Cover
Vol. 1 No. 2 (2025)

Published: December 1, 2025

Pages: 63-73

Original Article

A Hybrid Intrusion Detection Framework for CyberPhysical Security in Smart Home/Smart City IoT Systems

Abstract

The rapid expansion of smart home and smart city technologies has introduced a complex array of interconnected Internet of Things (IoT) devices, exposing both cyber and physical infrastructures to a growing spectrum of security threats. Traditional cybersecurity models are insufficient to address the dynamic and distributed nature of modern cyber-physical environments, particularly in emerging economies where standardized security frameworks are often lacking. This research proposes a unified, hybrid cyber-physical security framework tailored for smart home and smart city IoT systems. Leveraging publicly available datasets such as UNSW-NB15, TON_IoT, and CICIDS2019, we simulate various attack vectors and evaluate a multi-layered intrusion detection system (IDS) that combines both signature-based and anomaly-based machine learning models. The proposed framework is validated using simulated network topologies built with NS-3 and Cooja, focusing on performance metrics including detection accuracy, false-positive rate, and computational overhead. Results demonstrate that our hybrid approach achieves over 95% accuracy in detecting complex multi-stage attacks, while maintaining scalability and adaptability across different IoT environments. The findings contribute to the development of more secure, resilient, and context-aware smart infrastructure systems offering a practical foundation for real-world deployment in smart cities and connected home ecosystems, especially within developing regions such as Iraq.

