An Ensemble-based Adaptable and Privacy-aware Threat Detection Mechanism for Wireless Sensor Network in Healthcare Systems

Authors

DOI:

https://doi.org/10.64539/sjcs.v1i2.2025.328

Keywords:

Wireless Sensor Networks, Threat Detection, Federated Learning, Adaptive Learning, Dynamic Threats, Ensemble Learning, Online AdaBoost, Online Random Forest

Abstract

Recently, wireless sensor networks (WSNs) have been widely integrated in critical applications such as environmental monitoring, smart cities, and modern healthcare for remote patient monitoring and data collection. This makes WSNs increasingly susceptible to security threats, including eavesdropping, jamming, sybil, data injection, routing, senor node capture, malicious intrusion attacks etc., therefore maintaining integrity, confidentiality, and availability of sensitive data and preserving privacy become a challenge. Existing mechanisms do not integrate threat detection, privacy preservation, and adaptability to evolving threats leading to security breaches in the left-out security requirements. This paper proposes an ensemble-based threat detection mechanism (FAL-ELeM-IDS) with privacy-awareness and adaptability to evolving threats for WSNs-based healthcare systems. The ensemble consists of Online Random Forest, Online AdaBoost, Support Vector Machine, Neural Network, and XGBoost to ensure detection high accuracy and low false-positives. Federated Learning combined with ensemble technique to provide confidentiality and a combined Online Adaptive Boosting and Online Random Forests algorithms to provide adaptability. The proposed model trained on a real-world healthcare sensor dataset demonstrates its superiority in performance compared to conventional models. An accuracy of 97.8%, a recall of 97%, precision of 98%, and F1-score of 97.5%, was achieved outperforming individual models by significant margins, showing that the model is accurate and reliable in detecting threats. This mechanism implies enhanced system security and privacy, timely threat mitigation ensuring patient safety, and boost in public acceptance for sensor-based healthcare services. Overall, this work contributes a scalable, privacy-aware, and adaptive threat detection mechanism suitable for integration in the sensitive healthcare applications.

References

[1] A. Lanzolla and M. Spadavecchia, “Wireless Sensor Networks for Environmental Monitoring,” Sensors, vol. 21, no. 4, p. 1172, Feb. 2021, doi: https://doi.org/10.3390/s21041172.

[2] Q. S. Zhang, “Environment Pollution Analysis on Smart Cities Using Wireless Sensor Networks,” Strategic Planning for Energy and the Environment, Dec. 2022, doi: https://doi.org/10.13052/spee1048-5236.42112.

[3] T. Jabeen, I. Jabeen, H. Ashraf, N. Z. Jhanjhi, A. Yassine, and M. S. Hossain, “An Intelligent Healthcare System Using IoT in Wireless Sensor Network,” Sensors, vol. 23, no. 11, p. 5055, Jan. 2023, doi: https://doi.org/10.3390/s23115055.

[4] A. Sayari and S. Rekhis, “Cyber Deception Across Domains: A Comprehensive Survey of Techniques, Challenges, and Perspectives,” International Journal of Advanced Computer Science and Applications, vol. 16, no. 7, 2025, doi: https://doi.org/10.14569/ijacsa.2025.0160792.

[5] S. Akhilendranath and P. Senthilkumar, “The HALF framework: a privacy-preserving federated learning approach for scalable and secure AI applications,” International Journal on Smart Sensing and Intelligent Systems, vol. 18, no. 1, Jan. 2025, doi: https://doi.org/10.2478/ijssis-2025-0058.

[6] A. Chaddad, Y. Wu, and C. Desrosiers, “Federated Learning for Healthcare Applications,” IEEE Internet of Things Journal, vol. 11, no. 5, pp. 7339–7358, Oct. 2023, doi: https://doi.org/10.1109/jiot.2023.3325822.

[7] R. Uddin and I. Koo, "Real-time remote patient mon-itoring: A review of biosensors integrated with multi-hop IoT systems via cloud connectivity," Applied Sciences, vol. 14, no. 5, pp. , 14(5), 1876., 2024, https://doi.org/10.3390/app14051876.

[8] D. Kandris, C. Nakas, D. Vomvas and G. Koulouras, "Applications of wireless sensor networks: an up-to-date survey," Applied system innovation, vol. 3, no. 1, p. 14, 25 Feb 2020, https://doi.org/10.3390/asi3010014.

