A comprehensive and in-depth study of the threats faced by smart cities and the countermeasures implemented in their key areas

Mehdi Houichi, Faouzi Jaidi, Adel Bouhoula

Article ID: 8629
Vol 8, Issue 10, 2024

VIEWS - 1843 (Abstract)

Abstract


A smart city focuses on enhancing and interconnecting facilities and services through digital technology to offer convenient services for both people and businesses. The basic infrastructure of smart cities consists of modern technologies such as the Internet of Things (IoT), cloud computing and artificial intelligence. These urban areas utilize different networks, such as the Internet and IoT, to share real-time information, improving convenience for the inhabitants. However, the reliance of smart cities on modern technologies exposes them to a range of organized, diverse, and sophisticated cyber threats. Therefore, prioritizing cybersecurity awareness and implementing appropriate measures and solutions are essential to protect the privacy and security of citizens. This study aims to identify cyber threats and their impact on smart cities, as well as the methods and measures required for key areas such as smart government, smart healthcare, smart mobility, smart environment, smart economy, smart living, and smart people. Furthermore, this study seeks to evaluate previous research in this field, establish necessary policies to mitigate these threats, and propose an appropriate model for the infrastructure associated with IT networks in smart cities.


Keywords


smart city; digital technology; cybersecurity; privacy; Internet of Things

Full Text:

