Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 -- 2588 2023-08-31 15:12:30 |
2 layout Meta information modification 2588 2023-09-01 03:00:00 |

Video Upload Options

Do you have a full video?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
Almeida, F. Prospects of Cybersecurity in Smart Cities. Encyclopedia. Available online: https://encyclopedia.pub/entry/48705 (accessed on 07 July 2024).
Almeida F. Prospects of Cybersecurity in Smart Cities. Encyclopedia. Available at: https://encyclopedia.pub/entry/48705. Accessed July 07, 2024.
Almeida, Fernando. "Prospects of Cybersecurity in Smart Cities" Encyclopedia, https://encyclopedia.pub/entry/48705 (accessed July 07, 2024).
Almeida, F. (2023, August 31). Prospects of Cybersecurity in Smart Cities. In Encyclopedia. https://encyclopedia.pub/entry/48705
Almeida, Fernando. "Prospects of Cybersecurity in Smart Cities." Encyclopedia. Web. 31 August, 2023.
Prospects of Cybersecurity in Smart Cities
Edit

Smart cities are urban spaces characterized by the widespread use of Information and Communication Technologies (ICTs). They intend to improve political-economic efficiency and support human and social development, thus improving the quality of life of its citizens. Cybersecurity plays a key role in smart cities due to the increasing interconnectivity and widespread use of ICT.

cybersecurity smart cities intelligent devices cyber-attacks privacy

1. Introduction

Smart cities are urban spaces characterized by the widespread use of Information and Communication Technologies (ICTs). They intend to improve political-economic efficiency and support human and social development, thus improving the quality of life of its citizens. According to Toli and Murtagh [1], a city is considered “smart” when there are drivers of sustainable eco-economic growth, a high quality of life, and conscious management of natural resources through participatory and democratic governance. Several drivers of smart cities include investments in technological infrastructure, investments in human capital, and social investments. In addition, other aspects that should be considered when classifying cities as smart include urban mobility, commitment to environmental issues, and social issues [2][3][4][5]. In summary, smart cities use technology and innovation to improve the quality of life of their inhabitants, increase the economic value generated in that community, and promote environmental sustainability.
Smart cities focus on the provision of a set of initiatives, actions, and services, in various areas of applicability in cities that aim to optimize and improve the well-being of their populations, both in terms of health and the environment. In broad terms, the goal of smart cities is to dynamically optimize the city to provide a set of actions and services for a more inclusive and sustainable city [6][7]. The main role that ICTs can assume is to integrate information systems services from each domain of activity of a city, such as health, education, transportation, energy, water, and waste management, to provide public services to citizens in a more efficient and ubiquitous way [8]. Furthermore, ICT plays a role in the incorporation and integration of various complex systems at the level of technological infrastructure, social structures, politics, and human behavior [9][10].
At the same time, the role of ICT for businesses, citizens, and civil society to create, invent, and experiment new things to improve and optimize the quality of life in cities is also widely known and accepted. However, taking into account the exposure of digital services and support services of the various domains through communication networks and the use of ICT, it is important to consider the identification of risks and challenges associated with smart cities, to reduce or mitigate these risks, namely in different sectors of activity, such as industrial control systems, intelligent transportation systems, Internet of Things (IoT), and digital health (e-health), in addition to other areas of intervention of cities. The literature [11][12] recognizes that cybersecurity and data privacy issues have become increasingly relevant, questionable, and challenging, both for citizens and for technology companies that provide digital services who are aware of the problem of cybercrime and cyberterrorism.
Cybersecurity plays a key role in smart cities due to the increasing interconnectivity and widespread use of ICT [13]. In smart cities, systems and devices are networked to collect data, monitor infrastructures, optimize services, and improve citizens’ quality of life. However, this connectivity exposes cities to a range of cyber threats, making data and infrastructure security critical. Systematic literature reviews performed by Kim et al. [14] and Gracias et al. [15] in the field of smart cities have identified cybersecurity as a key factor for the implementation of a smart city. Furthermore, studies in the area have sought to characterize the various security risks considering theoretical models for identifying vulnerabilities [16][17][18][19][20] and empirical scenarios considering several smart cities such as Dubai, Barcelona, Shanghai, and Como [21][22][23][24].

