CFP last date
02 March 2026
Call for Paper
April Edition
IJAIS solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 02 March 2026

Submit your paper
Know more
Random Articles
Reseach Article

Optimized Decision Tree Classifier for Data Aggregation in Wireless Sensor Networks using IoT Sensor Data

by Jagan Kurma, Raghuvaran Kendyala, Varun Bitkuri, Avinash Attipalli, Jaya Vardhani Mamidala, Sunil Jacob Enokkaren
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Number 2
Year of Publication: 2026
Authors: Jagan Kurma, Raghuvaran Kendyala, Varun Bitkuri, Avinash Attipalli, Jaya Vardhani Mamidala, Sunil Jacob Enokkaren
10.5120/ijais2026452035

Jagan Kurma, Raghuvaran Kendyala, Varun Bitkuri, Avinash Attipalli, Jaya Vardhani Mamidala, Sunil Jacob Enokkaren . Optimized Decision Tree Classifier for Data Aggregation in Wireless Sensor Networks using IoT Sensor Data. International Journal of Applied Information Systems. 13, 2 ( Feb 2026), 1-10. DOI=10.5120/ijais2026452035

@article{ 10.5120/ijais2026452035,
author = { Jagan Kurma, Raghuvaran Kendyala, Varun Bitkuri, Avinash Attipalli, Jaya Vardhani Mamidala, Sunil Jacob Enokkaren },
title = { Optimized Decision Tree Classifier for Data Aggregation in Wireless Sensor Networks using IoT Sensor Data },
journal = { International Journal of Applied Information Systems },
issue_date = { Feb 2026 },
volume = { 13 },
number = { 2 },
month = { Feb },
year = { 2026 },
issn = { 2249-0868 },
pages = { 1-10 },
numpages = {9},
url = { https://www.ijais.org/archives/volume13/number2/optimized-decision-tree-classifier-for-data-aggregation-in-wireless-sensor-networks-using-iot-sensor-data/ },
doi = { 10.5120/ijais2026452035 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2026-02-26T00:03:43+05:30
%A Jagan Kurma
%A Raghuvaran Kendyala
%A Varun Bitkuri
%A Avinash Attipalli
%A Jaya Vardhani Mamidala
%A Sunil Jacob Enokkaren
%T Optimized Decision Tree Classifier for Data Aggregation in Wireless Sensor Networks using IoT Sensor Data
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 13
%N 2
%P 1-10
%D 2026
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet of Things (IoT) is a network that allows physical objects, sensors, appliances, and other items to communicate with each other without requiring human intervention. Wireless Sensor Networks (WSNs) are the main IoT components. The Internet of Things and WSNs have several significant and non-essential applications in practically every facet of contemporary life. The proposed study suggests a Decision Tree (DT)-based model that can be used to carry out data aggregation in an efficient and effective manner, utilizing the Intel Berkeley Research Lab dataset, a collection of 54 sensors. The methodology consists of three major steps of preprocessing, i.e., cleaning up the data, handling outliers, and label encoding, and feature optimization using Recursive Feature Elimination (RFE). The DT classifier is used to accomplish classification tasks. AUC-ROC, F1-score, recall, accuracy, and precision are used to evaluate measurements. It has been experimentally proven that the DT model exhibits the best classification accuracy of 97% and an AUC of 0.9928, exceeding the performance of other baseline models, including two-layer LSTM and Naive Bayes. The relative analysis validates the strength, interpretability and computability of the DT classifier, and thus it is an appropriate and viable solution to the WSN-based Smart IoT applications in terms of data aggregation.

References
  1. P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, “Wireless sensor networks: A survey on recent developments and potential synergies,” J. Supercomput., 2014, doi: 10.1007/s11227-013-1021-9.
  2. H. Jawad, R. Nordin, S. Gharghan, A. Jawad, and M. Ismail, “Energy-Efficient Wireless Sensor Networks for Precision Agriculture: A Review,” Sensors, vol. 17, no. 8, p. 1781, Aug. 2017, doi: 10.3390/s17081781.
