scholarly journals End Node Security and Trust vulnerabilities in the Smart City Infrastructure

2018 ◽  
Vol 188 ◽  
pp. 05005
Author(s):  
Apostolos P. Fournaris ◽  
Konstantinos Lampropoulos ◽  
Odysseas Koufopavlou

As cities gradually introduce intelligence in their core services and infrastructure thus becoming “smart cities”, they are deploying new Information Technology devices in the urban grid that are interconnected to a broad network. The main focus of widely implemented smart cities' services was the operation of sensors and smart devices across city areas that need low energy consumption and high connectivity. However, as 5G technologies are gradually been adopted in the smart city infrastructure thus solving that problem, the fundamental issue of addressing security becomes dominant. While latest network topologies and standards include security functions thus giving an illusion of security, there is little focus on the fact that many smart city end nodes cannot realize all security specifications without additional help. In this paper, we discuss briefly smart city security issues and focus on problem and security requirement that need to be address in the smart city end nodes, the sensors and actuators deployed within the city's grid. In this paper, attacks that cannot be thwarted by traditional cybersecurity solutions are discussed and countermeasures based on hardware are suggested in order to achieve a high level of trust. Also, the danger of microarchitectural and side channel attacks on these devices is highlighted and protection approaches are discussed.

Author(s):  
Jayapandian N.

The main objective of this chapter is to discuss various security and privacy issues in smart cities. The development of smart cities involves both the private and public sectors. The theoretical background is also discussed in future growth of smart city devices. Thus, the literature survey part discusses different smart devices and their working principle is elaborated. Cyber security and internet security play a major role in smart cities. The primary solution of smart city security issues is to find some encryption methods. The symmetric and asymmetric encryption algorithm is analyzed and given some comparative statement. The final section discusses some possible ways to solve smart city security issues. This chapter showcases the security issues and solutions for smart city devices.


Author(s):  
Jayapandian N.

The main objective of this chapter is to discuss various security and privacy issues in smart cities. The development of smart cities involves both the private and public sectors. The theoretical background is also discussed in future growth of smart city devices. Thus, the literature survey part discusses different smart devices and their working principle is elaborated. Cyber security and internet security play a major role in smart cities. The primary solution of smart city security issues is to find some encryption methods. The symmetric and asymmetric encryption algorithm is analyzed and given some comparative statement. The final section discusses some possible ways to solve smart city security issues. This chapter showcases the security issues and solutions for smart city devices.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


2020 ◽  
Vol 60 (11) ◽  
pp. 16-20
Author(s):  
Vugar Hajimahmud Abdullayev ◽  
◽  
Vusala Alyag Abuzarova ◽  

The article is devoted to the study of cyber security problems in the Smart Cities system. The development of the IT industry has led to the introduction of new technologies into our lives. One of these technologies is the Internet of Things technology. The application of IoT technology has increased in recent years. One of the most important areas in which Internet of Things technology is applied is the Smart Cities system. The main difference between smart cities and other cities is that their components are connected to each other via the Internet. All these smart devices create a smart city system in general. One of the biggest and most important problems in many areas where the Internet is used is security. The article looks at possible security problems in the system of smart cities and solutions to ensure cyber security. Key words: Smart city; Internet of Things; Information technologies; Security; Cyber security


Author(s):  
Amtul Waheed ◽  
Jana Shafi

Smart cities are established on some smart components such as smart governances, smart economy, science and technology, smart politics, smart transportation, and smart life. Each and every smart object is interconnected through the internet, challenging the security and privacy of citizen's sensitive information. A secure framework for smart cities is the only solution for better and smart living. This can be achieved through IoT infrastructure and cloud computing. The combination of IoT and Cloud also increases the storage capacity and computational power and make services pervasive, cost-effective, and accessed from anywhere and any device. This chapter will discuss security issues and challenges of smart city along with cyber security framework and architecture of smart cities for smart infrastructures and smart applications. It also presents a general study about security mechanism for smart city applications and security protection methodology using IOT service to stand against cyber-attacks.


2020 ◽  
Vol 9 (4) ◽  
pp. 240 ◽  
Author(s):  
Sara Shirowzhan ◽  
Willie Tan ◽  
Samad M. E. Sepasgozar

Smart technologies are advancing, and smart cities can be made smarter by increasing the connectivity and interactions of humans, the environment, and smart devices. This paper discusses selective technologies that can potentially contribute to developing an intelligent environment and smarter cities. While the connectivity and efficiency of smart cities is important, the analysis of the impact of construction development and large projects in the city is crucial to decision and policy makers, before the project is approved. This raises the question of assessing the impact of a new infrastructure project on the community prior to its commencement—what type of technologies can potentially be used for creating a virtual representation of the city? How can a smart city be improved by utilizing these technologies? There are a wide range of technologies and applications available but understanding their function, interoperability, and compatibility with the community requires more discussion around system designs and architecture. These questions can be the basis of developing an agenda for further investigations. In particular, the need for advanced tools such as mobile scanners, Geospatial Artificial Intelligence, Unmanned Aerial Vehicles, Geospatial Augmented Reality apps, Light Detection, and Ranging in smart cities is discussed. In line with smart city technology development, this Special Issue includes eight accepted articles covering trending topics, which are briefly reviewed.