2. Information Security

In recent years, the potential and actual impacts of security threats in cyberspace have become evident due to several incidents with direct repercussions on the security of countries and citizens [25][26][27]. Digital technologies and cyberspace are not only resources and space where one can do better and more efficiently what was once difficult, time-consuming, and costly to do. As argued by Lippert and Cloutier [28], this new reality has created the potential to significantly alter the influence of different groups or actors in the international and national, social, or business scenes.
Information systems, digital communication, and the surrounding digital environment are key elements for successful decision-making processes that aim to produce informed decisions on critical and sensitive issues. To maintain sustainable and competitive infrastructures, which are vital to the survival of nations around the world, there has been a drive to invest in mechanisms and processes that derive from the need to make every possible effort to ensure secure digital resources. Authors such as Knell [29] and Pereira et al. [30] emphasize that the world is highly interconnected, with resources interconnected with structures and networks on a global scale. Therefore, one of the main concerns to ensure a secure protection and safeguarding of information has been the security of information systems, public and private, and their information, which is essential to support the activities of organizations. It also emerges that information security is also vital to building and maintaining customer trust. Consumers are increasingly concerned about the privacy and protection of their personal data. Bleier et al. [31] argue that by demonstrating a serious commitment to information security, organizations can gain customer trust and establish lasting relationships. This is also an important element in the context of smart city adoption, in which the relationships established also manifest themselves in the inclusion of new services in smart cities.
Information security addresses multiple domains. The importance of information security can be understood in different aspects. Information security must ensure the confidentiality of data, preventing sensitive information from falling into the wrong hands. This is especially critical when it comes to personal data, financial information, trade secrets, or government information. Based in a literature review, Rath and Kumar [32] have concluded that a breach of confidentiality can lead to serious consequences such as identity theft, financial loss, or reputational damage. Information security also aims to ensure data integrity (i.e., its accuracy, completeness, and consistency over time). It is essential that information is not altered in an unauthorized or accidental way, ensuring that it remains reliable and accurate. A lack of data integrity can lead to wrong decisions, errors in processes, and loss of confidence in the information [33]. Finally, information security must ensure that data and systems are available when needed. This implies protecting information against technical failures, cyber-attacks, or natural disasters that may compromise data availability. In their work exploring the relationship between availability and other security issues, Qadir and Quadri [34] have realized that a lack of availability can cause business disruptions, lost productivity, and financial losses.
Information security, data science, and technology are interconnected domains. Data science involves the extraction of knowledge and insights from data. It encompasses a wide range of techniques, including data collection, data cleaning, data analysis, data visualization, machine learning, and statistical modeling [35][36]. Technology serves as the foundation for both information security and data science. Technological advancements have enabled the rapid growth of digital data and the development of sophisticated tools and algorithms to process and analyze it. Key technological components that support information security and data science include big data platforms, cloud computing, artificial intelligence, machine learning, cryptography, and networking and communication. Hazim and Khan [37] provide several examples of the use of the cloud in organizations and pointed out that cloud services have revolutionized data storage, accessibility, and processing. They provide scalable infrastructure to accommodate large datasets and host data science applications and security solutions. Cloud service providers maintain vast data centers with a wide array of servers, storage, and networking resources. They can allocate and reallocate these resources dynamically based on demand. According to Brataas et al. [38], this allows users to scale up (add more resources) or scale down (remove excess resources) as needed, without having to invest in physical hardware themselves. Furthermore, cloud platforms offer elasticity, which means they can automatically adjust resources in response to varying workloads. During periods of high demand, the cloud can rapidly provision additional resources, and during low-demand periods, it can release unneeded resources. Biswas et al. [39] state that dynamic scaling ensures efficient resource utilization and cost-effectiveness. Cloud computing and machine learning are two powerful technologies that can be effectively combined to leverage their respective strengths. The integration of machine learning with cloud computing enables scalable and flexible solutions for processing and analyzing large datasets, building sophisticated models, and deploying AI-powered applications [40]. Machine learning tasks often require significant computational resources, especially for training complex models. Peng et al. [41] provide a vision regarding the parallel computing programming mode in the context of cloud computing and argue that it has enabled distributed computing, which can significantly speed up the training process by distributing the workload across multiple servers or nodes. This parallel processing capability can be relevant when training complex models on large datasets.

3. Security Risks in Smart Cities

ICT plays a key role in the development of smart cities, which combine infrastructure, architecture, objects, and people to improve processes and address social, economic, and environmental problems. Several technologies such as cloud, big data, artificial intelligence, blockchain, and IoT are found in smart cities. Nastjuk et al. [42] advocate that the use of emerging technologies is an enabler of innovation in the context of smart cities, and that it is not limited to the technological perspective of cities, but enables the creation of a smart environment, smart governance, and smart economy. Given the above, it can be inferred that there is no smart city without technology and innovation, as these are the factors that differentiate it from an ordinary city [43]. Necessarily, the adoption of new technologies and the high interconnectivity between them and humans makes smart cities vulnerable to various cyber threats [44][45]. Therefore, protecting the infrastructure, systems, and data from malicious activities is essential to ensure the security, privacy, and reliability of smart city services. Accordingly, there is a need to explore and know mitigation strategies that can address these challenges.
It is important to highlight that the security and privacy challenges of smart cities are not new and that many of them already exist in the isolated use of each of their technologies, but that they now assume a greater impact in the interconnected context of smart cities. The infrastructure of a smart city is composed of thousands of devices and applications that aim to improve processes and bring benefits to citizens. However, the use of these applications and systems can bring several problems related to security and privacy. Elliott and Soifer [46] and Federspiel et al. [47] refer to the vulnerabilities that occur by adopting smart systems based on artificial intelligence, as they not only collect a wide variety of sensitive information from people and their social circles, but also control city facilities and influence citizens’ lives.
In a smart city, security is looked at in the general component by covering all the features of the city, but it is also included in all the aspects that make it up. Studies by Ghazizadeh et al. [48] use an extended version of the Technology Acceptance Model (TAM) to demonstrate that security is a key factor in technology acceptance. Thus, safety encompasses more than just technical factors, having a strong human-dependent aspect, also including subjective factors related to the perception of individuals [49]. Consequently, the existence of objective and subjective dimensions of security is assumed.
Cybersecurity plays a key role in protecting critical infrastructure, which includes systems and assets that are essential to the functioning of society and the economy. This infrastructure can include power grids, transportation networks, water treatment facilities, communication systems, and more. Protecting these vital components from cyber threats is critical to prevent the disruptions, unauthorized access, or sabotage that can affect citywide operations [50]. The privacy by design approach advocated in studies such as Drev and Delak’s [51] and Romanou’s [52] is essential in smart cities that must be supported by a secure architecture and design. Therefore, cybersecurity considerations should be integrated into the architecture and design of critical infrastructure systems from the outset. This involves following the best security practices, conducting risk assessments, and implementing appropriate security controls [53][54].
Protecting data privacy is another area of concern in smart cities’ environments. Smart cities generate massive amounts of data from sensors, surveillance systems, and connected devices. These data often contain sensitive information about individuals, including their locations, behaviors, and personal preferences. Data encryption is a fundamental technique used to secure data in transit and at rest. In smart cities, sensitive data such as personal information, financial records, and surveillance footage should be encrypted to prevent unauthorized access or interception by malicious actors [55]. The importance of data minimization and anonymization is associated with the appearance of data encryption. Daoudagh et al. [56] recommend that smart cities should practice data minimization, collecting only the necessary data to fulfill their functions and reducing the risk associated with storing excessive personal information. Furthermore, smart cities must implement robust access controls to restrict access to sensitive systems and data. This involves implementing secure authentication mechanisms such as multi-factor authentication and role-based access control (RBAC) to ensure that only authorized individuals can access specific data [57]. Additionally, smart cities must incorporate secure communication mechanisms. Communication between devices and systems within a smart city’s infrastructure should be secured to prevent eavesdropping or tampering.
IoT devices are the backbone of smart cities, enabling connectivity and data exchange among various systems and devices. However, these devices are often vulnerable to cyber-attacks due to their limited security measures [58]. Consequently, robust cybersecurity practices are needed to secure IoT devices, including implementing secure authentication, encryption, and regular software updates to prevent unauthorized access or control. Several approaches are proposed in the literature to increase the security of IoT devices. Implementing robust authentication mechanisms such as multi-factor authentication (MFA) is proposed by Ometov et al. [59] to ensure that only authorized users or devices can access the IoT devices. This helps prevent unauthorized access and protects against brute-force attacks. The adoption of secure communication protocols such as Transport Layer Security (TLS) or Secure Shell (SSH) to encrypt data transmitted between IoT devices and the backend systems is proposed by Paul et al. [60]. This prevents the eavesdropping of and tampering with sensitive information. Regular firmware updates are recommended by Gong et al. [61] to keep the firmware of IoT devices up to date by applying regular security patches and updates provided by the manufacturers. This helps address vulnerabilities and ensures that devices are protected against known security risks. Finally, Prazeres et al. [62] employ an approach using test data from different datasets to suggest the implementation of network segmentation to isolate IoT devices from other critical infrastructure systems. This way, even if one device is compromised, it will not provide direct access to the entire network, reducing the potential impact of an attack.
Effective cybersecurity in smart cities requires collaboration among various stakeholders, which may include government authorities, urban planners, industry partners, community and citizen groups, and academic and research institutions, among others. As it is advocated by Clement et al. [63], the sharing of information, best practices, and establishing partnerships can help develop comprehensive cybersecurity strategies and responses to emerging threats. Public awareness and education are another pillar of cybersecurity in smart cities. At this level, Williamson [64] states that citizens should be informed about potential risks, advised on secure practices, and encouraged to report any suspicious activities. It is advocated that building a culture of cybersecurity awareness can help prevent attacks and ensure the collective security of the smart city ecosystem.

