{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:58:11Z","timestamp":1777705091292,"version":"3.51.4"},"reference-count":30,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2024,4,18]]},"abstract":"<jats:p>In general, wireless sensor networks are used in various industries, including environmental monitoring, military applications, and queue tracking. To support vital applications, it is crucial to ensure effectiveness and security. To prolong the network lifetime, most current works either introduce energy-preserving and dynamic clustering strategies to maintain the optimal energy level or attempt to address intrusion detection to fix attacks. In addition, some strategies use routing algorithms to secure the network from one or two attacks to meet this requirement, but many fewer solutions can withstand multiple types of attacks. So, this paper proposes a secure deep learning-based energy-efficient routing (SDLEER) mechanism for WSNs that comes with an intrusion detection system for detecting attacks in the network. The proposed system overcomes the existing solutions\u2019 drawbacks by including energy-efficient intrusion detection and prevention mechanisms in a single network. The system transfers the network\u2019s data in an energy-aware manner and detects various kinds of network attacks in WSNs. The proposed system mainly comprises two phases, such as optimal cluster-based energy-aware routing and deep learning-based intrusion detection system. Initially, the cluster of sensor nodes is formed using the density peak k-mean clustering algorithm. After that, the proposed system applies an improved pelican optimization approach to select the cluster heads optimally. The data are transmitted to the base station via the chosen optimal cluster heads. Next, in the attack detection phase, the preprocessing operations, such as missing value imputation and normalization, are done on the gathered dataset. Next, the proposed system applies principal component analysis to reduce the dimensionality of the dataset. Finally, intrusion classification is performed by Smish activation included recurrent neural networks. The proposed system uses the NSL-KDD dataset to train and test it. The proposed one consumes a minimum energy of 49.67 mJ, achieves a better delivery rate of 99.92%, takes less lifetime of 5902 rounds, 0.057\u200as delay, and achieves a higher throughput of 0.99 Mbps when considering a maximum of 500 nodes in the network. Also, the proposed one achieves 99.76% accuracy for the intrusion detection. Thus, the simulation outcomes prove the superiority of the proposed SDLEER system over the existing schemes for routing and attack detection.<\/jats:p>","DOI":"10.3233\/jifs-235512","type":"journal-article","created":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T11:31:22Z","timestamp":1708687882000},"page":"8587-8603","source":"Crossref","is-referenced-by-count":17,"title":["Secure deep learning-based energy efficient routing with intrusion detection system for wireless sensor networks"],"prefix":"10.1177","volume":"46","author":[{"given":"M.","family":"Sakthimohan","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, Kalasalingam Academy of Research and Education, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Deny","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, Kalasalingam Academy of Research and Education, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. Elizabeth","family":"Rani","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Kalaignar Karunanidhi Institute of Technology, Coimbatore, Tamil Nadu, India"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"issue":"23","key":"10.3233\/JIFS-235512_ref1","doi-asserted-by":"crossref","first-page":"e6152","DOI":"10.1002\/cpe.6152","article-title":"Design and analysis of efficient neural intrusion detection for wireless sensor networks","volume":"33","author":"Batiha","year":"2021","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"2","key":"10.3233\/JIFS-235512_ref2","doi-asserted-by":"crossref","first-page":"478","DOI":"10.3390\/s22020478","article-title":"Game theory-based energy-efficient clustering algorithm for wireless sensor networks","volume":"22","author":"Yan","year":"2022","journal-title":"Sensors"},{"key":"10.3233\/JIFS-235512_ref3","doi-asserted-by":"crossref","unstructured":"Sharma T. , Balyan A. , Nair R. , Jain P. , Arora S. and Ahmadi F. , ReLeC: A Reinforcement Learning-Based Clustering-Enhanced Protocol for Efficient Energy Optimization in Wireless Sensor Networks, Wireless Communications and Mobile