A comprehensive and in-depth study of the threats faced by smart cities and the countermeasures implemented in their key areas

Mehdi Houichi, Faouzi Jaidi, Adel Bouhoula

Article ID: 8629
Vol 8, Issue 10, 2024

VIEWS - 120 (Abstract) 64 (PDF)

Abstract


A smart city focuses on enhancing and interconnecting facilities and services through digital technology to offer convenient services for both people and businesses. The basic infrastructure of smart cities consists of modern technologies such as the Internet of Things (IoT), cloud computing and artificial intelligence. These urban areas utilize different networks, such as the Internet and IoT, to share real-time information, improving convenience for the inhabitants. However, the reliance of smart cities on modern technologies exposes them to a range of organized, diverse, and sophisticated cyber threats. Therefore, prioritizing cybersecurity awareness and implementing appropriate measures and solutions are essential to protect the privacy and security of citizens. This study aims to identify cyber threats and their impact on smart cities, as well as the methods and measures required for key areas such as smart government, smart healthcare, smart mobility, smart environment, smart economy, smart living, and smart people. Furthermore, this study seeks to evaluate previous research in this field, establish necessary policies to mitigate these threats, and propose an appropriate model for the infrastructure associated with IT networks in smart cities.


Keywords


smart city; digital technology; cybersecurity; privacy; Internet of Things

Full Text:

PDF


References


Abdel-Rahman, M. (2023). Advanced cybersecurity measures in IT service operations and their crucial role in safeguarding enterprise data in a connected world. Eigenpub Review of Science and Technology, 7(1), 138-158.

Abdulelah, A. J., & Mustafa, A. S. (2020). Advanced Secure Architecture for The Internet of Things based on DTLS Protocol. 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 1–5. https://doi.org/10.1109/ismsit50672.2020.9254700

Access 17.0M+ vector icons & stickers. (2024). Download Free Icons and Stickers for your projects. Available online: https://www.flaticon.com (accessed on 3 May 2024).

Adel, A. (2023). Unlocking the Future: Fostering Human–Machine Collaboration and Driving Intelligent Automation through Industry 5.0 in Smart Cities. Smart Cities, 6(5), 2742–2782. https://doi.org/10.3390/smartcities6050124

Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors, 22(13), 4730. https://doi.org/10.3390/s22134730

Ahmed, S., & Khan, M. (2023). Securing the Internet of Things (IoT): A comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem. AI, IoT and the Fourth Industrial Revolution Review, 13(9), 1-17.

AlQahtani, A. A. S., Alshayeb, T., Nabil, M., et al. (2024). Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor Authentication. IEEE Access, 12, 13277–13289. https://doi.org/10.1109/access.2024.3356351

Amin, S. U., & Hossain, M. S. (2021). Edge Intelligence and Internet of Things in Healthcare: A Survey. IEEE Access, 9, 45–59. https://doi.org/10.1109/access.2020.3045115

Angelidou, M., Psaltoglou, A., Komninos, N., et al. (2017). Enhancing sustainable urban development through smart city applications. Journal of Science and Technology Policy Management, 9(2), 146–169. https://doi.org/10.1108/jstpm-05-2017-0016

Apata, O., Bokoro, P. N., & Sharma, G. (2023). The Risks and Challenges of Electric Vehicle Integration into Smart Cities. Energies, 16(14), 5274. https://doi.org/10.3390/en16145274

Asaju, B. J. (2024). Standardization and regulation of V2X cybersecurity: analyzing the current landscape, identifying gaps, and proposing frameworks for harmonization. Advances in Deep Learning Techniques, 4(1), 33-52.

Azeez, O. H., Sarah, K. E., Adekunle, A. A., et al. (2024). Cybersecurity In Banking: A Global Perspective with A Focus on Nigerian Practices. Computer Science & IT Research Journal, 5(1), 41–59. https://doi.org/10.51594/csitrj.v5i1.701

Azzedin, F. (2023). Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach. IEEE Access, 11, 129077–129089. https://doi.org/10.1109/access.2023.3331030

Babikian, J. (2023). Navigating Legal Frontiers: Exploring Emerging Issues in Cyber Law. Revista Espanola de Documentacion Cientifica, 17(2), 95-109.