PDF


References

  1. Abdel-Rahman, M. (2023). Advanced cybersecurity measures in IT service operations and their crucial role in safeguarding enterprise data in a connected world. Eigenpub Review of Science and Technology, 7(1), 138-158.
  2. Abdulelah, A. J., & Mustafa, A. S. (2020). Advanced Secure Architecture for The Internet of Things based on DTLS Protocol. 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 1–5. https://doi.org/10.1109/ismsit50672.2020.9254700
  3. Access 17.0M+ vector icons & stickers. (2024). Download Free Icons and Stickers for your projects. Available online: https://www.flaticon.com (accessed on 3 May 2024).
  4. Adel, A. (2023). Unlocking the Future: Fostering Human–Machine Collaboration and Driving Intelligent Automation through Industry 5.0 in Smart Cities. Smart Cities, 6(5), 2742–2782. https://doi.org/10.3390/smartcities6050124
  5. Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors, 22(13), 4730. https://doi.org/10.3390/s22134730
  6. Ahmed, S., & Khan, M. (2023). Securing the Internet of Things (IoT): A comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem. AI, IoT and the Fourth Industrial Revolution Review, 13(9), 1-17.
  7. AlQahtani, A. A. S., Alshayeb, T., Nabil, M., et al. (2024). Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor Authentication. IEEE Access, 12, 13277–13289. https://doi.org/10.1109/access.2024.3356351
  8. Amin, S. U., & Hossain, M. S. (2021). Edge Intelligence and Internet of Things in Healthcare: A Survey. IEEE Access, 9, 45–59. https://doi.org/10.1109/access.2020.3045115
  9. Angelidou, M., Psaltoglou, A., Komninos, N., et al. (2017). Enhancing sustainable urban development through smart city applications. Journal of Science and Technology Policy Management, 9(2), 146–169. https://doi.org/10.1108/jstpm-05-2017-0016
  10. Apata, O., Bokoro, P. N., & Sharma, G. (2023). The Risks and Challenges of Electric Vehicle Integration into Smart Cities. Energies, 16(14), 5274. https://doi.org/10.3390/en16145274
  11. Asaju, B. J. (2024). Standardization and regulation of V2X cybersecurity: analyzing the current landscape, identifying gaps, and proposing frameworks for harmonization. Advances in Deep Learning Techniques, 4(1), 33-52.
  12. Azeez, O. H., Sarah, K. E., Adekunle, A. A., et al. (2024). Cybersecurity In Banking: A Global Perspective with A Focus on Nigerian Practices. Computer Science & IT Research Journal, 5(1), 41–59. https://doi.org/10.51594/csitrj.v5i1.701
  13. Azzedin, F. (2023). Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach. IEEE Access, 11, 129077–129089. https://doi.org/10.1109/access.2023.3331030
  14. Babikian, J. (2023). Navigating Legal Frontiers: Exploring Emerging Issues in Cyber Law. Revista Espanola de Documentacion Cientifica, 17(2), 95-109.
  15. Bailey, L. E., & Nyabola, N. (2021). Digital Equity as an Enabling Platform for Equality and Inclusion. Available online: https://cic. nyu. edu/resources/digital-equity-as-an-enabling-platform-for-equality-and-inclusion (accessed on 12 May 2024).
  16. Bakshi, G., & Sahu, H. (2022). WSN Security. Computational Intelligence for Wireless Sensor Networks, 151–174. https://doi.org/10.1201/9781003102397-9
  17. Barbera, S. L. (2023). Revolutionizing Italian Homes: Embracing the Smart Home Era in the Housing Landscape. Research square. https://doi.org/10.21203/rs.3.rs-3272478/v1
  18. Belavagi, M. C., & Muniyal, B. (2022). Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification. International Journal of Communication Networks and Information Security (IJCNIS), 13(1). https://doi.org/10.17762/ijcnis.v13i1.4875
  19. Benyahya, M., Collen, A., Kechagia, S., et al. (2022). Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments. Computers & Security, 122, 102904. https://doi.org/10.1016/j.cose.2022.102904
  20. Bhardwaj, A., Bharany, S., Abulfaraj, A. W., et al. (2024). Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities. Egyptian Informatics Journal, 25, 100443. https://doi.org/10.1016/j.eij.2024.100443
