Cognitive Wireless Sensor Networks (CWSNs) play a pivotal role in dynamic spectrum access and wireless communication. However, their susceptibility to Spectrum Sensing Data Falsification (SSDF) attacks poses a severe challenge to cooperative spectrum sensing (CSS). Traditional techniques, including statistical analysis and machine learning (ML) models such as Isolation Forest (IF) and Spectral Clustering (SC), have been explored for anomaly detection. Yet, these approaches struggle with scalability and real-time responsiveness. This paper surveys the landscape of anomaly detection in CWSNs, comparing traditional and modern techniques, and proposes a new framework—IFSC-GNN—that replaces SC with lightweight Graph Neural Networks (GNNs) to enhance scalability, reduce latency, and support real-time detection on edge devices. Graphs are used widely to model complex systems, and detecting anomalies in a graph is an important task in the analysis of complex systems. Graph anomalies are patterns in a graph that do not conform to normal patterns expected of the attributes and/or structures of the graph. In recent years, graph neural networks (GNNs) have been studied extensively and have successfully performed difficult machine learning tasks in node classification, link prediction, and graph classification thanks to the highly expressive capability via message passing in effectively learning graph representations.
Introduction
Cognitive Wireless Sensor Networks (CWSNs) integrate traditional wireless sensor networks with cognitive radio technology to enable intelligent, dynamic access to unused licensed spectrum. They rely on real-time spectrum sensing, adaptive transmission, and context-awareness, making them useful in smart cities, healthcare, environmental monitoring, military communication, and industrial IoT.
In such networks, graph structures are powerful tools for representing relationships among nodes. Modern anomaly detection has shifted from handcrafted statistical methods to deep learning and Graph Neural Networks (GNNs), which efficiently handle large, high-dimensional graph data. GNNs capture complex structural and attribute-based patterns through message passing, and state-of-the-art graph anomaly detection methods combine GNNs with other deep learning techniques to improve detection accuracy.
A major security concern in CWSNs is Spectrum Sensing Data Falsification (SSDF) attacks, where malicious nodes intentionally send false sensing data during cooperative spectrum sensing (CSS). CSS improves detection reliability by combining sensing reports from multiple sensor nodes, but is vulnerable to attackers such as Always-Yes, Always-No, Random, Intermittent, and Coordinated attacks.
Traditional anomaly detection frameworks like IFSC (Isolation Forest + Spectral Clustering) work well at small scale but face severe limitations, including high computational cost (O(n³)), poor scalability beyond 5,000 nodes, and difficulty running on resource-limited edge devices.
To overcome these issues, the proposed IFSC-GNN framework replaces Spectral Clustering with lightweight GNN models (e.g., SGC, GNN-Lite) while retaining Isolation Forest for anomaly scoring. This hybrid approach improves scalability, reduces latency by about 40% in large graphs (10k+ nodes), and supports efficient deployment on edge hardware. By leveraging GNNs’ ability to model relational information, IFSC-GNN enhances detection accuracy, efficiency, and adaptability for large CWSNs.
The literature review highlights advancements in WSN and CRN security, machine learning and deep learning for anomaly detection, GNN-based spatial–temporal modeling, federated learning for privacy, and efficient distributed detection methods—underscoring the growing importance of advanced graph learning techniques for securing cognitive networks.
Conclusion
Cognitive Wireless Sensor Networks (CWSNs) represent the next generation of intelligent spectrum-aware communication systems, but remain highly vulnerable to Spectrum Sensing Data Falsification (SSDF) attacks. Traditional anomaly detection methods, including statistical models, classical machine learning, and clustering algorithms, have laid foundational defenses but often suffer from scalability issues, high latency, or dependency on labeled data.
This review provided a detailed comparison of these approaches, highlighting the strengths and limitations of techniques like Isolation Forest and Spectral Clustering, which together form the IFSC framework. While IFSC demonstrates the power of unsupervised hybrid models, its reliance on Spectral Clustering hinders its scalability and responsiveness, especially in large-scale, real-time environments.