Bailey, L. E., & Nyabola, N. (2021). Digital Equity as an Enabling Platform for Equality and Inclusion. Available online: https://cic. nyu. edu/resources/digital-equity-as-an-enabling-platform-for-equality-and-inclusion (accessed on 12 May 2024).

Bakshi, G., & Sahu, H. (2022). WSN Security. Computational Intelligence for Wireless Sensor Networks, 151–174. https://doi.org/10.1201/9781003102397-9

Barbera, S. L. (2023). Revolutionizing Italian Homes: Embracing the Smart Home Era in the Housing Landscape. Research square. https://doi.org/10.21203/rs.3.rs-3272478/v1

Belavagi, M. C., & Muniyal, B. (2022). Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification. International Journal of Communication Networks and Information Security (IJCNIS), 13(1). https://doi.org/10.17762/ijcnis.v13i1.4875

Benyahya, M., Collen, A., Kechagia, S., et al. (2022). Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments. Computers & Security, 122, 102904. https://doi.org/10.1016/j.cose.2022.102904

Bhardwaj, A., Bharany, S., Abulfaraj, A. W., et al. (2024). Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities. Egyptian Informatics Journal, 25, 100443. https://doi.org/10.1016/j.eij.2024.100443

Bibri, S. E., Alexandre, A., Sharifi, A., et al. (2023). Environmentally sustainable smart cities and their converging AI, IoT, and big data technologies and solutions: an integrated approach to an extensive literature review. Energy Informatics, 6(1). https://doi.org/10.1186/s42162-023-00259-2

Böhm, F., Dietz, M., Preindl, T., et al. (2021). Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. Journal of Cybersecurity and Privacy, 1(3), 519–538. https://doi.org/10.3390/jcp1030026

Boukerche, A., & Coutinho, R. W. L. (2019). Crowd Management: The Overlooked Component of Smart Transportation Systems. IEEE Communications Magazine, 57(4), 48–53. https://doi.org/10.1109/mcom.2019.1800641

Bouramdane, A. A. (2023). Optimal Water Management Strategies: Paving the Way for Sustainability in Smart Cities. Smart Cities, 6(5), 2849–2882. https://doi.org/10.3390/smartcities6050128

Brauneck, A., Schmalhorst, L., Kazemi Majdabadi, M. M., et al. (2023). Federated Machine Learning, Privacy-Enhancing Technologies, and Data Protection Laws in Medical Research: Scoping Review. Journal of Medical Internet Research, 25, e41588. https://doi.org/10.2196/41588

Chandramouli, D., Liebhart, R., & Pirskanen, J. (2019). 5G for the Connected World. Wiley Online Library. https://doi.org/10.1002/9781119247111

Chaudhary, S. (2024). Driving behavior change with cybersecurity awareness. Computers & Security, 142, 103858. https://doi.org/10.1016/j.cose.2024.103858

Dağtaş, S., Pekhteryev, G., Şahinoğlu, Z., et al. (2008). Real-Time and Secure Wireless Health Monitoring. International Journal of Telemedicine and Applications, 2008, 1–10. https://doi.org/10.1155/2008/135808

Data Science and Security. (2022). Lecture Notes in Networks and Systems. Springer Nature Singapore.

De Nicola, A., & Villani, M. L. (2021). Smart City Ontologies and Their Applications: A Systematic Literature Review. Sustainability, 13(10), 5578. https://doi.org/10.3390/su13105578

Decision Making and Security Risk Management for IoT Environments. (2024). Advances in Information Security. Springer International Publishing.