2017 ◽  
Vol 1 (1) ◽  
pp. 26 ◽  
Author(s):  
Hala Hassanein

The high pace of technology has redefined street furniture as smart devices that contribute to build future cities. Thus, it is a combination of passion; skills, ideas and tools of Information and Communication Technologies (ICT) converted into finished products. ICT is a catalyst for cities to address these challenges in a ‘smart’ manner that links and strengthens networks of people, businesses, infrastructures, resources, energy and spaces. On the other hand, one of the most important components to be adopted for designing Smart Cities is the IT service management (ITSM). It refers to the entirety of the activities directed by policies, organized and structured to plan, design, operate and control ITSM offered to citizens by adopting a process approach towards management, focusing on their needs and stressing continual improvement.New trends in urban planning are heading to draw a new future- a Smart City that is able to link the physical capital with the social one. Street furniture, as an important element of Smart Cities, is a term used to define objects in public spaces. Such concept is related to the context of wireless infrastructure and house small-cell units. They are considered –visually- as common and tolerable places to the public.This research will focus on smart Street-Furniture design as a standard guide for designers and planners of the ''New Cairo Administrative Capital'', which is currently under construction as the first Smart City in Egypt.


Author(s):  
A. Denker

Abstract. The project of smart cities has emerged as a response to the challenges of twenty-first- century urbanization. Solutions to the fundamental conundrum of cities revolving around efficiency, convenience and security keep being sought by leveraging technology. Notwithstanding all the conveniences furnished by a smart city to all the citizens, privacy of a citizen is intertwined with the benefits of a smart city. The development processes which overlook privacy and security issues have left many of the smart city applications vulnerable to non-conventional security threats and susceptible to numerous privacy and personal data spillage risks. Among the challenges the smart city initiatives encounter, the emergence of the smartphone-big data-the cloud coalescence is perhaps the greatest, from the viewpoint of privacy and personal data protection. As our cities are getting digitalized, information comprising citizens' behavior, choices, and mobility, as well as their personal assets are shared over smartphone-big data-the cloud coalescences, thereby expanding cyber-threat surface and creating different security concerns. This coalescence refers to the practices of creating and analyzing vast sets of data, which comprise personal information. In this paper, the protection of privacy and personal data issues in the big data environment of smart cities are viewed through bifocal lenses, focusing on social and technical aspects. The protection of personal data and privacy in smart city enterprises is treated as a socio-technological operation where various actors and factors undertake different tasks. The article concludes by calling for novel developments, conceptual and practical changes both in technological and social realms.


Author(s):  
Mouad Banane ◽  
Abdessalam Belangour

Contemporary cities face many challenges: energy, ecological, demographic or economic. To answer this, technological means are implemented in cities through the use of sensors and actuators. These cities are said to be smart. Currently, smart cities are operated by actors who share neither their sensor data nor access to their actuators. This situation is called vertical: each operator deploys its own sensors and actuators and has its own IT infrastructure hosting its applications. This leads to infrastructure redundancy and ad-hoc applications to oversee and control an area of the city. A trend is to move towards a so-called horizontal situation via the use of an open and shared mediation platform. Sensor data and access to the actuators are shared within this type of platform, allowing their sharing between the different actors. The costs of infrastructure and development are then reduced. This work is part of such a context of horizontalization, within an open and shared platform, in which we propose: 1) a layer of abstraction for control and supervision of the city, 2) a competition control mechanism handling conflict cases based on the RDF (Resource Description Framework) semantic Web standard, 3) a coordination mechanism promoting the reuse of actuators using ontology, 4) an implementation of our work by a proof of concept. The abstraction we propose is based on models from reactive systems. They aim to be generic and represent the invariant of the smart city: the physical elements. They allow applications to control and supervise the city. To facilitate the development of applications we standardize the interface of our models. Since these applications may have real-time constraints, especially those that have control objectives, we propose to take advantage of the distributed architecture of this type of platform. Given the sharing of the actuators, we have identified that conflicts can arise between applications. We propose a mechanism of competition control to deal with these cases of conflicts. We have also identified that a coordination mechanism must be offered to applications wishing to perform atomic control operations. Such a mechanism promotes the reuse of the actuators present in the city. Finally, we implemented our proposals around a proof of concept, including several use cases, to demonstrate our work.


Author(s):  
Muneer Ahmad Dar

The world is moving towards modernization with the help of smart devices used in smart cities to make the whole lot intelligent and smart. These smart devices are extensively used in smart city and are capable of doing everything which one can do with the normal desktop computer. These smart devices like Smartphone have computational limitations are not able to store a large data to be used and collected in a smart city. In this paper, we propose a novel security architecture which first uses the Elliptic Curve Diffie Helman Key Exchange Algorithms to exchange the keys between the two low power devices (Smartphone). The keys are used to encrypt the large data (images and videos etc). The data is encrypted using the private keys of a device and then send to the cloud for safe storage. The data can be only accessed by the communicating device with the same key. The proposed security architecture enables these smart devices to store the huge data collected from the smart city to store on the cloud. If another device requests the same set of data, the keys can be shared secretly and the communicating device can be allowed to download the data directly from the cloud. This architecture relieves the Smartphone from the storage limitation and also enables it to communicate with faster speed and securely.   


Sign in / Sign up

Export Citation Format

Share Document