  3. S. S. S. Neeli, “The Significance of NoSQL Databases : Strategic Business Approaches and Management Techniques,” J. Adv. Dev. Res., vol. 10, no. 1, p. 11, 2019.
  4. M. S. Hossain, M. Rahman, M. T. Sarker, M. E. Haque, and A. Jahid, “A smart IoT based system for monitoring and controlling the sub-station equipment,” Internet of Things, vol. 7, Sep. 2019, doi: 10.1016/j.iot.2019.100085.
  5. D. Mocrii, Y. Chen, and P. Musilek, “IoT-based smart homes: A review of system architecture, software, communications, privacy and security,” Internet of Things, vol. 1–2, pp. 81–98, Sep. 2018, doi: 10.1016/j.iot.2018.08.009.
  6. A. Kushwaha, P. Pathak, and S. Gupta, “Review of optimize load balancing algorithms in cloud,” Int. J. Distrib. Cloud Comput., vol. 4, no. 2, pp. 1–9, 2016.
  7. J. Cui, K. Boussetta, and F. Valois, “Classification of data aggregation functions in wireless sensor networks,” Comput. Networks, vol. 178, Sep. 2020, doi: 10.1016/j.comnet.2020.107342.
  8. M. Amjad, M. K. Afzal, T. Umer, and B.-S. Kim, “QoS-Aware and Heterogeneously Clustered Routing Protocol for Wireless Sensor Networks,” IEEE Access, vol. 5, pp. 10250–10262, 2017, doi: 10.1109/ACCESS.2017.2712662.
  9. S. S. S. Neeli, “Real-Time Data Management with In-Memory Databases : A Performance- Centric Approach,” J. Adv. Dev. Res., vol. 11, no. 2, p. 49, 2020.
  10. S. S. S. Neeli, “Decentralized Databases Leveraging Blockchain Technology,” vol. 8, no. 1, pp. 1–8, 2020.
  11. M. Mohammadi, A. Al-Fuqaha, S. Sorour, and M. Guizani, “Deep Learning for IoT Big Data and Streaming Analytics: A Survey,” IEEE Commun. Surv. Tutorials, vol. 20, no. 4, pp. 2923–2960, 2018, doi: 10.1109/COMST.2018.2844341.
  12. M. Hammoudeh et al., “A Wireless Sensor Network Border Monitoring System: Deployment Issues and Routing Protocols,” IEEE Sens. J., vol. 17, no. 8, pp. 2572–2582, Apr. 2017, doi: 10.1109/JSEN.2017.2672501.
  13. H. P. Kapadia, “Cross-Platform UI/UX Adaptions Engine for Hybrid Mobile Apps,” Int. J. Nov. Res. Dev., vol. 5, no. 9, pp. 30–37, 2020.
  14. S. Sakib, M. M. Fouda, Z. M. Fadlullah, and N. Nasser, “Migrating Intelligence from Cloud to Ultra-Edge Smart IoT Sensor Based on Deep Learning: An Arrhythmia Monitoring Use-Case,” in 2020 International Wireless Communications and Mobile Computing, IWCMC 2020, 2020. doi: 10.1109/IWCMC48107.2020.9148134.
  15. A. Verma and V. Ranga, “ELNIDS: Ensemble Learning based Network Intrusion Detection System for RPL based Internet of Things,” in Proceedings - 2019 4th International Conference on Internet of Things: Smart Innovation and Usages, IoT-SIU 2019, 2019. doi: 10.1109/IoT-SIU.2019.8777504.
  16. M. R. Shahid, G. Blanc, Z. Zhang, and H. Debar, “Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders,” in 2019 IEEE 18th International Symposium on Network Computing and Applications, NCA 2019, 2019. doi: 10.1109/NCA.2019.8935007.
  17. I. U. Samee, M. T. Jilani, and H. G. A. Wahab, “An Application of IoT and Machine Learning to Air Pollution Monitoring in Smart Cities,” in 2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology, ICEEST 2019, 2019. doi: 10.1109/ICEEST48626.2019.8981707.
