WIRELESS SENSOR NETWORK BASED INTRUSION DETECTION SYSTEM'S: A REVIEW

Authors

  • Dr. Syed Umar, Goli Madhuri , Dikshendra Daulat Sarpate, Gopala Soujanya , B.Rani Author

DOI:

https://doi.org/10.65009/r0btgd93

Keywords:

Intrusion Detection Systems, Security, Wireless Sensor Network,,

Abstract

A Wireless Sensor Network (WSN) based Intrusion Detection System's (IDS) primary 
goals are to increase network security and integrity via the effective utilisation of sensor nodes' 
limited resources. 
An IDS is to identify intrusions into a wireless sensor network (WSN). It has to be able to spot out
of-the-ordinary actions or patterns that may point to intrusion, data manipulation, or hostile 
assaults on the network. The IDS should offer prompt reactions to detected intrusions in order to 
lessen the severity of any security lapses. It should warn the central control system or 
administrators so they may take corrective action as soon as possible. The IDS should aim for high 
detection accuracy to minimize the false positives (FP) and false negatives (FN) rate. For effective 
intrusion detection, a middle ground must be found between sensitivity and specificity. The IDS has 
to be scalable so that it can work with WSNs of different sizes and in different deployment settings. 
It has to precede a growing number of sensor nodes without slowing down or otherwise degrading 
its ability to detect or react.  
When these goals are met, the network's security posture is greatly improved, and the network's 
dependable and secure operation across a wide range of application domains is ensured. 

,

References

D. E. Baraneetharan, “Role of machine learning algorithms intrusion detection in WSNs: A

survey,” Journal of Information Technology and Digital World, vol. 2, no. 3, pp. 161–173, 2020.

Ferran Mohamed Amine et al. 2020, ‘Deep learning for cyber security intrusion detection:

approaches, datasets & comparative study’, J Information Secure Appl., vol. 50, 102419.

R. Vinayakumar, K.P. Soman, P. Poornachandran, Applying convolutional neural network for

network intrusion detection, in: 2017 International Conference on Advances in Computing,

Communications and Informatics (ICACCI), 2017, pp. 1222–1228.

Umar, Syed, Bommina Naveen Sai, Nagineni Sai Lasya,Doppalapudi Asutosh, and LohithaRani.

"Machine Learning based Sentiment Analysis of Product Reviews Using DeepEmbedding."

Journal of Optoelectronics Laser 41, no. 6(2022): 108-113.

Saheed, YK 2022, ‘Performance improvement of intrusion detection system for detecting attacks

on Internet of things and edge of things. In: Misra S, TKA, Piuri V, Garg L, editors, Artificial

intelligence for cloud and edge computing’. Internet of things (technology, communications and

computing). Cham: Springer; pp. 321-39.

Kasongo, SM & Sun, Y 2021, ‘A Deep Gated Recurrent Unit based model for wireless intrusion

detection system. ICT Express, vol. 7, no. 1, pp. 81-87.

Nagalalli, G & Ravi, G 2022, ‘A Novel Megabat Optimized Intelligent Intrusion Detection System

In Wireless Sensor Networks’, Journal of Intelligent Automation and Soft Computing, Tech

Science Press, vol. 35, no. 1, pp. 475-490.

S. Jiang, J. Zhao and X. Xu, “SLGBM: An intrusion detection mechanism for wireless sensor

networks in smart environments,” IEEE Access, vol. 8, pp. 169548–169558, 2020.

Habeeb, M. S., & Babu, T. R. (2022). Network intrusion detection system: a survey on artificial

intelligence‐based techniques. Expert Systems, 39(9), e13066.

Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A

Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",

International Journal on Recent and Innovation Trends in Computing and Communication, ISSN:

-8169 Volume: 11 Issue: 3.

Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.

(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in

IoT Systems. International Journal of Communication Networks and Information Security

(IJCNIS), 13(3), 582–595.

Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm

Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection",

International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s), 941.

Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization

Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2, September,

Habeeb, M. S. (2024). Predictive analytics and cybersecurity. Intelligent Techniques for Predictive

Data Analytics, 151-169.

hakre N, Nimma D, Turukmane AV, Singh AK, Rohatgi D, Bangaru B (2024) Dynamic path

planning for autonomous robots in forest fire scenarios using hybrid deep reinforcement learning

and particle swarm optimization. Int J Adv Comput Sci Appl 15(9).

M. Mukhedkar, D. Rohatgi, V.A. Vuyyuru, K.V.S.S. Ramakrishna, Y.A. Baker El-Ebiary, V.A.

Asir Daniel, "Feline wolf net: A hybrid lion-grey wolf optimization deep learning model for

ovarian cancer detection", Int. J. Adv. Comput. Sci. Appl., 14 (9) (2023)

Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms",

International Journal of Intelligent Systems and Applications in Engineering, IJISAE, 2024,

(23s), 3339–3347.

Downloads.

Published

2025-09-24

How to Cite

WIRELESS SENSOR NETWORK BASED INTRUSION DETECTION SYSTEM’S: A REVIEW. (2025). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 3(3), 160-166. https://doi.org/10.65009/r0btgd93