Demertzi, V., Demertzis, S., & Demertzis, K. (2023). An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities. Applied Sciences, 13(2), 790. https://doi.org/10.3390/app13020790

Dou, X., Chen, W., Zhu, L., et al. (2023). Machine Learning for Smart Cities: A Comprehensive Review of Applications and Opportunities. International Journal of Advanced Computer Science and Applications, 14(9). https://doi.org/10.14569/ijacsa.2023.01409104

Duggineni, S. (2023). Data Integrity and Risk. Open Journal of Optimization, 12(02), 25–33. https://doi.org/10.4236/ojop.2023.122003

Egbert, S., & Leese, M. (2020). Criminal Futures: Predictive Policing and Everyday Police Work. CrimRxiv. https://doi.org/10.21428/cb6ab371.17e3e7ab

Fan, J., Yang, W., Liu, Z., et al. (2023). Understanding Security in Smart City Domains From the ANT-Centric Perspective. IEEE Internet of Things Journal, 10(13), 11199–11223. https://doi.org/10.1109/jiot.2023.3252040

Froomkin, M., & Colangelo, Z. (2020). Privacy as Safety. Wash. L. Rev., 95, 141.

Ghorbel, A., Ghorbel, M., & Jmaiel, M. (2021). Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. International Journal of Information Security, 21(3), 489–508. https://doi.org/10.1007/s10207-021-00565-4

Gracias, J. S., Parnell, G. S., Specking, E., et al. (2023). Smart Cities—A Structured Literature Review. Smart Cities, 6(4), 1719–1743. https://doi.org/10.3390/smartcities6040080

Guerar, M., Verderame, L., Merlo, A., et al. (2020). CirclePIN. ACM Transactions on Cyber-Physical Systems, 4(3), 1–19. https://doi.org/10.1145/3365995

Hasan, M. K., Ghazal, T. M., Saeed, R. A., et al. (2021). A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things. IET Communications, 16(5), 421–432. Portico. https://doi.org/10.1049/cmu2.12301

Hemmati, R., & Faraji, H. (2022). Identification of cyber-attack/outage/fault in zero-energy building with load and energy management strategies. Journal of Energy Storage, 50, 104290. https://doi.org/10.1016/j.est.2022.104290

Hoang, T. V. (2024). Impact of Integrated Artificial Intelligence and Internet of Things Technologies on Smart City Transformation. Journal of Technical Education Science, 19(1), 64–73. https://doi.org/10.54644/jte.2024.1532

Houichi, M., Jaidi, F., & Bouhoula, A. (2022). Analysis of Smart Cities Security: Challenges and Advancements. In: Proceedings of 2022 15th International Conference on Security of Information and Networks (SIN); 11-13 November 2022; Sousse, Tunisia.

Houichi, M., Jaidi, F., & Bouhoula, A. (2023). A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach. 2023 International Wireless Communications and Mobile Computing (IWCMC), 8, 505–511. https://doi.org/10.1109/iwcmc58020.2023.10182948

Islam, A. I. A., Anthony, C. A., Shedrack, O., et al. (2024). Cybersecurity Challenges in Smart Cities: A Case Review of African Metropolises. Computer Science & IT Research Journal, 5(2), 254–269. https://doi.org/10.51594/csitrj.v5i2.756

Ismagilova, E., Hughes, L., Rana, N. P., et al. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers, 24(2), 393–414. https://doi.org/10.1007/s10796-020-10044-1

Jaïdi, F., Labbene Ayachi, F., & Bouhoula, A. (2018). A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Security and Communication Networks, 2018, 1–22. https://doi.org/10.1155/2018/7142170

Jaïdi, F., Labbene-Ayachi, F., & Bouhoula, A. (2016). Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare. Journal of Medical Systems, 40(12). https://doi.org/10.1007/s10916-016-0630-2

James, E., & Rabbi, F. (2023). Fortifying the IoT Landscape: Strategies to Counter Security Risks in Connected Systems. Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, 6(1), 32-46.