  21. Bibri, S. E., Alexandre, A., Sharifi, A., et al. (2023). Environmentally sustainable smart cities and their converging AI, IoT, and big data technologies and solutions: an integrated approach to an extensive literature review. Energy Informatics, 6(1). https://doi.org/10.1186/s42162-023-00259-2
  22. Böhm, F., Dietz, M., Preindl, T., et al. (2021). Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. Journal of Cybersecurity and Privacy, 1(3), 519–538. https://doi.org/10.3390/jcp1030026
  23. Boukerche, A., & Coutinho, R. W. L. (2019). Crowd Management: The Overlooked Component of Smart Transportation Systems. IEEE Communications Magazine, 57(4), 48–53. https://doi.org/10.1109/mcom.2019.1800641
  24. Bouramdane, A. A. (2023). Optimal Water Management Strategies: Paving the Way for Sustainability in Smart Cities. Smart Cities, 6(5), 2849–2882. https://doi.org/10.3390/smartcities6050128
  25. Brauneck, A., Schmalhorst, L., Kazemi Majdabadi, M. M., et al. (2023). Federated Machine Learning, Privacy-Enhancing Technologies, and Data Protection Laws in Medical Research: Scoping Review. Journal of Medical Internet Research, 25, e41588. https://doi.org/10.2196/41588
  26. Chandramouli, D., Liebhart, R., & Pirskanen, J. (2019). 5G for the Connected World. Wiley Online Library. https://doi.org/10.1002/9781119247111
  27. Chaudhary, S. (2024). Driving behavior change with cybersecurity awareness. Computers & Security, 142, 103858. https://doi.org/10.1016/j.cose.2024.103858
  28. Dağtaş, S., Pekhteryev, G., Şahinoğlu, Z., et al. (2008). Real-Time and Secure Wireless Health Monitoring. International Journal of Telemedicine and Applications, 2008, 1–10. https://doi.org/10.1155/2008/135808
  29. Data Science and Security. (2022). Lecture Notes in Networks and Systems. Springer Nature Singapore.
  30. De Nicola, A., & Villani, M. L. (2021). Smart City Ontologies and Their Applications: A Systematic Literature Review. Sustainability, 13(10), 5578. https://doi.org/10.3390/su13105578
  31. Decision Making and Security Risk Management for IoT Environments. (2024). Advances in Information Security. Springer International Publishing.
  32. Demertzi, V., Demertzis, S., & Demertzis, K. (2023). An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities. Applied Sciences, 13(2), 790. https://doi.org/10.3390/app13020790
  33. Dou, X., Chen, W., Zhu, L., et al. (2023). Machine Learning for Smart Cities: A Comprehensive Review of Applications and Opportunities. International Journal of Advanced Computer Science and Applications, 14(9). https://doi.org/10.14569/ijacsa.2023.01409104
  34. Duggineni, S. (2023). Data Integrity and Risk. Open Journal of Optimization, 12(02), 25–33. https://doi.org/10.4236/ojop.2023.122003
  35. Egbert, S., & Leese, M. (2020). Criminal Futures: Predictive Policing and Everyday Police Work. CrimRxiv. https://doi.org/10.21428/cb6ab371.17e3e7ab
  36. Fan, J., Yang, W., Liu, Z., et al. (2023). Understanding Security in Smart City Domains From the ANT-Centric Perspective. IEEE Internet of Things Journal, 10(13), 11199–11223. https://doi.org/10.1109/jiot.2023.3252040
  37. Froomkin, M., & Colangelo, Z. (2020). Privacy as Safety. Wash. L. Rev., 95, 141.
  38. Ghorbel, A., Ghorbel, M., & Jmaiel, M. (2021). Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. International Journal of Information Security, 21(3), 489–508. https://doi.org/10.1007/s10207-021-00565-4
  39. Gracias, J. S., Parnell, G. S., Specking, E., et al. (2023). Smart Cities—A Structured Literature Review. Smart Cities, 6(4), 1719–1743. https://doi.org/10.3390/smartcities6040080
  40. Guerar, M., Verderame, L., Merlo, A., et al. (2020). CirclePIN. ACM Transactions on Cyber-Physical Systems, 4(3), 1–19. https://doi.org/10.1145/3365995
  41. Hasan, M. K., Ghazal, T. M., Saeed, R. A., et al. (2021). A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things. IET Communications, 16(5), 421–432. Portico. https://doi.org/10.1049/cmu2.12301
  42. Hemmati, R., & Faraji, H. (2022). Identification of cyber-attack/outage/fault in zero-energy building with load and energy management strategies. Journal of Energy Storage, 50, 104290. https://doi.org/10.1016/j.est.2022.104290
  43. Hoang, T. V. (2024). Impact of Integrated Artificial Intelligence and Internet of Things Technologies on Smart City Transformation. Journal of Technical Education Science, 19(1), 64–73. https://doi.org/10.54644/jte.2024.1532
  44. Houichi, M., Jaidi, F., & Bouhoula, A. (2022). Analysis of Smart Cities Security: Challenges and Advancements. In: Proceedings of 2022 15th International Conference on Security of Information and Networks (SIN); 11-13 November 2022; Sousse, Tunisia.
  45. Houichi, M., Jaidi, F., & Bouhoula, A. (2023). A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach. 2023 International Wireless Communications and Mobile Computing (IWCMC), 8, 505–511. https://doi.org/10.1109/iwcmc58020.2023.10182948
  46. Islam, A. I. A., Anthony, C. A., Shedrack, O., et al. (2024). Cybersecurity Challenges in Smart Cities: A Case Review of African Metropolises. Computer Science & IT Research Journal, 5(2), 254–269. https://doi.org/10.51594/csitrj.v5i2.756
  47. Ismagilova, E., Hughes, L., Rana, N. P., et al. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers, 24(2), 393–414. https://doi.org/10.1007/s10796-020-10044-1
  48. Jaïdi, F., Labbene Ayachi, F., & Bouhoula, A. (2018). A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Security and Communication Networks, 2018, 1–22. https://doi.org/10.1155/2018/7142170
  49. Jaïdi, F., Labbene-Ayachi, F., & Bouhoula, A. (2016). Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare. Journal of Medical Systems, 40(12). https://doi.org/10.1007/s10916-016-0630-2
  50. James, E., & Rabbi, F. (2023). Fortifying the IoT Landscape: Strategies to Counter Security Risks in Connected Systems. Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, 6(1), 32-46.
  51. Jeong, H., Shen, Y., Jeong, J., & Oh, T. (2021). A comprehensive survey on vehicular networking for safe and efficient driving in smart transportation: A focus on systems, protocols, and applications. Vehicular Communications, 31, 100349. https://doi.org/10.1016/j.vehcom.2021.100349
  52. Jha, A., & Jha, A. (2024). Securing tomorrow’s urban frontiers: A holistic approach to cybersecurity in smart cities. Information System and Smart City, 3(1). https://doi.org/10.59400/issc.v3i1.418
  53. Jia, M., Komeily, A., Wang, Y., et al. (2019). Adopting Internet of Things for the development of smart buildings: A review of enabling technologies and applications. Automation in Construction, 101, 111–126. https://doi.org/10.1016/j.autcon.2019.01.023
  54. Ji-Young, K., Jong In, L., & Kyoung Gon, K. (2019). The All-Purpose Sword: North Korea’s Cyber Operations and Strategies. 2019 11th International Conference on Cyber Conflict (CyCon), 5, 1–20. https://doi.org/10.23919/cycon.2019.8756954
  55. Judijanto, L., Putra, H. N., Zani, B. N., et al. (2024). E-Health and Digital Transformation in Increasing Accessibility of Health Services. Journal of World Future Medicine, Health and Nursing, 2(1), 119–132. https://doi.org/10.70177/health.v2i1.720
  56. Kalunga, J., Tembo, S., & Phiri, J. (2020). Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identityfor Industrial Internet of ThingsCritical Infrastructure Protection. International Journal of Advances in Scientific Research and Engineering, 6(12), 15–34. https://doi.org/10.31695/ijasre.2020.33940
  57. Kanellopoulos, D., Sharma, V. K., Panagiotakopoulos, T., et al. (2023). Networking Architectures and Protocols for IoT Applications in Smart Cities: Recent Developments and Perspectives. Electronics, 12(11), 2490. https://doi.org/10.3390/electronics12112490
  58. Karale, A. (2021). The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws. Internet of Things, 15, 100420. https://doi.org/10.1016/j.iot.2021.100420
  59. Kavitha, J., Rao, P. S. V. S., & Babu, G. C. (2023). Energy Efficient Resource Utilization of Cloud Computing Environments for Deployment Models. 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), 26, 1111–1119. https://doi.org/10.1109/icaiss58487.2023.10250648
  60. Kayode-Ajala, O. (2023). Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption. Applied Research in Artificial Intelligence and Cloud Computing, 6(8), 1-21.
  61. Khan, M. Y. (2023). Cyber Security: Recent Cyber-Attacks as A Challenge to National Economic Security. International Journal of Modern Sciences and Multidisciplinary Studies (Ijmsms), 2(01), 72-100.
