018.
[17]S. K. Shaw, N. Sahoo, โEnsemble learning and feature selection for WSN IDS,โ IEEE Access, vol. 10, 2022.
[18]Z. Abbasi et al., โOptimal cluster head selection in LEACH WSNs,โ IEEE IoT J., vol. 9, no. 1, 2022.