{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T17:32:04Z","timestamp":1770399124962,"version":"3.49.0"},"reference-count":54,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:00:00Z","timestamp":1770336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Artif. Intell."],"abstract":"<jats:p>Denial-of-service (DoS) attacks pose a major threat to various kinds of computer networks. There are several kinds of networks that are victims of DoS attacks, one of them being the wireless sensor network (WSN). The main objective of this work is to detect such attacks in wireless sensor networks. These networks are susceptible to intrusion attacks because of their fragile defense mechanisms in unattended environments. Thus, a suitable intrusion detection system must be created to optimally detect DoS attacks and prevent them. This work proposes a hybrid technique called Grasshopper Optimization Algorithm-Genetic Algorithm (GOA-GA), which combines the advantages of two metaheuristic algorithms, namely, the Grasshopper Optimization Algorithm and the Genetic Algorithm, to optimize feature selection based on the given WSN dataset. After optimal feature selection and training, the machine learning classification algorithms classify whether the traffic is normal or benign in the form of four types of DoS attacks, namely, Blackhole, Scheduling, Flooding, and Grayhole attacks. The proposed model and algorithms used are further validated and compared based on standard performance metrics. The experiments conducted during the research show that the GOA-GA method, when combined with the KNN classifier, achieves an accuracy of 95.51% and a recall of 95.51%, exhibiting competitive performance relative to recent state-of-the-art approaches while reducing feature dimensionality and computational overhead. These results indicate that the proposed hybrid optimization strategy offers a robust and efficient solution for DoS attack detection in WSNs, contributing to ongoing research in information security.<\/jats:p>","DOI":"10.3389\/frai.2026.1738152","type":"journal-article","created":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:45:18Z","timestamp":1770360318000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A hybrid metaheuristic algorithm with machine learning for detecting denial-of-service attacks in wireless sensor networks"],"prefix":"10.3389","volume":"9","author":[{"given":"Ashwani","family":"Prasad","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology","place":["Chennai, Tamil Nadu, India"]}]},{"given":"Karmel","family":"Arockiasamy","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology","place":["Chennai, Tamil Nadu, India"]}]},{"given":"Kanimozhi","family":"Gunasekaran","sequence":"additional","affiliation":[{"name":"Centre for Smart Grid Technologies, Vellore Institute of Technology","place":["Chennai, Tamil Nadu, India"]}]}],"member":"1965","published-online":{"date-parts":[[2026,2,6]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","first-page":"e1135","DOI":"10.7717\/PEERJ-CS.1135\/SUPP-1","article-title":"A systematic review of routing attacks detection in wireless sensor networks","volume":"8","author":"Alansari","year":"2022","journal-title":"PeerJ Comput. Sci."},{"key":"ref2","doi-asserted-by":"publisher","first-page":"47364","DOI":"10.1109\/ACCESS.2018.2866962","article-title":"A multi-level intrusion detection system for wireless sensor networks based on immune theory","volume":"6","author":"Alaparthy","year":"2018","journal-title":"IEEE Access"},{"key":"ref3","first-page":"107","article-title":"Using machine learning to detect dos attacks in wireless sensor networks","author":"Al-Issa","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2016\/4731953","article-title":"WSN-DS: A dataset for intrusion detection Systems in Wireless Sensor Networks","volume":"2016","author":"Almomani","year":"2016","journal-title":"J. Sens."},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.5121\/ijnsa.2021.13202","article-title":"Performance evaluation of machine learning techniques for DoS detection in wireless sensor network","author":"Alsulaiman","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3390\/s22020410","article-title":"An efficient multilevel probabilistic model for abnormal traffic detection in wireless sensor networks","volume":"22","author":"Altaf Khan","year":"2022","journal-title":"Sensors (Basel)"},{"key":"ref7","doi-asserted-by":"publisher","first-page":"2911","DOI":"10.1007\/S11277-021-08855-9","article-title":"Trust based DoS attack detection in wireless sensor networks for reliable data transmission","volume":"121","author":"Anand","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref8","doi-asserted-by":"publisher","first-page":"6590","DOI":"10.1016\/J.IJLEO.2016.04.041","article-title":"A survey on LEACH and other\u2019s routing protocols in wireless sensor network","volume":"127","author":"Arora","year":"2016","journal-title":"Optik (Stuttg)"},{"key":"ref9","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1007\/S12652-019-01382-3\/METRICS","article-title":"Genetic algorithm based optimized leach protocol for energy efficient wireless sensor networks","volume":"11","author":"Bhola","year":"2020","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1201\/9781315139470","volume-title":"Classification and regression trees","author":"Breiman","year":"2017"},{"key":"ref11","doi-asserted-by":"publisher","first-page":"103407","DOI":"10.1016\/J.ADHOC.2024.103407","article-title":"Secure and privacy-preserving intrusion detection in wireless sensor networks: federated learning with SCNN-bi-LSTM for enhanced reliability","volume":"155","author":"Bukhari","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"ref12","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A survey of intrusion detection systems in wireless sensor networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref13","doi-asserted-by":"publisher","first-page":"63","DOI":"10.22108\/jcs.2020.119468.1033","article-title":"A lightweight anomaly detection model using SVM for WSNs in IoT through a hybrid feature selection algorithm based on GA and GWO","volume":"1","author":"Davahli","year":"2020","journal-title":"J. Comput. Secur."