{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:45:23Z","timestamp":1775609123399,"version":"3.50.1"},"reference-count":72,"publisher":"MDPI AG","issue":"14","license":[{"start":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:00:00Z","timestamp":1626307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Wireless Sensor Networks (WSNs) continue to face two major challenges: energy and security. As a consequence, one of the WSN-related security tasks is to protect them from Denial of Service (DoS) and Distributed DoS (DDoS) attacks. Machine learning-based systems are the only viable option for these types of attacks, as traditional packet deep scan systems depend on open field inspection in transport layer security packets and the open field encryption trend. Moreover, network data traffic will become more complex due to increases in the amount of data transmitted between WSN nodes as a result of increasing usage in the future. Therefore, there is a need to use feature selection techniques with machine learning in order to determine which data in the DoS detection process are most important. This paper examined techniques for improving DoS anomalies detection along with power reservation in WSNs to balance them. A new clustering technique was introduced, called the CH_Rotations algorithm, to improve anomaly detection efficiency over a WSN\u2019s lifetime. Furthermore, the use of feature selection techniques with machine learning algorithms in examining WSN node traffic and the effect of these techniques on the lifetime of WSNs was evaluated. The evaluation results showed that the Water Cycle (WC) feature selection displayed the best average performance accuracy of 2%, 5%, 3%, and 3% greater than Particle Swarm Optimization (PSO), Simulated Annealing (SA), Harmony Search (HS), and Genetic Algorithm (GA), respectively. Moreover, the WC with Decision Tree (DT) classifier showed 100% accuracy with only one feature. In addition, the CH_Rotations algorithm improved network lifetime by 30% compared to the standard LEACH protocol. Network lifetime using the WC + DT technique was reduced by 5% compared to other WC + DT-free scenarios.<\/jats:p>","DOI":"10.3390\/s21144821","type":"journal-article","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T21:56:51Z","timestamp":1626299811000},"page":"4821","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs\u2019 Lifetime"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3913-6397","authenticated-orcid":false,"given":"Rami","family":"Ahmad","sequence":"first","affiliation":[{"name":"The School of Information Technology, Sebha University, Sebha 71, Libya"}]},{"given":"Raniyah","family":"Wazirali","sequence":"additional","affiliation":[{"name":"College of Computing and Informatics, Saudi Electronic University, Riyadh 11673, Saudi Arabia"}]},{"given":"Qusay","family":"Bsoul","sequence":"additional","affiliation":[{"name":"Faculty of Science and Information Technology, Irbid National University, Irbid 21110, Jordan"}]},{"given":"Tarik","family":"Abu-Ain","sequence":"additional","affiliation":[{"name":"College of Computing and Informatics, Saudi Electronic University, Riyadh 11673, Saudi Arabia"}]},{"given":"Waleed","family":"Abu-Ain","sequence":"additional","affiliation":[{"name":"College of Community, Taibah University, Badr 46354, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,7,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Al-Emran, M., Malik, S.I., and Al-Kabi, M.N. (2020). A Survey of Internet of Things (IoT) in Education: Opportunities and Challenges. Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications, Springer International Publishing.","DOI":"10.1007\/978-3-030-24513-9_12"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2017\/7536381","article-title":"A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT","volume":"2017","author":"Zhang","year":"2017","journal-title":"Secur. Commun. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"53079","DOI":"10.1109\/ACCESS.2019.2911395","article-title":"A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network","volume":"7","author":"Yi","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/SURV.2013.050113.00191","article-title":"A Survey of Intrusion Detection Systems in Wireless Sensor Networks","volume":"16","author":"Butun","year":"2014","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Glissa, G., and Meddeb, A. (2017, January 26\u201330). 6LoWPAN Multi-Layered Security Protocol Based on IEEE 802.15.4 Security Features. Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference, IWCMC 2017, Valencia, Spain.","DOI":"10.1109\/IWCMC.2017.7986297"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Lee, C.-C. (2020). Security and Privacy in Wireless Sensor Networks: Advances and Challenges. Sensors, 20.","DOI":"10.3390\/s20030744"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1049\/iet-wss.2017.0029","article-title":"DDoS attacks in WSNs: Detection and Countermeasures","volume":"8","author":"Abidoye","year":"2018","journal-title":"IET Wirel. Sens. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., and Ghorbani, A.A. (2019, January 1\u20133). Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India.","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11235-019-00599-z","article-title":"A survey of DDoS attacking techniques and defence mechanisms in the IoT network","volume":"73","author":"Vishwakarma","year":"2020","journal-title":"Telecommun. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"101701","DOI":"10.1016\/j.sysarc.2019.101701","article-title":"A survey on intrusion detection and prevention in wireless ad-hoc networks","volume":"105","author":"Khan","year":"2020","journal-title":"J. Syst. Archit."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Kaur, T., Saluja, K.K., and Sharma, A.K. (2016, January 23\u201325). DDOS attack in WSN: A survey. Proceedings of the 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur, India.","DOI":"10.1109\/ICRAIE.2016.7939566"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1016\/j.future.2020.08.010","article-title":"A framework for anomaly detection and classification in Multiple IoT scenarios","volume":"114","author":"Cauteruccio","year":"2021","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"103278","DOI":"10.1016\/j.micpro.2020.103278","article-title":"DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks","volume":"79","author":"Premkumar","year":"2020","journal-title":"Microprocess. Microsyst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"5244","DOI":"10.1109\/TII.2019.2952917","article-title":"LSTM Learning with Bayesian and Gaussian Processing for Anomaly Detection in Industrial IoT","volume":"16","author":"Wu","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1016\/j.ins.2018.06.017","article-title":"Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model","volume":"476","author":"Han","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.inffus.2018.09.013","article-title":"Machine learning algorithms for wireless sensor networks: A survey","volume":"49","author":"Amgoth","year":"2019","journal-title":"Inf. Fusion"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1093\/comjnl\/bxy025","article-title":"A DDoS detection method for socially aware networking based on forecasting fusion feature sequence","volume":"61","author":"Cheng","year":"2018","journal-title":"Comput. J."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/LNET.2019.2901792","article-title":"On the Feasibility of Deep Learning in Sensor Network Intrusion Detection","volume":"1","author":"Otoum","year":"2019","journal-title":"IEEE Netw. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.compeleceng.2013.11.024","article-title":"A survey on feature selection methods","volume":"40","author":"Chandrashekar","year":"2014","journal-title":"Comput. Electr. Eng."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.1007\/s11277-018-5721-6","article-title":"Hybrid Anomaly Detection by Using Clustering for Wireless Sensor Network","volume":"106","author":"Ahmad","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_21","first-page":"221","article-title":"Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network","volume":"22","author":"Lu","year":"2020","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"3285","DOI":"10.1016\/j.asoc.2012.05.004","article-title":"An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection","volume":"12","author":"Lin","year":"2012","journal-title":"Appl. Soft Comput. J."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"101645","DOI":"10.1016\/j.cose.2019.101645","article-title":"A dynamic MLP-based DDoS attack detection method using feature selection and feedback","volume":"88","author":"Wang","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Bikmukhamedov, R.F., and Nadeev, A.F. (2019, January 1\u20133). Lightweight Machine Learning Classifiers of IoT Traffic Flows. Proceedings of the 2019 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO), Yaroslavl, Russia.","DOI":"10.1109\/SYNCHROINFO.2019.8814156"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Depari, A., Ferrari, P., Flammini, A., Rinaldi, S., and Sisinni, E. (2019, January 11\u201313). Lightweight Machine Learning-Based Approach for Supervision of Fitness Workout. Proceedings of the 2019 IEEE Sensors Applications Symposium (SAS), Sophia Antipolis, France.","DOI":"10.1109\/SAS.2019.8706106"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.comcom.2014.10.004","article-title":"A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology","volume":"74","author":"Bouaziz","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Chakeres, I.D., and Belding-Royer, E.M. (2004, January 23\u201324). AODV Routing Protocol Implementation Design. Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, Tokyo, Japan.","DOI":"10.1109\/ICDCSW.2004.1284108"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1016\/j.jnca.2012.12.001","article-title":"A systematic review on clustering and routing techniques based upon LEACH protocol for wireless sensor networks","volume":"36","author":"Tyagi","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"4731953","DOI":"10.1155\/2016\/4731953","article-title":"WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks","volume":"2016","author":"Almomani","year":"2016","journal-title":"J. Sens."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/978-981-10-6005-2_42","article-title":"H-LEACH: Modified and efficient LEACH protocol for hybrid clustering scenario in wireless sensor networks","volume":"638","author":"Gupta","year":"2018","journal-title":"Adv. Intell. Syst. Comput."