A Secure and Privacy-Preserving IoT Cybersecurity Framework Using Feature Selection and Ensemble Deep Learning for Smart City Applications
Received: 11 January 2026 | Revised: 27 January 2026 | Accepted: 7 February 2026 | Online: 4 April 2026
Corresponding author: Samah Alzanin
Abstract
The rapid proliferation of Internet of Things (IoT) applications in recent years has played a significant role in the advancement of smart cities. Sustainable cities and communities are a main goal of the Sustainable Development Goal (SDG), which aims to make urban areas safe, resilient, and sustainable by 2030. Smart cities employ IoT-based technologies, communication systems, and intelligent applications to optimize operational efficiency and improve both service delivery and citizens’ quality of life. Cybersecurity has become a problematic issue in IoT environments, needing effective addressing of the persistent cyberthreats. Intrusion Detection Systems (IDSs) are required to protect data, and the utilization of Artificial Intelligence (AI) subfields such as Machine Learning (ML) and Deep Learning (DL) is proven to be among the most effective solutions. In this paper, an Artificial Intelligence-Driven Cybersecurity Detection using Ensemble Models (AIDCD-EM) framework in smart city applications is proposed. Initially, the Z-score normalization is used for data normalization. For dimensionality reduction, the AIDCD-EM utilizes the enhanced Mutual Information Feature Selection (MIFS) method and an ensemble classification comprising the Bi-directional Gated Recurrent Unit (BiGRU), autoencoder (AE), and Graph Convolutional Networks (GCNs), is utilized for cyberattack classification. The experimental valuation of the AIDCD-EM model highlighted superior accuracy values of 99.60% and 99.55% when investigated under the ToN-IoT and Edge-IIoT datasets.
Keywords:
artificial intelligence, smart city, cybersecurity, internet of things, ensemble models, mutual informationDownloads
References
T. V. Hoang, "Impact of Integrated Artificial Intelligence and Internet of Things Technologies on Smart City Transformation," Journal of Technical Education Science, vol. 19, no. Special Issue 01, pp. 64–73, Feb. 2024. DOI: https://doi.org/10.54644/jte.2024.1532
U. Chatterjee, G. S. Bhunia, D. Mahata, and U. Singh, "Smart Cities and Their Role in Enhancing Quality of Life," in Quality of Life, CRC Press, 2021, pp. 127–143. DOI: https://doi.org/10.1201/9781003009139-8
M. Kalinin, V. Krundyshev, and P. Zegzhda, "Cybersecurity Risk Assessment in Smart City Infrastructures," Machines, vol. 9, no. 4, Apr. 2021, Art. no. 78. DOI: https://doi.org/10.3390/machines9040078
T. Nishitha and A. Khare, "Smart Contract-Enhanced Residual GRU with Merkle-Damgard Cryptography for IoT Attack Detection," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19331–19336, Feb. 2025. DOI: https://doi.org/10.48084/etasr.8860
V. Baladari, "Adaptive Cybersecurity Strategies: Mitigating Cyber Threats and Protecting Data Privacy," Journal of Scientific and Engineering Research, vol. 7, no. 8, pp. 279–288, Dec. 2020.
K. Thakur, "Analysis of Denial of Services (DOS) Attacks and Prevention Techniques," International Journal of Engineering Research & Technology, vol. 4, no. 7, Jul. 2015.