},{"key":"ref14","doi-asserted-by":"publisher","first-page":"5277","DOI":"10.1007\/S00500-020-05527-X\/METRICS","article-title":"An improved differential evolution algorithm and its application in optimization problem","volume":"25","author":"Deng","year":"2021","journal-title":"Soft. Comput."},{"key":"ref15","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1007\/S11277-021-09401-3","article-title":"A centralized mechanism for preventing DDOS attack in wireless sensor networks","volume":"124","author":"Dhamodharan","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-981-10-4585-1_1","article-title":"Detection and prevention of DDoS attacks in wireless sensor networks","volume":"3","author":"Dhuria","year":"2018","journal-title":"Lect. Notes Data Eng. Commun. Technol."},{"key":"ref17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1993042.1993049","article-title":"Data collection in wireless sensor networks with Mobile elements","volume":"8","author":"Di Francesco","year":"2011","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/J.COMCOM.2014.06.003","article-title":"Security in wireless ad-hoc networks \u2013 a survey","volume":"51","author":"Di Pietro","year":"2014","journal-title":"Comput. Commun."},{"key":"ref19","first-page":"907","article-title":"Effects of IDSs on the WSNs lifetime: evidence of the need of new approaches","author":"Doddapaneni","year":"2012"},{"key":"ref20","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1080\/1206212X.2020.1720951","article-title":"Defense against distributed DoS attack detection by using intelligent evolutionary algorithm","volume":"44","author":"Dwivedi","year":"2020","journal-title":"Int. J. Comput. Appl."},{"key":"ref21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S12083-025-01947-4\/FIGURES\/5","article-title":"A feature selection-driven machine learning framework for anomaly-based intrusion detection systems","volume":"18","author":"Emirmahmuto\u011flu","year":"2025","journal-title":"Peer Peer Netw Appl"},{"key":"ref22","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/J.ESWA.2018.06.023","article-title":"Improved grasshopper optimization algorithm using opposition-based learning","volume":"112","author":"Ewees","year":"2018","journal-title":"Expert Syst. Appl."},{"key":"ref23","first-page":"173","article-title":"Systematic analysis of DoS attacks in wireless sensor networks with wormhole injection","volume":"4","author":"Farooq","year":"2014","journal-title":"Int. J. Inform. Comput. Technol."},{"key":"ref24","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1016\/J.SOLENER.2018.07.014","article-title":"Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded PV array","volume":"171","author":"Fathy","year":"2018","journal-title":"Sol. Energy"},{"key":"ref25","article-title":"An energy balanced algorithm of LEACH protocol in WSN","author":"Fu","year":"2013"},{"key":"ref26","first-page":"329","article-title":"Intrusion detection in wireless sensor networks: issues, challenges and approaches. In Wireless Networks and Security","author":"Ghosal","year":"2013"},{"key":"ref27","first-page":"79","article-title":"Enhanced svm-based novel detection of intrusions for wireless sensor networks (WSNS)","volume":"11","author":"Gupta","year":"2023","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref28","first-page":"1","article-title":"Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA,","author":"Heinzelman","year":"2000"},{"key":"ref29","doi-asserted-by":"publisher","first-page":"2074","DOI":"10.30534\/ijatcse\/2021\/1491032021","article-title":"Energy efficient routing and reliable data transmission protocol in WSN","volume":"12","author":"Ibrahim Khalaf","year":"2020","journal-title":"Int. J. Adv. Soft Compu. Appl."},{"key":"ref30","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/ASI3010014","article-title":"Applications of wireless sensor networks: an up-to-date survey","volume":"3","author":"Kandris","year":"2020","journal-title":"Appl. Syst. Innovat."},{"key":"ref31","first-page":"422","article-title":"Comparative study of WSN protocols (LEACH, PEGASIS and TEEN)","author":"Khan","year":"2016"},{"key":"ref32","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/S11277-021-08277-7","article-title":"Machine learning based detection and a novel EC-BRTT algorithm based prevention of DoS attacks in wireless sensor networks","volume":"127","author":"Lakshmi Narayanan","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/S40537-024-00892-Y\/FIGURES\/4","article-title":"Optimizing IoT intrusion detection system: feature selection versus feature extraction in machine learning","volume":"11","author":"Li","year":"2024","journal-title":"J. Big Data"},{"key":"ref34","doi-asserted-by":"crossref","DOI":"10.1109\/IEMCON.2015.7344446","article-title":"Various types of routing protocols in wireless sensor network with vulnerabilities: a review","author":"Majumdar","year":"2015"},{"key":"ref35","doi-asserted-by":"publisher","first-page":"350","DOI":"10.3390\/FI17080350","article-title":"Security issues in IoT-based wireless sensor networks: classifications and solutions","volume":"17","author":"Nguyen","year":"2025","journal-title":"Fut. Internet"},{"key":"ref36","doi-asserted-by":"publisher","first-page":"315","DOI":"10.2298\/FUEE1902315O","article-title":"Feature selection for intrusion detection system in a cluster-based heterogeneous wireless sensor network","volume":"32","author":"Osanaiye","year":"2019","journal-title":"Facta Univ. Ser. Electron. Energ."