Hybrid Feature Selection and Classification Approach for Intrusion Detection in Wireless Sensor Networks Using LEACH Routing Protocol | IJCT Volume 12 – Issue 5 | IJCT-V12I5P61

International Journal of Computer Techniques Logo
International Journal of Computer Techniques
ISSN 2394-2231
Volume 12, Issue 5  |  Published: September – October 2025
Author
Satish Dekka, Dr. Prasadu Peddi, Dr. Manendra Sai Dasari

Abstract

Wireless Sensor Networks (WSNs) are increasingly deployed in diverse and resource-constrained environments, making them prime targets for a variety of security threats, including the infiltration of malicious nodes. This article proposes a novel hybrid framework that integrates advanced feature selection techniques and robust classification algorithms to enhance intrusion detection capabilities in WSNs. Leveraging the LEACH (Low-Energy Adaptive Clustering Hierarchy) routing protocol, our approach efficiently organizes sensor nodes into clusters, optimizing energy consumption while enabling effective monitoring of network activities. The hybrid feature selection mechanism systematically identifies the most relevant attributes from network traffic, reducing dimensionality and improving the accuracy of the intrusion detection system (IDS). Subsequently, state-of-the-art classification models are deployed to analyse the selected features, enabling precise detection and classification of malicious behaviours within the network. Experimental results demonstrate that the proposed system significantly outperforms conventional IDS solutions in terms of detection rate, false positive rate, and energy efficiency. The integration of LEACH protocol with hybrid IDS not only strengthens security but also prolongs the operational lifetime of WSN deployments, making it a viable solution for secure and resilient wireless sensing applications.

Keywords

Wireless Sensor Networks (WSN), Intrusion Detection System (IDS), Feature Selection, Classification, LEACH Routing Protocol, Malicious Nodes, Network Security, Energy Efficiency, Clustering, Hybrid Approach

Conclusion

This work introduced a hybrid feature selection and classification IDS integrated with the LEACH protocol, significantly improving detection accuracy and extending the lifetime of WSNs. The system combines advanced data selection, adaptive machine learning, and energy-efficient clustering, overcoming key challenges in WSN security. Experiments across various network sizes showed the proposed approach consistently outperformed standard IDSs like SVM and RF, achieving higher detection rates, fewer false positives, and better energy balance. The framework is practical for deployment in real-world IoT, smart environments, and critical infrastructure. Future directions include adding real-time learning, integrating trust and secure routing protocols, validating on hardware testbeds, and adapting to new attack types further advancing secure and resilient WSN operation.

References

[1]W. B. Heintzelman et al., β€œAn application-specific protocol architecture for wireless microsensor networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, 2002. [2]R. Roman et al., β€œApplying intrusion detection systems to wireless sensor networks,” in Consumer Commun. Netw. Conf., 2006, pp. 640–644. [3]Y. Zhang et al., β€œOutlier detection techniques for wireless sensor networks,” IEEE Commun. Surveys Tuts., vol. 12, no. 2, pp. 159–170, 2017. [4]D. Singh et al., “A novel deep learning-based IDS in clustered WSNs,” Measurement, vol. 187, 110278, 2023. [5]J. Li et al., β€œHybrid feature selection and random forest for network anomaly detection,” Sensors, vol. 22, no. 4, 1508, 2022. [6]A.-S. K. Pathan et al., β€œSecurity in wireless sensor networks,” Int. J. Compute. Theory Eng., vol. 1, no. 5, pp. 365–371, 2018. [7]Y. Yadav et al., β€œAn intelligent IDS for WSN using SVM,” Int. J. Info. Mgmt., vol. 52, 2020. [8]S. K. Jaiswal and H. S. Gour, β€œReview of clustering-based routing in WSNs,” Wireless Networks, vol. 27, 2021. [9]N. Mistry et al., β€œAdvances in secure data aggregation in WSNs: A survey,” J. Netw. Comput. Appl., vol. 41, 2016. [10]B. Sun et al., β€œIntrusion detection techniques in WSNs,” IEEE Wireless Commun., vol. 15, no. 5, pp. 56–63, 2008. [11]X. Wang et al., β€œA survey on intrusion detection in WSNs,” Wireless Commun. and Mobile Comput., 2018. [12]M. Jyothi, N. Kumaravel, β€œAnalysis of algorithms for intrusion detection in WSNs,” Procedia Comput. Sci., vol. 133, 2018. [13]S. Krishnan et al., β€œRouting attacks and defenses in WSNs,” IEEE Commun. Surveys Tuts., vol. 18, 2016. [14]A. V. Senthil Kumar, β€œFeature selection in IDS: An overview,” J. King Saud Univ., vol. 34, 2022. [15]A. R. Jyothi, R. V. Prasad, β€œSecure routing in WSNs,” Comput. Networks, vol. 151, 2019. [16]S. Kazemian et al., β€œImproved LEACH for IDS in WSNs,” Int. J. Comput. Appl., vol. 180, 2018. [17]S. K. Shaw, N. Sahoo, β€œEnsemble learning and feature selection for WSN IDS,” IEEE Access, vol. 10, 2022. [18]Z. Abbasi et al., β€œOptimal cluster head selection in LEACH WSNs,” IEEE IoT J., vol. 9, no. 1, 2022.

Journal Covers

Official IJCT Front Cover
Official Front Cover
Download
Official IJCT Back Cover
Official Back Cover
Download

IJCT Important Links

Β© 2025 International Journal of Computer Techniques (IJCT).

Submit Paper