Abstract |
Smart cities represent the future of urban evolution, characterized by the intricate integration of the Internet of Things (IoT). This integration sees everything, from traffic management to waste disposal, governed by interconnected and digitally managed systems. As fascinating as the promise of such cities is, they have its challenges. A significant concern in this digitally connected realm is the introduction of fake clients. These entities, masquerading as legitimate system components, can execute a range of cyber-attacks. This research focuses on the issue of fake clients by devising a detailed simulated smart city model utilizing the Netsim program. Within this simulated environment, multiple sectors collaborate with numerous clients to optimize performance, comfort, and energy conservation. Fake clients, who appear genuine but with malicious intentions, are introduced into this simulation to replicate the real-world challenge. After the simulation is configured, the data flows are captured using Wireshark and saved as a CSV file, differentiating between the real and fake clients. We applied MATLAB machine learning techniques to the captured data set to address the threat these fake clients posed. Various machine learning algorithms were tested, and the knearest neighbors (KNN) classifier showed a remarkable detection accuracy of 98 77%. Specifically, our method increased detection accuracy by 4.66%, from 94.02% to 98.68% over three experiments conducted, and enhanced the Area Under the Curve (AUC) by 0.49%, reaching 99.81%. Precision and recall also saw substantial gains, with precision improving by 9.09%, from 88.77% to 97.86%, and recall improving by 9.87%, from 89.23% to 99.10%. The comprehensive analysis underscores the role of preprocessing in enhancing the overall performance, highlighting its superior performance in detecting fake IoT clients in smart city environments compared to conventional approaches. Our research introduces a powerful model for protecting smart cities, merging sophisticated detection techniques with robust defenses. |