Abstract
With the increasing deployment of Internet of Things (IoT) devices in Smart Cities, ensuring the security and integrity of these systems is of paramount importance. This study focuses on the detection of anomalies and prevention of security attacks in Smart City environments, specifically in the context of traffic management. We compare the performance of three machine learning algorithms, namely logistic boosted algorithms, random forest, and support vector machines, using a dataset collected from various Smart City devices. Through comprehensive evaluation metrics such as accuracy, precision, recall, and F1 score, we analyze the efficacy of each algorithm. Our results indicate that the logistic boosted algorithm outperforms the other approaches in accurately identifying data outliers and achieving high performance across all evaluation metrics. Notably, it excels in handling imbalanced datasets and leveraging ensemble methods to enhance overall performance. While the random forest algorithm demonstrates exceptional performance in all metrics, the support vector machines approach exhibits superior recall but comparatively lower accuracy, precision, and F1 score. Moreover, the logistic boosted method showcases fewer misclassifications in the confusion matrices, making it highly effective for anomaly detection. The area under the ROC curve is highest for the logistic boosted algorithm (0.98), further emphasizing its effectiveness in filtering out anomalies. The random forest algorithm achieves the highest area under the curve (0.982), while the support vector machines method shows the lowest (0.968). Based on our findings, we conclude that the logistic boosted algorithm is the most effective for monitoring Smart City systems, followed by the random forest approach. However, the support vector machines method can be a viable alternative if recall is the primary performance metric of concern. Future research can focus on comparing the efficacy of different machine learning approaches for anomaly detection in Smart City environments and exploring the impact of unique dataset properties on algorithm performance. Additionally, exploring the potential of deep learning algorithms for traffic anomaly detection in Smart City systems could be a promising area of study. This study contributes to the advancement of state-of-the-art anomaly detection algorithms for ensuring the security and efficiency of Smart City applications.












Similar content being viewed by others
Data Availability
The author used data to support the findings of this study that is included in this article.
References
Sreedharan S, Rakesh N. Securitization of Smart City network using dynamic authentication. Singapore: Springer; 2019.
Chandak MB. Natural language processing based context sensitive, content specific architecture & its speech based implementation for Smart city applications. Int J Smart Home. 2010;4(2):1–10.
Guven CT, Acı M. Design and implementation of a self-learner Smart city system using machine learning algorithms. Inf Technol Control. 2022;51(3):545–62. https://doi.org/10.5755/j01.itc.51.3.31273.
Hameed M, Yang F, Ghafoor MI, Jaskani FH, Islam U, Fayaz M, Mehmood G. IOTA-based mobile crowd sensing: detection of fake sensing using logit-boosted machine learning algorithms. Wireless Commun Mob Comput. 2022;2022:15. https://doi.org/10.1155/2022/6274114.
Rahman Z, Yi X, Billah M, Sumi M, Anwar A. Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based Smart city. Electronics. 2022. https://doi.org/10.3390/electronics11071083.
Ruano A, Hernandez A, Ureña J, Ruano M, Garcia J. NILM techniques for intelligent city energy management and ambient assisted living : a review”. Energies. 2019. https://doi.org/10.3390/en12112203.
Alshammari T, Alshammari N, Sedky M, Howard C. Evaluating machine learning techniques for activity classification in Smart city environments. Int J Inf Commun Eng. 2018;12(February):72–8.
Horyachyy O. Comparison of wireless communication technologies used in a smart city: analysis of wireless sensor node based on Arduino in home automation scenario. Faculty of computing blekinge institute of technology, master’s dissertation. 2017.
Khare S and Totaro M. Ensemble learning for detecting attacks and anomalies in IoT Smart city. In: Proceeding—2020 3rd International Conference on Data Intelligence and Secure. ICDIS 2020, 2020; pp. 56–63. https://doi.org/10.1109/ICDIS50059.2020.00014.