[9] K. M. Abubeker and S. Baskar, “Wireless sensor and wireless body area network assisted biosensor network for effective monitoring and prevention of non-ventilator hospital-acquired pneumonia,” Frontiers in Sustainable Cities, vol. 4, Nov. 2022, doi: https://doi.org/10.3389/frsc.2022.1063067

[10] R. Kashyap, "Applications of wireless sensor networks in healthcare. In IoT and WSN applications for modern agricultural advancements," Emerging research and opportunities, pp. 8-40, 2020, https://doi.org/10.4018/978-1-5225-9004-0.ch002.

[11] G. Ijemaru, "Large-Scale Internet of Things and Wireless Rechargeable Sensor Networks for Deployment in Smart Cities.," 2023, https://doi.org/10.25907/00821.

[12] S. L. Ullo and G. R. Sinha, "Advances in smart environment monitoring systems using IoT and sensors," Sensors, vol. 20, no. 11, p. 3113, 2020, https://doi.org/10.3390/s20113113.

[13] M. N. Mowla, N. Mowla, A. S. Shah, K. M. Rabie and T. Shongwe, "Internet of Things and wireless sensor networks for smart agriculture applications: A survey," IEEE Access, vol. 11, pp. 145813-145852, 2023, https://doi.org/10.1109/ACCESS.2023.3346299.

[14] B. Bhushan and G. Sahoo, Requirements, protocols, and security challenges in wireless sensor networks: An industrial perspective.: Handbook of computer networks and cyber security: principles and paradigms, pp. 683-713, 2020, https://doi.org/10.1007/978-3-030-22277-2_27.

[15] H. Sharma, A. Haque and F. Blaabjerg, "Machine learning in wireless sensor networks for smart cities: a survey," Electronics, vol. 10, no. 9, p. 1012., 2021, https://doi.org/10.3390/electronics10091012.

[16] S. Singh, D. Garg and A. Malik, "A novel cluster head selection algorithm based IoT enabled heterogeneous WSNs distributed architecture for smart city," Microprocessors and Microsystems, vol. 101, p. 104892, 2023, https://doi.org/10.1016/j.micpro.2023.104892.

[17] K. Karunanithy and B. Velusamy, "An efficient data collection using wireless sensor networks and internet of things to monitor the wild animals in the reserved area," Peer-to-Peer Networking and Applications, vol. 15, no. 2, pp. 1105-1125, 2022, https://doi.org/10.1007/s12083-021-01289-x.

[18] R. Vera-Amaro, M. E. R. Angeles and A. Luviano-Juarez, "Design and analysis of wireless sensor networks for animal tracking in large monitoring polar regions using phase-type distributions and single sensor model," IEEE Access, vol. 7, pp. 45911-45929., 2019, https://doi.org/10.1109/ACCESS.2019.2908308.

[19] S. Sadeghi, N. Soltanmohammadlou and F. Nasirzadeh, “Applications of wireless sensor networks to improve occupational safety and health in underground mines,” Journal of safety research, vol. 83, pp. 8-25, 2022, https://doi.org/10.1016/j.jsr.2022.07.016.

[20] R. Alekya, N. D. Boddeti, K. S. Monica, R. Prabha and V. Venkatesh, "IoT based smart healthcare monitoring systems: A literature review," European Journal of Molecular & Clinical Medicine, vol. 7, no. 11, 2020, https://www.researchgate.net/profile/Venkatesh-Ramani/publication/348930509_IoT_based_Smart_Healthcare_Monitoring_Systems_A_Literature_Review/links/6017d531299bf1b33e3d5fee/IoT-based-Smart-Healthcare-Monitoring-Systems-A-Literature-Review.pdf.

[21] M. Yuvaraja, R. Ramesh, R. Priya and J. Dhanasekar, "Wireless Body Sensor Networks for Real-Time Healthcare Monitoring: A Cost-Effective and Energy-Efficient Approach," Integrative Biomedical Research, vol. 8, no. 7, pp. 1-13, 2024, https://doi.org/10.25163/angiotherapy.879796.

[22] H. M. A. Fahmy, "WSNs applications. In Concepts, applications, experimentation and analysis of wireless sensor networks," Cham: Springer Nature, Switzerland, pp. 67-242, 2023, https://doi.org/10.1007/978-3-031-20709-9_3.

[23] H. M. Kaidi, M. A. M. Izhar, R. A. Dziyauddin, N. E. Shaiful and R. Ahmad, " A comprehensive review on wireless healthcare monitoring: System components," IEEE Access, vol. 12, pp. 35008-35032, 2024, https://doi.org/10.1109/ACCESS.2024.3349547.