  18. M. Mamdouh, M. A. I. Elrukhsi, and A. Khattab, “Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey,” in 2018 International Conference on Computer and Applications (ICCA), IEEE, Aug. 2018, pp. 215–218. doi: 10.1109/COMAPP.2018.8460440.
  19. P. Lynggaard, “Using Machine Learning for Adaptive Interference Suppression in Wireless Sensor Networks,” IEEE Sens. J., vol. 18, no. 21, pp. 8820–8826, Nov. 2018, doi: 10.1109/JSEN.2018.2867068.
  20. L. Demarchi, A. Kania, W. Ciężkowski, H. Piórkowski, Z. Oświecimska-Piasko, and J. Chormański, “Recursive Feature Elimination and Random Forest Classification of Natura 2000 Grasslands in Lowland River Valleys of Poland Based on Airborne Hyperspectral and LiDAR Data Fusion,” Remote Sens., vol. 12, no. 11, 2020, doi: 10.3390/rs12111842.
  21. M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” Internet of Things, vol. 7, Sep. 2019, doi: 10.1016/j.iot.2019.100059.
  22. G. Almonacid-Olleros, G. Almonacid, J. I. Fernandez-Carrasco, M. E. Estevez, and J. M. Quero, “A new architecture based on iot and machine learning paradigms in photovoltaic systems to nowcast output energy,” Sensors (Switzerland), vol. 20, no. 15, pp. 1–16, 2020, doi: 10.3390/s20154224.
  23. S. Rashid, U. Akram, and S. A. Khan, “WML : Wireless Sensor Network based Machine Learning for Leakage Detection and Size Estimation,” Procedia - Procedia Comput. Sci., vol. 63, no. Euspn, pp. 171–176, 2015, doi: 10.1016/j.procs.2015.08.329.
  24. Chundru, S. K., Vangala, S. R., Polam, R. M., Kamarthapu, B., Kakani, A. B., & Nandiraju, S. K. K. (2024). A Machine Learning-Based Framework for Predicting and Improving Student Outcomes Using Big Educational Data (Approved by ICITET 2024 Conference Proceedings). Available at SSRN 5315635.
  25. Nandiraju, S. K. K., Chundru, S. K., Vangala, S. R., Polam, R. M., Kamarthapu, B., & Kakani, A. B. (2025). Towards Early Forecast of Diabetes Mellitus via Machine Learning Systems in Healthcare. European Journal of Technology, 9(1), 35-50.
  26. Chalasani, R., Gangineni, V. N., Pabbineedi, S., Penmetsa, M., Bhumireddy, J. R., & Tyagadurgam, M. S. V. (2025). Big Data-Driven Approach for Lung Cancer Identification via Advanced Deep Transfer Learning Models. European Journal of Technology, 9(1), 51-67.
  27. Vattikonda, N., Gupta, A. K., Polu, A. R., Narra, B., Buddula, D. V. K. R., & Patchipulusu, H. H. S. (2024). Machine Learning-Based Approaches for Detecting and Mitigating Distributed Denial of Service (DDoS) Attacks to Improved Cloud Security. European Journal of Technology, 8(6), 28-48.
  28. Polu, A. R., Narra, B., Buddula, D. V. K. R., Hara, H., Patchipulusu, S., Vattikonda, N., & Gupta, A. K. Analyzing The Role of Analytics in Insurance Risk Management: A Systematic Review of Process Improvement and Business Agility.
  29. Madhura, R., Varshitha, P., Nikitha, S., Niveditha, K. M., & Bhat, M. (2024, December). RTL design of 16-bit RISC Processor Using Vedic Mathematics. In 2024 IEEE 33rd Asian Test Symposium (ATS) (pp. 1-4). IEEE.
  30. Harinandan, R., Kumar, M., Vamshi, P., Padma, C. R., Krishnappa, K. H., & Raghunandan, J. R. (2024, August). Design and Development of a Real-time Monitoring System for ACL Injury Prevention. In 2024 2nd International Conference on Networking, Embedded and Wireless Systems (ICNEWS) (pp. 1-6). IEEE.
