scholarly journals Security and Privacy in Smart Cities: Challenges and Opportunities

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 46134-46145 ◽  
Author(s):  
Lei Cui ◽  
Gang Xie ◽  
Youyang Qu ◽  
Longxiang Gao ◽  
Yunyun Yang
Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6230 ◽  
Author(s):  
Ji Chu Jiang ◽  
Burak Kantarci ◽  
Sema Oktug ◽  
Tolga Soyata

Smart Cities sensing is an emerging paradigm to facilitate the transition into smart city services. The advent of the Internet of Things (IoT) and the widespread use of mobile devices with computing and sensing capabilities has motivated applications that require data acquisition at a societal scale. These valuable data can be leveraged to train advanced Artificial Intelligence (AI) models that serve various smart services that benefit society in all aspects. Despite their effectiveness, legacy data acquisition models backed with centralized Machine Learning models entail security and privacy concerns, and lead to less participation in large-scale sensing and data provision for smart city services. To overcome these challenges, Federated Learning is a novel concept that can serve as a solution to the privacy and security issues encountered within the process of data collection. This survey article presents an overview of smart city sensing and its current challenges followed by the potential of Federated Learning in addressing those challenges. A comprehensive discussion of the state-of-the-art methods for Federated Learning is provided along with an in-depth discussion on the applicability of Federated Learning in smart city sensing; clear insights on open issues, challenges, and opportunities in this field are provided as guidance for the researchers studying this subject matter.


2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Daniel Ayala-Ruiz ◽  
Alejandro Castillo Atoche ◽  
Erica Ruiz-Ibarra ◽  
Edith Osorio de la Rosa ◽  
Javier Vázquez Castillo

Long power wide area networks (LPWAN) systems play an important role in monitoring environmental conditions for smart cities applications. With the development of Internet of Things (IoT), wireless sensor networks (WSN), and energy harvesting devices, ultra-low power sensor nodes (SNs) are able to collect and monitor the information for environmental protection, urban planning, and risk prevention. This paper presents a WSN of self-powered IoT SNs energetically autonomous using Plant Microbial Fuel Cells (PMFCs). An energy harvesting device has been adapted with the PMFC to enable a batteryless operation of the SN providing power supply to the sensor network. The low-power communication feature of the SN network is used to monitor the environmental data with a dynamic power management strategy successfully designed for the PMFC-based LoRa sensor node. Environmental data of ozone (O3) and carbon dioxide (CO2) are monitored in real time through a web application providing IoT cloud services with security and privacy protocols.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 72033-72036 ◽  
Author(s):  
Debiao He ◽  
Kim-Kwang Raymond Choo ◽  
Neeraj Kumar ◽  
Aniello Castiglione

2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Irfan Muhammad ◽  
Hirley Alves ◽  
Onel Alcaraz López ◽  
Matti Latva-aho

The Internet of Things (IoT) facilitates physical things to detect, interact, and execute activities on-demand, enabling a variety of applications such as smart homes and smart cities. However, it also creates many potential risks related to data security and privacy vulnerabilities on the physical layer of cloud-based Internet of Things (IoT) networks. These can include different types of physical attacks such as interference, eavesdropping, and jamming. As a result, quality-of-service (QoS) provisioning gets difficult for cloud-based IoT. This paper investigates the statistical QoS provisioning of a four-node cloud-based IoT network under security, reliability, and latency constraints by relying on the effective capacity model to offer enhanced QoS for IoT networks. Alice and Bob are legitimate nodes trying to communicate with secrecy in the considered scenario, while an eavesdropper Eve overhears their communication. Meanwhile, a friendly jammer, which emits artificial noise, is used to degrade the wiretap channel. By taking advantage of their multiple antennas, Alice implements transmit antenna selection, while Bob and Eve perform maximum-ratio combining. We further assume that Bob decodes the artificial noise perfectly and thus removes its contribution by implementing perfect successive interference cancellation. A closed-form expression for an alternative formulation of the outage probability, conditioned upon the successful transmission of a message, is obtained by considering adaptive rate allocation in an ON-OFF transmission. The data arriving at Alice’s buffer are modeled by considering four different Markov sources to describe different IoT traffic patterns. Then, the problem of secure throughput maximization is addressed through particle swarm optimization by considering the security, latency, and reliability constraints. Our results evidence the considerable improvements on the delay violation probability by increasing the number of antennas at Bob under strict buffer constraints.


2021 ◽  
Vol 2021 ◽  
pp. 1-2
Author(s):  
Chalee Vorakulpipat ◽  
Ryan K. L. Ko ◽  
Qi Li ◽  
Ahmed Meddahi


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


This chapter explores infrastructures, experiences, and interactions in relation to emerging urban layers and spaces for engagement in the city. The purpose of this chapter is to shed light on the digital layers enabled by information and communication technologies, the internet of things, the internet of people, and other emerging technologies to complement and extend existing urban infrastructural layers. The research literature for infrastructures, experiences, and interactions is explored in this chapter in the context of smart cities, enabling identification of issues, controversies, and problems. Using an exploratory case study approach, solutions and recommendations are advanced. This chapter makes a contribution to 1) the research literature across multiple domains, 2) the identification of challenges and opportunities for research and practice relating to emerging urban layers and spaces going forward, and 3) the extending of existing understandings of urbanity to incorporate digital layers and spaces enabling connected, contextual, and continuous engagement.


Sign in / Sign up

Export Citation Format

Share Document