A comprehensive and in-depth study of the threats faced by smart cities and the countermeasures implemented in their key areas
Vol 8, Issue 10, 2024
VIEWS - 120 (Abstract) 64 (PDF)
Abstract
A smart city focuses on enhancing and interconnecting facilities and services through digital technology to offer convenient services for both people and businesses. The basic infrastructure of smart cities consists of modern technologies such as the Internet of Things (IoT), cloud computing and artificial intelligence. These urban areas utilize different networks, such as the Internet and IoT, to share real-time information, improving convenience for the inhabitants. However, the reliance of smart cities on modern technologies exposes them to a range of organized, diverse, and sophisticated cyber threats. Therefore, prioritizing cybersecurity awareness and implementing appropriate measures and solutions are essential to protect the privacy and security of citizens. This study aims to identify cyber threats and their impact on smart cities, as well as the methods and measures required for key areas such as smart government, smart healthcare, smart mobility, smart environment, smart economy, smart living, and smart people. Furthermore, this study seeks to evaluate previous research in this field, establish necessary policies to mitigate these threats, and propose an appropriate model for the infrastructure associated with IT networks in smart cities.
Keywords
Full Text:
PDFReferences
Abdel-Rahman, M. (2023). Advanced cybersecurity measures in IT service operations and their crucial role in safeguarding enterprise data in a connected world. Eigenpub Review of Science and Technology, 7(1), 138-158.
Abdulelah, A. J., & Mustafa, A. S. (2020). Advanced Secure Architecture for The Internet of Things based on DTLS Protocol. 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), 1–5. https://doi.org/10.1109/ismsit50672.2020.9254700
Access 17.0M+ vector icons & stickers. (2024). Download Free Icons and Stickers for your projects. Available online: https://www.flaticon.com (accessed on 3 May 2024).
Adel, A. (2023). Unlocking the Future: Fostering Human–Machine Collaboration and Driving Intelligent Automation through Industry 5.0 in Smart Cities. Smart Cities, 6(5), 2742–2782. https://doi.org/10.3390/smartcities6050124
Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors, 22(13), 4730. https://doi.org/10.3390/s22134730
Ahmed, S., & Khan, M. (2023). Securing the Internet of Things (IoT): A comprehensive study on the intersection of cybersecurity, privacy, and connectivity in the IoT ecosystem. AI, IoT and the Fourth Industrial Revolution Review, 13(9), 1-17.
AlQahtani, A. A. S., Alshayeb, T., Nabil, M., et al. (2024). Leveraging Machine Learning for Wi-Fi-Based Environmental Continuous Two-Factor Authentication. IEEE Access, 12, 13277–13289. https://doi.org/10.1109/access.2024.3356351
Amin, S. U., & Hossain, M. S. (2021). Edge Intelligence and Internet of Things in Healthcare: A Survey. IEEE Access, 9, 45–59. https://doi.org/10.1109/access.2020.3045115
Angelidou, M., Psaltoglou, A., Komninos, N., et al. (2017). Enhancing sustainable urban development through smart city applications. Journal of Science and Technology Policy Management, 9(2), 146–169. https://doi.org/10.1108/jstpm-05-2017-0016
Apata, O., Bokoro, P. N., & Sharma, G. (2023). The Risks and Challenges of Electric Vehicle Integration into Smart Cities. Energies, 16(14), 5274. https://doi.org/10.3390/en16145274
Asaju, B. J. (2024). Standardization and regulation of V2X cybersecurity: analyzing the current landscape, identifying gaps, and proposing frameworks for harmonization. Advances in Deep Learning Techniques, 4(1), 33-52.
Azeez, O. H., Sarah, K. E., Adekunle, A. A., et al. (2024). Cybersecurity In Banking: A Global Perspective with A Focus on Nigerian Practices. Computer Science & IT Research Journal, 5(1), 41–59. https://doi.org/10.51594/csitrj.v5i1.701
Azzedin, F. (2023). Mitigating Denial of Service Attacks in RPL-Based IoT Environments: Trust-Based Approach. IEEE Access, 11, 129077–129089. https://doi.org/10.1109/access.2023.3331030
Babikian, J. (2023). Navigating Legal Frontiers: Exploring Emerging Issues in Cyber Law. Revista Espanola de Documentacion Cientifica, 17(2), 95-109.
Bailey, L. E., & Nyabola, N. (2021). Digital Equity as an Enabling Platform for Equality and Inclusion. Available online: https://cic. nyu. edu/resources/digital-equity-as-an-enabling-platform-for-equality-and-inclusion (accessed on 12 May 2024).
Bakshi, G., & Sahu, H. (2022). WSN Security. Computational Intelligence for Wireless Sensor Networks, 151–174. https://doi.org/10.1201/9781003102397-9
Barbera, S. L. (2023). Revolutionizing Italian Homes: Embracing the Smart Home Era in the Housing Landscape. Research square. https://doi.org/10.21203/rs.3.rs-3272478/v1
Belavagi, M. C., & Muniyal, B. (2022). Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification. International Journal of Communication Networks and Information Security (IJCNIS), 13(1). https://doi.org/10.17762/ijcnis.v13i1.4875
Benyahya, M., Collen, A., Kechagia, S., et al. (2022). Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments. Computers & Security, 122, 102904. https://doi.org/10.1016/j.cose.2022.102904
Bhardwaj, A., Bharany, S., Abulfaraj, A. W., et al. (2024). Fortifying home IoT security: A framework for comprehensive examination of vulnerabilities and intrusion detection strategies for smart cities. Egyptian Informatics Journal, 25, 100443. https://doi.org/10.1016/j.eij.2024.100443
Bibri, S. E., Alexandre, A., Sharifi, A., et al. (2023). Environmentally sustainable smart cities and their converging AI, IoT, and big data technologies and solutions: an integrated approach to an extensive literature review. Energy Informatics, 6(1). https://doi.org/10.1186/s42162-023-00259-2
Böhm, F., Dietz, M., Preindl, T., et al. (2021). Augmented Reality and the Digital Twin: State-of-the-Art and Perspectives for Cybersecurity. Journal of Cybersecurity and Privacy, 1(3), 519–538. https://doi.org/10.3390/jcp1030026
Boukerche, A., & Coutinho, R. W. L. (2019). Crowd Management: The Overlooked Component of Smart Transportation Systems. IEEE Communications Magazine, 57(4), 48–53. https://doi.org/10.1109/mcom.2019.1800641
Bouramdane, A. A. (2023). Optimal Water Management Strategies: Paving the Way for Sustainability in Smart Cities. Smart Cities, 6(5), 2849–2882. https://doi.org/10.3390/smartcities6050128
Brauneck, A., Schmalhorst, L., Kazemi Majdabadi, M. M., et al. (2023). Federated Machine Learning, Privacy-Enhancing Technologies, and Data Protection Laws in Medical Research: Scoping Review. Journal of Medical Internet Research, 25, e41588. https://doi.org/10.2196/41588
Chandramouli, D., Liebhart, R., & Pirskanen, J. (2019). 5G for the Connected World. Wiley Online Library. https://doi.org/10.1002/9781119247111
Chaudhary, S. (2024). Driving behavior change with cybersecurity awareness. Computers & Security, 142, 103858. https://doi.org/10.1016/j.cose.2024.103858
Dağtaş, S., Pekhteryev, G., Şahinoğlu, Z., et al. (2008). Real-Time and Secure Wireless Health Monitoring. International Journal of Telemedicine and Applications, 2008, 1–10. https://doi.org/10.1155/2008/135808
Data Science and Security. (2022). Lecture Notes in Networks and Systems. Springer Nature Singapore.
De Nicola, A., & Villani, M. L. (2021). Smart City Ontologies and Their Applications: A Systematic Literature Review. Sustainability, 13(10), 5578. https://doi.org/10.3390/su13105578
Decision Making and Security Risk Management for IoT Environments. (2024). Advances in Information Security. Springer International Publishing.
