This case study is based on the work done by Baig et al.  for developing an online security scheme for the WSN. In this study, the simple GN algorithm for pattern-recognition has been used to detect the DDoS attack in WSNs. In this scheme, each network node also acts as the GN node within the WSN. The scheme shows that the GN algorithm provides an energy-efficient mechanism for attack pattern detection within the WSN.
In this approach, the GN enables the network to process its internal traffic flow patterns in real-time through a process similar to human introspection using very little energy. The GN algorithm is implemented using an energy-efficient scheme, which uses partial updating of patterns within the network for energy conservation. The threat detection scheme is implemented in five stages and is designed for DDoS, which commonly occur within the WSNs: