Machine Learning Techniques for Anomaly Detection in IoT and WSN: A review
DOI:
https://doi.org/10.29304/jqcsm.2025.17.22198Keywords:
Anomaly Detection, Cybersecurity, Deep Learning, Internet of Things (IoT), Wireless Sensor Networks (WSN)Abstract
Quick Internet of Things (IoT) and Wireless Sensor Networks (WSN) proliferation have considerably raised real-life and automation monitoring, data-based decision-making over various fields such as industrial systems, healthcare, and smart cities. Although great IoT device development defines security vulnerabilities and operational risks, it signifies strong anomaly diagnosis algorithms for recognizing system failures, unusual behaviors, and cyber threats. Traditional rule-based and statistical techniques cope with controlling active, massive, and high-dimensional IoT data aspects, creating methods of machine learning (ML) that are promising alternatives for appropriate and scalable unusual diagnosis. The present paper shows a general review of ML-based unusual diagnosis strategies in IoT and WSN, grouping them into hybrid, unsupervised, and supervised learning methods. In addition, it examines deep learning architectures, such as Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTM), and Transformer-based models, highlighting their strengths in capturing complex spatial and temporal dependencies in sensor data. Despite their efficiency, ML-based techniques meet some issues like real-life limitations, data scarcity, high computational costs, adversarial vulnerabilities, and a shortage of generalization over various IoT areas. For considering such issues, this review describes the present paper's directions. Though state-of-the-art methods’ analysis and highlighting future trends, the present paper targets present worthy perspectives for investigators and practitioners in improving more adaptive, safe, effective ML-based unusual diagnosis responses for IoT and WSN
Downloads
References
B. R. Kikissagbe and M. Adda, "Machine learning-based intrusion detection methods in IoT systems: A comprehensive review," Electronics, vol. 13, no. 18, p. 3601, 2024.
L. Zolfagharipour, M. H. Kadhim, and T. H. Mandeel, "Enhance the Security of Access to IoT-based Equipment in Fog," in Proc. Al-Sadiq International Conference on Communication and Information Technology (AICCIT), pp. 142–146, 2023.
A. Ghaffari, N. Jelodari, S. Pouralish, N. Derakhshanfard, and B. Arasteh, "Securing Internet of Things using machine and deep learning methods: a survey," Cluster Computing, vol. 27, no. 7, pp. 9065–9089, 2024.
A. Adewuyi, A. A. Oladele, P. U. Enyiorji, O. O. Ajayi, T. E. Tsambatare, K. Oloke, and I. Abijo, "The convergence of cybersecurity, Internet of Things (IoT), and data analytics: Safeguarding smart ecosystems," WORLD JOURNAL OF ADVANCED RESEARCH AND REVIEWS, vol. 23, no. 1, pp. 379–394, 2024.
A. Q. Khan, S. El Jaouhari, N. Tamani, and L. Mroueh, "Knowledge-based anomaly detection: Survey, challenges, and future directions," Engineering Applications of Artificial Intelligence, vol. 136, p. 108996, Oct. 2024.
Y. Wang, R. Guo, and P. Min, "A Survey of Applications for Anomaly Detection in the IoT: Methods, New Perspectives, and Future," in Proc. IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 2453–2460, 2024.
S. Kumari, C. Prabha, A. Karim, M. M. Hassan, and S. Azam, "A Comprehensive Investigation of Anomaly Detection Methods in Deep Learning and Machine Learning: 2019–2023," IET Information Security, vol. 2024, no. 1, p. 8821891, 2024.
N. R. Palakurti, "Challenges and future directions in anomaly detection," in Practical Applications of Data Processing, Algorithms, and Modeling, IGI Global, pp. 269–284, 2024.
E. Krzysztoń, I. Rojek, and D. Mikołajewski, "A Comparative Analysis of Anomaly Detection Methods in IoT Networks: An Experimental Study," Applied Sciences, vol. 14, no. 24, p. 11545, 2024.
L. Zolfagharipour and M. H. Kadhim, "A Technique for Efficiently Controlling Centralized Data Congestion in Vehicular Ad Hoc Networks," International Journal of Computer Networks and Applications (IJCNA), vol. 12, no. 2, pp. 267–277, 2025.
H. El-Sofany, S. A. El-Seoud, O. H. Karam, and B. Bouallegue, "Using machine learning algorithms to enhance IoT system security," Scientific Reports, vol. 14, no. 1, p. 12077, 2024.
Z. Wang, M. Ye, J. Cheng, C. Zhu, and Y. Wang, "An Anomaly Node Detection Method for Wireless Sensor Networks Based on Deep Metric Learning with Fusion of Spatial–Temporal Features," Sensors, vol. 25, no. 10, p. 3033, 2025.
P. He, Y. Zhou, and X. Qin, "A survey on energy-aware security mechanisms for the internet of things," Future Internet, vol. 16, no. 4, p. 128, 2024.
L. Yang and A. Shami, "IoT data analytics in dynamic environments: From an automated machine learning perspective," Engineering Applications of Artificial Intelligence, vol. 116, p. 105366, 2022.
B. H. Aubaidan, R. A. Kadir, M. T. Lajb, M. Anwar, K. N. Qureshi, B. A. Taha, and K. Ghafoor, "A review of intelligent data analysis: Machine learning approaches for addressing class imbalance in healthcare—Challenges and perspectives," INTELLIGENT DATA ANALYSIS, vol. 2025, Feb. 26, Article ID 1088467X241305509, 2025.
A. Chatterjee and B. S. Ahmed, "IoT anomaly detection methods and applications: A survey," Internet of Things, vol. 19, p. 100568, 2022.
