Evaluating Machine Learning Efficacy for DoS Intrusion Detection in Wireless Sensor Networks

PDF (737KB), PP.1-23

Views: 0 Downloads: 0

Author(s)

Samuel Mends 1 Kofi Sarpong Adu-Manu 1,*

1. Department of Computer Science, University of Ghana, Lego-Accra, Ghana

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2026.01.01

Received: 15 Jun. 2025 / Revised: 25 Aug. 2025 / Accepted: 22 Oct. 2025 / Published: 8 Feb. 2026

Index Terms

Intrusion Detection Systems (IDS), Wireless Sensor Networks (WSNs), Denial of Service (DoS) Attacks, Machine Learning for Security, AdaBoost and Algorithm Performance

Abstract

Wireless Sensor Networks (WSNs) are integral to mission-critical applications, including environmental monitoring, smart infrastructure, and healthcare. However, they are particularly vulnerable to denial-of-service (DoS) attacks, which can deplete the node's energy and disrupt communication. This study examines the effectiveness of various machine learning algorithms in enhancing intrusion detection within WSNs, focusing on balancing detection accuracy and computational efficiency. Utilising the Network Simulator-2 (NS-2) generated WSN-DS dataset, seven algorithms—K-Nearest Neighbours (KNN), Decision Tree (DT), Random Forest (RF), Naïve Bayes (NB), Stacking Classifier, AdaBoost, and Artificial Neural Network (ANN)—were implemented and evaluated. The experimental results indicate that AdaBoost achieved the highest overall performance, with an accuracy of 99.7%, ROC-AUC of 0.996, and detection speed of 1.6 min, underscoring its suitability for real-time intrusion detection. Stacking and Random Forest also demonstrated high accuracy (99.7% and 99.6%, respectively) but required slightly longer detection times of 7.07 and 7.33 min, respectively. In contrast, KNN exhibited the longest detection time (86.2 min) due to its high computational overhead, whereas Naïve Bayes was the fastest (0.02 min) but had lower precision (0.757) and F1-score (0.771). AdaBoost demonstrated superior detection accuracy, efficiency, and adaptability under constrained WSN conditions, outperforming all other algorithms across multiple performance metrics. These findings offer a practical benchmark for developing lightweight, high-performance intrusion detection systems in resource-limited wireless sensor environments, thereby enhancing the resilience and reliability of next-generation WSN infrastructures.

Cite This Paper

Samuel Mends, Kofi Sarpong Adu-Manu, "Evaluating Machine Learning Efficacy for DoS Intrusion Detection in Wireless Sensor Networks", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.16, No.1, pp. 1-23, 2026. DOI:10.5815/ijwmt.2026.01.01