  31. Krishnappa, K. H. (2024). Traffic pattern analysis for malicious node detection in NoC design. Journal of Communications, 9, 12.
  32. Mukund Sai Vikram Tyagadurgam, Venkataswamy Naidu Gangineni, Sriram Pabbineedi, Mitra Penmetsa, Jayakeshav Reddy Bhumireddy, et al. (2024) AI-Powered Cybersecurity Risk Scoring for Financial Institutions Using Machine Learning Techniques. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-482. DOI: doi.org/10.47363/JAICC/2024(3)452
  33. Penmetsa, M., Bhumireddy, J. R., Chalasani, R., Vangala, S. R., Polam, R. M., & Kamarthapu, B. (2025). Adversarial Machine Learning in Cybersecurity: A Review on Defending Against AI-Driven Attacks. European Journal of Applied Science, Engineering and Technology, 3(4), 4-14.
  34. Tyagadurgam, M. S. V., Gangineni, V. N., Pabbineedi, S., Kakani, A. B., Nandiraju, S. K. K., & Chundru, S. K. (2025). Using Artificial Intelligence-Based Machine Learning Regression Models for Predictions of Home Prices. European Journal of Applied Science, Engineering and Technology, 3(3), 404-416.
  35. Nandiraju, S. K. K., Chundru, S. K., Tyagadurgam, M. S. V., Gangineni, V. N., Pabbineedi, S., & Kakani, A. B. (2025). Enhancing Cybersecurity: Zero-Day Attack Detection in Network Traffic with Deep Learning Model. Asian Journal of Research in Computer Science, 18(7), 262-273.
  36. Polam, R. M., Kamarthapu, B., Penmetsa, M., Bhumireddy, J. R., Chalasani, R., & Vangala, S. R. (2025). Advanced Machine Learning for Robust Botnet Attack Detection in Evolving Threat Landscapes. Asian Journal of Research in Computer Science, 18(8), 1-14.
  37. Kamarthapu, B., Penmetsa, M., Reddy, J., Chalasani, R., Vangala, S. R., & Polam, R. M. Data-Driven Detection of Network Threats using Advanced Machine Learning Techniques for Cybersecurity.
  38. Chundru, S. K., Vikram, M. S., Naidu, V., Pabbineedi, S., Kakani, A. B., & Nandiraju, S. K. K. Analyzing and Predicting Anaemia with Advanced Machine Learning Techniques with Comparative Analysis.
  39. Gangineni, V. N., Tyagadurgam, M. S. V., Pabbineedi, S., Kakani, A. B., Nandiraju, S. K. K., & Chundru, S. K. (2025). Preventing Phishing Attacks Using Advanced Deep Learning Techniques for Cyber Threat Mitigation. Journal of Data Analysis and Information Processing, 13(03), 10-4236.
  40. Kalla, D., Mohammed, A. S., Boddapati, V. N., Jiwani, N., & Kiruthiga, T. (2024, November). Investigating the Impact of Heuristic Algorithms on Cyberthreat Detection. In 2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT) (Vol. 1, pp. 450-455). IEEE.
  41. Gangineni, V. N., Penmetsa, M., Bhumireddy, J. R., Chalasani, R., Tyagadurgam, M. S. V., & Pabbineedi, S. (2025). Big Data and Predictive Analytics for Customer Retention: Exploring the Role of Machine Learning in E-Commerce. Available at SSRN 5478047.
  42. Polu, A. R., Narra, B., Buddula, D. V. K. R., Patchipulusu, H. H. S., Vattikonda, N., & Gupta, A. K. (2025). The Role of the Internet of Things in Smart Cities: Current Implementations and Pathways for Future Development. Universal Library of Engineering Technology, 2(2).
