A Secure and Privacy-Preserving IoT Cybersecurity Framework Using Feature Selection and Ensemble Deep Learning for Smart City Applications

Authors

  • Samah Alzanin Department of Computer Science, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Kharj, Saudi Arabia
  • Mohammed Alonazi Department of Information Systems, College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Al-Kharj, Saudi Arabia
Volume: 16 | Issue: 2 | Pages: 33485-33491 | April 2026 | https://doi.org/10.48084/etasr.17472

Abstract

The rapid proliferation of Internet of Things (IoT) applications in recent years has played a significant role in the advancement of smart cities. Sustainable cities and communities are a main goal of the Sustainable Development Goal (SDG), which aims to make urban areas safe, resilient, and sustainable by 2030. Smart cities employ IoT-based technologies, communication systems, and intelligent applications to optimize operational efficiency and improve both service delivery and citizens’ quality of life. Cybersecurity has become a problematic issue in IoT environments, needing effective addressing of the persistent cyberthreats. Intrusion Detection Systems (IDSs) are required to protect data, and the utilization of Artificial Intelligence (AI) subfields such as Machine Learning (ML) and Deep Learning (DL) is proven to be among the most effective solutions. In this paper, an Artificial Intelligence-Driven Cybersecurity Detection using Ensemble Models (AIDCD-EM) framework in smart city applications is proposed. Initially, the Z-score normalization is used for data normalization. For dimensionality reduction, the AIDCD-EM utilizes the enhanced Mutual Information Feature Selection (MIFS) method and an ensemble classification comprising the Bi-directional Gated Recurrent Unit (BiGRU), autoencoder (AE), and Graph Convolutional Networks (GCNs), is utilized for cyberattack classification. The experimental valuation of the AIDCD-EM model highlighted superior accuracy values of 99.60% and 99.55% when investigated under the ToN-IoT and Edge-IIoT datasets.

Keywords:

artificial intelligence, smart city, cybersecurity, internet of things, ensemble models, mutual information

Downloads

Download data is not yet available.

References

T. V. Hoang, "Impact of Integrated Artificial Intelligence and Internet of Things Technologies on Smart City Transformation," Journal of Technical Education Science, vol. 19, no. Special Issue 01, pp. 64–73, Feb. 2024. DOI: https://doi.org/10.54644/jte.2024.1532

U. Chatterjee, G. S. Bhunia, D. Mahata, and U. Singh, "Smart Cities and Their Role in Enhancing Quality of Life," in Quality of Life, CRC Press, 2021, pp. 127–143. DOI: https://doi.org/10.1201/9781003009139-8

M. Kalinin, V. Krundyshev, and P. Zegzhda, "Cybersecurity Risk Assessment in Smart City Infrastructures," Machines, vol. 9, no. 4, Apr. 2021, Art. no. 78. DOI: https://doi.org/10.3390/machines9040078

T. Nishitha and A. Khare, "Smart Contract-Enhanced Residual GRU with Merkle-Damgard Cryptography for IoT Attack Detection," Engineering, Technology & Applied Science Research, vol. 15, no. 1, pp. 19331–19336, Feb. 2025. DOI: https://doi.org/10.48084/etasr.8860

V. Baladari, "Adaptive Cybersecurity Strategies: Mitigating Cyber Threats and Protecting Data Privacy," Journal of Scientific and Engineering Research, vol. 7, no. 8, pp. 279–288, Dec. 2020.

K. Thakur, "Analysis of Denial of Services (DOS) Attacks and Prevention Techniques," International Journal of Engineering Research & Technology, vol. 4, no. 7, Jul. 2015.

R. H. Ali, S. F. M. Alazawy, A. Mustafa, and K. R. Erzaij, "Smart City Feasibility Study using IoT and Machine Learning," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 17494–17500, Oct. 2024. DOI: https://doi.org/10.48084/etasr.8714

C. P. Singh, R. Yamaganti, and L. S. Umrao, "A privacy-preserving and secure framework using blockchain-based quantum-inspired complex convolutional neural network for IoT-driven smart cities," Peer-to-Peer Networking and Applications, vol. 19, no. 1, Nov. 2025, Art. no. 3. DOI: https://doi.org/10.1007/s12083-025-02168-5

T.-T.-H. Le, H. Kim, H. Kang, and H. Kim, "Classification and Explanation for Intrusion Detection System Based on Ensemble Trees and SHAP Method," Sensors, vol. 22, no. 3, Feb. 2022. DOI: https://doi.org/10.3390/s22031154

T. Hasan, A. Hossain, M. Ansari, and T. Syed, "Enhanced Intrusion Detection in IIoT Networks: A Lightweight Approach with Autoencoder-Based Feature Learning," in 10th International Conference on Internet of Things, Big Data and Security, Mar. 2026, pp. 207–214. DOI: https://doi.org/10.5220/0013203700003944

