Intrusion Detection System Fog Security Model for the Smart Cities and Urban Sensing
DOI:
https://doi.org/10.69996/jsihs.2023005Keywords:
Smart cities, internet of things (iot), intrusion detection system (ids), fog computing, securityAbstract
In smart cities, Intrusion Detection Systems (IDS) play a critical role in enhancing cybersecurity and safeguarding the interconnected network of devices and systems. Smart cities leverage various technologies, such as the Internet of Things (IoT), sensors, and communication networks, to optimize urban services and improve overall efficiency. However, this increased connectivity also introduces vulnerabilities that could be exploited by malicious actors. This paper presents a thorough exploration of contemporary developments in the domains of security and optimization within the context of smart cities. The rapid integration of Internet of Things (IoT) devices and technologies in urban environments necessitates robust security frameworks and efficient resource management strategies. The paper begins by scrutinizing Intrusion Detection Systems (IDS) tailored for smart city networks, evaluating their efficacy in mitigating diverse cyber threats. Novel approaches, such as Anomaly Detection and Firewall systems, are analyzed alongside traditional IDS, providing a comprehensive overview of the security landscape. In parallel, the paper introduces innovative clustering techniques, with a focus on the proposed Flora Optimization Weighted Clustering (FOWC) model. Inspired by biological growth mechanisms, FOWC presents a unique paradigm for optimizing sensor placements in smart cities. A comparative analysis with existing clustering algorithms like LEACH and Genetic Algorithm underscores FOWC’s superior performance in terms of Detection Rate, Precision, Recall, and F1 Score, positioning it as a promising solution for urban sensor network optimization. Beyond security and optimization, the paper addresses broader challenges in the realm of smart cities, including secure IoT applications, intrusion detection for IoT-enabled environments, and the integration of artificial intelligence for enhanced cyber defense. The research studies presented collectively contribute to a comprehensive understanding of the evolving landscape of smart cities, offering insights with practical implications for policymakers, urban planners, and technologists.
References
[1] E.M. Onyema, S.Dalal, C.A.T. Romero, B. Seth, B, P. Young et al., “Design of intrusion detection system based on cyborg intelligence for security of cloud network traffic of smart cities,” Journal of Cloud Computing, vol.11, no.1, pp.1-20, 2022.
[2] V.Chang, L.Golightly, P. Modesti, Q. A. Xu, L.M.T. Doan et al., “A survey on intrusion detection systems for fog and cloud computing,” Future Internet, vol.14, no. 3, pp.89, 2022.
[3] C. Hazman, A. Guezzaz, S. Benkirane and M. Azrour. “lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning,” Cluster Computing, vol. 26, no.6, pp. 4069-4083, 2023.
[4] L.A. Ajao and S. T. Apeh. “Secure fog computing vulnerability in smart city using machine learning and blockchain technology,” networks, vol. 20, no. 23, 2023.
[5] O. Bukhari, P. Agarwal, D. Koundal and S. Zafar, “Anomaly detection using ensemble techniques for boosting the security of intrusion detection system,” Procedia Computer Science, vol.218, pp.1003-1013, 2023.
[6] D. Rangelov, P. Lämmel, L. Brunzel, S. Borgert and M. Boerger, “Towards an integrated methodology and toolchain for machine learning-based intrusion detection in urban iot networks and platforms,” Future Internet, vol.15, no.3, pp. 98, 2023.
[7] E.S.Babu, B.K.N. Srinivasa Rao, S.R. Nayak, A. Verma, F. Alqahtani et al., “Blockchain-based intrusion detection system of iot urban data with device authentication against ddos attacks,” Computers and Electrical Engineering, vol.103, no.108287, 2022.
[8] M.Y. Ayub, U. Haider, A. Haider and A. Basit, “An intelligent machine learning based intrusion detection system (ids) for smart cities networks,” EAI Endorsed Transactions on Smart Cities, vol.7, no.1, pp. e4-e4, 2023.