References

  1. Toli, A.M.; Murtagh, N. The Concept of Sustainability in Smart City Definitions. Front. Built Environ. 2020, 6, 1–10.
  2. Albino, V.; Berardi, U.; Dangelico, R.M. Smart Cities: Definitions, Dimensions, Performance, and Initiatives. J. Urban Technol. 2015, 22, 3–21.
  3. Kozlowski, W.; Suwar, K. Smart City: Definitions, Dimensions, and Initiatives. Eur. Res. Studies J. 2021, XXIV, 509–520.
  4. Joshi, S.; Saxena, S.; Godbole, T.; Shreya, S. Developing Smart Cities: An Integrated Framework. Proc. Comp. Sci. 2016, 93, 902–909.
  5. Winkowska, J.; Szpilko, D.; Pejić, S. Smart city concept in the light of the literature review. Eng. Manag. Prod. Serv. 2019, 11, 70–86.
  6. Corsi, A.; Pagani, R.; Cruz, T.B.; Souza, F.F.; Kovaleski, J.L. Smart Sustainable Cities: Characterization and Impacts for Sustainable Development Goals. J. Environ. Manag. Sust. 2022, 11, 1–32.
  7. Lee, J.; Babcock, J.; Pham, T.S.; Bui, T.H.; Kang, M. Smart city as a social transition towards inclusive development through technology: A tale of four smart cities. Int. J. Urban Sci. 2023, 27, 75–100.
  8. Czupich, M. The Role of ICT in the Smart City Concept. Olszt. Econ. J. 2019, 14, 63–74.
  9. Yeh, H. The effects of successful ICT-based smart city services: From citizens’ perspectives. Gov. Inf. Q. 2017, 34, 556–565.
  10. Myeong, S.; Jung, Y.; Lee, E. A Study on Determinant Factors in Smart City Development: An Analytic Hierarchy Process Analysis. Sustainability 2018, 10, 2606.
  11. Nitika, G.; Deepam, G. Cyber crime in the society: Security issues, preventions and challenges. Res. J. Eng. Technol. 2017, 8, 73–80.
  12. Verma, A.; Shri, C. Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control. Vision 2022, in press.
  13. Alamer, M.; Almaiah, M.A. Cybersecurity in Smart City: A Systematic Mapping Study. In Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 719–724.
  14. Kim, K.; Alshenaifi, I.M.; Ramachandran, S.; Kim, J.; Zia, T.; Amorjan, A. Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors 2023, 23, 3681.
  15. Gracias, J.S.; Parnell, G.S.; Specking, E.; Pohl, E.A.; Buchanan, R. Smart Cities—A Structured Literature Review. Smart Cities 2023, 6, 1719–1743.
  16. Kollarova, M.; Granak, T.; Stricova, S.; Ristvej, J. Conceptual Model of Key Aspects of Security and Privacy Protection in a Smart City in Slovakia. Sustainability 2023, 15, 6926.
  17. Alfouzan, F.A.; Kim, K.; Alzahrani, N.M. An Efficient Framework for Securing the Smart City Communication Networks. Sensors 2022, 22, 3053.
  18. Megahed, N.A.; Abdel-Kader, R.F. Smart Cities after COVID-19: Building a conceptual framework through a multidisciplinary perspective. Sci. Afr. 2022, 17, e01374.
  19. Neshenko, N.; Nader, C.; Bou-Harb, E.; Furht, B. A survey of methods supporting cyber situational awareness in the context of smart cities. J. Big Data 2020, 7, 92.
  20. Rani, S.; Kataria, A.; Chauhan, M.; Rattan, P.; Kumar, R.; Sivaraman, A.K. Security and Privacy Challenges in the Deployment of Cyber-Physical Systems in Smart City Applications: State-of-Art Work. Mater. Proc. 2022, 62, 4671–4676.
  21. Efthymiopoulos, M.P. Cyber-security in smart cities: The case of Dubai. J. Innov. Entrep. 2016, 5, 11.