P. M. Kumar, B. P. Kavin, A. Jagathpally, and T. Shahwar, "Transforming the cybersecurity space of healthcare IoT devices using Deep Learning," in 2025 IEEE 4th International Conference on AI in Cybersecurity (ICAIC), Houston, TX, USA, Oct. 2025, pp. 1–6. DOI: https://doi.org/10.1109/ICAIC63015.2025.10849305

L. A. Maghrabi et al., "Enhancing Cybersecurity in the Internet of Things Environment Using Bald Eagle Search Optimization With Hybrid Deep Learning," IEEE Access, vol. 12, pp. 8337–8345, 2024. DOI: https://doi.org/10.1109/ACCESS.2024.3352568

A. Bensaoud and J. Kalita, "Optimized detection of cyber-attacks on IoT networks via hybrid deep learning models," Ad Hoc Networks, vol. 170, Apr. 2025, Art. no. 103770. DOI: https://doi.org/10.1016/j.adhoc.2025.103770

H. Gonaygunta, G. S. Nadella, P. Pramod Pawar, and D. Kumar, "Enhancing Cybersecurity: The Development of a Flexible Deep Learning Model for Enhanced Anomaly Detection," in 2024 Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, USA, Feb. 2024, pp. 79–84. DOI: https://doi.org/10.1109/SIEDS61124.2024.10534661

H. Alamro et al., "Mathematical modelling-based blockchain with attention deep learning model for cybersecurity in IoT-consumer electronics," Alexandria Engineering Journal, vol. 113, pp. 366–377, Feb. 2025. DOI: https://doi.org/10.1016/j.aej.2024.11.016

V. Jaganraja and R. Srinivasan, "An agile solution for enhancing cybersecurity attack detection using deep learning privacy-preservation in IoT-smart city," Wireless Networks, vol. 31, no. 3, pp. 2227–2242, Mar. 2025. DOI: https://doi.org/10.1007/s11276-024-03876-1

F. A. F. Alrslani et al., "Enhancing cybersecurity via attribute reduction with deep learning model for false data injection attack recognition," Scientific Reports, vol. 15, no. 1, Jan. 2025, Art. no. 3944. DOI: https://doi.org/10.1038/s41598-024-82566-6

W. Villegas-Ch, J. Govea, and A. Jaramillo-Alcazar, "IoT Anomaly Detection to Strengthen Cybersecurity in the Critical Infrastructure of Smart Cities," Applied Sciences, vol. 13, no. 19, Oct. 2023, Art. no. 10977. DOI: https://doi.org/10.3390/app131910977

C. E. Shannon, "A mathematical theory of communication," Bell System Technical Journal, vol. 27, no. 3, pp. 379–423, and vol. 27, no. 4, pp. 623–656, 1948. DOI: https://doi.org/10.1002/j.1538-7305.1948.tb00917.x

K. Cho et al., "Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation," in Proceedings of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP), Doha, Qatar, Jul. 2014, pp. 1724–1734. DOI: https://doi.org/10.3115/v1/D14-1179

D. E. Rumelhart and J. L. McClelland, "Learning Internal Representations by Error Propagation," in Parallel Distributed Processing: Explorations in the Microstructure of Cognition: Foundations, Cambridge, MA, USA: MIT Press, 1987, pp. 318–362. DOI: https://doi.org/10.7551/mitpress/4943.003.0128

T. N. Kipf and M. Welling, "Semi-Supervised Classification with Graph Convolutional Networks." arXiv, Feb. 22, 2017.

M. Sarhan, S. Layeghy, and & M. Portmann"CIC-ToN-IoT." 2023, [Online]. Available: https://www.kaggle.com/datasets/dhoogla/cictoniot.

M. A. Ferrag, "Edge-IIoTset Cyber Security Dataset of IoT & IIoT." [Online]. Available: https://www.kaggle.com/datasets/mohamedamineferrag/edgeiiotset-cyber-security-dataset-of-iot-iiot.

S. Srivastav, A. K. Shukla, S. Kumar, and P. K. Muhuri, "HYRIDE: HYbrid and Robust Intrusion DEtection approach for enhancing cybersecurity in Industry 4.0," Internet of Things, vol. 30, Mar. 2025, Art. no. 101492. DOI: https://doi.org/10.1016/j.iot.2025.101492

M. A. Alkhonaini et al., "Sandpiper optimization with hybrid deep learning model for blockchain-assisted intrusion detection in iot environment," Alexandria Engineering Journal, vol. 112, pp. 49–62, Jan. 2025. DOI: https://doi.org/10.1016/j.aej.2024.10.032

Downloads

How to Cite

[1]
S. Alzanin and M. Alonazi, “A Secure and Privacy-Preserving IoT Cybersecurity Framework Using Feature Selection and Ensemble Deep Learning for Smart City Applications”, Eng. Technol. Appl. Sci. Res., vol. 16, no. 2, pp. 33485–33491, Apr. 2026.

Metrics

Abstract Views: 91
PDF Downloads: 79

Metrics Information