A hybrid machine learning model for intrusion detection in wireless sensor networks leveraging data balancing and dimensionality reduction

被引:0
|
作者
Talukder, Md. Alamin [1 ]
Khalid, Majdi [2 ]
Sultana, Nasrin [3 ]
机构
[1] Int Univ Business Agr & Technol, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Umm Al Qura Univ, Coll Comp, Dept Comp Sci & Artificial Intelligence, Mecca 21955, Saudi Arabia
[3] RMIT Univ, Dept ICT, Future Technol, Melbourne, Australia
来源
SCIENTIFIC REPORTS | 2025年 / 15卷 / 01期
关键词
Intrusion detection systems; Wireless sensor networks; Internet of Things; Hybrid machine learning; Model; Dimensionality reduction; Data balancing techniques;
D O I
10.1038/s41598-025-87028-1
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Intrusion detection systems are essential for securing wireless sensor networks (WSNs) and Internet of Things (IoT) environments against various threats. This study presents a novel hybrid machine learning (ML) model that integrates KMeans-SMOTE (KMS) for data balancing and principal component analysis (PCA) for dimensionality reduction, evaluated using the WSN-DS and TON-IoT datasets. The model employs classifiers such as Decision Tree Classifier, Random Forest Classifier (RFC), and gradient boosting techniques like XGBoost (XGBC) to enhance detection accuracy and efficiency. The proposed hybrid (KMS + PCA + RFC) approach achieves remarkable performance, with an accuracy of 99.94% and an f1-score of 99.94% on the WSN-DS dataset. For the TON-IoT dataset, it achieves 99.97% accuracy and an f1-score of 99.97%, outperforming traditional SMOTE TomekLink and Generative Adversarial Network-based data balancing techniques. This hybrid approach addresses class imbalance and high-dimensionality challenges, providing scalable and robust intrusion detection. Complexity analysis reveals that the proposed model reduces training and prediction times, making it suitable for real-time applications.
引用
收藏
页数:23
相关论文
共 50 条
  • [41] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259
  • [42] Adaptive intrusion detection in wireless sensor networks
    Techateerawat, Piya
    Jennings, Andrew
    2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 23 - 28
  • [43] Behavioural Intrusion Detection for Wireless Sensor Networks
    Smith, A.
    Ramotsoela, T. D.
    Hancke, G. F.
    PROCEEDINGS OF 2021 IEEE 30TH INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2021,
  • [44] An Intrusion Detection Algorithm for Wireless Sensor Networks
    Eissa, Alaa
    Zied, Samir
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (11): : 80 - 85
  • [45] Cooperative Intrusion Detection in Wireless Sensor Networks
    Krontiris, Ioannis
    Benenson, Zinaida
    Giannetsos, Thanassis
    Freiling, Felix C.
    Dimitriou, Tassos
    WIRELESS SENSOR NETWORKS, PROCEEDINGS, 2009, 5432 : 263 - +
  • [46] Anomaly intrusion detection in wireless sensor networks
    Bhuse, V
    Gupta, A
    JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (01) : 33 - 51
  • [47] An Intrusion Detection System for Wireless Sensor Networks
    Ioannou, Christiana
    Vassiliou, Vasos
    Sergiou, Charalampos
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [48] Research on Intrusion Detection of Wireless Sensor Networks
    Guo, Jianli
    PROCEEDINGS OF THE 2015 CONFERENCE ON INFORMATIZATION IN EDUCATION, MANAGEMENT AND BUSINESS, 2015, 20 : 65 - 69
  • [49] Hybrid Gaussian-Ring Deployment for Intrusion Detection in Wireless Sensor Networks
    Katneni, Narendranad
    Pandit, Vaibhav
    Li, Hailong
    Agrawal, Dharma P.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [50] A Hybrid Intrusion Detection System of Cluster-based Wireless Sensor Networks
    Yan, K. Q.
    Wang, S. C.
    Liu, C. W.
    IMECS 2009: INTERNATIONAL MULTI-CONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2009, : 411 - 416