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/cpe.5619","article-title":"A unified heuristic bat algorithm to optimize the LEACH protocol","volume":"32","author":"Cai","year":"2020","journal-title":"Concurr. Comput."},{"key":"ref_32","first-page":"1","article-title":"A new algorithm for cluster head selection in LEACH protocol for wireless sensor networks","volume":"31","year":"2018","journal-title":"Int. J. Commun. Syst."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1007\/s00779-019-01205-4","article-title":"Enhanced LEACH protocol for increasing a lifetime of WSNs","volume":"23","author":"Shudifat","year":"2019","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.jpdc.2017.12.014","article-title":"Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things","volume":"132","author":"Cui","year":"2019","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"100059","DOI":"10.1016\/j.iot.2019.100059","article-title":"Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches","volume":"7","author":"Hasan","year":"2019","journal-title":"Internet Things"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1993","DOI":"10.1007\/s11277-020-07776-3","article-title":"Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques","volume":"116","author":"Islam","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1049\/iet-wss.2017.0099","article-title":"Energy-efficient modified LEACH protocol for IoT application","volume":"8","author":"Behera","year":"2018","journal-title":"IET Wirel. Sens. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"4298","DOI":"10.1109\/ACCESS.2017.2666082","article-title":"A Survey on Successors of LEACH Protocol","volume":"5","author":"Singh","year":"2017","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"316839","DOI":"10.1155\/2012\/316839","article-title":"Routing in IPv6 over low-power wireless personal area networks (6LoWPAN): A survey","volume":"2012","author":"Kumar","year":"2012","journal-title":"J. Comput. Networks Commun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-019-1509-y","article-title":"Research on routing optimization of WSNs based on improved LEACH protocol","volume":"2019","author":"Liang","year":"2019","journal-title":"Eurasip J. Wirel. Commun. Netw."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1049\/iet-wss.2017.0139","article-title":"Prolonging the lifetime of large-scale wireless sensor networks using distributed cooperative transmissions","volume":"8","author":"Monser","year":"2018","journal-title":"IET Wirel. Sens. Syst."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"3963","DOI":"10.1007\/s11227-017-2169-5","article-title":"Enhanced DTLS with CoAP-based authentication scheme for the internet of things in healthcare application","volume":"76","author":"Kumar","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1002\/sec.375","article-title":"Energy efficiency of encryption schemes applied to wireless sensor networks","volume":"5","author":"Zhang","year":"2012","journal-title":"Secur. Commun. Networks"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","article-title":"A Survey on Security and Privacy Issues in Internet-of-Things","volume":"4","author":"Yang","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Can, O., and Sahingoz, O.K. (2015, January 27\u201329). A Survey of Intrusion Detection Systems in Wireless Sensor Networks. Proceedings of the 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, Turkey.","DOI":"10.1109\/ICMSAO.2015.7152200"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/exsy.12556","article-title":"A machine learning approach for imputation and anomaly detection in IoT environment","volume":"37","author":"Vangipuram","year":"2020","journal-title":"Expert Syst."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/TCE.2020.2981636","article-title":"Anomaly Detection in Smart Home Operation from User Behaviors and Home Conditions","volume":"66","author":"Yamauchi","year":"2020","journal-title":"IEEE Trans. Consum. Electron."},{"key":"ref_48","first-page":"145","article-title":"MLP-GA based algorithm to detect application layer DDoS attack","volume":"36","author":"Singh","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_49","first-page":"120","article-title":"A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept","volume":"23","author":"Borkar","year":"2019","journal-title":"Sustain. Comput. Inform. Syst."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1007\/s00500-020-05164-4","article-title":"A hybrid mine blast algorithm for feature selection problems","volume":"25","author":"Alweshah","year":"2021","journal-title":"Soft Comput."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1016\/j.neucom.2017.04.053","article-title":"Hybrid Whale Optimization Algorithm with simulated annealing for feature selection","volume":"260","author":"Mafarja","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1007\/s10115-018-1306-7","article-title":"Variational data generative model for intrusion detection","volume":"60","author":"Carro","year":"2019","journal-title":"Knowl. Inf. Syst."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1016\/j.compstruc.2012.07.010","article-title":"Water cycle algorithm\u2014A novel metaheuristic optimization method for solving constrained engineering optimization problems","volume":"110\u2013111","author":"Eskandar","year":"2012","journal-title":"Comput. Struct."