Computing 2022 (2022).","DOI":"10.1155\/2022\/3337831"},{"key":"10.3233\/JIFS-235512_ref4","doi-asserted-by":"crossref","first-page":"89593","DOI":"10.1109\/ACCESS.2021.3090979","article-title":"Energy efficient clustering-based mobile routing algorithm on WSNs","volume":"9","author":"Aydin","year":"2021","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-235512_ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2022\/8429285","article-title":"Wireless sensor network cluster head selection and short routing using energy efficient ElectroStatic discharge algorithm","volume":"2022","author":"Jagan","year":"2022","journal-title":"Journal of Engineering"},{"key":"10.3233\/JIFS-235512_ref6","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s11277-020-07727-y","article-title":"An improved energy efficient clustering protocol for increasing the life time of wireless sensor networks","volume":"116","author":"Khediri","year":"2021","journal-title":"Wireless Personal Communications"},{"issue":"13","key":"10.3233\/JIFS-235512_ref7","doi-asserted-by":"crossref","first-page":"1539","DOI":"10.3390\/electronics10131539","article-title":"An overview of machine learning-based energy-efficient routing algorithms in wireless sensor networks","volume":"10","author":"Ding","year":"2021","journal-title":"Electronics"},{"key":"10.3233\/JIFS-235512_ref9","doi-asserted-by":"crossref","first-page":"92688","DOI":"10.1109\/ACCESS.2021.3092509","article-title":"Towards energy efficient clustering in wireless sensor networks: A comprehensive review","volume":"9","author":"Merabtine","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"10.3233\/JIFS-235512_ref10","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1016\/j.jksuci.2019.04.003","article-title":"Hybrid based cluster head selection for maximizing network lifetime and energy efficiency in WSN","volume":"34","author":"Dattatraya","year":"2022","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"3","key":"10.3233\/JIFS-235512_ref11","doi-asserted-by":"crossref","first-page":"2235","DOI":"10.1007\/s11277-021-08990-3","article-title":"A new energy-aware cluster head selection algorithm for wireless sensor networks","volume":"122","author":"Tay","year":"2022","journal-title":"Wireless Personal Communications"},{"issue":"10","key":"10.3233\/JIFS-235512_ref12","doi-asserted-by":"crossref","first-page":"8564","DOI":"10.1016\/j.jksuci.2021.08.031","article-title":"Energy efficient cluster head selection using improved Sparrow Search Algorithm in Wireless Sensor Networks","volume":"34","author":"Kathiroli","year":"2022","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"10.3233\/JIFS-235512_ref13","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1007\/s11277-021-08239-z","article-title":"Energy efficient clustering algorithm based on particle swarm optimization technique for wireless sensor networks","volume":"119","author":"Loganathan","year":"2021","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"10.3233\/JIFS-235512_ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/LSENS.2021.3068184","article-title":"A node overhaul scheme for energy efficient clustering in wireless sensor networks","volume":"5","author":"Singh","year":"2021","journal-title":"IEEE Sensors Letters"},{"key":"10.3233\/JIFS-235512_ref15","doi-asserted-by":"crossref","first-page":"7649","DOI":"10.1007\/s11227-020-03593-4","article-title":"Energy-efficient cluster head selection through relay approach for WSN","volume":"77","author":"Rathore","year":"2021","journal-title":"The Journal of Supercomputing"},{"issue":"20","key":"10.3233\/JIFS-235512_ref16","doi-asserted-by":"crossref","first-page":"3332","DOI":"10.3390\/electronics11203332","article-title":"High density sensor networks intrusion detection system for anomaly intruders using the slime mould algorithm","volume":"11","author":"Alwan","year":"2022","journal-title":"Electronics"},{"key":"10.3233\/JIFS-235512_ref17","doi-asserted-by":"crossref","first-page":"69498","DOI":"10.1109\/ACCESS.2021.3065571","article-title":"An optimal decision method for intrusion detection system in wireless sensor networks with enhanced cooperation mechanism","volume":"9","author":"Du","year":"2021","journal-title":"IEEE Access"},{"issue":"1","key":"10.3233\/JIFS-235512_ref18","doi-asserted-by":"crossref","first-page":"e4150","DOI":"10.1002\/ett.4150","article-title":"Network intrusion detection system: A systematic study of machine learning and deep learning