Skip to main content

Advertisement

Log in

Enhancing Internet of Smart City Security: Utilizing Logistic Boosted Algorithms for Anomaly Detection and Cyberattack Prevention

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

With the increasing deployment of Internet of Things (IoT) devices in Smart Cities, ensuring the security and integrity of these systems is of paramount importance. This study focuses on the detection of anomalies and prevention of security attacks in Smart City environments, specifically in the context of traffic management. We compare the performance of three machine learning algorithms, namely logistic boosted algorithms, random forest, and support vector machines, using a dataset collected from various Smart City devices. Through comprehensive evaluation metrics such as accuracy, precision, recall, and F1 score, we analyze the efficacy of each algorithm. Our results indicate that the logistic boosted algorithm outperforms the other approaches in accurately identifying data outliers and achieving high performance across all evaluation metrics. Notably, it excels in handling imbalanced datasets and leveraging ensemble methods to enhance overall performance. While the random forest algorithm demonstrates exceptional performance in all metrics, the support vector machines approach exhibits superior recall but comparatively lower accuracy, precision, and F1 score. Moreover, the logistic boosted method showcases fewer misclassifications in the confusion matrices, making it highly effective for anomaly detection. The area under the ROC curve is highest for the logistic boosted algorithm (0.98), further emphasizing its effectiveness in filtering out anomalies. The random forest algorithm achieves the highest area under the curve (0.982), while the support vector machines method shows the lowest (0.968). Based on our findings, we conclude that the logistic boosted algorithm is the most effective for monitoring Smart City systems, followed by the random forest approach. However, the support vector machines method can be a viable alternative if recall is the primary performance metric of concern. Future research can focus on comparing the efficacy of different machine learning approaches for anomaly detection in Smart City environments and exploring the impact of unique dataset properties on algorithm performance. Additionally, exploring the potential of deep learning algorithms for traffic anomaly detection in Smart City systems could be a promising area of study. This study contributes to the advancement of state-of-the-art anomaly detection algorithms for ensuring the security and efficiency of Smart City applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Data Availability

The author used data to support the findings of this study that is included in this article.

References

  1. Sreedharan S, Rakesh N. Securitization of Smart City network using dynamic authentication. Singapore: Springer; 2019.

    Google Scholar 

  2. Chandak MB. Natural language processing based context sensitive, content specific architecture & its speech based implementation for Smart city applications. Int J Smart Home. 2010;4(2):1–10.

    Google Scholar 

  3. Guven CT, Acı M. Design and implementation of a self-learner Smart city system using machine learning algorithms. Inf Technol Control. 2022;51(3):545–62. https://doi.org/10.5755/j01.itc.51.3.31273.

    Article  Google Scholar 

  4. Hameed M, Yang F, Ghafoor MI, Jaskani FH, Islam U, Fayaz M, Mehmood G. IOTA-based mobile crowd sensing: detection of fake sensing using logit-boosted machine learning algorithms. Wireless Commun Mob Comput. 2022;2022:15. https://doi.org/10.1155/2022/6274114.

    Article  Google Scholar 

  5. Rahman Z, Yi X, Billah M, Sumi M, Anwar A. Enhancing AES using chaos and logistic map-based key generation technique for securing IoT-based Smart city. Electronics. 2022. https://doi.org/10.3390/electronics11071083.

    Article  Google Scholar 

  6. Ruano A, Hernandez A, Ureña J, Ruano M, Garcia J. NILM techniques for intelligent city energy management and ambient assisted living : a review”. Energies. 2019. https://doi.org/10.3390/en12112203.

    Article  Google Scholar 

  7. Alshammari T, Alshammari N, Sedky M, Howard C. Evaluating machine learning techniques for activity classification in Smart city environments. Int J Inf Commun Eng. 2018;12(February):72–8.

    Google Scholar 

  8. Horyachyy O. Comparison of wireless communication technologies used in a smart city: analysis of wireless sensor node based on Arduino in home automation scenario. Faculty of computing blekinge institute of technology, master’s dissertation. 2017.

  9. Khare S and Totaro M. Ensemble learning for detecting attacks and anomalies in IoT Smart city. In: Proceeding—2020 3rd International Conference on Data Intelligence and Secure. ICDIS 2020, 2020; pp. 56–63. https://doi.org/10.1109/ICDIS50059.2020.00014.

  10. Kotsiopoulos T, Sarigiannidis P, Ioannidis D. Machine learning and deep learning in smart manufacturing: the smart grid paradigm. Comput Sci Rev. 2021;40: 100341. https://doi.org/10.1016/j.cosrev.2020.100341.

