{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T09:09:46Z","timestamp":1763543386039,"version":"3.45.0"},"reference-count":47,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T00:00:00Z","timestamp":1763164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Wireless Sensor Networks (WSNs) have a decisive share in various monitoring and control systems. However, their distributed and resource-constrained nature makes them vulnerable to anomalies caused by factors such as environmental noise, sensor faults, and cyber intrusions. In this paper, HEXADWSN, a hybrid ensemble learning-based explainable anomaly detection framework for anomaly detection to improve reliability and interpretability in WSNs, has been proposed. The proposed framework integrates an ensemble learning approach using Autoencoders, Isolation Forests, and One-Class SVMs to achieve robust detection of time-series-based irregularities in the Intel Lab dataset. The framework uses stack and vote ensemble learning. The stack ensemble achieved the highest overall performance, indicating strong effectiveness in detecting varied anomaly patterns. The voting ensemble demonstrated moderate results and offered a balance between detection rate and computation, whereas LSTM, which is efficient at capturing temporal dependencies, exhibited a relatively low performance in the processed dataset. SHAP, LIME, and Permutation Feature Importance techniques are employed for model explainability. These techniques offer insights into feature relevance and anomalies at global and local levels. The framework also measures the mean energy consumption for anomalous and normal data. The interpretability results identified that temperature, humidity, and voltage are the most influential features. HEXADWSN establishes a scalable and explainable foundation for anomaly detection in WSNs, striking a balance between accuracy, interpretability, and energy management insights.<\/jats:p>","DOI":"10.3390\/fi17110520","type":"journal-article","created":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T08:50:07Z","timestamp":1763542207000},"page":"520","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HEXADWSN: Explainable Ensemble Framework for Robust and Energy-Efficient Anomaly Detection in WSNs"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9283-0727","authenticated-orcid":false,"given":"Rahul","family":"Mishra","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication, University of Allahabad, Prayagraj 211002, Uttar Pradesh, India"}]},{"given":"Sudhanshu Kumar","family":"Jha","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication, University of Allahabad, Prayagraj 211002, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7610-3004","authenticated-orcid":false,"given":"Shiv","family":"Prakash","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication, University of Allahabad, Prayagraj 211002, Uttar Pradesh, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4571-1888","authenticated-orcid":false,"given":"Rajkumar Singh","family":"Rathore","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff CF5 2YB, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,15]]},"reference":[{"key":"ref_1","unstructured":"Hossam, F., Ahmad, M., and WSNs Applications (2023). Concepts, Applications, Experimentation and Analysis of Wireless Sensor Networks, Springer Nature."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mishra, R., and Jha, S.K. (2024, January 11\u201312). Efficient Zone Routing through KNearest Neighbours Optimization in Wireless Sensor Networks. Proceedings of the 2024 International Conference on Decision Aid Sciences and Applications (DASA), Manama, Bahrain.","DOI":"10.1109\/DASA63652.2024.10836250"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1186\/s13638-020-01721-5","article-title":"Hybrid WGWO: Whale grey wolf optimization-based novel energy-efficient clustering for EH-WSNs","volume":"2020","author":"Rathore","year":"2020","journal-title":"J. Wirel. Commun. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3706583","article-title":"Security challenges, mitigation strategies, and future trends in wireless sensor networks: A review","volume":"57","author":"Oztoprak","year":"2024","journal-title":"ACM Comput. Surv."