Drone Application in Smart Cities: The General Overview of Security Vulnerabilities and Countermeasures for Data Communication

Author(s):  
Huu Phuoc Dai Nguyen ◽  
Dinh Dung Nguyen
Author(s):  
Ismail Butun ◽  
Patrik Österberg

Interfacing the smart cities with cyber-physical systems (CPSs) improves cyber infrastructures while introducing security vulnerabilities that may lead to severe problems such as system failure, privacy violation, and/or issues related to data integrity if security and privacy are not addressed properly. In order for the CPSs of smart cities to be designed with proactive intelligence against such vulnerabilities, anomaly detection approaches need to be employed. This chapter will provide a brief overview of the security vulnerabilities in CPSs of smart cities. Following a thorough discussion on the applicability of conventional anomaly detection schemes in CPSs of smart cities, possible adoption of distributed anomaly detection systems by CPSs of smart cities will be discussed along with a comprehensive survey of the state of the art. The chapter will discuss challenges in tailoring appropriate anomaly detection schemes for CPSs of smart cities and provide insights into future directions for the researchers working in this field.


2019 ◽  
Vol 2019 ◽  
pp. 1-9 ◽  
Author(s):  
Asim Zeb ◽  
Qurban Ali ◽  
Muhammad Qaiser Saleem ◽  
Khalid Mahmood Awan ◽  
Ali Saeed Alowayr ◽  
...  

Internet of Things (IoT) is an emerging technology that offers promising solutions to modernize the traditional systems. It accords promising result in crystallizing smart cities, smart homes, smart industries, and smart environment. This article presents the smart waste management architecture for smart cities and efficient routing technique considering least delay for the architecture. In wireless sensor networks, end-to-end delay is one of the important Quality of Services (QoS) parameter to overcome delay in data communication. In this article, we consider end-to-end delay minimization in smart waste management application. The term “end-to-end delay” is defined as the total time taken by a single packet to reach the destination node. The proposed scheme considers the interference level, the length of the routing path, and the number of hops along the path. The simulation results show that the proposed scheme outperforms current schemes.


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 2043
Author(s):  
Il-Gu Lee ◽  
Kyungmin Go ◽  
Jung Hoon Lee

Wi-Fi technology connects sensor-based things that operate with small batteries, and allows them to access the Internet from anywhere at any time and perform networking. It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities. The Wi-Fi-based Internet of things is gradually expanding its range of uses from new industries to areas that are intimately connected to people’s lives, safety, and property. Wi-Fi technology has undergone a 20-year standardization process and continues to evolve to improve transmission speeds and service quality. Simultaneously, it has also been strengthening power-saving technology and security technology to improve energy efficiency and security while maintaining backward compatibility with past standards. This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones. The results of the experiment showed that when a battery draining attack was performed on power-saving Wi-Fi, 14 times the amount of energy was consumed compared with when a battery draining attack was not performed. This study analyzed the security vulnerabilities of the power-saving mechanism and discusses countermeasures.


2021 ◽  
Author(s):  
Marius Minea ◽  
Catalin Marian Dumitrescu ◽  
Viviana Laetitia Minea ◽  
Augustin Semenescu

Information ◽  
2021 ◽  
Vol 12 (2) ◽  
pp. 87
Author(s):  
Marco Lombardi ◽  
Francesco Pascale ◽  
Domenico Santaniello

In recent years, the growing number of devices connected to the internet has increased significantly. These devices can interact with the external environment and with human beings through a wide range of sensors that, perceiving reality through the digitization of some parameters of interest, can provide an enormous amount of data. All this data is then shared on the network with other devices and with different applications and infrastructures. This dynamic and ever-changing world underlies the Internet of Things (IoT) paradigm. To date, countless applications based on IoT have been developed; think of Smart Cities, smart roads, and smart industries. This article analyzes the current architectures, technologies, protocols, and applications that characterize the paradigm.