    Article  MathSciNet  Google Scholar 

  11. Xu H, He Y, Sun X, He J, Xu Q. Prediction of thermal energy inside smart Cities using IoT and classifier ensemble techniques. Comput Commun. 2020;151:581–9. https://doi.org/10.1016/j.comcom.2019.12.020.

    Article  Google Scholar 

  12. Jethanandani M, Sharma A, Perumal T. Internet of Things Multi-label classification based ensemble learning for human activity recognition in smart City. Internet of Things. 2020;12: 100324. https://doi.org/10.1016/j.iot.2020.100324.

    Article  Google Scholar 

  13. Sarker IH. CyberLearning: effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks. Internet Things (Netherlands). 2021;14: 100393. https://doi.org/10.1016/j.iot.2021.100393.

    Article  Google Scholar 

  14. Karun D, et al. Exact greedy algorithm based split finding approach for intrusion detection in fog-enabled IoT environment. J Inf Secur Appl. 2021;60(1): 102866. https://doi.org/10.1016/j.jisa.2021.102866.

    Article  Google Scholar 

  15. Iqbal Z, Imran A, Yasin AU, Alvi A. Denial of service (DoS) defences against adversarial attacks in IoT Smart city networks using machine learning methods. NUST J Eng Sci. 2022;15(1):18–25.

    Article  Google Scholar 

  16. Barbosa N, Park JS, Yao Y, Wang Y. ‘what if?’ predicting individual users’ smart city privacy preferences and their changes. Proceedings on Privacy Enhancing Technologies Symposium. 2019;211–31. https://doi.org/10.2478/popets-2019-0066.

    Article  Google Scholar 

  17. Lombardo L and Conoscenti MCC. Binary logistic regression versus stochastic gradient boosted decision trees in assessing landslide susceptibility for multiple-occurring landslide events: application to the 2009 storm event in Messina (Sicily, southern Italy). 2015; pp. 1621–48. https://doi.org/10.1007/s11069-015-1915-3.

  18. Li X, Ghodosi H, Chen C, Sankupellay M, Lee I. Improving network-based anomaly detection in smart home environment. Sens. 2022;22(15):5626. https://doi.org/10.3390/s22155626.

    Article  Google Scholar 

  19. Zhou Y, Liu Y, Hu S, Member S. Smart city cyberattack detection framework for sponsor. EEE Trans Smart Grid. 2017;3053(c):1–11. https://doi.org/10.1109/TSG.2017.2781695.

    Article  Google Scholar 

  20. Augusto-Gonzalez J et al. From internet of threats to internet of things: A cyber security architecture for smart Cities. In: IEEE International Workshop on Computer Aided Modeling and Design of Communication. Links Networks, CAMAD, vol. 2019-Septe, 2019. https://doi.org/10.1109/CAMAD.2019.8858493.

  21. Gordon H, Batula C, Tushir B, Dezfouli B and Liu Y. Securing smart Cities via software-defined networking and low-cost traffic classification. In: Proc. - 2021 IEEE 45th Annual Computers, Software, and Applications Conference COMPSAC 2021, 2021; pp. 1049–57. https://doi.org/10.1109/COMPSAC51774.2021.00143.

  22. Elsaid M, Altuwaijri S, Aljammaz N, Ara A. Design and analysis of secure Smart city for elderly people. Int J Distrib Parallel Syst. 2019;10(6):1–13. https://doi.org/10.5121/ijdps.2019.10601.

    Article  Google Scholar 

  23. Mantas G, Lymberopoulos D, Komninos N. Security in Smart city environment. Wirel Technol Ambient Assist Living Healthc Syst Appl. 2010. https://doi.org/10.4018/978-1-61520-805-0.ch010.

    Article  Google Scholar 

  24. de Melo PHAD, Miani RS, Rosa PF. FamilyGuard: a security architecture for traffic anomaly detection in city networks. Sensors. 2022. https://doi.org/10.3390/s22082895.

    Article  Google Scholar 

  25. Yang J, Sun L. A comprehensive survey of security issues of Smart city system: ‘Spear’ and ‘Shields’, theory and practice. IEEE Access. 2022;10(November):124167–92. https://doi.org/10.1109/ACCESS.2022.3224806.

