Smart City Gnosys

Smart city article details

Title Enhancing 6G-Iot Network Security: A Trustworthy And Responsible Ai-Driven Stacked-Hybrid Model For Attack Detection
ID_Doc 23730
Authors Sharma A.; Rani S.
Year 2025
Published IEEE Internet of Things Journal
DOI http://dx.doi.org/10.1109/JIOT.2025.3566403
Abstract The fast growth of 6G-enabled Internet of Things (IoT) networks has transformed communication and made it possible for smart cities, driverless cars, healthcare, and industrial automation to all have seamless connectivity. However, the growing complexity and diversity of 6G-IoT infrastructures present serious cybersecurity issues, leaving these networks open to a range of attacks like malware dissemination, spoofing, and Distributed Denial-of-Service (DDoS). Because traditional intrusion detection systems (IDS) cannot adjust to changing attack patterns, they are unable to effectively combat these threats. Using Random Forest (RF), Support Vector Machine (SVM), Logistic Regression (LR), and Extreme Gradient Boosting (XGBoost) to improve detection accuracy and robustness, this study proposed a novel Stacked-Hybrid Model for attack detection in 6G-IoT networks. The proposed model maximizes classification performance while reducing computational cost by utilizing feature selection and ensemble learning. Training and evaluation are conducted on the RT-IoT dataset, proving the effectiveness of the method. The experimental results demonstrate that the proposed Stacked-Hybrid Model outperforms individual machine learning (ML) models, achieving 99.90% detection accuracy. The other performance metrics of the proposed model have also been evaluated including precision, sensitivity, specificity and F1-score rates at 99.56%, 99.56%, 99.93% and 99.56% respectively. Significant advancements in identifying intricate and dynamic cyber threats in 6G-IoT contexts are also revealed by a comparison with other models. © 2014 IEEE.
Author Keywords 6G; Cyberattacks; Internet of Things; Machine Learning; Security; Stacked-hybrid model


Similar Articles


Id Similarity Authors Title Published
47763 View0.907Alotaibi A.; Barnawi A.Securing Massive Iot In 6G: Recent Solutions, Architectures, Future DirectionsInternet of Things (Netherlands), 22 (2023)
329 View0.905Rajak A.; Tiwari S.; Rajak P.; Tripathi R.6G-Enabled Attack Detection System For Iot-Driven Smart City Using Machine Learning2025 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2025 (2025)
23927 View0.9Khan W.; Usama M.; Khan M.S.; Saidani O.; Al Hamadi H.; Alnazzawi N.; Alshehri M.S.; Ahmad J.Enhancing Security In 6G-Enabled Wireless Sensor Networks For Smart Cities: A Multi-Deep Learning Intrusion Detection ApproachFrontiers in Sustainable Cities, 7 (2025)
5218 View0.9Haider Z.A.; Zeb A.; Rahman T.; Singh S.K.; Akram R.; Arishi A.; Ullah I.A Survey On Anomaly Detection In Iot: Techniques, Challenges, And Opportunities With The Integration Of 6GComputer Networks, 270 (2025)
295 View0.893Sadhwani S.; Mathur A.; Muthalagu R.; Pawar P.M.5G-Siid: An Intelligent Hybrid Ddos Intrusion Detector For 5G Iot NetworksInternational Journal of Machine Learning and Cybernetics, 16, 2 (2025)
41565 View0.891Zhukabayeva T.; Ahmad Z.; Adamova A.; Karabayev N.; Mardenov Y.; Satybaldina D.Penetration Testing And Machine Learning-Driven Cybersecurity Framework For Iot And Smart City Wireless NetworksIEEE Access, 13 (2025)
36711 View0.889Alwaisi Z.Memory-Efficient And Robust Detection Of Mirai Botnet For Future 6G-Enabled Iot NetworksInternet of Things (The Netherlands), 32 (2025)
33508 View0.881Saini K.S.; Chaudhary S.Investigation On Attack Detection In Iot Networks: A Study And Analysis Of The Existing Machine Learning And Deep Learning Techniques3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025 (2025)
23762 View0.872Gupta S.; Roy D.; Pramanik P.; Chowdhury S.Enhancing Cyber Security In 6G Networks With Federated Learning For Collaborative Threat MitigationAdvanced Sciences and Technologies for Security Applications, Part F458 (2025)
36064 View0.87Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)