International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF
Volume 74 | Issue 2 | Year 2026 | Article Id. IJETT-V74I2P120 | DOI : https://doi.org/10.14445/22315381/IJETT-V74I2P120

Advanced Ensemble Deep Learning Model Integrated with Metaheuristic Optimisation for Secure and Reliable Intrusion Detection in Wireless Sensor Networks


M. Pradeepa, R. Ponnusamy

Received Revised Accepted Published
25 Aug 2025 23 Jan 2026 27 Jan 2026 14 Feb 2026

Citation :

M. Pradeepa, R. Ponnusamy, "Advanced Ensemble Deep Learning Model Integrated with Metaheuristic Optimisation for Secure and Reliable Intrusion Detection in Wireless Sensor Networks," International Journal of Engineering Trends and Technology (IJETT), vol. 74, no. 2, pp. 280-292, 2026. Crossref, https://doi.org/10.14445/22315381/IJETT-V74I2P120

Abstract

With the growth of reliance on the internet and the transfer of most businesses to present remote services, the problems in protecting the network and identifying attacks rapidly become more prominent, as the attack surface and cyberattacks improve in response. The current Wireless Sensor Networks (WSNs) intrusion detection methods that utilize Machine Learning (ML) techniques to detect previously known attacks use single layers of recognition, which means an expensive algorithm must be performed before identifying any suspicious action. Network Intrusion Detection Systems (IDS) present a type of service to the system, and it becomes unavoidable for some communication systems. ML methods are extensively applied in IDS; still, the performance of ML methods is less adequate while processing unbalanced attacks. This paper presents an Advanced Ensemble Deep Learning Model Integrated with Metaheuristic Optimization for Secure and Reliable Intrusion Detection (AEDL-MORID) methodology. The main objective of the AEDL-MORID methodology presents strong potential for real-time deployment in resource-constrained WSN environments, strengthening network resilience against sophisticated cyber threats. The AEDL-MORID method starts with data pre-processing techniques involving the handling of missing values and min-max normalization to ensure clean and consistent input for the learning models. For dimensionality reduction, the dung beetle optimization (DBO) method is utilized to detect the most informative features effectively. In addition, an ensemble classification method integrating Bidirectional Long Short-Term Memory (BiLSTM), Graph Convolutional Network (GCN), and Stacked Denoising Autoencoder (SDAE) is employed for attack detection. To further improve ensemble classification performance, the model parameters are fine-tuned using the Improved Crow Search Algorithm (ICSA) method. The experimentation of the AEDL-MORID model is conducted on the WSN-DS dataset. The experimental validation of the AEDL-MORID system indicated a better accuracy of 99.81% compared to recent techniques.

Keywords

Intrusion Detection, Dung Beetle Optimization, Wireless Sensor Network, Attack Detection, Resource Constrained, Deep Learning.

References

[1] V. Gowdhaman, and R. Dhanapal, “An Intrusion Detection System for Wireless Sensor Networks using Deep Neural Network,” Soft Computing, vol. 26, no. 23, pp. 13059-13067, 2022.
[CrossRef] [Google Scholar] [Publisher Link]


[2] Halima Sadia et al., “Intrusion Detection System for Wireless Sensor Networks: A Machine Learning based Approach,” IEEE Access, vol. 12, pp. 52565-52582, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[3] K. Sedhuramalingam, and N. Saravanakumar, “A Novel Optimal Deep Learning Approach for Designing Intrusion Detection System in Wireless Sensor Networks,” Egyptian Informatics Journal, vol. 27, pp. 1-8, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[4] Fatima Al-Quayed, Zulfiqar Ahmad, and Mamoona Humayun, “A Situation based Predictive Approach for Cybersecurity Intrusion Detection and Prevention using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0,” IEEE Access, vol. 12, pp. 34800-34819, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[5] Safa Otoum, Burak Kantarci, and Hussein Mouftah, “On the Feasibility of Deep Learning in Sensor Network Intrusion Detection,” IEEE Networking Letters, vol. 1, no. 2, pp. 68-71, 2019.
[CrossRef] [Google Scholar] [Publisher Link]

[6] Abhilash Singh et al., “A Deep Learning Approach to Predict the Number of K-Barriers for Intrusion Detection Over a Circular Region using Wireless Sensor Networks,” Expert Systems with Applications, vol. 211, pp. 1-29, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[7] Bandar Almaslukh et al., “Deep Learning and Entity Embedding-based Intrusion Detection Model for Wireless Sensor Networks,” Computers, Materials & Continua, vol. 69, no. 1, pp. 1343-1360, 2021.
[CrossRef] [Google Scholar] [Publisher Link]

[8] Liqun Yang et al., “Real-Time Intrusion Detection in Wireless Network: A Deep Learning-Based Intelligent Mechanism,” IEEE Access, vol. 8, pp. 170128-170139, 2020.
[CrossRef] [Google Scholar] [Publisher Link]

[9] Remah Alshinina, and Khaled Elleithy, “A Highly Accurate Deep Learning based Approach for Developing Wireless Sensor Network Middleware,” IEEE Access, vol. 6, pp. 29885-29898, 2018.
[CrossRef] [Google Scholar] [Publisher Link]

