A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities

被引:154
作者
Habibzadeh, Hadi [1 ]
Nussbaum, Brian H. [2 ]
Anjomshoa, Fazel [3 ]
Kantarci, Burak [4 ]
Soyata, Tolga [1 ]
机构
[1] SUNY Albany, Dept Elect & Comp Engn, Draper Hall,Suite 116,135 Western Ave, Albany, NY 12203 USA
[2] SUNY Albany, Coll Emergency Preparedness Homeland Secur & Cybe, Albany, NY 12203 USA
[3] Clarkson Univ, Dept Elect & Comp Engn, Potsdam, NY USA
[4] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON, Canada
基金
美国国家科学基金会;
关键词
Smart cities; Cyber security; Government policy making; Cryptography; Security and privacy; Authentication; ENERGY THEFT DETECTION; SUPPORTED INTERNET; ATTACK DETECTION; ACCESS-CONTROL; PUBLIC SAFETY; DATA-SECURITY; THINGS; CLOUD; CHALLENGES; SCHEME;
D O I
10.1016/j.scs.2019.101660
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Deployments of Cyber Physical Systems (CPSs) in smart cities are poised to significantly improve healthcare, transportation services, utilities, safety, and environmental health. However, these efficiencies and service improvements will come at a price: increased vulnerability and risk. Smart city deployments have already begun to proliferate, as have the upsides, efficiencies, and cost-savings they can facilitate. There are, however, proliferating challenges and costs as well. These challenges include important technical questions, but equally important policy and organizational questions. It is important to understand that these policy and technical implementation hurdles are perhaps equally likely to slow or disable smart city implementation efforts. In this paper, a survey of the theoretical and practical challenges and opportunities are enumerated not only in terms of their technical aspects, but also in terms of policy and governance issues of concern.
引用
收藏
页数:20
相关论文
共 200 条
[1]   Lightweight Security and Privacy Preserving Scheme for Smart Grid Customer-Side Networks [J].
Abdallah, Asmaa ;
Shen, Xuemin .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (03) :1064-1074
[2]   Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
COMPUTERS & SECURITY, 2018, 74 :144-166
[3]   An intrusion detection system for connected vehicles in smart cities [J].
Aloqaily, Moayad ;
Otoum, Safa ;
Al Ridhawi, Ismaeel ;
Jararweh, Yaser .
AD HOC NETWORKS, 2019, 90
[4]   SPEED: Secure Provable Erasure for Class-1 IoT Devices [J].
Ammar, Mahmoud ;
Daniels, Wilfried ;
Crispo, Bruno ;
Hughes, Danny .
PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, :111-118
[5]  
An Jian, 2011, Proceedings of the 2011 IEEE International Conference on Internet of Things and 4th IEEE International Conference on Cyber, Physical and Social Computing (iThings/CPSCom 2011), P687, DOI 10.1109/iThings/CPSCom.2011.118
[6]  
Angrishi K., 2017, CoRR
[7]   Social Behaviometrics for Personalized Devices in the Internet of Things Era [J].
Anjomshoa, Fazel ;
Aloqaily, Moayad ;
Kantarci, Burak ;
Erol-Kantarci, Melike ;
Schuckers, Stephanie .
IEEE ACCESS, 2017, 5 :12199-12213
[8]  
[Anonymous], 2018, RANSOMWARE HIT ATLAN
[9]  
[Anonymous], 2013, BIG PAYDAYS FORCE HO
[10]  
[Anonymous], 2007, Tech. Rep.