Reference

[1]K. S. Adu-Manu, ‘A Study into Lifetime Maximization of Wireless Sensor Networks for Water Quality Monitoring’, University Of Ghana, 2019.
[2]K. S. Adu-Manu, F. A. Katsriku, J.-D. Abdulai, and F. Engmann, ‘Smart River Monitoring Using Wireless Sensor Networks’, Wirel Commun Mob Comput, vol. 2020, 2020, doi: 10.1155/2020/8897126.
[3]K. S. Adu-manu et al., ‘Review Article WSN Architectures for Environmental Monitoring Applications’, J Sens, vol. 2022, 2022.
[4]K. S. Adu-manu, F. Engmann, G. Sarfo-kantanka, G. E. Baiden, and B. A. Dulemordzi, ‘Review Article WSN Protocols and Security Challenges for Environmental Monitoring Applications : A Survey’, J Sens, vol. 2022, 2022.
[5]Z. Liu, G. Mohiuddin, J. Zheng, M. Asim, and S. Wang, ‘Intrusion detection in wireless sensor network using enhanced empirical based component analysis’, Future Gener. Comput. Syst., vol. 135, pp. 181–193, 2022, [Online]. Available: https://api.semanticscholar.org/CorpusID:250534078
[6]D. Manivannan, ‘Recent endeavors in machine learning-powered intrusion detection systems for the Internet of Things’, J. Netw. Comput. Appl., vol. 229, p. 103925, 2024, [Online]. Available: https://api.semanticscholar.org/CorpusID:270662368
[7]H. Kheddar, Y. Himeur, and A. I. Awad, ‘Deep transfer learning for intrusion detection in industrial control networks: A comprehensive review’, J. Netw. Comput. Appl., vol. 220, p. 103760, 2023, [Online]. Available: https://api.semanticscholar.org/CorpusID:258291793
[8]H. Yao, Y. Yang, X. Fu, and C. Mi, ‘An Adaptive Sliding-Window Strategy for Outlier Detection in Wireless Sensor Networks for Smart Port Construction’, J Coast Res, vol. 82, no. 82, pp. 245–253, 2018, doi: 10.2112/SI82-036.1.
[9]M. S. Alsahli, M. M. Almasri, M. Al-Akhras, A. I. Al-Issa, and M. Alawairdhi, ‘Evaluation of Machine Learning Algorithms for Intrusion Detection System in WSN’, International Journal of Advanced Computer Science and Applications, vol. 12, no. 5, pp. 617–626, 2021, doi: 10.14569/IJACSA.2021.0120574.
[10]T. T. Lai, T. P. Tran, J. Cho, and M.-S. Yoo, ‘DoS attack detection using online learning techniques in wireless sensor networks’, Alexandria Engineering Journal, 2023, [Online]. Available: https://api.semanticscholar.org/CorpusID:265431580
[11]R. Ahmad, R. Wazirali, and T. Abu-Ain, ‘Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues’, Sensors, vol. 22, no. 13, p. 4730, 2022, doi: 10.3390/s22134730.
[12]Z. Ahmad, A. Shahid Khan, C. Wai Shiang, J. Abdullah, and F. Ahmad, ‘Network intrusion detection system: A systematic study of machine learning and deep learning approaches’, Transactions on Emerging Telecommunications Technologies, vol. 32, no. 1, pp. 1–29, 2021, doi: 10.1002/ett.4150.
[13]S. Otoum, B. Kantarci, and H. T. Mouftah, ‘A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks’, IEEE International Conference on Communications, vol. 2020-June, 2020, doi: 10.1109/ICC40277.2020.9149413.
[14]H. N. M. Akpinar, S. Duran, R. I. Eser, and S. Dogru, ‘Detection of DoS Attacks in WSNs by using Machine Learning Models’, 2024 8th International Artificial Intelligence and Data Processing Symposium (IDAP), pp. 1–8, 2024, [Online]. Available: https://api.semanticscholar.org/CorpusID:273377458
[15]Z. Ahmad, A. S. Khan, W. S. Cheah, J. bin Abdullah, and F. Ahmad, ‘Network intrusion detection system: A systematic study of machine learning and deep learning approaches’, Transactions on Emerging Telecommunications Technologies, vol. 32, 2020, [Online]. Available: https://api.semanticscholar.org/CorpusID:225153435
[16]S. Otoum, B. Kantarci, and H. T. Mouftah, ‘A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks’, ICC 2020 - 2020 IEEE International Conference on Communications (ICC), pp. 1–6, 2020, [Online]. Available: https://api.semanticscholar.org/CorpusID:220890659