Kotsiopoulos T, Sarigiannidis P, Ioannidis D. Machine learning and deep learning in smart manufacturing: the smart grid paradigm. Comput Sci Rev. 2021;40: 100341. https://doi.org/10.1016/j.cosrev.2020.100341.
Xu H, He Y, Sun X, He J, Xu Q. Prediction of thermal energy inside smart Cities using IoT and classifier ensemble techniques. Comput Commun. 2020;151:581–9. https://doi.org/10.1016/j.comcom.2019.12.020.
Jethanandani M, Sharma A, Perumal T. Internet of Things Multi-label classification based ensemble learning for human activity recognition in smart City. Internet of Things. 2020;12: 100324. https://doi.org/10.1016/j.iot.2020.100324.
Sarker IH. CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things (Netherlands). 2021;14: 100393. https://doi.org/10.1016/j.iot.2021.100393.
Karun D, et al. Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment. J Inf Secur Appl. 2021;60(1): 102866. https://doi.org/10.1016/j.jisa.2021.102866.
Iqbal Z, Imran A, Yasin AU, Alvi A. Denial of service (DoS) defences against adversarial attacks in IoT Smart city networks using machine learning methods. NUST J Eng Sci. 2022;15(1):18–25.
Barbosa N, Park JS, Yao Y, Wang Y. ‘what if?’ predicting individual users’ smart city privacy preferences and their changes. Proceedings on Privacy Enhancing Technologies Symposium. 2019;211–31. https://doi.org/10.2478/popets-2019-0066.
Lombardo L and Conoscenti MCC. Binary logistic regression versus stochastic gradient boosted decision trees in assessing landslide susceptibility for multiple-occurring landslide events: application to the 2009 storm event in Messina (Sicily, southern Italy). 2015; pp. 1621–48. https://doi.org/10.1007/s11069-015-1915-3.
Li X, Ghodosi H, Chen C, Sankupellay M, Lee I. Improving network-based anomaly detection in smart home environment. Sens. 2022;22(15):5626. https://doi.org/10.3390/s22155626.
Zhou Y, Liu Y, Hu S, Member S. Smart city cyberattack detection framework for sponsor. EEE Trans Smart Grid. 2017;3053(c):1–11. https://doi.org/10.1109/TSG.2017.2781695.
Augusto-Gonzalez J et al. From internet of threats to internet of things: A cyber security architecture for smart Cities. In: IEEE International Workshop on Computer Aided Modeling and Design of Communication. Links Networks, CAMAD, vol. 2019-Septe, 2019. https://doi.org/10.1109/CAMAD.2019.8858493.
Gordon H, Batula C, Tushir B, Dezfouli B and Liu Y. Securing smart Cities via software-defined networking and low-cost traffic classification. In: Proc. - 2021 IEEE 45th Annual Computers, Software, and Applications Conference COMPSAC 2021, 2021; pp. 1049–57. https://doi.org/10.1109/COMPSAC51774.2021.00143.
Elsaid M, Altuwaijri S, Aljammaz N, Ara A. Design and analysis of secure Smart city for elderly people. Int J Distrib Parallel Syst. 2019;10(6):1–13. https://doi.org/10.5121/ijdps.2019.10601.
Mantas G, Lymberopoulos D, Komninos N. Security in Smart city environment. Wirel Technol Ambient Assist Living Healthc Syst Appl. 2010. https://doi.org/10.4018/978-1-61520-805-0.ch010.
de Melo PHAD, Miani RS, Rosa PF. FamilyGuard: a security architecture for traffic anomaly detection in city networks. Sensors. 2022. https://doi.org/10.3390/s22082895.
Yang J, Sun L. A comprehensive survey of security issues of Smart city system: ‘Spear’ and ‘Shields’, theory and practice. IEEE Access. 2022;10(November):124167–92. https://doi.org/10.1109/ACCESS.2022.3224806.
Chatterjee A, Ahmed BS. IoT traffic anomaly detection methods and applications: a survey. Internet Things (Netherlands). 2022;19(June): 100568. https://doi.org/10.1016/j.iot.2022.100568.