Jeong, H., Shen, Y., Jeong, J., & Oh, T. (2021). A comprehensive survey on vehicular networking for safe and efficient driving in smart transportation: A focus on systems, protocols, and applications. Vehicular Communications, 31, 100349. https://doi.org/10.1016/j.vehcom.2021.100349

Jha, A., & Jha, A. (2024). Securing tomorrow’s urban frontiers: A holistic approach to cybersecurity in smart cities. Information System and Smart City, 3(1). https://doi.org/10.59400/issc.v3i1.418

Jia, M., Komeily, A., Wang, Y., et al. (2019). Adopting Internet of Things for the development of smart buildings: A review of enabling technologies and applications. Automation in Construction, 101, 111–126. https://doi.org/10.1016/j.autcon.2019.01.023

Ji-Young, K., Jong In, L., & Kyoung Gon, K. (2019). The All-Purpose Sword: North Korea’s Cyber Operations and Strategies. 2019 11th International Conference on Cyber Conflict (CyCon), 5, 1–20. https://doi.org/10.23919/cycon.2019.8756954

Judijanto, L., Putra, H. N., Zani, B. N., et al. (2024). E-Health and Digital Transformation in Increasing Accessibility of Health Services. Journal of World Future Medicine, Health and Nursing, 2(1), 119–132. https://doi.org/10.70177/health.v2i1.720

Kalunga, J., Tembo, S., & Phiri, J. (2020). Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identityfor Industrial Internet of ThingsCritical Infrastructure Protection. International Journal of Advances in Scientific Research and Engineering, 6(12), 15–34. https://doi.org/10.31695/ijasre.2020.33940

Kanellopoulos, D., Sharma, V. K., Panagiotakopoulos, T., et al. (2023). Networking Architectures and Protocols for IoT Applications in Smart Cities: Recent Developments and Perspectives. Electronics, 12(11), 2490. https://doi.org/10.3390/electronics12112490

Karale, A. (2021). The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws. Internet of Things, 15, 100420. https://doi.org/10.1016/j.iot.2021.100420

Kavitha, J., Rao, P. S. V. S., & Babu, G. C. (2023). Energy Efficient Resource Utilization of Cloud Computing Environments for Deployment Models. 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), 26, 1111–1119. https://doi.org/10.1109/icaiss58487.2023.10250648

Kayode-Ajala, O. (2023). Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption. Applied Research in Artificial Intelligence and Cloud Computing, 6(8), 1-21.

Khan, M. Y. (2023). Cyber Security: Recent Cyber-Attacks as A Challenge to National Economic Security. International Journal of Modern Sciences and Multidisciplinary Studies (Ijmsms), 2(01), 72-100.

Kim, K., Alshenaifi, I. M., Ramachandran, S., et al. (2023). Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors, 23(7), 3681. https://doi.org/10.3390/s23073681

Kim, K., Cho, K., Lim, J., et al. (2020). What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive and Mobile Computing, 66, 101211. https://doi.org/10.1016/j.pmcj.2020.101211

Kim, K., Kim, J. S., Jeong, S., et al. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103, 102150. https://doi.org/10.1016/j.cose.2020.102150

Kitchin, R. (2016). Getting smarter about smart cities: Improving data privacy and data security. Sensors. https://doi.org/10.3390/s22239338

Krishna, S. R., Rathor, K., Ranga, J., et al. (2023). Artificial Intelligence Integrated with Big Data Analytics for Enhanced Marketing. In 2023 International Conference on Inventive Computation Technologies (ICICT). IEEE; pp. 1073-1077.