approaches","volume":"32","author":"Ahmad","year":"2021","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"key":"10.3233\/JIFS-235512_ref19","doi-asserted-by":"crossref","unstructured":"Nagalalli G. and Ravi G. , A novel MegaBAT optimized intelligent intrusion detection system in wireless sensor networks, Intelligent Automation & Soft Computing 35(1) (2023).","DOI":"10.32604\/iasc.2023.026571"},{"key":"10.3233\/JIFS-235512_ref20","doi-asserted-by":"crossref","unstructured":"Kumar G. and Alqahtani H. , Machine learning techniques for intrusion detection systems in SDN-Recent advances. Challenges and future directions, CMES-Computer Modeling in Engineering & Sciences 134(1) (2023).","DOI":"10.32604\/cmes.2022.020724"},{"key":"10.3233\/JIFS-235512_ref22","first-page":"100613","article-title":"A deep learning based feed forward artificial neural network to predict the K-barriers for intrusion detection using a wireless sensor network","volume":"25","author":"Muruganandam","year":"2023","journal-title":"Measurement: Sensors"},{"key":"10.3233\/JIFS-235512_ref23","doi-asserted-by":"crossref","unstructured":"Rameshkumar S. , Ganesan R. and Merline A. , Progressive transfer learning-based deep Q network for DDOS defence in WSN, Computer Systems Science & Engineering 44(3) (2023).","DOI":"10.32604\/csse.2023.027910"},{"issue":"6","key":"10.3233\/JIFS-235512_ref24","doi-asserted-by":"crossref","first-page":"e3997","DOI":"10.1002\/ett.3997","article-title":"Analysis of security and energy efficiency for shortest route discovery in low energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system","volume":"32","author":"Mittal","year":"2021","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"1","key":"10.3233\/JIFS-235512_ref25","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/s41870-021-00744-5","article-title":"EES-WCA: energy efficient and secure weighted clustering for WSN using machine learning approach","volume":"14","author":"Gulganwa","year":"2022","journal-title":"International Journal of Information Technology"},{"issue":"8","key":"10.3233\/JIFS-235512_ref27","doi-asserted-by":"crossref","first-page":"947","DOI":"10.1016\/j.jksuci.2018.08.002","article-title":"ESO-LEACH: PSO based energy efficient clustering in LEACH","volume":"33","author":"Nigam","year":"2021","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"1","key":"10.3233\/JIFS-235512_ref28","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1007\/s11277-022-09776-x","article-title":"Intrusion detection system in wireless sensor network using conditional generative adversarial network","volume":"126","author":"Sood","year":"2022","journal-title":"Wireless Personal Communications"},{"key":"10.3233\/JIFS-235512_ref29","first-page":"1","article-title":"A lightweight intelligent intrusion detection model for wireless sensor networks","volume":"2021","author":"Pan","year":"2021","journal-title":"Security and communication Networks"},{"key":"10.3233\/JIFS-235512_ref30","doi-asserted-by":"crossref","first-page":"3873","DOI":"10.1007\/s11276-021-02660-9","article-title":"Energy efficient secured K means based unequal fuzzy clustering algorithm for efficient reprogramming in wireless sensor networks","volume":"27","author":"Santhosh Kumar","year":"2021","journal-title":"Wireless Networks"},{"issue":"4","key":"10.3233\/JIFS-235512_ref31","doi-asserted-by":"crossref","first-page":"1407","DOI":"10.3390\/s22041407","article-title":"An enhanced intrusion detection model based on improved kNN in WSNs","volume":"22","author":"Liu Gaoyuan","year":"2022","journal-title":"Sensors"},{"issue":"1","key":"10.3233\/JIFS-235512_ref32","doi-asserted-by":"crossref","first-page":"9074","DOI":"10.1038\/s41598-022-13061-z","article-title":"AutoML-ID: Automated machine learning model for intrusion detection using wireless sensor network","volume":"12","author":"Singh Abhilash","year":"2022","journal-title":"Scientific Reports"},{"key":"10.3233\/JIFS-235512_ref33","doi-asserted-by":"crossref","unstructured":"Punithavathi R. , Thanga Selvi R. , Latha R. , Kadiravan G. , Srikanth V. , Neeraj Kumar Shukla , Robust node localization with intrusion detection for wireless sensor networks, Intelligent Automation & Soft Computing 33(1) (2022).","DOI":"10.32604\/iasc.2022.023344"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-235512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:42:52Z","timestamp":1777455772000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-235512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,18]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jifs-235512","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,18]]}}}