Cyber Defense Maturity Levels and Threat Models for Smart Cities

被引:4
作者
Al Shidhani, Ali Amur [1 ]
机构
[1] Res Council, Muscat, Oman
关键词
Cyber Defense; Maturity Levels; Security; Smart Cities; Smart Electricity; Smart Transportation; Smart Water; Threat Models;
D O I
10.4018/IJISP.2019040103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Smart cities are in development around the world to tackle urbanization challenges. Smart solutions are being developed to optimize scarce resources, reduce service cost, improve service quality and improve the livelihood of city residents. With smart city infrastructure getting digitized and remotely accessible, the risk of cyber security cannot be overlooked. This article describes the technical and non-technical challenges smart cities are facing with regards to cyber security attacks. The article outlines design requirements that should be considered when designing a secure smart city. The requirements are overarching technical, operational, social, safety, legal and usability domains. In addition, the article proposes cyber defense maturity levels for smart cities and describes threat models relevant to each maturity level.
引用
收藏
页码:32 / 46
页数:15
相关论文
共 21 条
  • [1] [Anonymous], 2015, P 2015 INT C CYBER S
  • [2] Threat-based Security Analysis for the Internet of Things
    Atamli, Ahmad W.
    Martin, Andrew
    [J]. 2014 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2014, : 35 - 43
  • [3] Bayuk J.L., 2011, 8 INT C EXP EM TECHN, P1, DOI [DOI 10.1109/CEWIT.2011.6135873, 10.1109/CEWIT.2011.6135873]
  • [4] A Trust Model for Data Sharing in Smart Cities
    Cao, Quyet H.
    Khan, Imran
    Farahbakhsh, Reza
    Madhusudan, Giyyarpuram
    Lee, Gyu Myoung
    Crespi, Noel
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [5] Cerrudo C., 2015, SECURING SMART CITIE
  • [6] Cerrudo C., 2015, CYBER SECURITY GUIDE
  • [7] Chakrabarty Shaibal, 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), P812, DOI 10.1109/CCNC.2016.7444889
  • [8] Chen YT, 2014, 2014 IEEE/SICE INTERNATIONAL SYMPOSIUM ON SYSTEM INTEGRATION (SII), P755, DOI 10.1109/SII.2014.7028133
  • [9] Cloud Security Alliance, 2015, CYB SEC SMART CIT AR
  • [10] Desa U. N., 2012, FINAL REPORT ANNEX T