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"14719","DOI":"10.1109\/ACCESS.2024.3359033","article-title":"A comparative study of anomaly detection techniques for IoT security using adaptive machine learning for IoT threats","volume":"12","author":"Dheyaaldin","year":"2024","journal-title":"IEEE Access"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"122157","DOI":"10.1016\/j.apenergy.2023.122157","article-title":"Enhancing anomaly detection accuracy and interpretability in low-quality and class imbalanced data: A comprehensive approach","volume":"353","author":"Gao","year":"2024","journal-title":"Appl. Energy"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"3165","DOI":"10.1109\/COMST.2024.3504955","article-title":"A survey on explainable artificial intelligence for internet traffic classification and prediction, and intrusion detection","volume":"27","author":"Nascita","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"80799","DOI":"10.1109\/ACCESS.2024.3409843","article-title":"Explainable artificial intelligence (xai)\u2014From theory to methods and applications","volume":"12","author":"Ortigossa","year":"2024","journal-title":"IEEE Access"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"30164","DOI":"10.1109\/ACCESS.2024.3368377","article-title":"Explainable AI for intrusion detection systems: LIME and SHAP applicability on multi-layer perceptron","volume":"12","author":"Diogo","year":"2024","journal-title":"IEEE Access"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1007\/s42979-025-04260-2","article-title":"EasyDiagnos: An Accurate Feature Selection Framework for Automated Diagnosis in Smart Healthcare","volume":"6","author":"Maji","year":"2025","journal-title":"SN Comput. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Swami, S., Singh, P., and Chauhan, S.S. (2024, January 9\u201311). Design and Analysis of an Integrated Rule-Based and Machine Learning System for DoS Attack Detection in Wireless Sensor Networks. Proceedings of the 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE), Gautam Buddha Nagar, India.","DOI":"10.1109\/IC3SE62002.2024.10593610"},{"key":"ref_12","first-page":"1109","article-title":"Outlier Detection in Wireless Sensor Networks Using Machine Learning and Statistical Based Approaches","volume":"38","author":"Darabseh","year":"2024","journal-title":"Rev. D\u2019intell. Artif."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Ashraf, M.W.A., Singh, A.R., Pandian, A., Rathore, R.S., Bajaj, M., and Zaitsev, I. (2024). A hybrid approach using support vector machine rule-based system: Detecting cyber threats in internet of things. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-78976-1"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"52565","DOI":"10.1109\/ACCESS.2024.3380014","article-title":"Intrusion detection system for wireless sensor networks: A machine learning based approach","volume":"12","author":"Sadia","year":"2024","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"751","DOI":"10.1007\/s42979-024-03113-8","article-title":"Machine learning-based energy optimization and anomaly detection for heterogeneous wireless sensor network","volume":"5","author":"Sharma","year":"2024","journal-title":"SN Comput. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Baykal, B., Saoud, B., Shayea, I., and Leila, R. (2024, January 22\u201323). Outlier Detection in Wireless Sensor Networks Based on Machine Learning. Proceedings of the 2024 IEEE 16th International Conference on Computational Intelligence and Communication Networks (CICN), Indore, India.","DOI":"10.1109\/CICN63059.2024.10847563"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Zerkouk, M., Mihoubi, M., and Chikhaoui, B. (2023, January 3\u20136). Deep Generative Model with Isolation Forest (DGM-IF) for Unsupervised Anomaly Detection in Wireless Sensor Network and Internet of Things. Proceedings of the 2023 9th International Conference on Control, Decision and Information Technologies (CoDIT), Rome, Italy.","DOI":"10.1109\/CoDIT58514.2023.10284184"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"332","DOI":"10.14445\/23488379\/IJEEE-V11I3P128","article-title":"Real-Time Anomaly Detection in IoT Networks Using Deep Learning over Wireless Channels","volume":"11","author":"Sudharson","year":"2024","journal-title":"SSRG Int. J. Electr. Electron. Eng."