  62. Kim, K., Alshenaifi, I. M., Ramachandran, S., et al. (2023). Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors, 23(7), 3681. https://doi.org/10.3390/s23073681
  63. Kim, K., Cho, K., Lim, J., et al. (2020). What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive and Mobile Computing, 66, 101211. https://doi.org/10.1016/j.pmcj.2020.101211
  64. Kim, K., Kim, J. S., Jeong, S., et al. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103, 102150. https://doi.org/10.1016/j.cose.2020.102150
  65. Kitchin, R. (2016). Getting smarter about smart cities: Improving data privacy and data security. Sensors. https://doi.org/10.3390/s22239338
  66. Krishna, S. R., Rathor, K., Ranga, J., et al. (2023). Artificial Intelligence Integrated with Big Data Analytics for Enhanced Marketing. In 2023 International Conference on Inventive Computation Technologies (ICICT). IEEE; pp. 1073-1077.
  67. Ksibi, S., Jaidi, F., & Bouhoula, A. (2023). IoMT Security Model based on Machine Learning and Risk Assessment Techniques. 2023 International Wireless Communications and Mobile Computing (IWCMC), 11, 614–619. https://doi.org/10.1109/iwcmc58020.2023.10182654
  68. Lansky, J., Sadrishojaei, M., Rahmani, A. M., et al. (2022). Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166
  69. Li, H., Wang, X., Feng, Y., et al. (2024). Integration Methods and Advantages of Machine Learning with Cloud Data Warehouses. International Journal of Computer Science and Information Technology, 2(1), 348–358. https://doi.org/10.62051/ijcsit.v2n1.36
  70. Liu, Y., Yu, F. R., Li, X., et al. (2020). Blockchain and Machine Learning for Communications and Networking Systems. IEEE Communications Surveys & Tutorials, 22(2), 1392–1431. https://doi.org/10.1109/comst.2020.2975911
  71. Löfgren, K., & Webster, C. W. R. (2020). The value of Big Data in government: The case of smart cities. Big Data & Society, 7(1), 205395172091277. https://doi.org/10.1177/2053951720912775
  72. Lounis, K., & Zulkernine, M. (2020). Attacks and Defenses in Short-Range Wireless Technologies for IoT. IEEE Access, 8, 88892–88932. https://doi.org/10.1109/access.2020.2993553
  73. Lyon, V. (2020). Exploring Strategies for Recruiting and Retaining Diverse Cybersecurity Professionals [PhD thesis]. Walden University.
  74. Ma, C. (2021). Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Reports, 7, 7999–8012. https://doi.org/10.1016/j.egyr.2021.08.124
  75. Majdoubi, D. E., Bakkali, H., & Sadki, S. (2020). Towards Smart Blockchain-Based System for Privacy and Security in a Smart City environment. In: Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech); 24–26 November 2020; Marrakesh, Morocco.
  76. Marín Díaz, G., Galdón Salvador, J. L., & Galán Hernández, J. J. (2023). Smart Cities and Citizen Adoption: Exploring Tourist Digital Maturity for Personalizing Recommendations. Electronics, 12(16), 3395. https://doi.org/10.3390/electronics12163395
  77. Markovic, D. S., Zivkovic, D., Branovic, I., et al. (2013). Smart power grid and cloud computing. Renewable and Sustainable Energy Reviews, 24, 566–577. https://doi.org/10.1016/j.rser.2013.03.068
  78. Meng, X., & Zhu, L. (2024). Augmenting cybersecurity in smart urban energy systems through IoT and blockchain technology within the Digital Twin framework. Sustainable Cities and Society, 106, 105336. https://doi.org/10.1016/j.scs.2024.105336
  79. Miller, C., & Valasek, C. (2015). Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015(S 91), 1-91.
  80. Miranda, R., Alves, C., Sousa, R., et al. (2024). Revolutionising the Quality of Life: The Role of Real-Time Sensing in Smart Cities. Electronics, 13(3), 550. https://doi.org/10.3390/electronics13030550
  81. Mortaheb, R., & Jankowski, P. (2023). Smart city re-imagined: City planning and GeoAI in the age of big data. Journal of Urban Management, 12(1), 4–15. https://doi.org/10.1016/j.jum.2022.08.001
  82. Mun, M., Reddy, S., Shilton, K., et al. (2009). PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services; 22 June 2009.
