RFSVMDD: Ensemble of multi-dimension random forest and custom-made support vector machine for detecting RPL DDoS attacks in an IoT-based WSN environment
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.3.02Keywords:
Internet of Things, Wireless sensor networks, Security, Distributed denial of service attacks, Routing protocol for low power and lossy networks.Dimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Growing dependence on the internet of things (IoT) and wireless sensor networks (WSNs) has led to critical security issues, especially concerning distributed denial of service (DDoS) attacks based on RPL. Such attacks can severely compromise the network’s security, reliability, and efficiency. To effectively address this problem, this research proposes (RFSVMDD) a novel hybrid detection model that combines a multi-dimensional random forest (MDRF) with a custom-made support vector machine (CSVM). The proposed technique uses MDRF to provide scalability for consistent feature selection and anomaly detection across high-dimensional datasets. CSVM reduces false positives and increases detection accuracy through its improved classification of potential threats. Experimental assessments in simulated IoT-based WSN environments show that the model outperforms conventional machine learning methods regarding accuracy, detection speed, and durability. This novel ensemble approach presents a promising solution by enhancing IoT and WSN networks against RPL DDoS attacks.Abstract
How to Cite
Downloads
Similar Articles
- R.R. Jenifer, V.S.J. Prakash, Detecting denial of sleep attacks by analysis of wireless sensor networks and the Internet of Things , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- K. Akila, Location-specific trusted third-party authentication model for environment monitoring using internet of things and an enhancement of quality of service , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Chinnadurai U, A. Vinayagam, Energy efficient routing with cluster approach in wireless networks – A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Annalakshmi D, C. Jayanthi, A secured routing algorithm for cluster-based networks, integrating trust-aware authentication mechanisms for energy-efficient and efficient data delivery , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- R. Rita Jenifer, V. Sinthu Janita, Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- R. Sridevi, V. S. J. Prakash, Load aware active low energy adaptive clustering hierarchy for IoT-WSN , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- A. Rukmani, C. Jayanthi, Trust and security in wireless sensor networks: A literature review of approaches for malicious node detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- P. Pattunnarajam, Janani G, A. Vijayaraj, Sathiya Priya S, Enhanced routing strategy of wireless sensor network based on fifth generation communication technology , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper

