Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review

被引:13
作者
Iftikhar, Abeer [1 ]
Qureshi, Kashif Naseer [1 ,2 ]
Shiraz, Muhammad [3 ]
Albahli, Saleh [4 ]
机构
[1] Bahria Univ, Dept Comp Sci, Islamabad Campus, Islamabad, Pakistan
[2] Univ Limerick, Dept Elect & Comp Engn, Limerick V94T9PX, Ireland
[3] Fdn Univ, Dept Comp Sci, Islamabad Campus, Islamabad, Pakistan
[4] Qassim Univ, Coll Comp, Dept Informat Technol, Buraydah, Saudi Arabia
关键词
Security; Privacy; Trust; Standards; Threats; Countermeasures; Edge computing; High-speed networks; Smart cities; ACCESS-CONTROL; EDGE; INTERNET; MODEL; AUTHENTICATION; 5G; ENCRYPTION; MANAGEMENT; BLOCKCHAIN; SCHEME;
D O I
10.1016/j.jksuci.2023.101788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
High-speed networks are utilized to satisfy user demands by using cloud and edge services. Due to the heterogeneous nature of these networks, security, trust, and privacy are the significant challenges for these networks. These networks are vulnerable to various security threats, lack of trustworthy devices, and user privacy concerns due to architectural complexities, diversity of protocols, and dynamic network topologies. This Systematic Literature Review (SLR) explores these networks in terms of technologies, edge and cloud services, security, trust and privacy concerns. Torress-Carrion methodology is used as a guideline to conduct this review to find the recent security, trust and privacy concerns. The attacks related to each area and their solutions are discussed to evaluate their strengths and weaknesses. The various existing technologies explore like Blockchain, encryption, hashing, and fuzzy logic. In addition, the trust evaluation and user privacy provision techniques are also discuss. This SLR also explores the methods designed for different communication layers against the various multilingual passive/active attacks like Sybil, Denial of Service (DoS), Distributed Denial of Service (DDoS), and Man in the Middle (MITM). This SLR will provide a direction to new researchers in the field of security, trust, and privacy to design more efficient and effective solutions to deal with new security challenges.(c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
引用
收藏
页数:39
相关论文
共 90 条
[1]   Digitalization of the supply chain: transformation factors [J].
Aamer, Ammar ;
Sahara, Chelinka Rafiesta ;
Al-Awlaqi, Mohammed Ali .
JOURNAL OF SCIENCE AND TECHNOLOGY POLICY MANAGEMENT, 2023, 14 (04) :713-733
[2]   Identifying cyber threats to mobile-loT applications in edge computing paradigm [J].
Abawajy, Jemal ;
Huda, Shamsul ;
Sharmeen, Shaila ;
Hassan, Mohammad Mehedi ;
Almogren, Ahmad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :525-538
[3]   Biometric Security Through Visual Encryption for Fog Edge Computing [J].
Abdul, Wadood ;
Ali, Zulfiqar ;
Ghouzali, Sanaa ;
Alfawaz, Budour ;
Muhammad, Ghulam ;
Hossain, M. Shamim .
IEEE ACCESS, 2017, 5 :5531-5538
[4]   SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things [J].
Adewuyi, Anuoluwapo A. ;
Cheng, Hui ;
Shi, Qi ;
Cao, Jiannong ;
Wang, Xingwei ;
Zhou, Bo .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3298-3312
[5]   Link-based penalized trust management scheme for preemptive measures to secure the edge-based internet of things networks [J].
Ahmed, Aneeqa ;
Qureshi, Kashif Naseer ;
Anwar, Muhammad ;
Masud, Farhan ;
Imtiaz, Junaid ;
Jeon, Gwanggil .
WIRELESS NETWORKS, 2024, 30 (05) :4237-4259
[6]  
Ajao Lukman Adewale, 2023, Intell. Syst. Appl, V18
[7]  
Al Omar Abdullah, 2017, Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017: International Workshops. Proceedings: LNCS 10658, P534, DOI 10.1007/978-3-319-72395-2_49
[8]  
AlFarraj Osama, 2018, J. Ambient Intell. Human. Comput., P1
[9]   A Blockchain-Based Framework for IoT Data Monetization Services [J].
Ali, Muhammad Salek ;
Vecchio, Massimo ;
Antonelli, Fabio .
COMPUTER JOURNAL, 2021, 64 (02) :195-210
[10]   Edge Based Priority-Aware Dynamic Resource Allocation for Internet of Things Networks [J].
Ali, Zulfiqar ;
Qureshi, Kashif Naseer ;
Mustafa, Kainat ;
Bukhsh, Rasool ;
Aslam, Sheraz ;
Mujlid, Hana ;
Ghafoor, Kayhan Zrar .
ENTROPY, 2022, 24 (11)