[17]H. M. Saleh, H. Marouane, and A. Fakhfakh, ‘Improves Intrusion Detection Performance In Wireless Sensor Networks Through Machine Learning, Enhanced By An Accelerated Deep Learning Model With Advanced Feature Selection’, Iraqi Journal For Computer Science and Mathematics, 2024, [Online]. Available: https://api.semanticscholar.org/CorpusID:272773125
[18]S. Swami, P. Singh, and S. S. Chauhan, ‘Design and Analysis of an Integrated Rule-Based and Machine Learning System for DoS Attack Detection in Wireless Sensor Networks’, 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE), pp. 1046–1052, 2024, [Online]. Available: https://api.semanticscholar.org/CorpusID:271406287
[19]I. M. Almomani, B. Al Kasasbeh, and M. T. Al-Akhras, ‘WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks’, J. Sensors, vol. 2016, pp. 4731953:1-4731953:16, 2016, [Online]. Available: https://api.semanticscholar.org/CorpusID:39586351
[20]N. M. Alruhaily and M. L. Dina, ‘A Multi-layer Machine Learning-based Intrusion Detection System for Wireless Sensor Networks’, International Journal of Advanced Computer Science and Applications, vol. 12, 2021, [Online]. Available: https://api.semanticscholar.org/CorpusID:235252595
[21]H. Liu and B. Lang, ‘Machine learning and deep learning methods for intrusion detection systems: A survey’, Applied Sciences (Switzerland), vol. 9, no. 20, 2019, doi: 10.3390/app9204396.
[22]C. Iwendi, J. H. Anajemba, C. N. Biamba, and D. Ngabo, ‘Security of Things Intrusion Detection System for Smart Healthcare’, Electronics (Basel), 2021, [Online]. Available: https://api.semanticscholar.org/CorpusID:236223965
[23]I. Almomani, B. Al-Kasasbeh, and M. Al-Akhras, ‘WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks’, J Sens, vol. 2016, 2016, doi: 10.1155/2016/4731953.
[24]N. M. Alruhaily and D. M. Ibrahim, ‘A Multi-layer Machine Learning-based Intrusion Detection System for Wireless Sensor Networks’, International Journal of Advanced Computer Science and Applications, vol. 12, no. 4, pp. 281–288, 2021, doi: 10.14569/IJACSA.2021.0120437.
[25]T. Kim, L. F. Vecchietti, K. Choi, S. Lee, and D. Har, ‘Machine Learning for Advanced Wireless Sensor Networks: A Review’, IEEE Sens J, vol. 21, no. 11, pp. 12379–12397, 2021, doi: 10.1109/JSEN.2020.3035846.
[26]A. Abdollahi, K. Rejeb, A. Rejeb, M. M. Mostafa, and S. Zailani, ‘Wireless sensor networks in agriculture: Insights from bibliometric analysis’, Sustainability (Switzerland), vol. 13, no. 21, 2021, doi: 10.3390/su132112011.
[27]S. S. Band et al., ‘When Smart Cities Get Smarter via Machine Learning: An In-Depth Literature Review’, IEEE Access, vol. 10, pp. 60985–61015, 2022, doi: 10.1109/ACCESS.2022.3181718.
[28]M. Pundir and J. K. Sandhu, ‘A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent Trend and Future Vision’, Journal of Network and Computer Applications, vol. 188, no. August 2020, p. 103084, 2021, doi: 10.1016/j.jnca.2021.103084.
[29]K. A. Alaghbari, M. H. M. Saad, A. Hussain, and M. R. Alam, ‘Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations’, Journal of Cloud Computing, vol. 11, no. 1, 2022, doi: 10.1186/s13677-022-00338-x.
[30]K. Sedhuramalingam and N. Saravanakumar, ‘A novel optimal deep learning approach for designing intrusion detection system in wireless sensor networks’, Egyptian Informatics Journal, 2024, [Online]. Available: https://api.semanticscholar.org/CorpusID:272810002
[31]E. El Ahmar, A. Rachini, and H. Attar, ‘Cybersecurity Enhancement in IoT Wireless Sensor Networks using Machine Learning’, WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS, 2024, [Online]. Available: https://api.semanticscholar.org/CorpusID:273383622
[32]T. Saranya, S. Sridevi, C. Deisy, T. D. Chung, and M. K. A. A. Khan, ‘Performance Analysis of Machine Learning Algorithms in Intrusion Detection System: A Review’, Procedia Comput Sci, vol. 171, no. 2019, pp. 1251–1260, 2020, doi: 10.1016/j.procs.2020.04.133.