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Lepp\u00e4nen, R.F., and H\u00e4m\u00e4l\u00e4inen, T. (2019). Network Anomaly Detection in Wireless Sensor Networks: A Review. Next Generation Teletraffic and Wired\/Wireless Advanced Networking, Springer Nature.","DOI":"10.1007\/978-3-030-30859-9_17"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"251","DOI":"10.21533\/pen.v10.i2.603","article-title":"Deep learning model for cyber-attacks detection method in wireless sensor networks","volume":"10","author":"Naser","year":"2022","journal-title":"Period. Eng. Nat. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Shifani, S.A., Mary, A.A., Metilda, M.M., Rajkumar, G.V., Sutha, S.M., and Maheshwari, S. (2024, January 7\u20139). A Novel Machine Learning Strategy for Anomaly Identification Scheme in Wireless Sensor Networks Using Supervised Training Principles. Proceedings of the 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India.","DOI":"10.1109\/ICESC60852.2024.10689838"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ahmad, R., and Alkhammash, E.H. (2024). Online Adaptive Kalman Filtering for Real-Time Anomaly Detection in Wireless Sensor Networks. Sensors, 24.","DOI":"10.3390\/s24155046"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"167","DOI":"10.11113\/aej.v14.20997","article-title":"Trap Based Anomaly Detection Mechanism for Wireless Sensor Network","volume":"14","author":"Mishra","year":"2024","journal-title":"ASEAN Eng. J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/JSYST.2023.3347435","article-title":"A Novel Self-Supervised Learning-Based Anomalous Node Detection Method Based on an Autoencoder for Wireless Sensor Networks","volume":"18","author":"Ye","year":"2024","journal-title":"IEEE Syst. J."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Luo, T., and Nagarajan, S.G. (2018, January 20\u201324). Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT. Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA.","DOI":"10.1109\/ICC.2018.8422402"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Chen, Z., Yeo, C.K., Lee, B.S., and Lau, C.T. (2018, January 17\u201320). Autoencoder-based network anomaly detection. Proceedings of the 2018 Wireless Telecommunications Symposium (WTS), Phoenix, AZ, USA.","DOI":"10.1109\/WTS.2018.8363930"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Shah, A., Obaidat, M.S., Shah, D., Shah, S., Gupta, R., Tanwar, S., and Bhatia, J. (2025, January 16\u201318). X-SENSE: Explainable ML-based Intelligent Sensor Environment for Wireless Network Security. Proceedings of the 2025 International Conference on Computer, Information and Telecommunication Systems (CITS), Colmar, France.","DOI":"10.1109\/CITS65975.2025.11099204"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Dhananjaya, S.A.K., Lakmal, H.K.I.S., and Nirmal, W.C. (2024, January 18\u201319). Evaluating the Features of Indoor Positioning Systems Using Explainable AI. Proceedings of the 2024 8th SLAAI International Conference on Artificial Intelligence (SLAAI-ICAI), Ratmalana, Sri Lanka.","DOI":"10.1109\/SLAAI-ICAI63667.2024.10844991"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"136864","DOI":"10.1109\/ACCESS.2025.3595595","article-title":"Intrusion Detection System framework for SDN-based IoT networks using deep learning approaches with XAI-based feature selection techniques and domain-constrained features","volume":"13","author":"Tserenkhuu","year":"2025","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"36421","DOI":"10.1109\/ACCESS.2025.3544625","article-title":"Using Permutation-Based Feature Importance for Improved Machine Learning Model Performance at Reduced Costs","volume":"13","author":"Khan","year":"2025","journal-title":"IEEE Access"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Paolini, D., Dini, P., Soldaini, E., and Saponara, S. (2025). One-Class Anomaly Detection for Industrial Applications: A Comparative Survey and Experimental Study. Computers, 14.","DOI":"10.3390\/computers14070281"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Singh, T., Nigam, S., Vijay, E., Rathore, R., Bhosale, S., and Deogirikar, A. (2023, January 14\u201316). Adaptive anomaly detection in sensor data: A comprehensive approach. Proceedings of the 2023 IEEE Technology & Engineering Management Conference-Asia Pacific (TEMSCON-ASPAC), Bengaluru, India.","DOI":"10.1109\/TEMSCON-ASPAC59527.2023.10531345"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1049\/wss2.12100","article-title":"Intrusion detection in cluster-based wireless sensor networks: Current issues, opportunities and future research directions","volume":"14","author":"John","year":"2024","journal-title":"IET Wirel. Sens. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"115990","DOI":"10.1109\/ACCESS.2025.3585764","article-title":"Explainable AI for Sensor Signal Interpretation to Revolutionize Human Health Monitoring: A Review","volume":"13","author":"Alharthi","year":"2025","journal-title":"IEEE Access"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"71024","DOI":"10.1109\/ACCESS.2024.3402446","article-title":"XAI-IoT: An explainable AI framework for enhancing anomaly detection in IoT systems","volume":"12","author":"Gummadi","year":"2024","journal-title":"IEEE Access"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"95659","DOI":"10.1109\/ACCESS.2024.3425472","article-title":"SXAD: Shapely eXplainable AI-based anomaly detection using log data","volume":"12","author":"Alam","year":"2024","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Laxmi, M., Kumar, S., Kumar, S., Maheshkumar, K., Aiswarya, A., and Pveena, S. (2025, January 22\u201324). Enhancing Sustainable Agriculture with IoT-Based Soil Fertility and Crop Selection Using Hybrid Stacked Ensemble Models and Explainable AI. Proceedings of the 2025 6th International Conference for Emerging Technology (INCET), Belgaum, India.","DOI":"10.1109\/INCET64471.2025.11140109"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"4445","DOI":"10.1007\/s10994-023-06501-y","article-title":"Distributed and explainable GHSOM for anomaly detection in sensor networks","volume":"113","author":"Mignone","year":"2024","journal-title":"Mach. Learn."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"13711","DOI":"10.1109\/ACCESS.2025.3528341","article-title":"Intrusion Detection for Wireless Sensor Network Using Particle Swarm Optimization Based Explainable Ensemble Machine Learning Approach","volume":"13","author":"Birahim","year":"2025","journal-title":"IEEE Access"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Duraj, A., Szczepaniak, P.S., and Sadok, A. (2025). Detection of Anomalies in Data Streams Using the LSTM-CNN Model. Sensors, 25.","DOI":"10.3390\/s25051610"},{"key":"ref_41","unstructured":"Intel Lab Data (2025, October 19). Available online: https:\/\/db.csail.mit.edu\/labdata\/labdata.html."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"852","DOI":"10.3390\/iot5040039","article-title":"Autoencoder-Based neural network model for anomaly detection in wireless body area networks","volume":"5","author":"Rassam","year":"2024","journal-title":"IoT"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Saraswathi, S. (2025, January 25\u201327). Hybrid Anomaly Detection Model Integrating Lstm and Isolation Forest for Enhanced Performance in Wireless Sensor Networks. Proceedings of the 2025 6th International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India.","DOI":"10.1109\/ICIRCA65293.2025.11089518"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"112369","DOI":"10.1016\/j.asoc.2024.112369","article-title":"Deep anomaly detection: A linear one-class SVM approach for high-dimensional and large-scale data","volume":"167","author":"Suresh","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"101919","DOI":"10.1016\/j.jksuci.2024.101919","article-title":"An energy consumption optimization strategy for Wireless sensor networks via multi-objective algorithm","volume":"36","author":"Zhang","year":"2024","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_46","unstructured":"Heinzelman, W., Chandrakasan, A., and Balakrishnan, H. (2000, January 4\u20137). Energy-efficient communication protocol for wireless microsensor networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Kumar, S.P., Garg, S., Alabdulkreem, E., and Ben Miled, A. (2024). Advanced generative adversarial network for optimizing layout of wireless sensor networks. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-83957-5"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/11\/520\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T09:05:04Z","timestamp":1763543104000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/11\/520"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,15]]},"references-count":47,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2025,11]]}},"alternative-id":["fi17110520"],"URL":"https:\/\/doi.org\/10.3390\/fi17110520","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,15]]}}}