[24] S. Ismail, D. Dawoud and H. Reza, "A lightweight multilayer machine learning detection system for cyber-attacks in WSN.," in IEEE 12th annual computing and communication workshop and conference (CCWC), 2022, https://doi.org/10.1109/CCWC54503.2022.9720891.

[25] A. Ahmed, M. M. Khan, P. Singh, R. S. Batth and M. Masud, "IoT-based real-time patients vital physiological parameters monitoring system using smart wearable sensors," Neural Comput Appl, , vol. 34, no. 22, pp. 19397-19673, 2023, https://doi.org/10.1007/s00521-022-07090-y.

[26] Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz and E. Akin, "A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions," Electronics, vol. 12, no. 6, p. 1333, 2023, https://doi.org/10.3390/electronics12061333.

[27] A. Akinsola, T. K. Njoku, O. Ejiofor and A. Akinde, "Enhancing data privacy in wireless sensor networks: investigating techniques and protocols to protect privacy of data transmitted over wireless sensor networks in critical applications of healthcare and national security," International Journal of Network Security Its Applications (IJNSA), vol. 16, no. 2, 2024, https://doi.org/10.5121/ijnsa.2024.16204.

[28] M. A. I. Mallick and R. Nath, "Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments," World Scientific News, vol. 190, no. 1, pp. 1-69, 2024, https://worldscientificnews.com/wp-content/uploads/2024/01/WSN-1901-2024-1-69-1.pdf.

[29] S. Benoy, "Wireless Sensor Networks for Healthcare Monitoring Challenges and Opportunities," Journal of Biomedical Systems for Emerging Technology, vol. 10, p. 163, 2023, https://www.hilarispublisher.com/open-access/wireless-sensor-networks-for-healthcare-monitoring-challenges-and-opportunities-98539.html.

[30] A. John, I. F. Isnin and S. H. H. Madni, "Current security threats in applications of wireless sensor network," International Journal on Engineering, Science and Technology, vol. 5, no. 3, pp. 255-272, 2023, https://doi.org/10.46328/ijonest.174.

[31] S. Ismail, D. W. Dawoud and H. Reza, "Securing wireless sensor networks using machine learning and blockchain: A review," Future Internet, vol. 15, no. 6, p. 200, 2023, https://doi.org/10.3390/fi15060200.

[32] L. Cai, J. Wang, R. Zhang, Y. Zhang, T. Jiang, D. Niyato and X. Shen, "Secure physical layer communications for low-altitude economy networking: A survey," IEEE Communications Surveys & Tutorials. (Early Access), 2025, https://doi.org/10.1109/COMST.2025.3634768.

[33] S. Jeyalakshmi, S. Sekar, S. Ravikumar and D. Kavitha, "Random forest-based oppositional henry gas solubility optimization model for service attack improvement in WSN," Journal of The Institution of Engineers (India): Series B, vol. 103, no. 3, pp. 939-950, 2022, https://doi.org/10.1007/s40031-021-00702-6.

[34] P. R. Grammatikis and P. Sarigiannidis, "Network Threats," in Cyber-Security Threats, Actors, and Dynamic Mitigation , CRC Press, pp. 159-198, 2022, http://doi.org/10.1201/9781003006145-5.

[35] R. U. Z. Wani, F. Thabit and O. Can, "Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review," Security and Privacy, vol. 7, no. 5, p. e409, 2024, https://doi.org/10.1002/spy2.409.

[36] E. Illi, M. Qaraqe, S. Althunibat, A. Alhasanat, M. Alsafasfeh, M. De Ree and S. Al-Kuwari, "Physical layer security for authentication, confidentiality, and malicious node detection: A paradigm shift in securing IoT networks," IEEE Communications Surveys & Tutorials, vol. 6, no. 1, 2024, https://doi.org/10.1109/COMST.2023.3327327.

[37] J. Wen, Z. Zhang, Y. Lan, Z. Cui, J. Cai and W. Zhang, "A survey on federated learning: challenges and applications," International journal of machine learning and cybernetics, vol. 14, no. 2, pp. 513-535, 2023, https://doi.org/10.1007/s13042-022-01647-y.

[38] F. Sharif, "The role of ensemble learning in strengthening intrusion detection systems: A machine learning perspective," Int. J. Comput. Eng. Technol, pp. 1-14, 2024, http://doi.org/10.13140/RG.2.2.10798.93766.