Demertzi, V., Demertzis, S., & Demertzis, K. (2023). An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities. Applied Sciences, 13(2), 790. https://doi.org/10.3390/app13020790
Dou, X., Chen, W., Zhu, L., et al. (2023). Machine Learning for Smart Cities: A Comprehensive Review of Applications and Opportunities. International Journal of Advanced Computer Science and Applications, 14(9). https://doi.org/10.14569/ijacsa.2023.01409104
Duggineni, S. (2023). Data Integrity and Risk. Open Journal of Optimization, 12(02), 25–33. https://doi.org/10.4236/ojop.2023.122003
Egbert, S., & Leese, M. (2020). Criminal Futures: Predictive Policing and Everyday Police Work. CrimRxiv. https://doi.org/10.21428/cb6ab371.17e3e7ab
Fan, J., Yang, W., Liu, Z., et al. (2023). Understanding Security in Smart City Domains From the ANT-Centric Perspective. IEEE Internet of Things Journal, 10(13), 11199–11223. https://doi.org/10.1109/jiot.2023.3252040
Froomkin, M., & Colangelo, Z. (2020). Privacy as Safety. Wash. L. Rev., 95, 141.
Ghorbel, A., Ghorbel, M., & Jmaiel, M. (2021). Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain. International Journal of Information Security, 21(3), 489–508. https://doi.org/10.1007/s10207-021-00565-4
Gracias, J. S., Parnell, G. S., Specking, E., et al. (2023). Smart Cities—A Structured Literature Review. Smart Cities, 6(4), 1719–1743. https://doi.org/10.3390/smartcities6040080
Guerar, M., Verderame, L., Merlo, A., et al. (2020). CirclePIN. ACM Transactions on Cyber-Physical Systems, 4(3), 1–19. https://doi.org/10.1145/3365995
Hasan, M. K., Ghazal, T. M., Saeed, R. A., et al. (2021). A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things. IET Communications, 16(5), 421–432. Portico. https://doi.org/10.1049/cmu2.12301
Hemmati, R., & Faraji, H. (2022). Identification of cyber-attack/outage/fault in zero-energy building with load and energy management strategies. Journal of Energy Storage, 50, 104290. https://doi.org/10.1016/j.est.2022.104290
Hoang, T. V. (2024). Impact of Integrated Artificial Intelligence and Internet of Things Technologies on Smart City Transformation. Journal of Technical Education Science, 19(1), 64–73. https://doi.org/10.54644/jte.2024.1532
Houichi, M., Jaidi, F., & Bouhoula, A. (2022). Analysis of Smart Cities Security: Challenges and Advancements. In: Proceedings of 2022 15th International Conference on Security of Information and Networks (SIN); 11-13 November 2022; Sousse, Tunisia.
Houichi, M., Jaidi, F., & Bouhoula, A. (2023). A Comprehensive Study of Intrusion Detection within Internet of Things-based Smart Cities: Synthesis, Analysis and a Novel Approach. 2023 International Wireless Communications and Mobile Computing (IWCMC), 8, 505–511. https://doi.org/10.1109/iwcmc58020.2023.10182948
Islam, A. I. A., Anthony, C. A., Shedrack, O., et al. (2024). Cybersecurity Challenges in Smart Cities: A Case Review of African Metropolises. Computer Science & IT Research Journal, 5(2), 254–269. https://doi.org/10.51594/csitrj.v5i2.756
Ismagilova, E., Hughes, L., Rana, N. P., et al. (2020). Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework. Information Systems Frontiers, 24(2), 393–414. https://doi.org/10.1007/s10796-020-10044-1
Jaïdi, F., Labbene Ayachi, F., & Bouhoula, A. (2018). A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures. Security and Communication Networks, 2018, 1–22. https://doi.org/10.1155/2018/7142170
Jaïdi, F., Labbene-Ayachi, F., & Bouhoula, A. (2016). Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare. Journal of Medical Systems, 40(12). https://doi.org/10.1007/s10916-016-0630-2
James, E., & Rabbi, F. (2023). Fortifying the IoT Landscape: Strategies to Counter Security Risks in Connected Systems. Tensorgate Journal of Sustainable Technology and Infrastructure for Developing Countries, 6(1), 32-46.
