Automated Clone Detection in Wireless Sensor Networks Using Ensemble Learning Models with Hybrid Optimization-Based Significant Feature Selection Approach

International Journal of Electronics and Communication Engineering
© 2025 by SSRG - IJECE Journal
Volume 12 Issue 12
Year of Publication : 2025
Authors : P. Kalvikkarasi, K. Selvakumar
pdf
How to Cite?

P. Kalvikkarasi, K. Selvakumar, "Automated Clone Detection in Wireless Sensor Networks Using Ensemble Learning Models with Hybrid Optimization-Based Significant Feature Selection Approach," SSRG International Journal of Electronics and Communication Engineering, vol. 12,  no. 12, pp. 134-146, 2025. Crossref, https://doi.org/10.14445/23488549/IJECE-V12I12P111

Abstract:

Wireless Sensor Networks (WSN) consist of miniature sensor nodes that communicate among themselves via wireless channels, often in an unfriendly environment, and nodes can be carried and defeated. Thus, an enemy may also attack the clones by copying the nodes taken and broadening the breaching areas with the help of clones. Hence, to reduce the losses of clone nodes to the WSNs, it is crucial to detect them as soon as possible. Other types of clone detection systems have been proposed in the recent past for WSNs, bearing in mind the dissimilar types of network structures, such as deployment strategies and types of devices. The Deep Learning (DL) techniques, however, are used to identify and clone nodes in WSN. A Hybrid Optimization Based Feature Learning is presented in this paper regarding Clone Detection Using Ensemble Learning Models (HOFLCD ELM). The project seeks to create and assess an effective clone detection technique in wireless sensor networks to improve network security and integrity. The initial phase of data preprocessing is the min-max normalization approach, which transforms raw data into a usable format for modeling. In the feature subset selection procedure, the proposed HOFLCD-ELM model develops a hybrid optimization process in the form of Lyrebat Algorithm (LYBA) that integrates Lyrebird Optimization Algorithm (LOA) and Bat Algorithm (BA) in order to find the optimal features within a dataset. Subsequently, the system of Deep Belief Network (DBN) model, Convolutional Variational Autoencoder (CVAE) method, and Graph Convolutional Network (GCN) has been implemented to identify and classify clone attacks. Lastly, the optimization process of the Spider Wasp (SWO) model is used to acquire the parameter tuning process in enhancing the classification of the ensemble classifier. The experimental analysis of the HOFLCD-ELM model is done through a benchmark and a dataset. The results of the empirical study showed that the performance of the HOFLCD-ELM method was improved more than that of the current methods.

Keywords:

Clone detection, Wireless Sensor Networks, Spider Wasp Optimization, Hybrid model, Ensemble deep learning.

References:

[1] Muhammad Numan et al., “A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks,” IEEE Access, vol. 8, pp. 65450-65461, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Sachin Lalar, Shashi Bhushan, and Surender, “An Efficient Tree-based Clone Detection Scheme in Wireless Sensor Network,” Journal of Information and Optimization Sciences, vol. 40, no. 5, pp. 1003-1023, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Harshita Patel et al., “A Review on Classification of Imbalanced Data for Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, vol. 16, no. 4, pp. 1-15, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Periasamy Nancy et al., “Intrusion Detection using Dynamic Feature Selection and Fuzzy Temporal Decision Tree Classification for Wireless Sensor Networks,” IET Communications, vol. 14, no. 5, pp. 888-895, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Amit Kumar Gautam, and Rakesh Kumar, “A Comprehensive Study on Key Management, Authentication and Trust Management Techniques in Wireless Sensor Networks,” SN Applied Sciences, vol. 3, pp. 1-27, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Rahul Priyadarshi, Bharat Gupta, and Amulya Anurag, “Wireless Sensor Networks Deployment: A Result Oriented Analysis,” Wireless Personal Communications, vol. 113, pp. 843-866, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Christian Miranda et al., “A Collaborative Security Framework for Software-Defined Wireless Sensor Networks,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 2602-2615, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Mukaram Safaldin, Mohammed Otair, and Laith Abualigah, “Improved Binary Gray Wolf Optimizer and SVM for Intrusion Detection System in Wireless Sensor Networks,” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 1559-1576, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Rabie A. Ramadan, “An Improved Group Teaching Optimization based Localization Scheme for WSN,” International Journal of Wireless and Ad Hoc Communication, vol. 3, no. 1, pp. 08-16, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Mona Nashaat et al., “An Enhanced Transformer-Based Framework for Interpretable Code Clone Detection,” Journal of Systems and Software, vol. 222, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Jean Rosemond Dora, and Karol Nemoga, “Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks,” Journal of Cybersecurity and Privacy, vol. 1, no. 4, pp. 553-579, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Zeina Swilam, Abeer Hamdy, and Andreas Pester, “Advanced Cross-Language Clone Detection Using Modified AST and Graph Neural Network,” 2024 International Conference on Computer and Applications (ICCA), Cairo, Egypt, pp. 1-6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Seelam Ch Vijaya Bhaskar et al., “Augmenting Cybersecurity in WSN: AI-Based Clone Attacks Recognition Framework,” 2024 Asian Conference on Communication and Networks (ASIANComNet), Bangkok, Thailand, pp. 1-6, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[14] K. Jane Nithya, and K. Shyamala, “Entropy Dove Swarm Optimization (Edso) Based Cluster Head Selection and Stacked Ensemble Learning-Clone Attack Detection (Sel-Cnd) for Wireless Sensor Network (Wsn),” 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0, Raigarh, India, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Ramesh Vatambeti et al., “Classification of HHO-based Machine Learning Techniques for Clone Attack Detection in WSN,” International Journal of Computer Network and Information Security, vol. 15, no. 6, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] S. Bhuvana et al., “Relative Spectral Feature Analysis-Based Clone Attack Detection and Enhance Routing in Wireless Sensor Networks Using Artificial Neural Networks,” Journal of Data Acquisition and Processing, vol. 38, no. 3, pp. 1770-1791, 2023.
[Google Scholar]
[17] Hadeel M. Saleh, Hend Marouane, and Ahmed Fakhfakh, “Stochastic Gradient Descent Intrusions Detection for Wireless Sensor Network Attack Detection System Using Machine Learning,” IEEE Access, vol. 12, pp. 3825-3836, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[18] N.S. Manohar Raji, “IDLRN-DBN: Segmentation-based Early Diagnosis of Rice Plant Disease Detection using Deep Belief Network,” KSII Transactions on Internet and Information Systems, vol. 19, no. 5, pp. 1539-1563, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Mostafa Mohammadpourfard, Chenhan Xiao, and Yang Weng, “Performance Guaranteed Deep Learning for Detection of Cyber-Attacks in Dynamic Smart Grids,” IEEE Transactions on Power Systems, vol. 40, no. 6, pp. 4608-4620, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[20] D. Palumbo et al., “Damage Diagnostic Method by Artificial Intelligence Analysis of Shaking Table Data of a Typical Italian Building Prototype,” Journal of Instrumentation, vol. 20, pp. 1-8, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Muhammed Ali Pala, “CNS-DDI: An Integrated Graph Neural Network Framework for Predicting Central Nervous System Related Drug Drug Interactions,” Bitlis Eren Üniversitesi Fen Bilimleri Dergisi, vol. 14, no. 2, pp. 907-929, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Sana Qaiyum et al., “Benchmarking Reinforcement Learning and Accurate Modeling of Ground Source Heat Pump Systems: Intelligent Strategy using Spiking Recurrent Neural Network Combined with Spider WASP Inspired Optimization Algorithm,” Results in Engineering, vol. 27, pp. 1-15, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[23] WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks, Kaggle. [Online]. Available: https://www.kaggle.com/datasets/bassamkasasbeh1/wsnds
[24] Hajar Fares, “Intrusion Detection in Wireless Sensor Networks using Machine Learning,” Procedia Computer Science, vol. 252, pp. 912 921, 2025.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Amal K. Alkhalifa et al., “Hybrid Dung Beetle Optimization based Dimensionality Reduction with Deep Learning based Cybersecurity Solution on IoT Environment,” Alexandria Engineering Journal, vol. 111, pp. 148-159, 2025.
[CrossRef] [Google Scholar] [Publisher Link]