[39] A. Vinolia, N. Kanya and V. N. Rajavarman, "Machine learning and deep learning based intrusion detection in cloud environment: a review.," in 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), January, 2023, https://doi.org/10.1109/ICSSIT55814.2023.10060868.

[40] N. M. Alruhaily and D. M. Ibrahim, "A multi-layer machine learning-based intrusion detection system for wireless sensor networks," International Journal of Advanced Computer Science and Applications, vol. 12, no. 4, pp. 281-288, 2021, https://doi.org/10.14569/IJACSA.2021.0120437.

[41] V. Gowdhaman and R. Dhanapal, "An intrusion detection system for wireless sensor networks using deep neural network," Soft Computing, vol. 26, no. 23, pp. 13059-13067, 2022, https://doi.org/10.1007/s00500-021-06473-y.

[42] A. Awajan, "A Novel Deep Learning-Based Intrusion Detection System for IoT Networks," Computers, vol. 12, no. 2, p. 34, 2023, https://doi.org/10.3390/computers12020034.

[43] R. B. Kagade, S. Jayagopalan, "Optimization assisted deep learning based intrusion detection system in wireless sensor network with two‐tier trust evaluation," International Journal of Network Management, vol. 32, no. 4, p. e2196, 2022, https://doi.org/10.1002/nem.2196.

[44] H. S. Sharma, A. Sarkar and M. M. Singh, "An efficient deep learning-based solution for network intrusion detection in wireless sensor network," International Journal of System Assurance Engineering and Management, vol. 14, no. 6, pp. 2423-2446, 2023, https://doi.org/10.1007/s13198-023-02090-0.

[45] M. Alazab, S. P. RM, M. Parimala, P. K. R. Maddikunta, T. R. Gadekallu and Q. V. Pham, "Federated learning for cybersecurity: Concepts, challenges, and future directions," IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 3501-3509, 2021, https://doi.org/10.1109/TII.2021.3119038.

[46] B. Dash, P. Sharma and A. Ali, " Federated learning for privacy-preserving: A review of PII data analysis in Fintech," International Journal of Software Engineering Applications (IJSEA), vol. 13, no. 4, 2022, Available at SSRN: https://ssrn.com/abstract=4323967.

[47] O. Friha, M. A. Ferrag, L. Shu, L. Maglaras, K. K. R. Choo and M. Nafaa, "FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things," Journal of Parallel and Distributed Computing, vol. 165, pp. 17-31, 2022, https://doi.org/10.1016/j.jpdc.2022.03.003.

[48] M. J. Idrissi, H. Alami, A. El Mahdaouy, A. El Mekki, S. Oualil, Z. Yartaoui and I. Berrada, "Fed-anids: Federated learning for anomaly-based network intrusion detection systems," Expert Systems with Applications, vol. 234, p. 121000, 2023, https://doi.org/10.1016/j.eswa.2023.121000.

[49] J. A. de Oliveira, V. P. Gonçalves, R. I. Meneguette, R. T. de Sousa Jr, D. L. Guidoni, J. C. Oliveira and G. P. Rocha Filho, "F-NIDS—A Network Intrusion Detection System based on federated learning.," Computer Networks, vol. 236, p. 110010., 2023, https://doi.org/10.1016/j.comnet.2023.110010.

[50] A. Alazab, A. Khraisat, S. Singh and T. Jan, "Enhancing privacy-preserving intrusion detection through federated learning," Electronics, vol. 12, no. 16, p. 3382, 2023, https://doi.org/10.3390/electronics12163382.

[51] R. R. dos Santos, E. K. Viegas, A. O. Santin and P. Tedeschi, "Federated learning for reliable model updates in network-based intrusion detection," Computers Security, vol. 133, p. 103413, 2023, https://doi.org/10.1016/j.cose.2023.103413.

[52] R. Lazzarini, H. Tianfield and V. Charissis, "Federated learning for IoT intrusion detection.," AI, vol. 4, no. 3, pp. 509-530, 2023, https://doi.org/10.3390/ai4030028.

[53] A. Fenjan, M. T. M. Almashhadany, S. R. Ahmed, H. A. Fadel, R. Sekhar, P. Shah and B. S. Veena, "Adaptive Intrusion Detection System Using Deep Learning for Network Security," in Cognitive Models and Artificial Intelligence Conference, pp. 279 – 284, 2024, https://doi.org/10.1145/3660853.3660928.