Jeong, H., Shen, Y., Jeong, J., & Oh, T. (2021). A comprehensive survey on vehicular networking for safe and efficient driving in smart transportation: A focus on systems, protocols, and applications. Vehicular Communications, 31, 100349. https://doi.org/10.1016/j.vehcom.2021.100349
Jha, A., & Jha, A. (2024). Securing tomorrow’s urban frontiers: A holistic approach to cybersecurity in smart cities. Information System and Smart City, 3(1). https://doi.org/10.59400/issc.v3i1.418
Jia, M., Komeily, A., Wang, Y., et al. (2019). Adopting Internet of Things for the development of smart buildings: A review of enabling technologies and applications. Automation in Construction, 101, 111–126. https://doi.org/10.1016/j.autcon.2019.01.023
Ji-Young, K., Jong In, L., & Kyoung Gon, K. (2019). The All-Purpose Sword: North Korea’s Cyber Operations and Strategies. 2019 11th International Conference on Cyber Conflict (CyCon), 5, 1–20. https://doi.org/10.23919/cycon.2019.8756954
Judijanto, L., Putra, H. N., Zani, B. N., et al. (2024). E-Health and Digital Transformation in Increasing Accessibility of Health Services. Journal of World Future Medicine, Health and Nursing, 2(1), 119–132. https://doi.org/10.70177/health.v2i1.720
Kalunga, J., Tembo, S., & Phiri, J. (2020). Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identityfor Industrial Internet of ThingsCritical Infrastructure Protection. International Journal of Advances in Scientific Research and Engineering, 6(12), 15–34. https://doi.org/10.31695/ijasre.2020.33940
Kanellopoulos, D., Sharma, V. K., Panagiotakopoulos, T., et al. (2023). Networking Architectures and Protocols for IoT Applications in Smart Cities: Recent Developments and Perspectives. Electronics, 12(11), 2490. https://doi.org/10.3390/electronics12112490
Karale, A. (2021). The Challenges of IoT Addressing Security, Ethics, Privacy, and Laws. Internet of Things, 15, 100420. https://doi.org/10.1016/j.iot.2021.100420
Kavitha, J., Rao, P. S. V. S., & Babu, G. C. (2023). Energy Efficient Resource Utilization of Cloud Computing Environments for Deployment Models. 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), 26, 1111–1119. https://doi.org/10.1109/icaiss58487.2023.10250648
Kayode-Ajala, O. (2023). Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption. Applied Research in Artificial Intelligence and Cloud Computing, 6(8), 1-21.
Khan, M. Y. (2023). Cyber Security: Recent Cyber-Attacks as A Challenge to National Economic Security. International Journal of Modern Sciences and Multidisciplinary Studies (Ijmsms), 2(01), 72-100.
Kim, K., Alshenaifi, I. M., Ramachandran, S., et al. (2023). Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors, 23(7), 3681. https://doi.org/10.3390/s23073681
Kim, K., Cho, K., Lim, J., et al. (2020). What’s your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive and Mobile Computing, 66, 101211. https://doi.org/10.1016/j.pmcj.2020.101211
Kim, K., Kim, J. S., Jeong, S., et al. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & Security, 103, 102150. https://doi.org/10.1016/j.cose.2020.102150
Kitchin, R. (2016). Getting smarter about smart cities: Improving data privacy and data security. Sensors. https://doi.org/10.3390/s22239338
Krishna, S. R., Rathor, K., Ranga, J., et al. (2023). Artificial Intelligence Integrated with Big Data Analytics for Enhanced Marketing. In 2023 International Conference on Inventive Computation Technologies (ICICT). IEEE; pp. 1073-1077.
Ksibi, S., Jaidi, F., & Bouhoula, A. (2023). IoMT Security Model based on Machine Learning and Risk Assessment Techniques. 2023 International Wireless Communications and Mobile Computing (IWCMC), 11, 614–619. https://doi.org/10.1109/iwcmc58020.2023.10182654
Lansky, J., Sadrishojaei, M., Rahmani, A. M., et al. (2022). Development of a Lightweight Centralized Authentication Mechanism for the Internet of Things Driven by Fog. Mathematics, 10(22), 4166. https://doi.org/10.3390/math10224166
Li, H., Wang, X., Feng, Y., et al. (2024). Integration Methods and Advantages of Machine Learning with Cloud Data Warehouses. International Journal of Computer Science and Information Technology, 2(1), 348–358. https://doi.org/10.62051/ijcsit.v2n1.36
Liu, Y., Yu, F. R., Li, X., et al. (2020). Blockchain and Machine Learning for Communications and Networking Systems. IEEE Communications Surveys & Tutorials, 22(2), 1392–1431. https://doi.org/10.1109/comst.2020.2975911
Löfgren, K., & Webster, C. W. R. (2020). The value of Big Data in government: The case of smart cities. Big Data & Society, 7(1), 205395172091277. https://doi.org/10.1177/2053951720912775
Lounis, K., & Zulkernine, M. (2020). Attacks and Defenses in Short-Range Wireless Technologies for IoT. IEEE Access, 8, 88892–88932. https://doi.org/10.1109/access.2020.2993553
Lyon, V. (2020). Exploring Strategies for Recruiting and Retaining Diverse Cybersecurity Professionals [PhD thesis]. Walden University.
Ma, C. (2021). Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Reports, 7, 7999–8012. https://doi.org/10.1016/j.egyr.2021.08.124
Majdoubi, D. E., Bakkali, H., & Sadki, S. (2020). Towards Smart Blockchain-Based System for Privacy and Security in a Smart City environment. In: Proceedings of 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech); 24–26 November 2020; Marrakesh, Morocco.
Marín Díaz, G., Galdón Salvador, J. L., & Galán Hernández, J. J. (2023). Smart Cities and Citizen Adoption: Exploring Tourist Digital Maturity for Personalizing Recommendations. Electronics, 12(16), 3395. https://doi.org/10.3390/electronics12163395
Markovic, D. S., Zivkovic, D., Branovic, I., et al. (2013). Smart power grid and cloud computing. Renewable and Sustainable Energy Reviews, 24, 566–577. https://doi.org/10.1016/j.rser.2013.03.068
Meng, X., & Zhu, L. (2024). Augmenting cybersecurity in smart urban energy systems through IoT and blockchain technology within the Digital Twin framework. Sustainable Cities and Society, 106, 105336. https://doi.org/10.1016/j.scs.2024.105336
Miller, C., & Valasek, C. (2015). Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015(S 91), 1-91.
Miranda, R., Alves, C., Sousa, R., et al. (2024). Revolutionising the Quality of Life: The Role of Real-Time Sensing in Smart Cities. Electronics, 13(3), 550. https://doi.org/10.3390/electronics13030550
Mortaheb, R., & Jankowski, P. (2023). Smart city re-imagined: City planning and GeoAI in the age of big data. Journal of Urban Management, 12(1), 4–15. https://doi.org/10.1016/j.jum.2022.08.001
Mun, M., Reddy, S., Shilton, K., et al. (2009). PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services; 22 June 2009.
Nastjuk, I., Trang, S., & Papageorgiou, E. I. (2022). Smart cities and smart governance models for future cities. Electronic Markets, 32(4), 1917–1924. https://doi.org/10.1007/s12525-022-00609-0
Nguyen, L., Phan, B., Zhang, L., et al. (2024). An Efficient Approach for Securing Audio Data in AI Training with Fully Homomorphic Encryption. Available online: https://doi.org/10.36227/techrxiv.170956397.78402834/v1 (accessed on 12 May 2024).
Nurthen II, J. M. (2023). Cybersecurity Risk Assessment Matrix (CRAM): A System-Theoretic Approach to Balancing Operational and Cybersecurity Risk in the Management of Transient Cyber Assets (TCA) in the Maintenance of Operational Technology (OT) [PhD thesis]. Massachusetts Institute of Technology.