  22. Eskhita, R.; Manda, V.K.; Hlali, A. Dubai and Barcelona as Smart Cities: Some Reflections on Data Protection Law and Privacy. Environ. Policy Law 2021, 51, 403–407.
  23. Cui, Q.; Chen, R.; Wei, R.; Hu, X.; Wang, G. Smart Mega-City Development in Practice: A Case of Shanghai, China. Sustainability 2023, 15, 1591.
  24. Fabrègue, B.; Bogoni, A. Privacy and Security Concerns in the Smart City. Smart Cities 2023, 6, 586–613.
  25. Li, Y.; Liu, Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 2021, 7, 8176–8186.
  26. Lambauer, D. Taking on the Challenge of Public Sector Cyber Security. Available online: https://www.nao.org.uk/insights/taking-on-the-challenge-of-public-sector-cyber-security/ (accessed on 27 June 2023).
  27. Reed, J. Cyberattacks Rise Sharply Against Governments and Schools. Available online: https://securityintelligence.com/news/cyberattacks-rise-sharply-against-governments-schools/ (accessed on 27 June 2023).
  28. Lippert, K.J.; Cloutier, R. Cyberspace: A Digital Ecosystem. Systems 2021, 9, 48.
  29. Knell, M. The digital revolution and digitalized network society. Rev. Evol. Polit. Econ. 2021, 2, 9–25.
  30. Pereira, C.S.; Durão, N.; Moreira, F.; Veloso, B. The Importance of Digital Transformation in International Business. Sustainability 2022, 14, 834.
  31. Bleier, A.; Goldfarb, A.; Tucker, C. Consumer privacy and the future of data-based innovation and marketing. Int. J. Res. Mark. 2020, 37, 466–480.
  32. Rath, D.K.; Kumar, A. Information privacy concern at individual, group, organization and societal level—A literature review. Vilakshan-XIMB J. Manag. 2021, 18, 171–186.
  33. Egoshin, N.S.; Konev, A.A.; Shelupanov, A.A. Model of Threats to the Integrity and Availability of Information Processed in Cyberspace. Symmetry 2023, 15, 431.
  34. Qadir, S.; Quadri, S.M.K. Information Availability: An Insight into the Most Important Attribute of Information Security. J. Inf. Sec. 2016, 7, 185–194.
  35. Sarker, I.H. Data Science and Analytics: An Overview from Data-Driven Smart Computing, Decision-Making and Applications Perspective. SN Comp. Sci. 2021, 2, 377.
  36. Xu, Z.; Tang, N.; Xu, C.; Cheng, X. Data science: Connotation, methods, technologies, and development. Data Sci. Manag. 2021, 1, 32–37.
  37. Hazim, K.; Khan, A.M. Cloud Computing: Revolution of the Internet. Int. J. Eng. Res. Tech. 2014, 2, 236–239.
  38. Brataas, G.; Herbst, N.; Ivansek, S.; Polutnik, J. Scalability Analysis of Cloud Software Services. In Proceedings of the IEEE International Conference on Autonomic Computing (ICAC), Columbus, OH, USA, 17–21 July 2017; pp. 285–292.
  39. Biswas, A.; Majumdar, S.; Nandy, B.; El-Haraki, A. A hybrid auto-scaling technique for clouds processing applications with service level agreements. J. Cloud Comp. 2017, 6, 29.
  40. Soni, D.; Kumar, N. Machine learning techniques in emerging cloud computing integrated paradigms: A survey and taxonomy. J. Netw. Comput. Appl. 2022, 205, 103419.
  41. Peng, Z.; Gong, Q.; Duan, Y.; Wang, Y. The Research of the Parallel Computing Development from the Angle of Cloud Computing. J. Phys. Conf. Ser. 2017, 910, 012002.
  42. Nastjuk, I.; Trang, S.; Papageorgiou, E.I. Smart cities and smart governance models for future cities. Electron. Mark. 2022, 32, 1917–1924.