  43. Narra, B., Gupta, A. K., Buddula, D. V. K. R., Patchipulusu, H. H. S., Vattikonda, N., & Polu, A. R. (2025). Applications of Blockchain in Software Engineering: Enhancing Security, Traceability, and Transparency. International Journal of Innovative Computer Science and IT Research, 1(02), 63-75.
  44. Vattikonda, N., Gupta, A. K., Polu, A. R., Narra, B., Buddula, D. V. K. R., & Patchipulusu, H. H. S. (2025). Leveraging Deep Learning for Personalized Fashion Recommendations Using Fashion MNIST. International Journal of Emerging Trends in Computer Science and Information Technology, 6(2), 36-46.
  45. Buddula, D. V. K. R., Patchipulusu, H. H. S., Vattikonda, N., Gupta, A. K., Polu, A. R., & Narra, B. (2025). Machine Learning-Based Detection and Prevention of Anti-Money Laundering (AML) in the Financial Sector. International Journal of Innovative Computer Science and IT Research, 1(02), 53-63.
  46. Polu, A. R., Narra, B., Vattikonda, N., Gupta, A. K., Buddula, D. V. K. R., & Patchipulusu, H. H. S. AI-POWERED SYNTHETIC COGNITION NETWORKS Leveraging Multi-Agent Machine Learning to Simulate and Optimize Human Decision-Making in Complex Crisis Scenarios. Global Pen Press UK.
  47. Mitra Penmetsa, Jayakeshav Reddy Bhumireddy, Rajiv Chalasani, Mukund Sai Vikram Tyagadurgam, Venkataswamy Naidu Gangineni, Sriram Pabbineedi. (2025) Big Data and Predictive Analytics for Customer Retention: Exploring the Role of Machine Learning in E-Commerce. International Journal of Computers, 10, 260-267
  48. Penmetsa, M., Bhumireddy, J.R., Chalasani, R., Vangala, S.R., Polam, R.M. and Kamarthapu, B. (2025) Effectiveness of Deep Learning Algorithms in Phishing Attack Detection for Cybersecurity Frameworks. Journal of Data Analysis and Information Processing, 13, 331-346. https://doi.org/10.4236/jdaip.2025.133021
  49. Prabakar, D., Iskandarova, N., Iskandarova, N., Kalla, D., Kulimova, K., & Parmar, D. (2025, May). Dynamic Resource Allocation in Cloud Computing Environments Using Hybrid Swarm Intelligence Algorithms. In 2025 International Conference on Networks and Cryptology (NETCRYPT) (pp. 882-886). IEEE.
  50. Nagaraju, S., Johri, P., Putta, P., Kalla, D., Polvanov, S., & Patel, N. V. (2025, May). Smart Routing in Urban Wireless Ad Hoc Networks Using Graph Attention Network-Based Decision Models. In 2025 International Conference on Networks and Cryptology (NETCRYPT) (pp. 212-216). IEEE.
  51. NR, A. R., Rajasri, T., Praveen, R., Kalla, D., Bendale, S. P., & Venu, N. (2025, April). CAC Training-A Unified Cybersecurity Training Program for Military Staff. In 2025 3rd International Conference on Communication, Security, and Artificial Intelligence (ICCSAI) (Vol. 3, pp. 569-573). IEEE.
  52. Kalla, D., Smith, N., & Samaah, F. (2025). Deep Learning-Based Sentiment Analysis: Enhancing IMDb Review Classification with LSTM Models. Available at SSRN 5103558.
  53. Sreeramulu, M. D., Mohammed, A. S., Kalla, D., Boddapati, N., & Natarajan, Y. (2024, September). AI-driven Dynamic Workload Balancing for Real-time Applications on Cloud Infrastructure. In 2024 7th International Conference on Contemporary Computing and Informatics (IC3I) (Vol. 7, pp. 1660-1665). IEEE.
  54. Kalla, D., & Samaah, F. (2023). Exploring Artificial Intelligence And Data-Driven Techniques For Anomaly Detection In Cloud Security. Available at SSRN 5045491.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks (WSNs) Smart IoT Data Aggregation Machine Learning Recursive Feature Elimination (RFE) Energy Efficiency