Vulnerability assessment of services deployed in internet of things based smart cities

被引:3
作者
Belghith, Aymen [1 ]
机构
[1] Saudi Elect Univ SEU, Comp Sci Dept, Riyadh, Saudi Arabia
关键词
IoT; smart cities; security; countermeasures; vulnerabilities; assessment; IOT; SECURITY; AUTHENTICATION;
D O I
10.1504/IJCAT.2022.123463
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Internet of Things (IoT) is an innovative and revolutionary technology. It promises to serve humanity and improve our lives by integrating a huge number of heterogeneous end devices and providing diverse interesting services. However, security remains the main key for the success of any technology. In this paper, we aim to provide structural guidelines to secure IoT-based smart cities. We should consider the IoT-based functional requirements in parallel with the security requirements based on the security triad: Confidentiality, Integrity and Availability. Moreover, we should consider the security challenges of smart cities based on the cube: Big data, Resource limitation, Interoperability, and Scalability. We then present solutions to the main threats. Finally, we assess vulnerabilities of some services offered in an IoT-based smart cities context. We show that current available services still suffer from several vulnerabilities and need associated security countermeasures for the success of the IoT-based smart cities.
引用
收藏
页码:164 / 174
页数:11
相关论文
共 45 条
  • [1] Alamet S.E., 2018, PROC IEEE INT SMART, P1
  • [2] Alrashdi I, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P305, DOI 10.1109/CCWC.2019.8666450
  • [3] IoT data security with DNA-genetic algorithm using blockchain technology
    Alshamrani, Sultan S.
    Basha, Amjath Fareeth
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2021, 65 (02) : 150 - 159
  • [4] Balla P. B., 2018, 2018 INT C SMART CIT, P1, DOI DOI 10.1109/ICSCET.2018.8537344
  • [5] Bansal B., 2017, P INT J ENG TRENDS T, V47, P380
  • [6] Bastos D., 2018, Living in the Internet of Things: Cybersecurity of the IoT - 2018
  • [7] Borgh J., 2017, 2017 Global Internet of Things Summit (GIoTS), P1, DOI DOI 10.1109/GIOTS.2017.8016277
  • [8] Castrillon J. A., 2017, PHOSPHORUS SULFUR, P1
  • [9] Dianawati E., 2020, P INT C ICT SMART SO
  • [10] Transaction Propagation on Permissionless Blockchains: Incentive and Routing Mechanisms
    Ersoy, Oguzhan
    Ren, Zhijie
    Erkin, Zekeriya
    Lagendijk, Reginald L.
    [J]. 2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, : 20 - 30