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.engappai.2014.03.007","article-title":"An unsupervised feature selection algorithm based on ant colony optimization","volume":"32","author":"Tabakhi","year":"2014","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/j.jocs.2013.11.007","article-title":"A three-stage unsupervised dimension reduction method for text clustering","volume":"5","author":"Bharti","year":"2014","journal-title":"J. Comput. Sci."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Abualigah, L.M., Khader, A.T., and Al-Betar, M.A. (2016, January 13\u201314). Unsupervised Feature Selection Technique Based on Genetic Algorithm for Improving the Text Clustering. Proceedings of the 2016 7th International Conference on Computer Science and Information Technology (CSIT), Amman, Jordan.","DOI":"10.1109\/CSIT.2016.7549453"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1016\/j.jocs.2017.07.018","article-title":"A new feature selection method to improve the document clustering using particle swarm optimization algorithm","volume":"25","author":"Abualigah","year":"2018","journal-title":"J. Comput. Sci."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep Learning Approach for Intelligent Intrusion Detection System","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Ioannou, C., and Vassiliou, V. (2018). An Intrusion Detection System for Constrained WSN and IoT Nodes Based on Binary Logistic Regression. 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, ACM.","DOI":"10.1145\/3242102.3242145"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/j.adhoc.2018.08.012","article-title":"BPA-CRP: A balanced power-aware clustering and routing protocol for wireless sensor networks","volume":"82","author":"Darabkh","year":"2019","journal-title":"Ad Hoc Netw."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1016\/j.compeleceng.2017.11.017","article-title":"EA-CRP: A Novel Energy-aware Clustering and Routing Protocol in Wireless Sensor Networks","volume":"72","author":"Darabkh","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"143721","DOI":"10.1109\/ACCESS.2019.2944089","article-title":"Hybrid Water Cycle Optimization Algorithm with Simulated Annealing for Spam E-mail Detection","volume":"7","author":"Mamat","year":"2019","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1559","DOI":"10.1007\/s42452-019-1356-9","article-title":"Evaluation of k-nearest neighbour classifier performance for heterogeneous data sets","volume":"1","author":"Ali","year":"2019","journal-title":"SN Appl. Sci."},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Coppolino, L., DAntonio, S., Garofalo, A., and Romano, L. (2013, January 28\u201330). Applying Data Mining Techniques to Intrusion Detection in Wireless Sensor Networks. Proceedings of the 2013 Eighth International Conference on P2P Parallel, Grid, Cloud and Internet Computing, Compiegne, France.","DOI":"10.1109\/3PGCIC.2013.43"},{"key":"ref_65","first-page":"4071851","article-title":"A Lightweight Intrusion Detection Method Based on Fuzzy Clustering Algorithm for Wireless Sensor Networks","volume":"2018","author":"Qu","year":"2018","journal-title":"Adv. Fuzzy Syst."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.neucom.2016.03.101","article-title":"Binary ant lion approaches for feature selection","volume":"213","author":"Emary","year":"2016","journal-title":"Neurocomputing"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"105935","DOI":"10.1016\/j.asoc.2019.105935","article-title":"Hierarchical Learning Water Cycle Algorithm","volume":"86","author":"Chen","year":"2020","journal-title":"Appl. Soft Comput."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","article-title":"Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset","volume":"100","author":"Koroniotis","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"7798","DOI":"10.1016\/j.eswa.2008.11.041","article-title":"A study on the use of statistical tests for experimentation with neural networks: Analysis of parametric test conditions and non-parametric tests","volume":"36","author":"Luengo","year":"2009","journal-title":"Expert Syst. Appl."},{"key":"ref_70","first-page":"223","article-title":"Evaluation of crossover operator performance in genetic algorithms with binary representation","volume":"6840 LNBI","author":"Picek","year":"2011","journal-title":"Lect. Notes Comput. Sci."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1016\/j.future.2017.12.045","article-title":"A survey on routing protocols supported by the Contiki Internet of things operating system","volume":"82","author":"Zikria","year":"2018","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"102448","DOI":"10.1016\/j.adhoc.2021.102448","article-title":"An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks","volume":"115","author":"Khashan","year":"2021","journal-title":"Ad Hoc Netw."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/14\/4821\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:30:44Z","timestamp":1760164244000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/14\/4821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,15]]},"references-count":72,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2021,7]]}},"alternative-id":["s21144821"],"URL":"https:\/\/doi.org\/10.3390\/s21144821","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,15]]}}}