[54] W. Villegas-Ch, J. R. Govea, A. Gutierrez, M. Navarro and A. Mera-Navarrete, "Effectiveness of an Adaptive Deep Learning-Based Intrusion Detection System," IEEE Access, vol. 12, pp. 184010-184027, 2024, http://doi.org/10.1109/ACCESS.2024.3512363.

[55] M. A. Shyaa, N. F. Ibrahim, Z. Zainol, R. Abdullah, M. Anbar and L. Alzubaidi, "Evolving cybersecurity frontiers: A comprehensive survey on concept drift and feature dynamics aware machine and deep learning in intrusion detection systems," Engineering Applications of Artificial Intelligence, vol. 137, p. 109143, 2024, https://doi.org/10.1016/j.engappai.2024.109143.

[56] N. Z. Rizqullah, J. Alekhine, D. L. Yonia, R. M. R. Purnomo and A. M. Shiddiqi, " Enhancing Intrusion Detection Systems with Adaptive Learning Techniques," in IEEE International Conference on Artificial Intelligence and Mechatronics, 2024, https://doi.org/10.1109/AIMS61812.2024.10513076.

[57] X. J. Li, M. Ma and Y. Sun, "An adaptive deep learning neural network model to enhance machine-learning-based classifiers for intrusion detection in smart grids," Algorithms, vol. 16, no. 6, p. 288, 2023, https://doi.org/10.3390/a16060288.

[58] Z. Nie, S. Basumallik, P. Banerjee and A. K. Srivastava, "Intrusion Detection in Cyber-Physical Grid using Incremental ML with Adaptive Moment Estimation," IEEE Transactions on Industrial Cyber-Physical Systems, vol. 2, pp. 206-219, 2024, https://doi.org/10.1109/TICPS.2024.3413607.

[59] M. U. Tanveer, K. Munir, M. Amjad, S. A. J. Zaidi, A. Bermak and A. U. Rehman, "Ensemble-Guard IoT: A Lightweight Ensemble Model for Real-Time Attack Detection on Imbalanced Dataset," IEEE Access, vol. 12, no. 6, pp. 168938-168952, 2024, https://doi.org/10.1109/ACCESS.2024.3495708.

[60] A. A. Alhashmi, A. M. Alashjaee, A. A. Darem, A. F. Alanazi and R. Effghi, "An ensemble-based fraud detection model for financial transaction cyber threat classification and countermeasures," Engineering, Technology Applied Science Research, vol. 13, no. 6, pp. 12433-12439, 2023, https://doi.org/10.48084/etasr.6401.

[61] E. Jaw and X. Wang, "Feature selection and ensemble-based intrusion detection system: an efficient and comprehensive approach," Symmetry, vol. 13, no. 10, p. 1764, 2021, https://doi.org/10.3390/sym13101764.

[62] M. A. Hossain and M. S. Islam, "A novel hybrid feature selection and ensemble-based machine learning approach for botnet detection," Scientific Reports, vol. 13, no. 1, p. 21207, 2023, https://doi.org/10.1038/s41598-023-48230-1.

[63] M. Torabi, N. Udzir, M. Abdullah and R. Yaakob, "A Review on Feature Selection and Ensemble Techniques for Intrusion Detection System," International Journal of Advanced Computer Science and Applications, vol. 12, no. 5, pp. 538-553, 2021, https://doi.org/10.14569/IJACSA.2021.0120566.

[64] M. A. Hossain and M. S. Islam, "Ensuring network security with a robust intrusion detection system using ensemble-based machine learning," Array, vol. 19, p. 100306, 2023, https://doi.org/10.1016/j.array.2023.100306.

[65] M. A. Hossain and M. S. Islam, "Enhancing DDoS attack detection with hybrid feature selection and ensemble-based classifier: A promising solution for robust cybersecurity," Measurement Sensors, vol. 32, p. 101037, 2024, https://doi.org/10.1016/j.measen.2024.101037.

[66] A. Das and B. S. Sunitha, "Anomaly-based network intrusion detection using ensemble machine learning approach.," International Journal of Advanced Computer Science and Applications, vol. 13, no. 2, 2022, https://doi.org/10.14569/IJACSA.2022.0130275.

Downloads

Published

2025-12-31

How to Cite

Afonne, E. I., Ejeh, P., & Aworonye, L. C. (2025). An Ensemble-based Adaptable and Privacy-aware Threat Detection Mechanism for Wireless Sensor Network in Healthcare Systems. Scientific Journal of Computer Science, 1(2), 94–114. https://doi.org/10.64539/sjcs.v1i2.2025.328

Issue

Section

Articles