S. F. Bedewy, "The Impact of Data Security and Privacy Concerns on the Implementation of Integrated Smart Cities: Foundations and Perspectives, vol. 59, 2024.
N. H. Mahmood, D. H. Hussein, and S. Askar, "Machine Learning for Network Anomaly Detection: A Review," The Indonesian Journal of Computer Science, vol. 14, no. 1, 2025.
G. Princz, M. Shaloo, and S. Erol, "Anomaly detection in binary time series data: An unsupervised machine learning approach for condition monitoring," Procedia Computer Science, vol. 232, pp. 1065–1078, 2024.
G. Long and Z. Zhang, "PUNet: A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data," Computers, Materials & Continua, vol. 81, no. 1, 2024.
B. Konatham, T. Simra, F. Amsaad, M. I. Ibrahem, and N. Z. Jhanjhi, "A secure hybrid deep learning technique for anomaly detection in IIoT edge computing," Authorea Preprints, 2024.
R. Bensaid, N. Labraoui, H. Saidi, and H. Bany Salameh, "Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach," Cluster Computing, vol. 28, no. 1, pp. 1–9, 2025.
S. A. Elsaid and A. Binbusayyis, "An optimized isolation forest-based intrusion detection system for heterogeneous and streaming data in the industrial Internet of Things (IIoT) networks," Discover Applied Sciences, vol. 6, no. 9, p. 483, 2024.
Y. Li, N. Sui, A. Gehi, C. Guo, and Z. Guo, "CardiacRT-NN: Real-Time Detection of Cardiovascular Disease Using Self-attention CNN-LSTM for Embedded Systems," in Proc. International Symposium on Neural Networks, pp. 610–621, 2024.
H. Niu, O. A. Omitaomu, M. A. Langston, S. K. Grady, M. Olama, O. Ozmen, H. B. Klasky, A. Laurio, M. Ward, and J. Nebeker, "Anomaly detection in electronic health records across hospital networks: Integrating machine learning with graph algorithms," IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2025.
V.. Justus and G. R. Kanagachidambaresan, "Intelligent single-board computer for Industry 4.0: Efficient real-time monitoring system for anomaly detection in CNC machines," Microprocessors and Microsystems, vol. 93, p. 104629, 2022.
M. R. Fachrezi, A. F. Ihsan, and W. Astuti, "Anomaly Detection Using LSTM-Based Deep Learning on Natural Gas Pipeline Operational Data," in Proc. 12th International Conference on Information and Communication Technology (ICoICT), pp. 500–506, 2024.
D. Dwivedi, A. Bhushan, and A. K. Singh, "85.35," in Proc. 3rd International Conference on Power Electronics and IoT Applications in Renewable Energy and its Control (PARC), pp. 72–76, 2024.
R. Shrestha, M. Mohammadi, S. Sinaei, A. Salcines, D. Pampliega, R. Clemente, and A. L. Sanz," JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, vol. 193, Nov. 1, Art. no. 104951, 2024.
H. C. Reis and V. Turk, "Detection of forest fire using deep convolutional neural networks with transfer learning approach," Applied Soft Computing, vol. 143, p. 110362, 2023.
T. Nie, S. Wang, Y. Wang, X. Tong, and F. Sun, "An effective recognition of moving target seismic anomaly for security region based on deep bidirectional LSTM combined CNN," Multimedia Tools and Applications, vol. 83, no. 22, pp. 61645–61658, 2024.
M. S. Habeeb and T. R. Babu, "Network intrusion detection system: a survey on artificial intelligence-based techniques," Expert Systems, vol. 39, no. 9, p. e13066, 2022.
A. Momand, S. U. Jan, and N. Ramzan, "A systematic and comprehensive survey of recent advances in intrusion detection systems using machine learning: Deep learning, datasets, and attack taxonomy," Journal of Sensors, vol. 2023, p. 6048087, 2023.
H. Kayan, Y. Majib, W. Alsafery, M. Barhamgi, and C. Perera, "AnoML-IoT: An end-to-end re-configurable multi-protocol anomaly detection pipeline for Internet of Things," Internet of Things, vol. 16, p. 100437, 2021.
P. Moriano, S. C. Hespeler, M. Li, and M. Mahbub, "Adaptive Anomaly Detection for Identifying Attacks in Cyber-Physical Systems: A Systematic Literature Review," arXiv preprint arXiv:2411.14278, 2024.
C. Zhou, X. Ge, Y. Chang, M. Wang, Z. Shi, M. Ji, T. Wu, C. Lv. "A Multimodal Parallel Transformer Framework for Apple Disease Detection and Severity Classification with Lightweight Optimization," AGRONOMY, vol. 15, no. 5, p. 1246, 2025.
M. A. Husnoo, A. Anwar, M. E. Haque, and A. N. Mahmood, "Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach," arXiv preprint arXiv:2407.15879, 2024.
A. N. Gummadi, J. C. Napier, and M. Abdallah, "XAI-IoT: an explainable AI framework for enhancing anomaly detection in IoT systems," IEEE Access, 2024.
H. Guo, Z. Zhou, D. Zhao, and W. Gaaloul, "EGNN: Energy-efficient anomaly detection for IoT multivariate time series data using graph neural network," Future Generation Computer Systems, vol. 151, pp. 45–56, 2024.
R. Sathya, J. Agrawal, D. Roy, and R. Dutta, "A self-adaptive and self-learning methodology for wireless intrusion detection using deep neural network," Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12, no. 6, pp. 2084–2094, 2021.
M. I. Okfie and S. Mishra, "Anomaly Detection in IIoT Transactions using Machine Learning: A Lightweight Blockchain-based Approach," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 14645–14651, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Israa Abdulkadhim Jabbar Al Ali, Manaf Mohammed Ali Alhaidery

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.