[10] Jyoti Srivastava, and Jay Prakash, “Deep Learning-Enabled Energy Optimization and Intrusion Detection for Wireless Sensor Networks,” Opsearch, vol. 62, no. 1, pp. 368-405, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[11] Maryam Mahdi Alhusseini, Alireza Rouhi, and Mohammad-Reza Feizi-Derakhshi, “AI-Powered Hybrid Intrusion Detection Framework for Cloud Security using Novel Metaheuristic Optimization,” arXiv Preprint, pp. 1-18, 2026.
[CrossRef] [Google Scholar] [Publisher Link]

[12] M. Sakthimohan, J. Deny, and G. Elizabeth Rani, “Secure Deep Learning-Based Energy Efficient Routing with Intrusion Detection System for Wireless Sensor Networks,” Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, vol. 46, no. 4, pp. 8587-8603, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[13] Ali Siddiq, and Yahya Jaber Ghazwani, “Hybrid Optimized Deep Neural Network-Based Intrusion Node Detection and Modified Energy Efficient Centralized Clustering Routing Protocol for Wireless Sensor Network,” IEEE Transactions on Consumer Electronics, vol. 70, no. 3, pp. 6303-6313, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[14] Priyanka Pande, Harsh Mathur, and Lalit Kumar Gupta, “Machine Learning-Based Intrusion Detection System using Wireless Sensor Networks,” 2024 Fourth International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India, pp. 1-10, 2024.
[CrossRef] [Google Scholar] [Publisher Link]

[15] Hanjabam Saratchandra Sharma, Arindam Sarkar, and Moirangthem Marjit Singh, “An Efficient Deep Learning-Based Solution for Network Intrusion Detection in Wireless Sensor Network,” International Journal of System Assurance Engineering and Management, vol. 14, no. 6, pp. 2423-2446, 2023.
[
CrossRef] [Google Scholar] [Publisher Link]

[16] S. Karthic, and S. Manoj Kumar, “Hybrid Optimized Deep Neural Network with Enhanced Conditional Random Field based Intrusion Detection on Wireless Sensor Network,” Neural Processing Letters, vol. 55, no. 1, pp. 459-479, 2023.
[CrossRef] [Google Scholar] [Publisher Link]

[17] M. Nirmal Kumar, T. Vijayan, and B. Karthik, “Intrusion Detection Framework for Industrial Wireless Sensor Networks in Smart Manufacturing,” Pioneering AI and Data Technologies for Next-Gen Security, IoT, and Smart Ecosystems, pp. 197-218, 2026.
[Google Scholar]


[18] Alok Kumar Shukla, Shubhra Dwivedi, and Aishwarya Mishra, “An Effective Hybrid Deep Learning Metaheuristic Model for Robust IoT Intrusion Detection,” Discover Computing, vol. 28, no. 1, pp. 1-31, 2025.


[CrossRef] [Google Scholar] [Publisher Link]

[19] R. Pavithra Guru, Thomas M. Chen, and Mithileysh Sathiyanarayanan, “ABO Optimized Hybrid Trans-CNN-Bi-GRU Approach for Intrusion Detection in IoT Networks: A Privacy-Preserving Solution,” Cluster Computing, vol. 29, no. 1, 2026.
[CrossRef] [Google Scholar] [Publisher Link]

[20] Sandeep Mahato, and Subrata Dutta, “Ensemble based Meta-Heuristic Optimized Approach for Network Intrusion Detection using LightGBM,” Cluster Computing, vol. 28, no. 12, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[21] YaHui Lv, “Research on Improving the Efficiency and Accuracy of Accounting Data Processing based on Intelligent Financial Software,” International Journal of High Speed Electronics and Systems, vol. 35, no. 2, pp. 1-24, 2026.
[CrossRef] [Google Scholar] [Publisher Link]

[22] Shuxun Li et al., “Composite Noise Reduction Method for Internal Leakage Acoustic Emission Signal of Safety Valve based on IWTD-IVMD Algorithm,” Sensors, vol. 25, no. 15, pp. 1-32, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[23] Bouchra Fatima Zohra Diaf et al., “A Novel Bidirectional Lstm-Based Approach for Wind Speed Forecasting: A Case Study of Oran and Adrar, Algeria,” SSRN Electronic Journal, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[24] Adson Silva, and Ricardo Farias, “AD-VAE: Adversarial Disentangling Variational Autoencoder,” Sensors, vol. 25, no. 5, pp. 1-14, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[25] Adil O. Khadidos, “Energy-Aware Unmanned Aerial Vehicle-Assisted Mobile Multimedia Communication via Metaheuristic Optimization with Stacked Deep Learning Models,” Alexandria Engineering Journal, vol. 129, pp. 864-876, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[26] Maithili Shailesh Andhare et al., “A Novel Optimized Hybrid Deep Learning Framework for Mental Stress Detection using Electroencephalography,” Brain Sciences, vol. 15, no. 8, pp. 1-27, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[27] Bassam Kasasbeh, Kaggle, 2026. [Online]. Available: https://www.kaggle.com/bassamkasasbeh1/datasets

[28] M. SriRaghavendra et al., “Knowledge Improved Hybrid DNN-KAN Framework for Intrusion Detection in Wireless Sensor Networks,” IEEE Access, vol. 13, pp. 127558-127569, 2025.
[CrossRef] [Google Scholar] [Publisher Link]

[29] Donghyeon Kim, Hyungchul Im, and Seongsoo Lee, “Adaptive Autoencoder-based Intrusion Detection System with Single Threshold for CAN Networks,” Sensors, vol. 25, no. 13, pp. 1-22, 2025.
[CrossRef] [Google Scholar] [Publisher Link]