Energy-Efficient Hybrid Learning for Secure Wireless Sensor Networks
Main Article Content
Abstract
Wireless Sensor Networks (WSNs) power critical applications from environmental monitoring to Internet-of-Medical-Things healthcare yet their tiny batteries and low-end microcontrollers leave them exposed to network-layer Denial-of-Service (DoS) attacks such as Blackhole, Grayhole, Flooding and TDMA scheduling. Signature IDSs miss zero-day variants and shallow machine-learning detectors produce many false alarms, while running monolithic deep-learning models on every node exhaust energy reserve. We introduce a two-stage hybrid IDS in which each sensor executes an integer-only rule filter that costs ≤0.05 mJ per packet and discards ≈95% of benign traffic, forwarding only flagged flows over BLE/LoRa to an edge gateway. There, a 50 %-pruned, 8-bit CNN-LSTM processes 32-window batches in 28 mJ and ≈42 ms. Experiments on the public WSN-DS corpus, augmented by ns-3 simulations of a 50-node LoRa network, show that the scheme achieves 98 % accuracy, 0.93 macro-F1 and minority-class recalls of 0.840.95 while extending network lifetime (T50) to 69 days an 82 % gain over on-node GRU and 35 % over a signature IDS. Removing the rule filter erases most of the lifetime benefit without affecting accuracy, confirming that local triage, not downsized deep models, is the key to energy efficiency. The evaluation answers four research questions covering optimal hybrid architecture, rule-filter tuning, node-level energy overhead, and performance trade-offs against traditional ML and standalone DL baselines. These findings demonstrate that intelligent workload partitioning can deliver deep-learning-level security without shortening the lifetime of resource-constrained WSN deployments.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
H. M. Saleh, H. Marouane and A. Fakhfakh “A Comprehensive Analysis of Security Challenges and Countermeasures in Wireless Sensor Networks Enhanced by Machine Learning and Deep Learning Technologies,” International Journal of Safety and Security Engineering, vol. 14, no. 2, pp. 373-386, 2024. Energy-Efficient Hybrid Learning for Secure Wireless Sensor Networks
N. M. Alruhaily and D. M. Ibrahim, “A multilayer machine learning-based intrusion detection system for wireless sensor networks,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 12, no. 4, pp. 281288, 2021.
C. Xu, J. Shen, X. Du and F. Zhang, “An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units,” in IEEE Access, vol. 6, pp. 48697-48707, 2018.
C. S. Mishra, D. Chaudhary, J. Sampson, M. T. Knademir and C. Das, “Revisiting DNN Training for Intermittently Powered Energy Harvesting Micro Computers,” arXiv preprint arXiv:2408.13696, 2024.
J.-H. Jeong, H. Jo, Q. Zhou, T. A. H. Nishat, and L. Wu, “Active management of battery degradation in wireless sensor network using deep reinforcement learning for group battery replacement,” arXiv preprint arXiv:2503.15865, 2025.
M. Yilmaz, A. M. Ozbayoglu and B. Tavli, “Efficient computation of wireless sensor network lifetime through deep neural networks,” Wireless Networks, vol. 27, pp. 2055-2065, 2021.
S. Ifzarne, H. Tabbaa, I. Hafidi and N. Lamghari, “Anomaly detection using machine learning techniques in wireless sensor networks,” in Journal of Physics: Conference Series, vol. 1743, no. 1, p. 012021, 2021.
J. Parras Moral, M. H¨uttenrauch, S. Zazo Bello and G. Neumann, “Deep Reinforcement Learning for Attacking Wireless Sensor Networks,” Sensors, vol. 21, no. 12, p. 4060, 2021.
L. Alsulaiman and S. Al-Ahmadi, “Performance evaluation of machine learning techniques for DOS detection in wireless sensor network,” arXiv preprint arXiv:2104.01963, 2021.
R. Ahmad, R. Wazirali and T. Abu-Ain, “Machine learning for wireless sensor networks security: An overview of challenges and issues,” Sensors, vol. 22, no. 13, p. 4730, 2022.
Y. Chae, N. Katenka and L. DiPippo, “An Adaptive Threshold Method for Anomaly-based Intrusion Detection Systems,” 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, USA, pp. 1-4, 2019.
A. Aldweesh, A. Derhab and A. Z. Emam, “Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues,” Knowledge-Based Systems, vol. 189, p. 105124, 2020. 705
W. Guo et al., “Model-driven deep learning for distributed detection with binary quantization,” arXiv preprint arXiv:2404.00309, 2024.
M. I. Rizqyawan, A. Munandar, M. F. Amri, R. Korio Utoro and A. Pratondo, “Quantized Convolutional Neural Network toward Real-time Arrhythmia Detection in Edge Device,” 2020 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), Tangerang, Indonesia, pp. 234239, 2020.
D. Chen, P. Yang, I.-R. Chen, D. S. Ha and J.-H. Cho, “SusFL: Energy-Aware Federated Learning-based Monitoring for Sustainable Smart Farms,” arXiv preprint arXiv:2402.10280, 2024.
P. Nayak, G. Swetha, S. Gupta, and K. Madhavi, “Routing in wireless sensor networks using machine learning techniques: Challenges and opportunities,” Measurement, vol. 178, p. 108974, 2021.
I. Almomani, B. Al-Kasasbeh and M. Al-Akhras, “WSN-DS: a dataset for intrusion detection systems in wireless sensor networks,” Journal of Sensors, vol. 2016, no. 1, p. 4731953, 2016.
I. Almomani and M. Alenezi, “Efficient Denial of Service Attacks Detection in Wireless Sensor Networks,” Journal of Information Science and Engineering, vol. 34, no. 4, pp. 977-1000, 2018.
H. Holm, “Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?,” 2014 47th Hawaii International Conference on System Sciences, Waikoloa, HI, USA, pp. 4895-4904, 2014.
A. Khraisat and A. J. C. Alazab, “A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges,” Cybersecurity, vol. 4, no. 18, pp. 127, 2021.
M. A. Elsadig, “Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach,” in IEEE Access, vol. 11, pp. 83537-83552, 2023.
R. Regin, S. S. Rajest and B. Singh, “Fault Detection in Wireless Sensor Network Based on Deep Learning Algorithms,” EAI Endorsed Transactions on Scalable Information Systems, vol. 8, no. 32, pp. 1-7, 2021.