An overview of security and privacy in smart cities' IoT communications

被引:179
作者
Al-Turjman, Fadi [1 ]
Zahmatkesh, Hadi [2 ]
Shahroze, Ramiz [1 ]
机构
[1] Antalya Bilim Univ, Dept Comp Engn, Antalya, Turkey
[2] Middle East Tech Univ, Comp Engn, Nothern Cyprus Campus, Guzelyurt, Mersin, Turkey
关键词
INTERNET; THINGS; CHALLENGES; ACCESS; SCHEME; TECHNOLOGIES; ARCHITECTURE; ENCRYPTION; MANAGEMENT; ALGORITHM;
D O I
10.1002/ett.3677
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Smart cities have brought significant improvements in quality of life and services to citizens and urban environments. They are fully enabled to control the physical objects in real time and provide intelligent information to citizens in terms of transport, healthcare, smart buildings, public safety, smart parking, and traffic system and smart agriculture, and so on. The applications of smart cities are able to collect sensitive information. However, various security and privacy issues may arise at different levels of the architecture. Therefore, it is important to be aware of these security and privacy issues while designing and implementing the applications. This paper highlights main applications of smart cities and addresses the major privacy and security issues in the architecture of the smart cities' applications. It also reviews some of the current solutions regarding the security and privacy of information-centric smart cities' applications and presents future research challenges that still need to be considered for performance improvement.
引用
收藏
页数:19
相关论文
共 126 条
[1]   A Mechanism for Securing IoT-enabled Applications at the Fog Layer [J].
Abbas, Nadeem ;
Asim, Muhammad ;
Tariq, Noshina ;
Baker, Thar ;
Abbas, Sohail .
JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2019, 8 (01)
[2]   A Lightweight Lattice-Based Homomorphic Privacy-Preserving Data Aggregation Scheme for Smart Grid [J].
Abdallah, Asmaa ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (01) :396-405
[3]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[4]   Real-Time Secure Health Surveillance for Smarter Health Communities [J].
Alabdulatif, Abdulatif ;
Khalil, Ibrahim ;
Forkan, Abdur Rahim Mohammad ;
Atiquzzaman, Mohammed .
IEEE COMMUNICATIONS MAGAZINE, 2019, 57 (01) :122-129
[5]   Smart Cities: Definitions, Dimensions, Performance, and Initiatives [J].
Albino, Vito ;
Berardi, Umberto ;
Dangelico, Rosa Maria .
JOURNAL OF URBAN TECHNOLOGY, 2015, 22 (01) :3-21
[6]   Cyber Security Attacks on Smart Cities and Associated Mobile Technologies [J].
AlDairi, Anwaar ;
Tawalbeh, Lo'ai .
8TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2017) AND THE 7TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT 2017), 2017, 109 :1086-1091
[7]   A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices [J].
Amin, Ruhul ;
Sherratt, R. Simon ;
Giri, Debasis ;
Islam, S. K. Hafizul ;
Khan, Muhammad Khurram .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2017, 63 (01) :53-61
[8]   Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection [J].
Aminanto, Muhamad Erza ;
Choi, Rakyong ;
Tanuwidjaja, Harry Chandra ;
Yoo, Paul D. ;
Kim, Kwangjo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :621-636
[9]  
Angelakis V., 2017, Designing, Developing, and Facilitating Smart Cities: Urban Design to IoT Solutions
[10]  
Angrishi K., 2017, CoRR