[9] F.S. Alrayes, M.M. Asiri, M. Maashi, A.S. Salama, M.A.Hamza et al., “Intrusion detection using chaotic poor and rich optimization with deep learning model for smart city environment,” Sustainability, vol.15, no.8, pp.6902, 2023.
[10] A. Chakraborty, M. Kumar and N. Chaurasia, “Secure framework for iot applications using deep learning in fog computing,” Journal of Information Security and Applications, vol.77, pp.103569, 2023.
[11] M. Hamdan, A.M. Eldhai, S.Abdelsalam, K. Ullah and D.M. Batista, “A two-tier anomaly-based intrusion detection approach for iot-enabled smart cities,” In IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hoboken, NJ, USA, pp. 1-7, 2023.
[12] T. Saba, A.R. Khan, T. Sadad and S.P. Hong, “Securing the IoT system of smart city against cyber threats using deep learning,” Discrete Dynamics in Nature and Society, vol.2022, 2022.
[13] M.M. Almasri and A.M. Alajlan, “A novel cascaded anfis based deep reinforcement learning for the detection of attack in cloud iot based smart city applications,” Concurrency and Computation: Practice and Experience, vol.35, no.22, pp.e7738, 2023.
[14] M.P. Kantipudi, R. Aluvalu and S. Velamuri, S. “An intelligent approach of intrusion detection in mobile crowd sourcing systems in the context of iot based smart city,” Smart Science, vol. 11, no.1, pp.234-240, 2023.
[15] W.B. Daoud and S. Mahfoudhi, “SIMAD: secure intelligent method for iot-fog environments attacks detection,” Computers, Materials & Continua, vol.70, no.2, 2021.
[16] I.A.T. Hashem, R.S.A. Usmani, M.S.Almutairi, A.O. Ibrahim, A. Zakari et al., “Urban computing for sustainable smart cities: recent advances, taxonomy, and open research challenges,” Sustainability, vol.15, no.5, pp.3916, 2023.
[17] E. Ntizikira, W. Lei, F. Alblehai, K.Saleem and M.A. Lodhi, “Secure and privacy-preserving intrusion detection and prevention in the internet of unmanned aerial vehicles,” Sensors, vol.23, no.19 pp.8077, 2023.
[18] Y. Jia, Z. Gu, L. Du, Y. Long, Y. Wang et al., “Artificial intelligence enabled cyber security defense for smart cities: a novel attack detection framework based on the mdata model,” Knowledge-Based Systems, vol. 276, pp.110781, 2023.
[19] P.M. Rao and B.D. Deebak, “Security and privacy issues in smart cities/industries: technologies, applications, and challenges,” Journal of Ambient Intelligence and Humanized Computing, pp.1-37, 2022.
[20] A. Rehman, K. Haseeb, T. Alam, F.S. Alamri, T. Saba et al., “Intelligent secured traffic optimization model for urban sensing applications with software defined network,” IEEE Sensors Journal, vol.1,no.1, pp.99, 2023.
[21] H. Ali, O.M. Elzeki and S. Elmougy, “Smart attacks learning machine advisor system for protecting smart cities from smart threats,” Applied Sciences, vol. 12, no.13, pp. 6473, 2022.
[22] A. Paranjothi and M. Atiquzzaman, “A statistical approach for enhancing security in vanets with efficient rogue node detection using fog computing,” Digital Communications and Networks, vol.8, no. 5, pp.814-824, 2022.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Sensors, IoT & Health Sciences (JSIHS,ISSN: 2584-2560)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Fringe Global Scientific Press publishes all the papers under a Creative Commons Attribution-Non-Commercial 4.0 International (CC BY-NC 4.0) (https://creativecommons.org/licenses/by-nc/4.0/) license. Authors have the liberty to replicate and distribute their work. Authors have the ability to use either the whole or a portion of their piece in compilations or other publications that include their own work. Please see the licensing terms for more information on reusing the work.