    Article  Google Scholar 

  26. Chatterjee A, Ahmed BS. IoT traffic anomaly detection methods and applications: a survey. Internet Things (Netherlands). 2022;19(June): 100568. https://doi.org/10.1016/j.iot.2022.100568.

    Article  Google Scholar 

  27. Dahmen J, Cook DJ, Wang X, Honglei W. Smart secure Cities : a survey of smart City technologies that sense, assess, and respond to security threats. J Reliab Intell Environ. 2017. https://doi.org/10.1007/s40860-017-0035-0.

    Article  Google Scholar 

  28. Haar C, Buchmann E. Securing smart cities using intrusion detection systems securing smart cities using intrusion detection systems. SECUEWARE 2020: the fourteenth international conference on emerging security information, systems and technologies. 2020.

    Google Scholar 

  29. Nassiri Abrishamchi MA, Zainal A, Ghaleb FA, Qasem SN, Albarrak AM. Smart city privacy protection methods against a passive wireless snooping side-channel attack. Sensors. 2022;22(21):1–21. https://doi.org/10.3390/s22218564.

    Article  Google Scholar 

  30. Abudalfa S, Bouchard K. Two-stage RFID approach for localizing objects in smart Cities based on gradient boosted decision trees with under- and over-sampling. J Reliab Intell Environ. 2023. https://doi.org/10.1007/s40860-022-00199-w.

    Article  Google Scholar 

  31. Ramana K, et al. A vision transformer approach for traffic congestion prediction in urban areas. IEEE Trans Intell Transp Syst. 2023;24(4):3922–34. https://doi.org/10.1109/TITS.2022.3233801.

    Article  Google Scholar 

  32. Ramasamy LK, Khan F, Shah M, Siva-Prasad BVV, Iwendi C, Biamba C. Secure smart wearable computing through artificial intelligence-enabled internet of things and cyber-physical systems for health monitoring. Sensors. 2022;22(3):1076. https://doi.org/10.3390/s22031076.

    Article  Google Scholar 

  33. Iwendi C, Wang G-G. Combined power generation and electricity storage device using deep learning and internet of things technologies. Energy Rep. 2022;8:5016–25. https://doi.org/10.1016/j.egyr.2022.02.304. (ISSN 2352-4847).

    Article  Google Scholar 

  34. Hameed M, et al. IOTA-based mobile crowd sensing: detection of fake sensing using logit-boosted machine learning algorithms. Wirel Commun Mob Comput. 2022. https://doi.org/10.1155/2022/6274114.

    Article  Google Scholar 

  35. Ghani MU, Alam TM and Jaskani FH. Comparison of classification models for early prediction of breast cancer. In: 3rd International Conference on Innovations in Computing. ICIC 2019, no. Icic, 2019. https://doi.org/10.1109/ICIC48496.2019.8966691.

  36. Mohanty SP, Choppali U, Kougianos E. Everything you wanted to know about smart cities: the Internet of things is the backbone. IEEE Consum Electron Magaz. 2016;5(3):60–70. https://doi.org/10.1109/MCE.2016.2556879.

    Article  Google Scholar 

Download references

Funding

The author received no specific funding for this study.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization: Abdullah A. Al-Atawi; Methodology: Abdullah A. Al-Atawi; Software: Abdullah A. Al-Atawi; Formal analysis: Abdullah A. Al-Atawi; Resources: Abdullah A. Al-Atawi; Writing—review and editing: Abdullah A. Al-Atawi; Funding acquisition: Abdullah A. Al-Atawi.

Corresponding author

Correspondence to Abdullah A. Al-Atawi.

Ethics declarations

Conflict of Interest

The author declare that there are no conflicts of interest regarding the publication of this research paper. The research was conducted in an unbiased manner, and there are no financial or personal relationships that could have influenced the findings or interpretations presented herein.

Research Involving Human Participants and/or Animals

This research study solely involves the use of historical datasets. No human participants or animals were involved in the collection or analysis of data for this study. As a result, ethical approval was not required.

Informed Consent

Since this research study did not involve human participants or animals, there were no informed consent procedures conducted. The data used for analysis was publicly available data that does not require informed consent. The author affirm their commitment to conducting research in accordance with the highest ethical standards and ensuring the accuracy, transparency, and reliability of the presented findings.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-Atawi, A.A. Enhancing Internet of Smart City Security: Utilizing Logistic Boosted Algorithms for Anomaly Detection and Cyberattack Prevention. SN COMPUT. SCI. 5, 548 (2024). https://doi.org/10.1007/s42979-024-02921-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-02921-2

Keywords

Navigation