  83. Nastjuk, I., Trang, S., & Papageorgiou, E. I. (2022). Smart cities and smart governance models for future cities. Electronic Markets, 32(4), 1917–1924. https://doi.org/10.1007/s12525-022-00609-0
  84. Nguyen, L., Phan, B., Zhang, L., et al. (2024). An Efficient Approach for Securing Audio Data in AI Training with Fully Homomorphic Encryption. Available online: https://doi.org/10.36227/techrxiv.170956397.78402834/v1 (accessed on 12 May 2024).
  85. Nurthen II, J. M. (2023). Cybersecurity Risk Assessment Matrix (CRAM): A System-Theoretic Approach to Balancing Operational and Cybersecurity Risk in the Management of Transient Cyber Assets (TCA) in the Maintenance of Operational Technology (OT) [PhD thesis]. Massachusetts Institute of Technology.
  86. Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of Cyber Security, 115–133. https://doi.org/10.58496/mjcsc/2023/016
  87. Panahi Rizi, M. H., & Hosseini Seno, S. A. (2022). A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet of Things, 20, 100584. https://doi.org/10.1016/j.iot.2022.100584
  88. Panda, P. K., & Chattopadhyay, S. (2020). A secure mutual authentication protocol for IoT environment. Journal of Reliable Intelligent Environments, 6(2), 79–94. https://doi.org/10.1007/s40860-020-00098-y
  89. Pasandi, F. B. (2024). Creative Organic Smart Spaces and Communities: Leveraging Technology to Fight Socio-Environmental Impacts. Available online: https://hal.science/hal-04527432 (accessed on 17 May 2024).
  90. Petrova, M., & Tairov, I. (2022). Solutions to Manage Smart Cities’ Risks in Times of Pandemic Crisis. Risks, 10(12), 240. https://doi.org/10.3390/risks10120240
  91. Pratomo, A. B., Mokodenseho, S., & Aziz, A. M. (2023). Data Encryption and Anonymization Techniques for Enhanced Information System Security and Privacy. West Science Information System and Technology, 1(01), 1–9. https://doi.org/10.58812/wsist.v1i01.176
  92. Principles and Applications of Narrowband Internet of Things (NBIoT). (2021). Advances in Wireless Technologies and Telecommunication. IGI Global. https://doi.org/10.4018/978-1-7998-4775-5
  93. Proceedings of the 6th Brazilian Technology Symposium (BTSym’20). (2021). Smart Innovation, Systems and Technologies. Springer International Publishing.
  94. Proceedings of the 7th Brazilian Technology Symposium (BTSym’21). (2022). Smart Innovation, Systems and Technologies. Springer International Publishing.
  95. Rafique, W., Qi, L., Yaqoob, I., et al. (2020). Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 22(3), 1761–1804. https://doi.org/10.1109/comst.2020.2997475
  96. Rahman, K., Khan, M. A., Afghah, F., et al. (2024). An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion. IEEE Access, 12, 62750–62764. https://doi.org/10.1109/access.2024.3395494
  97. Raj, P., Akilandeswari, J., & Marimuthu, M. (2022). The edge AI paradigm: Technologies, platforms and use cases. Edge/Fog Computing Paradigm: The Concept Platforms and Applications, 139–182. https://doi.org/10.1016/bs.adcom.2022.02.003
  98. Rajendran, S., Sabharwal, M., Ghinea, G., et al. (2022). IoT and Big Data Analytics for Smart Cities. Chapman and Hall/CRC. https://doi.org/10.1201/9781003217404
  99. Rao, G. S., & Subbarao, P. K. (2024). A Novel Framework for Detection of DoS/DDoS Attack Using Deep Learning Techniques, and An Approach to Mitigate the Impact of DoS/DDoS attack in Network Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 450-466.
  100. Rehan, H. (2023). Internet of Things (IoT) in Smart Cities: Enhancing Urban Living Through Technology. Journal of Engineering and Technology, 5(1), 1-16.
  101. Rejeb, A., Rejeb, K., Simske, S. J., et al. (2021). Blockchain technology in the smart city: a bibliometric review. Quality & Quantity, 56(5), 2875–2906. https://doi.org/10.1007/s11135-021-01251-2
  102. Remotti, L. A. (2021). IoT innovation clusters in Europe and the case for public policy. Data & Policy, 3. https://doi.org/10.1017/dap.2021.16
  103. Rhoda, A. A., Kehinde, F, A., Ndubuisi, L. N., et al. (2024). Reviewing big data’s role in the digital economy: USA and Africa focus. World Journal of Advanced Research and Reviews, 21(2), 085–095. https://doi.org/10.30574/wjarr.2024.21.2.0396