},{"key":"ref37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3706583","article-title":"Security challenges, mitigation strategies, and future trends in wireless sensor networks: a review","volume":"57","author":"Oztoprak","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref38","doi-asserted-by":"publisher","first-page":"3053","DOI":"10.1007\/S11277-021-09040-8","article-title":"FBDR-fuzzy based DDoS attack detection and recovery mechanism for wireless sensor networks","volume":"122","author":"Pajila","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref39","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1108\/IJPCC-10-2020-0162","article-title":"Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM","volume":"19","author":"Pawar","year":"2023","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"ref40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S12652-020-02763-9","article-title":"An optimized deep neural network based DoS attack detection in wireless video sensor network","volume":"12","author":"Ramesh","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/S10462-024-10747-W","article-title":"A review of nature-inspired algorithms on single-objective optimization problems from 2019 to 2023","volume":"57","author":"Rani","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"ref42","doi-asserted-by":"publisher","first-page":"1559","DOI":"10.1007\/S12652-020-02228-Z\/METRICS","article-title":"Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks","volume":"12","author":"Safaldin","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref43","doi-asserted-by":"publisher","first-page":"2022","DOI":"10.14569\/IJACSA.2022.0130497","article-title":"CNN-LSTM based approach for dos attacks detection in wireless sensor networks","volume":"13","author":"Salmi","year":"2022","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref44","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1201\/b13092-15","article-title":"Security in wireless sensor networks","volume-title":"Wireless Sensor Networks","author":"Sen","year":"2016"},{"key":"ref45","first-page":"58","article-title":"Issues and challenges in wireless sensor networks","author":"Sharma","year":"2014"},{"key":"ref46","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/J.JISA.2017.09.004","article-title":"MLP-GA based algorithm to detect application layer DDoS attack","volume":"36","author":"Singh","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"ref47","doi-asserted-by":"publisher","first-page":"264","DOI":"10.23919\/JCN.2022.000002","article-title":"Intrusion detection technique in wireless sensor network using grid search random forest with Boruta feature selection algorithm","volume":"24","author":"Subbiah","year":"2022","journal-title":"J. Commun. Netw."},{"key":"ref48","first-page":"199","article-title":"Variants of LEACH routing protocol in WSN: a comparative analysis","author":"Varshney","year":"2018"},{"key":"ref49","doi-asserted-by":"publisher","first-page":"120567","DOI":"10.1109\/access.2021.3108222","article-title":"Efficient detection of botnet traffic by features selection and decision trees","volume":"9","author":"Velasco-Mata","year":"2021","journal-title":"IEEE Access"},{"key":"ref50","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/J.COSE.2018.04.010","article-title":"Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection","volume":"77","author":"Vijayanand","year":"2018","journal-title":"Comput. Secur."},{"key":"ref51","first-page":"1","volume-title":"Nature-inspired optimization algorithms","author":"Yang","year":"2020"},{"key":"ref52","doi-asserted-by":"publisher","first-page":"12361","DOI":"10.1007\/S00500-020-04678-1","article-title":"Wireless sensor network intrusion detection system based on MK-ELM","volume":"24","author":"Zhang","year":"2020","journal-title":"Soft. Comput."},{"key":"ref53","doi-asserted-by":"publisher","first-page":"102094","DOI":"10.1016\/J.ADHOC.2020.102094","article-title":"Mobile wireless sensor network lifetime maximization by using evolutionary computing methods","volume":"101","author":"Zhang","year":"2020","journal-title":"Ad Hoc Netw."},{"key":"ref54","first-page":"135","article-title":"Logistic regression model optimization and case analysis","author":"Zou","year":"2019"}],"container-title":["Frontiers in Artificial Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2026.1738152\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:45:20Z","timestamp":1770360320000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/frai.2026.1738152\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,6]]},"references-count":54,"alternative-id":["10.3389\/frai.2026.1738152"],"URL":"https:\/\/doi.org\/10.3389\/frai.2026.1738152","relation":{},"ISSN":["2624-8212"],"issn-type":[{"value":"2624-8212","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,6]]},"article-number":"1738152"}}