To address these shortcomings, we proposed a conceptual framework, IFSC-GNN, which replaces Spectral Clustering with lightweight Graph Neural Networks (GNNs). These models, including SGC, TinyGNN, and GNN-Lite, offer structural awareness, reduced latency, and compatibility with edge computing devices. Experimental simulations referenced in the literature suggest that GNN-based models can reduce detection latency by up to 40% in networks with over 10,000 nodes.
While IFSC-GNN presents a promising path forward, several open challenges remain, including the need for real-world datasets, interpretability of GNNs, energy-efficient deployment, and robustness to adversarial attacks. Future work must explore federated learning, AutoML, and secure GNN variants to further enhance CWSN resilience.
In summary, IFSC-GNN offers a scalable, real-time, and intelligent alternative to traditional SSDF defense strategies—paving the way for more secure and autonomous cognitive sensor networks.
References
[1] S.?Shrivastava, A.?Rajesh, P.?K. Bora, et al., “A survey on security issues in cognitive radio based cooperative sensing,” IET Commun., vol.?15, no.?7, pp.?875–905, 2021, doi:?10.1049/com.2020.12131.
[2] A.?Haque, M.?N.-U.-R. Chowdhury, H.?Soliman, et al., “Wireless sensor networks anomaly detection using machine learning: A survey,” in Lecture Notes in Networks and Systems, vol.?647, 2024, pp.?491–506, doi:?10.1007/978 3 031 47715 7_34.
[3] X.?Ma and W.?Shi, “A comprehensive survey on graph anomaly detection with deep learning,” IEEE Trans. Knowl. Data Eng., vol.?34, no.?5, pp.?2021–2040, 2022, doi:?10.1109/TKDE.2021.3102786.
[4] Y.?Zhang and X.?Zhang, “A novel anomaly detection method for multimodal WSN data flow via a dynamic GNN,” IEEE Sensors J., vol.?22, no.?6, pp.?5789–5797, 2022, doi:?10.1109/JSEN.2021.3090161.
[5] T.?Luo and S.?G. Nagarajan, “Distributed anomaly detection using autoencoder neural networks in WSN for IoT,” in IEEE ICC, May 2018, pp.?1–6, doi:?10.1109/ICC.2018.8422402.
[6] V.?Chandola, A.?Banerjee, and V.?Kumar, “Anomaly detection: A survey,” ACM Comput. Surv., vol.?41, no.?3, pp.?1–58, Jul. 2009, doi:?10.1145/1541880.1541880.
[7] S.?Rajasegarar, C.?Leckie, and M.?Palaniswami, “Anomaly detection in wireless sensor networks,” IEEE Wirel. Commun., vol.?15, no.?4, pp.?34–40, Aug. 2008, doi:?10.1109/MWC.2008.4599219.
[8] B.?Egilmez and A.?Ortega, “Spectral anomaly detection using graph-based filtering for WSNs,” in ICASSP, Apr. 2014, pp.?3185–3189, doi:?10.1109/ICASSP.2014.6853764.
[9] M.-C.?Zhong and M.?Velipasalar, “Deep actor-critic reinforcement learning for anomaly detection,” in IEEE GLOBECOM, Dec. 2019, pp.?1–6, doi:?10.1109/GLOBECOM38437.2019.9013223.
[10] X.?Feng et al., “Anomaly detection in WSNs using support vector data description,” Int. J. Distrib. Sensor Netw., vol.?13, no. 1, pp.?1–12, 2017, doi:?10.1177/1550147716686161.
[11] T.?Xie, J.?Hu, S.?Zomaya, et al., “Scalable hypergrid k NN based online anomaly detection in WSNs,” IEEE Trans. Parallel Distrib. Syst., vol.?24, no.?8, pp.?1586–1596, Aug. 2013, doi:?10.1109/TPDS.2012.261.
