Abstract
The Internet of Things (IoT) makes more heterogeneous devices possible. A wireless sensor network (WSN) is a cluster of sensor nodes used to monitor different field conditions. A node must transport data to its destination, usually the base station (BS), with the assistance of other nodes in the network because each node has a limited wireless transmission range. The primary concern that comes up while data is being transmitted is security. This section will discuss a critical attack known as a sinkhole attack. Using the Leader election technique, this system can monitor the nearby nodes zone-by-zone. The current work uses an Intelligent Intrusion Mechanism (IIM) to identify network intruders and stop sinkhole attacks. Two methods are used to accomplish this: the Zone-Based Leader Election Technique and the Region-Based Leader Election Method. In both methods, a network's nodes are distributed among various zones and regions. The alternative WSN leader is informed of a node's compromised state when detected in the Leader election method. The existing technologies can improve system efficiency and identify intruder nodes. The proposed IIM model achieves a high throughput of 98.2%, energy consumption rate of 80.5%, malicious node detection rate of 96.5%, and end-to-end delay rate of 11.2% compared to other existing models.
Keywords
Internet of Things, Routing Attacks, Intelligent Intrusion Mechanism, Leader Election Method, Wireless Sensor Network,Downloads
References
- M.Z. Hasan, Z.M. Hanapi, Z.A. Zukarnain, F.H. Huyop, M.D.H. Abdullah, An Efficient Detection of Sinkhole Attacks using Machine Learning: Impact on energy and security. PLOS ONE, 20(3), (2025) e0309532. https://doi.org/10.1371/journal.pone.0309532
- S. Pundir, M. Wazid, D.P. Singh, A.K. Das, J.J. Rodrigues, Y. Park, Designing Efficient Sinkhole Attack Detection Mechanism in edge-based IoT deployment. Sensors, 20(5), (2020) 1300. https://doi.org/10.3390/s20051300
- L.C. Sejaphala, M. Velempini, The design of a defense mechanism to mitigate sinkhole attack in software defined wireless sensor cognitive radio networks. Wireless Personal Communications, 113(2), (2020) 977–993.
- A.A.R.A.C. Omar, B. Soudan, A Comprehensive Survey on Detection of Sinkhole Attack in Routing over Low Power and Lossy Network for Internet of Things. Internet of Things, 22, (2023) 100750. https://doi.org/10.1016/j.iot.2023.100750
- S.S.M. Vincent, N. Duraipandian, Detection and Prevention of Sinkhole Attacks in MANETs-based Routing Protocol using Hybrid AdaBoost–Random Forest Algorithm. Expert Systems with Applications, 249, (2024) 123765. https://doi.org/10.1016/j.eswa.2024.123765
- A. John, I.F.B. Isnin, S.H.M. Madni, M. Faheem, Intrusion Detection in Cluster-Based Wireless Sensor Networks: Current Issues, Opportunities and Future Research Directions. IET Wireless Sensor Systems, 14(6), (2024) 293–332. https://doi.org/10.1049/wss2.12100
- V. Sivagaminathan, M. Sharma, S.K. Henge, Intrusion Detection Systems for Wireless Sensor Networks using Computational Intelligence techniques. Cybersecurity, 6(1), (2023) 27. https://doi.org/10.1186/s42400-023-00161-0
- A. Rehman, S.U. Rehman, H. Raheem, Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wireless Personal Communications, 106(4), (2018) 2291–2313. https://doi.org/10.1007/s11277-018-6040-7
- A. Bhushan, G. Sahoo, Recent advances in Attacks, Technical Challenges, Vulnerabilities and their Countermeasures in Wireless Sensor Networks. Wireless Personal Communications, 98(2), (2017) 2037–2077. https://doi.org/10.1007/s11277-017-4962-0
- S. Padmanabhan, R. Maruthi, R. Anitha, An Experimental Study to Recognize and Mitigate the Malevolent Attack in Wireless Sensor Networks. Global Transitions Proceedings, 3(1), (2022) 55–59. https://doi.org/10.1016/j.gltp.2022.04.013
- S. Vadivel, S. Konda, K.R. Balmuri, A. Stateczny, B.D. Parameshachari, Dynamic Route Discovery Using Modified Grasshopper Optimization Algorithm in Wireless Ad-Hoc Visible light communication network. Electronics, 10(10), (2021) 1176. https://doi.org/10.3390/electronics10101176