Omotunde, H., & Ahmed, M. (2023). A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond. Mesopotamian Journal of Cyber Security, 115–133. https://doi.org/10.58496/mjcsc/2023/016
Panahi Rizi, M. H., & Hosseini Seno, S. A. (2022). A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city. Internet of Things, 20, 100584. https://doi.org/10.1016/j.iot.2022.100584
Panda, P. K., & Chattopadhyay, S. (2020). A secure mutual authentication protocol for IoT environment. Journal of Reliable Intelligent Environments, 6(2), 79–94. https://doi.org/10.1007/s40860-020-00098-y
Pasandi, F. B. (2024). Creative Organic Smart Spaces and Communities: Leveraging Technology to Fight Socio-Environmental Impacts. Available online: https://hal.science/hal-04527432 (accessed on 17 May 2024).
Petrova, M., & Tairov, I. (2022). Solutions to Manage Smart Cities’ Risks in Times of Pandemic Crisis. Risks, 10(12), 240. https://doi.org/10.3390/risks10120240
Pratomo, A. B., Mokodenseho, S., & Aziz, A. M. (2023). Data Encryption and Anonymization Techniques for Enhanced Information System Security and Privacy. West Science Information System and Technology, 1(01), 1–9. https://doi.org/10.58812/wsist.v1i01.176
Principles and Applications of Narrowband Internet of Things (NBIoT). (2021). Advances in Wireless Technologies and Telecommunication. IGI Global. https://doi.org/10.4018/978-1-7998-4775-5
Proceedings of the 6th Brazilian Technology Symposium (BTSym’20). (2021). Smart Innovation, Systems and Technologies. Springer International Publishing.
Proceedings of the 7th Brazilian Technology Symposium (BTSym’21). (2022). Smart Innovation, Systems and Technologies. Springer International Publishing.
Rafique, W., Qi, L., Yaqoob, I., et al. (2020). Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey. IEEE Communications Surveys & Tutorials, 22(3), 1761–1804. https://doi.org/10.1109/comst.2020.2997475
Rahman, K., Khan, M. A., Afghah, F., et al. (2024). An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion. IEEE Access, 12, 62750–62764. https://doi.org/10.1109/access.2024.3395494
Raj, P., Akilandeswari, J., & Marimuthu, M. (2022). The edge AI paradigm: Technologies, platforms and use cases. Edge/Fog Computing Paradigm: The Concept Platforms and Applications, 139–182. https://doi.org/10.1016/bs.adcom.2022.02.003
Rajendran, S., Sabharwal, M., Ghinea, G., et al. (2022). IoT and Big Data Analytics for Smart Cities. Chapman and Hall/CRC. https://doi.org/10.1201/9781003217404
Rao, G. S., & Subbarao, P. K. (2024). A Novel Framework for Detection of DoS/DDoS Attack Using Deep Learning Techniques, and An Approach to Mitigate the Impact of DoS/DDoS attack in Network Environment. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 450-466.
Rehan, H. (2023). Internet of Things (IoT) in Smart Cities: Enhancing Urban Living Through Technology. Journal of Engineering and Technology, 5(1), 1-16.
Rejeb, A., Rejeb, K., Simske, S. J., et al. (2021). Blockchain technology in the smart city: a bibliometric review. Quality & Quantity, 56(5), 2875–2906. https://doi.org/10.1007/s11135-021-01251-2
Remotti, L. A. (2021). IoT innovation clusters in Europe and the case for public policy. Data & Policy, 3. https://doi.org/10.1017/dap.2021.16
Rhoda, A. A., Kehinde, F, A., Ndubuisi, L. N., et al. (2024). Reviewing big data’s role in the digital economy: USA and Africa focus. World Journal of Advanced Research and Reviews, 21(2), 085–095. https://doi.org/10.30574/wjarr.2024.21.2.0396
Ribeiro-Navarrete, S., Saura, J. R., & Palacios-Marqués, D. (2021). Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy. Technological Forecasting and Social Change, 167, 120681. https://doi.org/10.1016/j.techfore.2021.120681
Sabbar Zamel, L., & Rokan Naif, J. (2023). An Overview Smart Assistant System for Old People Using Internet of Things. Iraqi Journal for Computers and Informatics, 49(2), 28–36. https://doi.org/10.25195/ijci.v49i2.432
Saber, O., & Mazri, T. (2021). Smart City Security Issues: The Main Attacks and Countermeasures. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 465–472. https://doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-465-2021
Satterthwaite, D. (2007). The transition to a predominantly urban world and its underpinnings. iied.