2021 ◽  
Author(s):  
Karunkuzhali D ◽  
Meenakshi B ◽  
Keerthi Lingam

Abstract Internet of things (IoT) makes a machines optimization in everyday which processing the data by very intelligently and make communication more effectively and efficiently. However, in order to decrease the harm of IoT, nearby is angrowinglonging to move en route for green IoT which is environmentally friendly. In smart city environments, the data collection and communication play an important role in defining quality. Since the research period, it has been recommending a new data acquisition and data communication software framework for IoT smart applications. For further improvements, we recommend an optimal QoS aware routing technique for smart cities using IoT enabled wireless sensor networks (OQR-SC). In data gathering phase, we introduce chaotic bird swarm optimization (CBSO) algorithm for IoT sensor cluster formation; the improved differential search (IDS) algorithm used to estimate the faith degree of each sensor node, the highest trust node act as cluster head (CH). In data transferring phase, we illustrates lightweight signcryption technique for data encryption between two IoT sensors. Then, we use optimal decision making (ODM) algorithm to compute the optimal path between source-destination in IoT platform. Finally, the proposed OQR-SC technique is implemented using network simulation (NS2) tool and analyzes the performance of proposed technique with existing state-of-art techniques.


2019 ◽  
Vol 9 (20) ◽  
pp. 4454 ◽  
Author(s):  
Teh-Lu Liao ◽  
Hong-Ru Lin ◽  
Pei-Yen Wan ◽  
Jun-Juh Yan

In recent years, Internet of Things (IoT) has developed rapidly and been widely used in industry, agriculture, e-health, smart cities, and families. As the total amount of data transmission will increase dramatically, security will become a very important issue in data communication in the IoT. There are many communication protocols for Device to Device (D2D) or Machine to Machine (M2M) in IoT. One of them is Message Queuing Telemetry Transport (MQTT), which is quite prevalent and easy to use. MQTT is designed for resource-constrained devices, so its security is not as strong as other communication protocols. To enhance MQTT security, it needs an additional function to overcome its weakness. However, considering the limited computational abilities of resource-constrained devices, they cannot use too powerful or complicated cryptographic algorithms. Therefore, this paper proposes novel improved attribute-based encryption (ABE) integrated with chaos synchronization to enhance the MQTT security. Finally, a small size of IoT is implemented to simulate resource-constrained devices equipped with a human–machine interface and monitoring software to show and verify the performance of MQTT communication with this improved ABE algorithm.


2021 ◽  
Vol 54 (3) ◽  
pp. 1-38
Author(s):  
Clayson Celes ◽  
Azzedine Boukerche ◽  
Antonio A. F. Loureiro

Intelligent vehicular networks emerge as a promising technology to provide efficient data communication in transportation systems and smart cities. At the same time, the popularization of devices with attached sensors has allowed the obtaining of a large volume of data with spatiotemporal information from different entities. In this sense, we are faced with a large volume of vehicular mobility traces being recorded. Those traces provide unprecedented opportunities to understand the dynamics of vehicular mobility and provide data-driven solutions. In this article, we give an overview of the main publicly available vehicular mobility traces; then, we present the main issues for preprocessing these traces. Also, we present the methods used to characterize and model mobility data. Finally, we review existing proposals that apply the hidden knowledge extracted from the mobility trace for vehicular networks. This article provides a survey on studies that use vehicular mobility traces and provides a guideline for the proposition of data-driven solutions in the domain of vehicular networks. Moreover, we discuss open research problems and give some directions to undertake them.


Author(s):  
Priyanka Goyal ◽  
Prachi Singh

Internet of things (IOT) and Vertical Cavity Surface Emitting Laser (VCSEL) future can be seen together, since VCSEL technology-based 3D sensors are introduced for IoT applications. The improved VCSEL structure design with fixed wavelength using a thermally actuated cantilever structure is presented. This improved structure of VCSEL will help us in realizing athermal VCSEL. In athermal VCSEL the dependency of VCSEL on temperature will be much less because it will not require temperature controllers. Realizing fully temperature-independent VCSEL (i.e., athermal VCSEL) is still a challenge but we can reduce it to some extent. In this chapter, recent diversification of application of VCSEL technology from data communication to sensing has been discussed. This proposed VCSEL structure may give us an opportunity to improve the VCSEL technology. Therefore, smart 3D sensors based on VCSEL will help in making internet of things applications more reliable and will directly or indirectly serve the concept of smart homes and smart cities.


Sign in / Sign up

Export Citation Format

Share Document