Dahmen J, Cook DJ, Wang X, Honglei W. Smart secure Cities : a survey of smart City technologies that sense, assess, and respond to security threats. J Reliab Intell Environ. 2017. https://doi.org/10.1007/s40860-017-0035-0.
Haar C, Buchmann E. Securing smart cities using intrusion detection systems securing smart cities using intrusion detection systems. SECUEWARE 2020: the fourteenth international conference on emerging security information, systems and technologies. 2020.
Nassiri Abrishamchi MA, Zainal A, Ghaleb FA, Qasem SN, Albarrak AM. Smart city privacy protection methods against a passive wireless snooping side-channel attack. Sensors. 2022;22(21):1–21. https://doi.org/10.3390/s22218564.
Abudalfa S, Bouchard K. Two-stage RFID approach for localizing objects in smart Cities based on gradient boosted decision trees with under- and over-sampling. J Reliab Intell Environ. 2023. https://doi.org/10.1007/s40860-022-00199-w.
Ramana K, et al. A vision transformer approach for traffic congestion prediction in urban areas. IEEE Trans Intell Transp Syst. 2023;24(4):3922–34. https://doi.org/10.1109/TITS.2022.3233801.
Ramasamy LK, Khan F, Shah M, Siva-Prasad BVV, Iwendi C, Biamba C. Secure smart wearable computing through artificial intelligence-enabled internet of things and cyber-physical systems for health monitoring. Sensors. 2022;22(3):1076. https://doi.org/10.3390/s22031076.
Iwendi C, Wang G-G. Combined power generation and electricity storage device using deep learning and internet of things technologies. Energy Rep. 2022;8:5016–25. https://doi.org/10.1016/j.egyr.2022.02.304. (ISSN 2352-4847).
Hameed M, et al. IOTA-based mobile crowd sensing: detection of fake sensing using logit-boosted machine learning algorithms. Wirel Commun Mob Comput. 2022. https://doi.org/10.1155/2022/6274114.
Ghani MU, Alam TM and Jaskani FH. Comparison of classification models for early prediction of breast cancer. In: 3rd International Conference on Innovations in Computing. ICIC 2019, no. Icic, 2019. https://doi.org/10.1109/ICIC48496.2019.8966691.
Mohanty SP, Choppali U, Kougianos E. Everything you wanted to know about smart cities: the Internet of things is the backbone. IEEE Consum Electron Magaz. 2016;5(3):60–70. https://doi.org/10.1109/MCE.2016.2556879.
Funding
The author received no specific funding for this study.
Author information
Authors and Affiliations
Contributions
Conceptualization: Abdullah A. Al-Atawi; Methodology: Abdullah A. Al-Atawi; Software: Abdullah A. Al-Atawi; Formal analysis: Abdullah A. Al-Atawi; Resources: Abdullah A. Al-Atawi; Writing—review and editing: Abdullah A. Al-Atawi; Funding acquisition: Abdullah A. Al-Atawi.
Corresponding author
Ethics declarations
Conflict of Interest
The author declare that there are no conflicts of interest regarding the publication of this research paper. The research was conducted in an unbiased manner, and there are no financial or personal relationships that could have influenced the findings or interpretations presented herein.
Research Involving Human Participants and/or Animals
This research study solely involves the use of historical datasets. No human participants or animals were involved in the collection or analysis of data for this study. As a result, ethical approval was not required.
Informed Consent
Since this research study did not involve human participants or animals, there were no informed consent procedures conducted. The data used for analysis was publicly available data that does not require informed consent. The author affirm their commitment to conducting research in accordance with the highest ethical standards and ensuring the accuracy, transparency, and reliability of the presented findings.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Al-Atawi, A.A. Enhancing Internet of Smart City Security: Utilizing Logistic Boosted Algorithms for Anomaly Detection and Cyberattack Prevention. SN COMPUT. SCI. 5, 548 (2024). https://doi.org/10.1007/s42979-024-02921-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-024-02921-2