Ksibi, S., Jaidi, F., & Bouhoula, A. (2023). IoMT Security Model based on Machine Learning and Risk Assessment Techniques. 2023 International Wireless Communications and Mobile Computing (IWCMC), 11, 614–619. https://doi.org/10.1109/iwcmc58020.2023.10182654

Lansky, J., Sadrishojaei, M., Rahmani, A. M., et al. (2022). Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166

Li, H., Wang, X., Feng, Y., et al. (2024). Integration Methods and Advantages of Machine Learning with Cloud Data Warehouses. International Journal of Computer Science and Information Technology, 2(1), 348–358. https://doi.org/10.62051/ijcsit.v2n1.36

Liu, Y., Yu, F. R., Li, X., et al. (2020). Blockchain and Machine Learning for Communications and Networking Systems. IEEE Communications Surveys & Tutorials, 22(2), 1392–1431. https://doi.org/10.1109/comst.2020.2975911

Löfgren, K., & Webster, C. W. R. (2020). The value of Big Data in government: The case of smart cities. Big Data & Society, 7(1), 205395172091277. https://doi.org/10.1177/2053951720912775

Lounis, K., & Zulkernine, M. (2020). Attacks and Defenses in Short-Range Wireless Technologies for IoT. IEEE Access, 8, 88892–88932. https://doi.org/10.1109/access.2020.2993553

Lyon, V. (2020). Exploring Strategies for Recruiting and Retaining Diverse Cybersecurity Professionals [PhD thesis]. Walden University.

Ma, C. (2021). Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Reports, 7, 7999–8012. https://doi.org/10.1016/j.egyr.2021.08.124

Majdoubi, D. E., Bakkali, H., & Sadki, S. (2020). Towards Smart Blockchain-Based System for Privacy and Security in a Smart City environment. In: Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech); 24–26 November 2020; Marrakesh, Morocco.

Marín Díaz, G., Galdón Salvador, J. L., & Galán Hernández, J. J. (2023). Smart Cities and Citizen Adoption: Exploring Tourist Digital Maturity for Personalizing Recommendations. Electronics, 12(16), 3395. https://doi.org/10.3390/electronics12163395

Markovic, D. S., Zivkovic, D., Branovic, I., et al. (2013). Smart power grid and cloud computing. Renewable and Sustainable Energy Reviews, 24, 566–577. https://doi.org/10.1016/j.rser.2013.03.068

Meng, X., & Zhu, L. (2024). Augmenting cybersecurity in smart urban energy systems through IoT and blockchain technology within the Digital Twin framework. Sustainable Cities and Society, 106, 105336. https://doi.org/10.1016/j.scs.2024.105336

Miller, C., & Valasek, C. (2015). Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015(S 91), 1-91.

Miranda, R., Alves, C., Sousa, R., et al. (2024). Revolutionising the Quality of Life: The Role of Real-Time Sensing in Smart Cities. Electronics, 13(3), 550. https://doi.org/10.3390/electronics13030550

Mortaheb, R., & Jankowski, P. (2023). Smart city re-imagined: City planning and GeoAI in the age of big data. Journal of Urban Management, 12(1), 4–15. https://doi.org/10.1016/j.jum.2022.08.001

Mun, M., Reddy, S., Shilton, K., et al. (2009). PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services; 22 June 2009.

Nastjuk, I., Trang, S., & Papageorgiou, E. I. (2022). Smart cities and smart governance models for future cities. Electronic Markets, 32(4), 1917–1924. https://doi.org/10.1007/s12525-022-00609-0

Nguyen, L., Phan, B., Zhang, L., et al. (2024). An Efficient Approach for Securing Audio Data in AI Training with Fully Homomorphic Encryption. Available online: https://doi.org/10.36227/techrxiv.170956397.78402834/v1 (accessed on 12 May 2024).

Nurthen II, J. M. (2023). Cybersecurity Risk Assessment Matrix (CRAM): A System-Theoretic Approach to Balancing Operational and Cybersecurity Risk in the Management of Transient Cyber Assets (TCA) in the Maintenance of Operational Technology (OT) [PhD thesis]. Massachusetts Institute of Technology.

Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of Cyber Security, 115–133. https://doi.org/10.58496/mjcsc/2023/016

Panahi Rizi, M. H., & Hosseini Seno, S. A. (2022). A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet of Things, 20, 100584. https://doi.org/10.1016/j.iot.2022.100584

Panda, P. K., & Chattopadhyay, S. (2020). A secure mutual authentication protocol for IoT environment. Journal of Reliable Intelligent Environments, 6(2), 79–94. https://doi.org/10.1007/s40860-020-00098-y

Pasandi, F. B. (2024). Creative Organic Smart Spaces and Communities: Leveraging Technology to Fight Socio-Environmental Impacts. Available online: https://hal.science/hal-04527432 (accessed on 17 May 2024).