- W. Jiaan, X. Ancheng, J. Jintao, G. Linyang, Optimization lighting layout of Indoor Visible Light Communication System based on Improved Artificial Fish Swarm Algorithm. Journal of Optics, 22(3), (2020) 035701. https://doi.org/10.1088/2040-8986/ab66cf
- M.R.M. R, Localization and detection of sinkhole Attacks in Wireless Sensor Networks based on Denial of Service Attacks. Journal of Electrical Systems, 20(3s), (2024) 195–204. https://doi.org/10.52783/jes.1270
- H. Chen, C. Meng, Z. Shan, Z. Fu, B.K. Bhargava, A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by combining Hilbert–Huang Transformation and Trust Evaluation. IEEE Access, 7, (2019) 32853–32866. https://doi.org/10.1109/ACCESS.2019.2903816
- W. Fang, M. Xu, C. Zhu, W. Han, W. Zhang, J.J.P.C. Rodrigues, FETMS: Fast and efficient Trust Management Scheme for Information-Centric Networking in Internet of Things. IEEE Access, 7, (2019) 13476–13485. https://doi.org/10.1109/ACCESS.2019.2892712
- D. Udaya Suriya Rajkumar, P. Shanmugaraja, K. Arunkumar, R. Sathiyaraj, P. Manivannan, A HSEERP—hierarchical Secured Energy Efficient Routing Protocol for Wireless Sensor Networks. Peer-to-Peer Networking and Applications, 17(1), (2023) 163–175. https://doi.org/10.1007/s12083-023-01575-w
- P. Bhale, S. Biswas, S. Nandi, A hybrid IDS for Detection and Mitigation of Sinkhole Attack in 6LoWPAN Networks. International Journal of Information Security, 23(2), (2024) 915–934. https://doi.org/10.1007/s10207-023-00763-2
- A.M. Khedr, P.P. Raj, S.S. Rani, Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model for Sinkhole Attack Detection in WSN. Wireless Personal Communications, 134(1), (2024) 361–382. https://doi.org/10.1007/s11277-024-10913-x
- S.S.M. Vincent, Mitigating Sinkhole Attacks in MANET Routing Protocols using Federated Learning HDBNCNN Algorithm. CLEI Electronic Journal, 28(1), (2025) 1–14. https://doi.org/10.19153/cleiej.28.1.7
- D. Airehrour, J.A. Gutierrez, S.K. Ray, SecTrust-RPL: A secure trust-aware RPL Routing Protocol for Internet of Things. Future Generation Computer Systems, 93, (2019) 860–876. https://doi.org/10.1016/j.future.2018.03.021
- R. Wazirali, R. Ahmad, Machine Learning approaches to detect DoS and their Effect on WSNs lifetime. Computers, Materials & Continua, 70(3), (2021) 4922–4946. https://doi.org/10.32604/cmc.2022.020044
- G.A. Sukkar, S. Al-Sharaeh, Enhancing security in wireless sensor networks: A Machine Learning-based DoS Attack Detection. Engineering Technology & Applied Science Research, 15(1), (2025) 19712–19719. https://doi.org/10.48084/etasr.7191
- A. Naderloo, S.A.F. Aghda, M. Mirfakhraei, Fuzzy-based Cluster Routing in Wireless Sensor Network. Soft Computing, 27(10), (2023) 6151–6158. https://doi.org/10.1007/s00500-023-07976-6
- X. Chai, Y. Wu, L. Feng, Energy-Efficient Scalable Routing Algorithm based on Hierarchical Agglomerative Clustering for Wireless Sensor Networks. Alexandria Engineering Journal, 120, (2025) 95–105.
- D.U.S. Rajkumar, P.S. Gavaskar, F. Al-Turjman, R. Sathiyaraj, B. Balusamy, Artificial Bee Colony Method for Identifying Eavesdropper in Terrestrial Cellular Networks. Transactions on Emerging Telecommunications Technologies, 32(7), (2021) e3941.
- A. Hamzah, M. Shurman, O. Al-Jarrah, E. Taqieddin, Energy-Efficient Fuzzy-Logic-based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks. Sensors, 19(3), (2019) 561. https://doi.org/10.3390/s19030561
- U.S.R. Dhamodharan, S. Rajendran, R.A. Sundaramoorthy, M. Thirunavukkarasan, A Centralized Mechanism for Preventing DDOs attack in Wireless Sensor Networks. Wireless Personal Communications, 124(2), (2022) 1191–1208.
- U.S.D. Rajkumar, R. Vayanaperumal, A leader based Monitoring Approach for Sinkhole Attack in Wireless Sensor Network. Journal of Computer Science, 9(9), (2013) 1106. https://doi.org/10.3844/jcssp.2013.1106.1116
- N. Kaja, A. Shaout, D. Ma, an Intelligent Intrusion Detection System. Applied Intelligence, 49(9), (2019) 3235–3247. https://doi.org/10.1007/s10489-019-01436-1
Articles