References

  1. United Nations, “World Urbanization Prospects: The 2018 Revision,” Department of Economic and Social Affairs, New York, NY, USA, 2018.
  2. H. Chourabi, T. Nam, S. Walker, J. Ramon Gil-Garcia, S. Mellouli, K. Nahon, T. A. Pardo, and H. Jochen Scholl, “Understanding Smart Cities: An Integrative Framework,” in Proc. 45th Hawaii Int. Conf. Syst. Sci., Maui, HI, USA, 2012, pp. 2289–2297. https://doi.org/10.1109/HICSS.2012.615
  3. A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of Things for Smart Cities,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22–32, Feb. 2014. https://doi.org/10.1109/JIOT.2014.2306328.
  4. M. Ammar, G. Russello, and B. Crispo, “Internet of Things: A survey on the security of IoT frameworks,” Journal of Information Security and Applications, vol. 38, pp. 8–27, 2018. https://doi.org/10.1016/j.jisa.2017.11.002
  5. N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, “Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2702–2733, 2019. https://doi.org/10.1109/COMST.2019.2910750
  6. F. Hussain, S. J. Abbas, A. Ali, S. Hassan, and E. Hossain, “Machine Learning in IoT Security: Current Solutions and Future Challenges,” IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 1112–1144, 2022. https://doi.org/10.1109/COMST.2020.2986444
  7. R. Mitchell and I. R. Chen, “A survey of intrusion detection techniques for cyber-physical systems.” ACM Computing Surveys, vol. 46, no. 4, pp. 1–29, 2014. https://doi.org/10.1145/2542049
  8. H. Lin, and N. W. Bergmann, "IoT privacy and security challenges for smart home environments", Information 7.3 (2016): 44. https://doi.org/10.3390/info7030044
  9. H. Jaafer, and A. Abed. "Towards Smart Manufacturing: Implementing PI Control on PLCs in IIoT-Driven Industrial Automation", International Journal of Mechatronics, Robotics, and Artificial Intelligence, vol.1, issue 1, pp. 19-29, 2025, https://doi.org/10.33971.1.1.4
  10. M. S. Aljumaily, and H. K. Abd. "Interdisciplinary Approaches to Smart City Development: Integrating Engineering, Urban Planning, and Social Sciences with AI and Cybersecurity Governance", International Journal of Mechatronics, Robotics, and Artificial Intelligence, vol.1, issue 1, pp. 11-18, 2025, https://doi.org/10.33971.1.1.3
  11. C. Lee, L. Zappaterra, K. Choi, and H. Choi, "Securing smart home: Technologies, security challenges, and security requirements." 2014 IEEE Conference on Communications and Network Security. IEEE, 2014. https://doi.org/10.1109/CNS.2014.6997467
  12. D. Popescul, and L. Radu, "Data security in smart cities: challenges and solutions", Informatica Economică 20.1 (2016). https://doi.org/10.12948/issn14531305/20.1.2016.03
  13. S. Sourcefire, "The Open Source Network Intrusion Detection System", http://www. snort. org (2003).
  14. A.L. Buczak and E. Guven, "A survey of data mining and machine learning methods for cyber security intrusion detection", IEEE Communications surveys & tutorials, vol. 12, no.4, pp.1153-1176, 2015. https://doi.org/10.1109/COMST.2015.2494502
  15. Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D. Guarnizo, and Y. Elovici, "Detection of unauthorized IoT devices using machine learning techniques", arXiv preprint arXiv:1709.04647 (2017). https://doi.org/10.48550/arXiv.1709.04647
  16. Z. El Mrabet, N. Kaabouch, H. El Ghazi, and H. El Ghazi, "Cyber-security in smart grid: Survey and challenges", Computers & Electrical Engineering, vol. 67, pp. 469-482, 2018. https://doi.org/10.1016/j.compeleceng.2018.01.015.
  17. P. Raj and A.C. Raman, “The Internet of Things: Enabling technologies, platforms, and use cases”, Auerbach Publications, 2017. https://doi.org/10.1201/9781315273095
  18. N. Moustafa, and J. Sla, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)", 2015 military communications and information systems conference (MilCIS), IEEE, 2015. https://doi.org/10.1109/MilCIS.2015.7348942
  19. I. Sharafaldin, A. H. Lashkari, and A. A. Ghorbani, "Toward generating a new intrusion detection dataset and intrusion traffic characterization", ICISSp, vol. 1, pp. 108-116, 2018. https://www.doi.org/10.5220/0006639801080116
  20. N. Moustafa, M. Ahmed, and S. Ahmed, "Data analytics-enabled intrusion detection: Evaluations of ToN_IoT linux datasets", 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. https://doi.org/10.1109/TrustCom50675.2020.00100
  21. J. M. Peterson, J. L. Leevy, and T. M. Khoshgoftaar, "A review and analysis of the bot-IoT dataset", 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE), IEEE, 2021. https://doi.org/10.1109/SOSE52839.2021.00007
  22. R. Guidotti, A. Monreale, S. Ruggieri, F. Turini, F. Giannotti, and D. Pedreschi, "A survey of methods for explaining black box models", ACM computing surveys (CSUR), vol. 51, no. 5, pp. 1-42, 2018. https://doi.org/10.1145/3236009
  23. T. Zhang, L. Gao, C. He, M. Zhang, B. Krishnamachari, and A. S. Avestimehr, "Federated learning for the internet of things: Applications, challenges, and opportunities", IEEE Internet of Things Magazine 5.1 (2022): 24-29. https://doi.org/10.1109/IOTM.004.2100182
  24. Y. Wu, H. Dai, and H. Tang, "Graph neural networks for anomaly detection in industrial Internet of Things", IEEE Internet of Things Journal 9.12 (2021): 9214-9231. https://doi.org/10.1109/JIOT.2021.3094295
  25. F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, "Machine learning in IoT security: Current solutions and future challenges", IEEE Communications Surveys & Tutorials 22.3 (2020): 1686-1721. https://doi.org/10.1109/COMST.2020.2986444
  26. S. Sicari, A. Rizzardi, L.A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead", Computer networks 76 (2015): 146-164. https://doi.org/10.1016/j.comnet.2014.11.008
  27. S. Görmüş, H. Aydın, and G. Ulutaş, "Security for the internet of things: a survey of existing mechanisms, protocols and open research issues", Journal of the Faculty of Engineering and Architecture of Gazi University 33.4 (2018): 1247-1272. https://www.doi.org/10.17341/gazimmfd.416406
  28. A. H. Al-Taie, M. S. Aljumaily, A. M. Ayal, A. Al-Khaleefa, A. M. Dakhil, and A. Alsalamy, "Improving Energy Consumption in IoT Networks: Reducing Sensors Energy by Timing Control", 2023 Al-Sadiq International Conference on Communication and Information Technology (AICCIT). IEEE, 2023. https://doi.org/10.1109/AICCIT57614.2023.10218101