Petrova, M., & Tairov, I. (2022). Solutions to Manage Smart Cities’ Risks in Times of Pandemic Crisis. Risks, 10(12), 240. https://doi.org/10.3390/risks10120240

Pratomo, A. B., Mokodenseho, S., & Aziz, A. M. (2023). Data Encryption and Anonymization Techniques for Enhanced Information System Security and Privacy. West Science Information System and Technology, 1(01), 1–9. https://doi.org/10.58812/wsist.v1i01.176

Principles and Applications of Narrowband Internet of Things (NBIoT). (2021). Advances in Wireless Technologies and Telecommunication. IGI Global. https://doi.org/10.4018/978-1-7998-4775-5

Proceedings of the 6th Brazilian Technology Symposium (BTSym’20). (2021). Smart Innovation, Systems and Technologies. Springer International Publishing.

Proceedings of the 7th Brazilian Technology Symposium (BTSym’21). (2022). Smart Innovation, Systems and Technologies. Springer International Publishing.

Rafique, W., Qi, L., Yaqoob, I., et al. (2020). Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 22(3), 1761–1804. https://doi.org/10.1109/comst.2020.2997475

Rahman, K., Khan, M. A., Afghah, F., et al. (2024). An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion. IEEE Access, 12, 62750–62764. https://doi.org/10.1109/access.2024.3395494

Raj, P., Akilandeswari, J., & Marimuthu, M. (2022). The edge AI paradigm: Technologies, platforms and use cases. Edge/Fog Computing Paradigm: The Concept Platforms and Applications, 139–182. https://doi.org/10.1016/bs.adcom.2022.02.003

Rajendran, S., Sabharwal, M., Ghinea, G., et al. (2022). IoT and Big Data Analytics for Smart Cities. Chapman and Hall/CRC. https://doi.org/10.1201/9781003217404

Rao, G. S., & Subbarao, P. K. (2024). A Novel Framework for Detection of DoS/DDoS Attack Using Deep Learning Techniques, and An Approach to Mitigate the Impact of DoS/DDoS attack in Network Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 450-466.

Rehan, H. (2023). Internet of Things (IoT) in Smart Cities: Enhancing Urban Living Through Technology. Journal of Engineering and Technology, 5(1), 1-16.

Rejeb, A., Rejeb, K., Simske, S. J., et al. (2021). Blockchain technology in the smart city: a bibliometric review. Quality & Quantity, 56(5), 2875–2906. https://doi.org/10.1007/s11135-021-01251-2

Remotti, L. A. (2021). IoT innovation clusters in Europe and the case for public policy. Data & Policy, 3. https://doi.org/10.1017/dap.2021.16

Rhoda, A. A., Kehinde, F, A., Ndubuisi, L. N., et al. (2024). Reviewing big data’s role in the digital economy: USA and Africa focus. World Journal of Advanced Research and Reviews, 21(2), 085–095. https://doi.org/10.30574/wjarr.2024.21.2.0396

Ribeiro-Navarrete, S., Saura, J. R., & Palacios-Marqués, D. (2021). Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy. Technological Forecasting and Social Change, 167, 120681. https://doi.org/10.1016/j.techfore.2021.120681

Sabbar Zamel, L., & Rokan Naif, J. (2023). An Overview Smart Assistant System for Old People Using Internet of Things. Iraqi Journal for Computers and Informatics, 49(2), 28–36. https://doi.org/10.25195/ijci.v49i2.432

Saber, O., & Mazri, T. (2021). Smart City Security Issues: The Main Attacks and Countermeasures. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 465–472. https://doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-465-2021

Satterthwaite, D. (2007). The transition to a predominantly urban world and its underpinnings. iied.