  104. Ribeiro-Navarrete, S., Saura, J. R., & Palacios-Marqués, D. (2021). Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy. Technological Forecasting and Social Change, 167, 120681. https://doi.org/10.1016/j.techfore.2021.120681
  105. Sabbar Zamel, L., & Rokan Naif, J. (2023). An Overview Smart Assistant System for Old People Using Internet of Things. Iraqi Journal for Computers and Informatics, 49(2), 28–36. https://doi.org/10.25195/ijci.v49i2.432
  106. Saber, O., & Mazri, T. (2021). Smart City Security Issues: The Main Attacks and Countermeasures. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 465–472. https://doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-465-2021
  107. Satterthwaite, D. (2007). The transition to a predominantly urban world and its underpinnings. iied.
  108. Scandizzo, P. L., & Knudsen, O. K. (2024). The New Normalcy and the Pandemic Threat: A Real Option Approach. Journal of Risk and Financial Management, 17(2), 72. https://doi.org/10.3390/jrfm17020072
  109. Shahidehpour, M., Li, Z., & Ganji, M. (2018). Smart cities for a sustainable urbanization: Illuminating the need for establishing smart urban infrastructures. IEEE Electrification Magazine, 6(2), 16–33. https://doi.org/10.1109/mele.2018.2816840
  110. Shahzad, F., Javed, A. R., Zikria, Y. B., et al. (2021). Future smart cities: requirements, emerging technologies, applications, challenges, and future aspects. TechRxiv.
  111. Sharma, R., & Arya, R. (2022). Security threats and measures in the Internet of Things for smart city infrastructure: A state of art. Transactions on Emerging Telecommunications Technologies, 34(11). Portico. https://doi.org/10.1002/ett.4571
  112. Shawe, R., & McAndrew, I. R. (2023). Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks. Journal of Software Engineering and Applications, 16(10), 530–547. https://doi.org/10.4236/jsea.2023.1610027
  113. Silasai, O., & Khowfa, W. (2020). The study on using biometric authentication on mobile device. NU Int. J. Sci, 17, 90-110.
  114. Silva, B. N., Khan, M., & Han, K. (2018). Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities. Sustainable Cities and Society, 38, 697–713. https://doi.org/10.1016/j.scs.2018.01.053
  115. Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. Security and Privacy Issues in IoT Devices and Sensor Networks, 153–185. https://doi.org/10.1016/b978-0-12-821255-4.00008-0
  116. Singh, S. K., Azzaoui, A. E., Choo, K. K. R., et al. (2023). Articles A Comprehensive Survey on Blockchain for Secure IoT-enabled Smart City beyond 5G: Approaches, Processes, Challenges, and Opportunities. Hum Centric Comput. Inf. Sci, 13, 51.
  117. Singh, S., Sharma, P. K., Yoon, B., et al. (2020). Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustainable Cities and Society, 63, 102364. https://doi.org/10.1016/j.scs.2020.102364
  118. Siripurapu, S., Darimireddy, N. K., Chehri, A., et al. (2023). Technological Advancements and Elucidation Gadgets for Healthcare Applications: An Exhaustive Methodological Review-Part-I (AI, Big Data, Block Chain, Open-Source Technologies, and Cloud Computing). Electronics, 12(3), 750. https://doi.org/10.3390/electronics12030750
  119. Sizov, N. (2024). Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management. Theseus.
  120. Smart, C. (2024). Studies in Energy, Resource and Environmental Economics. Springer International Publishing.
  121. Sodiq, A., Baloch, A. A. B., Khan, S. A., et al. (2019). Towards modern sustainable cities: Review of sustainability principles and trends. Journal of Cleaner Production, 227, 972–1001. https://doi.org/10.1016/j.jclepro.2019.04.106
  122. Sooriyaarachchi, J., Seneviratne, S., Thilakarathna, K., et al. (2021). MusicID: A Brainwave-Based User Authentication System for Internet of Things. IEEE Internet of Things Journal, 8(10), 8304–8313. https://doi.org/10.1109/jiot.2020.3044726
  123. Stratigea, A., Papadopoulou, C. A., & Panagiotopoulou, M. (2015). Tools and Technologies for Planning the Development of Smart Cities. Journal of Urban Technology, 22(2), 43–62. https://doi.org/10.1080/10630732.2015.1018725