Scandizzo, P. L., & Knudsen, O. K. (2024). The New Normalcy and the Pandemic Threat: A Real Option Approach. Journal of Risk and Financial Management, 17(2), 72. https://doi.org/10.3390/jrfm17020072
Shahidehpour, M., Li, Z., & Ganji, M. (2018). Smart cities for a sustainable urbanization: Illuminating the need for establishing smart urban infrastructures. IEEE Electrification Magazine, 6(2), 16–33. https://doi.org/10.1109/mele.2018.2816840
Shahzad, F., Javed, A. R., Zikria, Y. B., et al. (2021). Future smart cities: requirements, emerging technologies, applications, challenges, and future aspects. TechRxiv.
Sharma, R., & Arya, R. (2022). Security threats and measures in the Internet of Things for smart city infrastructure: A state of art. Transactions on Emerging Telecommunications Technologies, 34(11). Portico. https://doi.org/10.1002/ett.4571
Shawe, R., & McAndrew, I. R. (2023). Increasing Threats to United States of America Infrastructure Based on Cyber-Attacks. Journal of Software Engineering and Applications, 16(10), 530–547. https://doi.org/10.4236/jsea.2023.1610027
Silasai, O., & Khowfa, W. (2020). The study on using biometric authentication on mobile device. NU Int. J. Sci, 17, 90-110.
Silva, B. N., Khan, M., & Han, K. (2018). Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities. Sustainable Cities and Society, 38, 697–713. https://doi.org/10.1016/j.scs.2018.01.053
Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. Security and Privacy Issues in IoT Devices and Sensor Networks, 153–185. https://doi.org/10.1016/b978-0-12-821255-4.00008-0
Singh, S. K., Azzaoui, A. E., Choo, K. K. R., et al. (2023). Articles A Comprehensive Survey on Blockchain for Secure IoT-enabled Smart City beyond 5G: Approaches, Processes, Challenges, and Opportunities. Hum Centric Comput. Inf. Sci, 13, 51.
Singh, S., Sharma, P. K., Yoon, B., et al. (2020). Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city. Sustainable Cities and Society, 63, 102364. https://doi.org/10.1016/j.scs.2020.102364
Siripurapu, S., Darimireddy, N. K., Chehri, A., et al. (2023). Technological Advancements and Elucidation Gadgets for Healthcare Applications: An Exhaustive Methodological Review-Part-I (AI, Big Data, Block Chain, Open-Source Technologies, and Cloud Computing). Electronics, 12(3), 750. https://doi.org/10.3390/electronics12030750
Sizov, N. (2024). Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management. Theseus.
Smart, C. (2024). Studies in Energy, Resource and Environmental Economics. Springer International Publishing.
Sodiq, A., Baloch, A. A. B., Khan, S. A., et al. (2019). Towards modern sustainable cities: Review of sustainability principles and trends. Journal of Cleaner Production, 227, 972–1001. https://doi.org/10.1016/j.jclepro.2019.04.106
Sooriyaarachchi, J., Seneviratne, S., Thilakarathna, K., et al. (2021). MusicID: A Brainwave-Based User Authentication System for Internet of Things. IEEE Internet of Things Journal, 8(10), 8304–8313. https://doi.org/10.1109/jiot.2020.3044726
Stratigea, A., Papadopoulou, C. A., & Panagiotopoulou, M. (2015). Tools and Technologies for Planning the Development of Smart Cities. Journal of Urban Technology, 22(2), 43–62. https://doi.org/10.1080/10630732.2015.1018725
Syed, A. S., Sierra-Sosa, D., Kumar, A., et al. (2021). IoT in Smart Cities: A Survey of Technologies, Practices and Challenges. Smart Cities, 4(2), 429–475. https://doi.org/10.3390/smartcities4020024
Tahirkheli, A. I., Shiraz, M., Hayat, B., et al. (2021). A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures, and Challenges. Electronics, 10(15), 1811. https://doi.org/10.3390/electronics10151811
Tahmasebi, M. (2024). Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises. Journal of Information Security, 15(02), 106–133. https://doi.org/10.4236/jis.2024.152008
Telo, J. (2023). Smart city security threats and countermeasures in the context of emerging technologies. International Journal of Intelligent Automation and Computing, 6(1), 31-45.