Scandizzo, P. L., & Knudsen, O. K. (2024). The New Normalcy and the Pandemic Threat: A Real Option Approach. Journal of Risk and Financial Management, 17(2), 72. https://doi.org/10.3390/jrfm17020072

Shahidehpour, M., Li, Z., & Ganji, M. (2018). Smart cities for a sustainable urbanization: Illuminating the need for establishing smart urban infrastructures. IEEE Electrification Magazine, 6(2), 16–33. https://doi.org/10.1109/mele.2018.2816840

Shahzad, F., Javed, A. R., Zikria, Y. B., et al. (2021). Future smart cities: requirements, emerging technologies, applications, challenges, and future aspects. TechRxiv.

Sharma, R., & Arya, R. (2022). Security threats and measures in the Internet of Things for smart city infrastructure: A state of art. Transactions on Emerging Telecommunications Technologies, 34(11). Portico. https://doi.org/10.1002/ett.4571

Shawe, R., & McAndrew, I. R. (2023). Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks. Journal of Software Engineering and Applications, 16(10), 530–547. https://doi.org/10.4236/jsea.2023.1610027

Silasai, O., & Khowfa, W. (2020). The study on using biometric authentication on mobile device. NU Int. J. Sci, 17, 90-110.

Silva, B. N., Khan, M., & Han, K. (2018). Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities. Sustainable Cities and Society, 38, 697–713. https://doi.org/10.1016/j.scs.2018.01.053

Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. Security and Privacy Issues in IoT Devices and Sensor Networks, 153–185. https://doi.org/10.1016/b978-0-12-821255-4.00008-0

Singh, S. K., Azzaoui, A. E., Choo, K. K. R., et al. (2023). Articles A Comprehensive Survey on Blockchain for Secure IoT-enabled Smart City beyond 5G: Approaches, Processes, Challenges, and Opportunities. Hum Centric Comput. Inf. Sci, 13, 51.

Singh, S., Sharma, P. K., Yoon, B., et al. (2020). Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustainable Cities and Society, 63, 102364. https://doi.org/10.1016/j.scs.2020.102364

Siripurapu, S., Darimireddy, N. K., Chehri, A., et al. (2023). Technological Advancements and Elucidation Gadgets for Healthcare Applications: An Exhaustive Methodological Review-Part-I (AI, Big Data, Block Chain, Open-Source Technologies, and Cloud Computing). Electronics, 12(3), 750. https://doi.org/10.3390/electronics12030750

Sizov, N. (2024). Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management. Theseus.

Smart, C. (2024). Studies in Energy, Resource and Environmental Economics. Springer International Publishing.

Sodiq, A., Baloch, A. A. B., Khan, S. A., et al. (2019). Towards modern sustainable cities: Review of sustainability principles and trends. Journal of Cleaner Production, 227, 972–1001. https://doi.org/10.1016/j.jclepro.2019.04.106

Sooriyaarachchi, J., Seneviratne, S., Thilakarathna, K., et al. (2021). MusicID: A Brainwave-Based User Authentication System for Internet of Things. IEEE Internet of Things Journal, 8(10), 8304–8313. https://doi.org/10.1109/jiot.2020.3044726

Stratigea, A., Papadopoulou, C. A., & Panagiotopoulou, M. (2015). Tools and Technologies for Planning the Development of Smart Cities. Journal of Urban Technology, 22(2), 43–62. https://doi.org/10.1080/10630732.2015.1018725

Syed, A. S., Sierra-Sosa, D., Kumar, A., et al. (2021). IoT in Smart Cities: A Survey of Technologies, Practices and Challenges. Smart Cities, 4(2), 429–475. https://doi.org/10.3390/smartcities4020024

Tahirkheli, A. I., Shiraz, M., Hayat, B., et al. (2021). A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges. Electronics, 10(15), 1811. https://doi.org/10.3390/electronics10151811

Tahmasebi, M. (2024). Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises. Journal of Information Security, 15(02), 106–133. https://doi.org/10.4236/jis.2024.152008

Telo, J. (2023). Smart city security threats and countermeasures in the context of emerging technologies. International Journal of Intelligent Automation and Computing, 6(1), 31-45.