  124. Syed, A. S., Sierra-Sosa, D., Kumar, A., et al. (2021). IoT in Smart Cities: A Survey of Technologies, Practices and Challenges. Smart Cities, 4(2), 429–475. https://doi.org/10.3390/smartcities4020024
  125. Tahirkheli, A. I., Shiraz, M., Hayat, B., et al. (2021). A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges. Electronics, 10(15), 1811. https://doi.org/10.3390/electronics10151811
  126. Tahmasebi, M. (2024). Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises. Journal of Information Security, 15(02), 106–133. https://doi.org/10.4236/jis.2024.152008
  127. Telo, J. (2023). Smart city security threats and countermeasures in the context of emerging technologies. International Journal of Intelligent Automation and Computing, 6(1), 31-45.
  128. Törngren, M., & Grogan, P. T. (2018). How to Deal with the Complexity of Future Cyber-Physical Systems? Designs, 2(4), 40. https://doi.org/10.3390/designs2040040
  129. Ullah, A., Anwar, S. M., Li, J., et al. (2023). Smart cities: the role of Internet of Things and machine learning in realizing a data-centric smart environment. Complex & Intelligent Systems, 10(1), 1607–1637. https://doi.org/10.1007/s40747-023-01175-4
  130. Valencia Rojas, A. L. (2023). The Rise of Net-States in the Cyberspace: Cyber Power Dynamics and the Disruption of International Security [Master’s thesis]. Charles University.
  131. Varghese, B. (2024). Examining the Transformation of IT Departments Post-adoption of Cloud Computing Services [PhD thesis] Dublin Business School.
  132. Vimala, H. S., et al. (2023). A systematic survey on content caching in ICN and ICN-IoT: Challenges, approaches and strategies. Computer Networks, 233, 109896. https://doi.org/10.1016/j.comnet.2023.109896
  133. Vitunskaite, M., He, Y., Brandstetter, T., et al. (2019). Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Computers & Security, 83, 313–331. https://doi.org/10.1016/j.cose.2019.02.009
  134. Waseem, M., Adnan Khan, M., Goudarzi, A., et al. (2023). Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges. Energies, 16(2), 820. https://doi.org/10.3390/en16020820
  135. Winn, J., & Govern, K. (2009). Identity theft: Risks and challenges to business of data compromise. Temp. J. Sci. Tech. & Envtl. L., 28, 49.
  136. Xenofontos, C., Zografopoulos, I., Konstantinou, C., et al. (2022). Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet of Things Journal, 9(1), 199–221. https://doi.org/10.1109/jiot.2021.3079916
  137. Xia, L., Semirumi, D. T., & Rezaei, R. (2023). A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy. Sustainable Cities and Society, 98, 104771. https://doi.org/10.1016/j.scs.2023.104771
  138. Xia, Z., Wu, J., Wu, L., et al. (2021). A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks. ACM Transactions on Intelligent Systems and Technology, 12(4), 1–30. https://doi.org/10.1145/3451984
  139. Yang, P., Xiong, N., & Ren, J. (2020). Data Security and Privacy Protection for Cloud Storage: A Survey. IEEE Access, 8, 131723–131740. https://doi.org/10.1109/access.2020.3009876
  140. Yang, W., Wang, S., Sahri, N. M., et al. (2021). Biometrics for Internet-of-Things Security: A Review. Sensors, 21(18), 6163. https://doi.org/10.3390/s21186163
  141. Zamponi, M. E., & Barbierato, E. (2022). The Dual Role of Artificial Intelligence in Developing Smart Cities. Smart Cities, 5(2), 728–755. https://doi.org/10.3390/smartcities5020038
  142. Zanaj, E., Caso, G., De Nardis, L., et al. (2021). Energy Efficiency in Short and Wide-Area IoT Technologies—A Survey. Technologies, 9(1), 22. https://doi.org/10.3390/technologies9010022
  143. Zhou, W., Jia, Y., Peng, A., et al. (2019). The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet of Things Journal, 6(2), 1606–1616. https://doi.org/10.1109/jiot.2018.2847733
  144. Zhuang, H., Zhang, J., C. B., et al. (2020). Sustainable Smart City Building Construction Methods. Sustainability, 12(12), 4947. https://doi.org/10.3390/su12124947


DOI: https://doi.org/10.24294/jipd.v8i10.8629

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Mehdi Houichi, Faouzi Jaidi, Adel Bouhoula

License URL: https://creativecommons.org/licenses/by/4.0/

This site is licensed under a Creative Commons Attribution 4.0 International License.