[12] S.?Trinh, K.?Tran, and T.?T.?Huong, “Hyperparameter optimization of one-class SVM for WSNs,” in IEEE ATC, Oct. 2017, pp.?563–568, doi:?10.1109/ATC.2017.8167642.
[13] A.?Abduvaliyev et al., “On the vital areas of intrusion detection systems in WSNs,” IEEE Commun. Surv. Tutor., vol.?15, no.?3, pp.?1223–1238, 2013, doi:?10.1109/SURV.2012.121912.00006.
[14] M.?Bosman, G.?Iacca, A.?Liotta, et al., “Spatial anomaly detection in sensor networks using neighborhood information,” Inf. Fusion, vol.?33, pp.?41–56, Jul. 2017, doi:?10.1016/j.inffus.2016.04.007.
[15] S.?Suthaharan et al., “Labelled data collection for anomaly detection in WSNs,” in IEEE ISSNIP, Dec. 2010, pp.?1–6, doi:?10.1109/ISSNIP.2010.5706782.
[16] S. Wang and S. Sun, “Threatrace: Detecting and tracing host-based threats in node level through provenance graph learning,” IEEE Trans. Inf. Forensics Secur., vol.?17, pp.?1123–1135, 2022, doi:10.1109/TIFS.2021.3108674.
[17] Q. Wang, W.?U. Hassan, D. Li, K. Jee, and X. Yu, “You Are What You Do: Hunting stealthy malware via data provenance analysis,” in NDSS, 2020, doi:10.14722/ndss.2020.23322.
[18] I.?J. King and H.?H.?Huang, “Euler: Detecting network lateral movement via scalable temporal link prediction,” in NDSS, 2022, doi:10.14722/ndss.2022.24473.
[19] Y. Zhao, Z. Liu, and J. Pang, “Anomaly Detection in Network Traffic via Cross-Domain Federated Graph Representation Learning,” Appl. Sci., vol.?15, no.?11, p.?6258, 2025, doi:10.3390/app15116258.
[20] Y. Wang and S. Yang, “A lightweight method for graph neural networks based on knowledge distillation and graph contrastive learning,” Appl. Sci., vol.?14, no.?11, p.?4805, 2024, doi:10.3390/app14114805.
[21] J.?K. Kong, W.?Zhang, H.?Wang, M.?Hou, X.?Chen, X.?Yan, and S.?K.?Das, “Federated graph anomaly detection via contrastive self-supervised learning,” in AAAI, vol.?39, no.?20, 2023, doi:10.1609/aaai.v39i20.35458.
[22] C. He et al., “FedGraphNN: A federated learning system and benchmark for graph neural networks,” arXiv preprint arXiv:2104.07145, 2021.
[23] T.?Gurumurthy, H.?Pal, and C.?Sharma, “Federated spectral graph transformers meet neural ordinary differential equations for non IID graphs,” arXiv preprint arXiv:2504.11808, 2025.
[24] A. Caville, W.?W. Lo, S.?Layeghy, and M. Portmann, “Anomal E: A self supervised network intrusion detection system based on graph neural networks,” arXiv preprint arXiv:2207.06819, 2022.
[25] T.?Nguyen, J.?He, L.?Tan Le, W. Bao, and N.?H. Tran, “Federated PCA on Grassmann manifold for anomaly detection in IoT networks,” arXiv preprint arXiv:2212.12121, 2022.
[26] “A survey of dynamic graph neural networks,” arXiv preprint arXiv:2404.18211, 2024.
[27] S.?Joshi, “Recent advances in efficient and scalable graph neural networks,” 2022.
[28] “Computing graph neural networks: A survey from algorithms to applications,” ACM Comput. Surv., 2022.
[29] “A survey on recommender systems using graph neural network,” ACM Comput. Surv., 2024.
[30] “A survey of computationally efficient graph neural networks for embedded systems,” Preprints.org, 2024, doi:10.20944/preprints202406.0281.v1.