Törngren, M., & Grogan, P. T. (2018). How to Deal with the Complexity of Future Cyber-Physical Systems? Designs, 2(4), 40. https://doi.org/10.3390/designs2040040

Ullah, A., Anwar, S. M., Li, J., et al. (2023). Smart cities: the role of Internet of Things and machine learning in realizing a data-centric smart environment. Complex & Intelligent Systems, 10(1), 1607–1637. https://doi.org/10.1007/s40747-023-01175-4

Valencia Rojas, A. L. (2023). The Rise of Net-States in the Cyberspace: Cyber Power Dynamics and the Disruption of International Security [Master’s thesis]. Charles University.

Varghese, B. (2024). Examining the Transformation of IT Departments Post-adoption of Cloud Computing Services [PhD thesis] Dublin Business School.

Vimala, H. S., et al. (2023). A systematic survey on content caching in ICN and ICN-IoT: Challenges, approaches and strategies. Computer Networks, 233, 109896. https://doi.org/10.1016/j.comnet.2023.109896

Vitunskaite, M., He, Y., Brandstetter, T., et al. (2019). Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Computers & Security, 83, 313–331. https://doi.org/10.1016/j.cose.2019.02.009

Waseem, M., Adnan Khan, M., Goudarzi, A., et al. (2023). Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges. Energies, 16(2), 820. https://doi.org/10.3390/en16020820

Winn, J., & Govern, K. (2009). Identity theft: Risks and challenges to business of data compromise. Temp. J. Sci. Tech. & Envtl. L., 28, 49.

Xenofontos, C., Zografopoulos, I., Konstantinou, C., et al. (2022). Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet of Things Journal, 9(1), 199–221. https://doi.org/10.1109/jiot.2021.3079916

Xia, L., Semirumi, D. T., & Rezaei, R. (2023). A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy. Sustainable Cities and Society, 98, 104771. https://doi.org/10.1016/j.scs.2023.104771

Xia, Z., Wu, J., Wu, L., et al. (2021). A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks. ACM Transactions on Intelligent Systems and Technology, 12(4), 1–30. https://doi.org/10.1145/3451984

Yang, P., Xiong, N., & Ren, J. (2020). Data Security and Privacy Protection for Cloud Storage: A Survey. IEEE Access, 8, 131723–131740. https://doi.org/10.1109/access.2020.3009876

Yang, W., Wang, S., Sahri, N. M., et al. (2021). Biometrics for Internet-of-Things Security: A Review. Sensors, 21(18), 6163. https://doi.org/10.3390/s21186163

Zamponi, M. E., & Barbierato, E. (2022). The Dual Role of Artificial Intelligence in Developing Smart Cities. Smart Cities, 5(2), 728–755. https://doi.org/10.3390/smartcities5020038

Zanaj, E., Caso, G., De Nardis, L., et al. (2021). Energy Efficiency in Short and Wide-Area IoT Technologies—A Survey. Technologies, 9(1), 22. https://doi.org/10.3390/technologies9010022

Zhou, W., Jia, Y., Peng, A., et al. (2019). The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet of Things Journal, 6(2), 1606–1616. https://doi.org/10.1109/jiot.2018.2847733

Zhuang, H., Zhang, J., C. B., et al. (2020). Sustainable Smart City Building Construction Methods. Sustainability, 12(12), 4947. https://doi.org/10.3390/su12124947




DOI: https://doi.org/10.24294/jipd.v8i10.8629

Refbacks

  • There are currently no refbacks.


Copyright (c) 2024 Mehdi Houichi, Faouzi Jaidi, Adel Bouhoula

License URL: https://creativecommons.org/licenses/by/4.0/

This site is licensed under a Creative Commons Attribution 4.0 International License.