scholarly journals Cyber Security Attacks on Smart Cities and Associated Mobile Technologies

2017 ◽  
Vol 109 ◽  
pp. 1086-1091 ◽  
Author(s):  
Anwaar AlDairi ◽  
Lo’ai Tawalbeh
2019 ◽  
Vol 13 (2) ◽  
pp. 32-46 ◽  
Author(s):  
Ali Amur Al Shidhani

Smart cities are in development around the world to tackle urbanization challenges. Smart solutions are being developed to optimize scarce resources, reduce service cost, improve service quality and improve the livelihood of city residents. With smart city infrastructure getting digitized and remotely accessible, the risk of cyber security cannot be overlooked. This article describes the technical and non-technical challenges smart cities are facing with regards to cyber security attacks. The article outlines design requirements that should be considered when designing a secure smart city. The requirements are overarching technical, operational, social, safety, legal and usability domains. In addition, the article proposes cyber defense maturity levels for smart cities and describes threat models relevant to each maturity level.


2021 ◽  
Author(s):  
Abhi Patel ◽  
Tim Schenk ◽  
Steffi Knorn ◽  
Heiko Patzlaff ◽  
Dragan Obradovic ◽  
...  

2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


Author(s):  
Eric Luiijf

Advancements of information and communication technologies (ICT) cause infrastructure owners to augment current infrastructures with such ICT. The creation of more efficient and effective end-user services provides economical benefits and increases customer satisfaction. Concurrently, ICT advancements allow governmental and industrial sectors to develop complete new infrastructures and infrastructure services, the so called Next Generation Infrastructures (NGI). NGI will offer new services to society, end-users and the supply-chain of organisations and linked, dependent infrastructural services. For over fifty years, the introduction of new ICT-based services and infrastructures has been tightly coupled with failures in ICT-security. This chapter on NGI discusses the root causes of these security failures. Based on historical experiences, this chapter predicts threats and cyber security failures alike for the envisioned NGI such as smart (energy) grids, smart road transport infrastructure, smart cities, and e-health. This prediction will become reality unless fundamental changes in the approach to security of ICT-based and ICT-controlled infrastructures are taken.


Author(s):  
Amtul Waheed ◽  
Jana Shafi

Smart cities are established on some smart components such as smart governances, smart economy, science and technology, smart politics, smart transportation, and smart life. Each and every smart object is interconnected through the internet, challenging the security and privacy of citizen's sensitive information. A secure framework for smart cities is the only solution for better and smart living. This can be achieved through IoT infrastructure and cloud computing. The combination of IoT and Cloud also increases the storage capacity and computational power and make services pervasive, cost-effective, and accessed from anywhere and any device. This chapter will discuss security issues and challenges of smart city along with cyber security framework and architecture of smart cities for smart infrastructures and smart applications. It also presents a general study about security mechanism for smart city applications and security protection methodology using IOT service to stand against cyber-attacks.


2022 ◽  
pp. 1459-1480
Author(s):  
Anand Nayyar ◽  
Rachna Jain ◽  
Bandana Mahapatra ◽  
Anubhav Singh

Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models designed to be implemented. The four major paradigms discussed in this chapter are smart grids, building automation system (BAS), unmanned aerial vehicle (UAV), and smart vehicles. Apart from addressing the security concerns of every component, the major highlights of this chapter are architecture, smart environment, industry, lifestyle, services, and digital lifestyle quality. Finally, the chapter focuses on privacy preserving mechanisms, its essence over smart cities, strong architecture related to privacy, preserving mechanism, and various approaches available that can retaliate these issues in a smart city environment.


2020 ◽  
Vol 2020 ◽  
pp. 1-15
Author(s):  
Qiyi He ◽  
Xiaolin Meng ◽  
Rong Qu

CAV (connected and autonomous vehicle) is a crucial part of intelligent transportation systems. CAVs utilize both sensors and communication components to make driving decisions. A large number of companies, research organizations, and governments have researched extensively on the development of CAVs. The increasing number of autonomous and connected functions however means that CAVs are exposed to more cyber security vulnerabilities. Unlike computer cyber security attacks, cyber attacks to CAVs could lead to not only information leakage but also physical damage. According to the UK CAV Cyber Security Principles, preventing CAVs from cyber security attacks need to be considered at the beginning of CAV development. In this paper, a large set of potential cyber attacks are collected and investigated from the aspects of target assets, risks, and consequences. Severity of each type of attacks is then analysed based on clearly defined new set of criteria. The levels of severity for the attacks can be categorized as critical, important, moderate, and minor. Mitigation methods including prevention, reduction, transference, acceptance, and contingency are then suggested. It is found that remote control, fake vision on cameras, hidden objects to LiDAR and Radar, spoofing attack to GNSS, and fake identity in cloud authority are the most dangerous and of the highest vulnerabilities in CAV cyber security.


Smart Cities ◽  
2017 ◽  
pp. 391-407
Author(s):  
Mridul S. Barik ◽  
Anirban Sengupta ◽  
Chandan Mazumdar

Sign in / Sign up

Export Citation Format

Share Document