Törngren, M., & Grogan, P. T. (2018). How to Deal with the Complexity of Future Cyber-Physical Systems? Designs, 2(4), 40. https://doi.org/10.3390/designs2040040
Ullah, A., Anwar, S. M., Li, J., et al. (2023). Smart cities: the role of Internet of Things and machine learning in realizing a data-centric smart environment. Complex & Intelligent Systems, 10(1), 1607–1637. https://doi.org/10.1007/s40747-023-01175-4
Valencia Rojas, A. L. (2023). The Rise of Net-States in the Cyberspace: Cyber Power Dynamics and the Disruption of International Security [Master’s thesis]. Charles University.
Varghese, B. (2024). Examining the Transformation of IT Departments Post-adoption of Cloud Computing Services [PhD thesis] Dublin Business School.
Vimala, H. S., et al. (2023). A systematic survey on content caching in ICN and ICN-IoT: Challenges, approaches and strategies. Computer Networks, 233, 109896. https://doi.org/10.1016/j.comnet.2023.109896
Vitunskaite, M., He, Y., Brandstetter, T., et al. (2019). Smart cities and cyber security: Are we there yet? A comparative study on the role of standards, third party risk management and security ownership. Computers & Security, 83, 313–331. https://doi.org/10.1016/j.cose.2019.02.009
Waseem, M., Adnan Khan, M., Goudarzi, A., et al. (2023). Incorporation of Blockchain Technology for Different Smart Grid Applications: Architecture, Prospects, and Challenges. Energies, 16(2), 820. https://doi.org/10.3390/en16020820
Winn, J., & Govern, K. (2009). Identity theft: Risks and challenges to business of data compromise. Temp. J. Sci. Tech. & Envtl. L., 28, 49.
Xenofontos, C., Zografopoulos, I., Konstantinou, C., et al. (2022). Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies. IEEE Internet of Things Journal, 9(1), 199–221. https://doi.org/10.1109/jiot.2021.3079916
Xia, L., Semirumi, D. T., & Rezaei, R. (2023). A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy. Sustainable Cities and Society, 98, 104771. https://doi.org/10.1016/j.scs.2023.104771
Xia, Z., Wu, J., Wu, L., et al. (2021). A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks. ACM Transactions on Intelligent Systems and Technology, 12(4), 1–30. https://doi.org/10.1145/3451984
Yang, P., Xiong, N., & Ren, J. (2020). Data Security and Privacy Protection for Cloud Storage: A Survey. IEEE Access, 8, 131723–131740. https://doi.org/10.1109/access.2020.3009876
Yang, W., Wang, S., Sahri, N. M., et al. (2021). Biometrics for Internet-of-Things Security: A Review. Sensors, 21(18), 6163. https://doi.org/10.3390/s21186163
Zamponi, M. E., & Barbierato, E. (2022). The Dual Role of Artificial Intelligence in Developing Smart Cities. Smart Cities, 5(2), 728–755. https://doi.org/10.3390/smartcities5020038
Zanaj, E., Caso, G., De Nardis, L., et al. (2021). Energy Efficiency in Short and Wide-Area IoT Technologies—A Survey. Technologies, 9(1), 22. https://doi.org/10.3390/technologies9010022
Zhou, W., Jia, Y., Peng, A., et al. (2019). The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved. IEEE Internet of Things Journal, 6(2), 1606–1616. https://doi.org/10.1109/jiot.2018.2847733
Zhuang, H., Zhang, J., C. B., et al. (2020). Sustainable Smart City Building Construction Methods. Sustainability, 12(12), 4947. https://doi.org/10.3390/su12124947
DOI: https://doi.org/10.24294/jipd.v8i10.8629
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 Mehdi Houichi, Faouzi Jaidi, Adel Bouhoula
License URL: https://creativecommons.org/licenses/by/4.0/
This site is licensed under a Creative Commons Attribution 4.0 International License.