R. H. Ali, S. F. M. Alazawy, A. Mustafa, and K. R. Erzaij, "Smart City Feasibility Study using IoT and Machine Learning," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 17494–17500, Oct. 2024. DOI: https://doi.org/10.48084/etasr.8714
C. P. Singh, R. Yamaganti, and L. S. Umrao, "A privacy-preserving and secure framework using blockchain-based quantum-inspired complex convolutional neural network for IoT-driven smart cities," Peer-to-Peer Networking and Applications, vol. 19, no. 1, Nov. 2025, Art. no. 3. DOI: https://doi.org/10.1007/s12083-025-02168-5
T.-T.-H. Le, H. Kim, H. Kang, and H. Kim, "Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method," Sensors, vol. 22, no. 3, Feb. 2022. DOI: https://doi.org/10.3390/s22031154
T. Hasan, A. Hossain, M. Ansari, and T. Syed, "Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning," in 10th International Conference on Internet of Things, Big Data and Security, Mar. 2026, pp. 207–214. DOI: https://doi.org/10.5220/0013203700003944
P. M. Kumar, B. P. Kavin, A. Jagathpally, and T. Shahwar, "Transforming the cybersecurity space of healthcare IoT devices using Deep Learning," in 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), Houston, TX, USA, Oct. 2025, pp. 1–6. DOI: https://doi.org/10.1109/ICAIC63015.2025.10849305
L. A. Maghrabi et al., "Enhancing Cybersecurity in the Internet of Things Environment Using Bald Eagle Search Optimization With Hybrid Deep Learning," IEEE Access, vol. 12, pp. 8337–8345, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3352568
A. Bensaoud and J. Kalita, "Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models," Ad Hoc Networks, vol. 170, Apr. 2025, Art. no. 103770. DOI: https://doi.org/10.1016/j.adhoc.2025.103770
H. Gonaygunta, G. S. Nadella, P. Pramod Pawar, and D. Kumar, "Enhancing Cybersecurity: The Development of a Flexible Deep Learning Model for Enhanced Anomaly Detection," in 2024 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA, Feb. 2024, pp. 79–84. DOI: https://doi.org/10.1109/SIEDS61124.2024.10534661
H. Alamro et al., "Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics," Alexandria Engineering Journal, vol. 113, pp. 366–377, Feb. 2025. DOI: https://doi.org/10.1016/j.aej.2024.11.016
V. Jaganraja and R. Srinivasan, "An agile solution for enhancing cybersecurity attack detection using deep learning privacy-preservation in IoT-smart city," Wireless Networks, vol. 31, no. 3, pp. 2227–2242, Mar. 2025. DOI: https://doi.org/10.1007/s11276-024-03876-1
F. A. F. Alrslani et al., "Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition," Scientific Reports, vol. 15, no. 1, Jan. 2025, Art. no. 3944. DOI: https://doi.org/10.1038/s41598-024-82566-6
W. Villegas-Ch, J. Govea, and A. Jaramillo-Alcazar, "IoT Anomaly Detection to Strengthen Cybersecurity in the Critical Infrastructure of Smart Cities," Applied Sciences, vol. 13, no. 19, Oct. 2023, Art. no. 10977. DOI: https://doi.org/10.3390/app131910977
C. E. Shannon, "A mathematical theory of communication," Bell System Technical Journal, vol. 27, no. 3, pp. 379–423, and vol. 27, no. 4, pp. 623–656, 1948. DOI: https://doi.org/10.1002/j.1538-7305.1948.tb00917.x
K. Cho et al., "Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation," in Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, Jul. 2014, pp. 1724–1734. DOI: https://doi.org/10.3115/v1/D14-1179
D. E. Rumelhart and J. L. McClelland, "Learning Internal Representations by Error Propagation," in Parallel Distributed Processing: Explorations in the Microstructure of Cognition: Foundations, Cambridge, MA, USA: MIT Press, 1987, pp. 318–362. DOI: https://doi.org/10.7551/mitpress/4943.003.0128
T. N. Kipf and M. Welling, "Semi-Supervised Classification with Graph Convolutional Networks." arXiv, Feb. 22, 2017.
M. Sarhan, S. Layeghy, and & M. Portmann"CIC-ToN-IoT." 2023, [Online]. Available: https://www.kaggle.com/datasets/dhoogla/cictoniot.
M. A. Ferrag, "Edge-IIoTset Cyber Security Dataset of IoT & IIoT." [Online]. Available: https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot.
S. Srivastav, A. K. Shukla, S. Kumar, and P. K. Muhuri, "HYRIDE: HYbrid and Robust Intrusion DEtection approach for enhancing cybersecurity in Industry 4.0," Internet of Things, vol. 30, Mar. 2025, Art. no. 101492. DOI: https://doi.org/10.1016/j.iot.2025.101492
M. A. Alkhonaini et al., "Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment," Alexandria Engineering Journal, vol. 112, pp. 49–62, Jan. 2025. DOI: https://doi.org/10.1016/j.aej.2024.10.032
Downloads
How to Cite
License
Copyright (c) 2026 Samah Alzanin, Mohammed Alonazi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