  43. Eckhoff, D.; Wagner, I. Privacy in the smart city—Applications, technologies, challenges, and solutions. IEEE Comm. Surv. Tutor. 2018, 20, 489–516.
  44. Demertzi, V.; Demertzis, S.; Demertzis, K. An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities. Appl. Sci. 2023, 13, 790.
  45. Wray, S. International Agencies Issue Smart City Cybersecurity Guide. Available online: https://cities-today.com/international-agencies-issue-smart-city-cybersecurity-guide/ (accessed on 29 June 2023).
  46. Elliott, D.; Soifer, E. AI Technologies, Privacy, and Security. Front. Artif. Intell. 2022, 5, 1–8.
  47. Federspiel, F.; Mitchell, R.; Asokan, A.; Umana, C.; McCoy, D. Threats by artificial intelligence to human health and human existence. BMJ Global Health 2023, 8, e010435.
  48. Ghazizadeh, M.; Peng, Y.; Lee, J.D.; Boyle, L.N. Augmenting the Technology Acceptance Model with Trust: Commercial Drivers’ Attitudes towards Monitoring and Feedback. Proc. Hum. Factors Ergon. Soc. Annu. Meet. 2012, 56, 2286–2290.
  49. Huang, D.L.; Rau, P.L.; Salvendy, G.; Gao, F.; Zhou, J. Factors affecting perception of information security and their impacts on IT adoption and security practices. Int. J. Hum. Comp. Stud. 2011, 69, 870–883.
  50. Edwards, A.; Calaresu, M. Smart cities and security: Editorial preface. City Territ. Arch. 2018, 5, 19.
  51. Drev, M.; Delak, B. Conceptual Model of Privacy by Design. J. Comp. Inf. Syst. 2022, 62, 888–895.
  52. Romanou, A. The necessity of the implementation of Privacy by Design in sectors where data protection concerns arise. Comp. Law Sec. Rev. 2018, 34, 99–110.
  53. Kalinin, M.; Krundyshev, V.; Zegzhda, P. Cybersecurity Risk Assessment in Smart City Infrastructures. Machines 2021, 9, 78.
  54. Gupta, K.; Zhang, W.; Hall, R.P. Risk priorities and their co-occurrences in smart city project implementation: Evidence from India’s Smart Cities Mission (SCM). Env. Plann. Urban Analyt. City Sci. 2021, 48, 880–894.
  55. Kuang, Z.; Chen, C. Research on smart city data encryption and communication efficiency improvement under federated learning framework. Egypt. Inf. J. 2023, 24, 217–227.
  56. Daoudagh, S.; Marchetti, E.; Savarino, V.; Bernabe, J.B.; Garcia-Rodríguez, J.; Moreno, R.T.; Martinez, J.A.; Skarmeta, A.F. Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal. Sensors 2021, 21, 7154.
  57. Liu, Q.; Zhang, H.; Wan, J.; Chen, X. An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things. IEEE Access 2017, 5, 7001–7011.
  58. Almagrabi, A.O. Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism. Expert Syst. 2023, 40, e13113.
  59. Ometov, A.; Petrov, V.; Bezzateev, S.; Andreev, S.; Koucheryavy, Y.; Gerla, M. Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications. IEEE Netw. 2019, 33, 82–88.
  60. Paul, R.; Ghosh, N.; Sau, S.; Chakrabarti, A.; Mohapatra, P. Blockchain based secure smart city architecture using low resource IoTs. Comp. Netw. 2021, 196, 108234.
  61. Gong, S.; Tcydenova, E.; Jo, J.; Lee, Y.; Park, J.H. Blockchain-Based Secure Device Management Framework for an Internet of Things Network in a Smart City. Sustainability 2019, 11, 3889.
  62. Prazeres, N.; Costa, R.; Santos, L.; Rabadão, C. Engineering the application of machine learning in an IDS based on IoT traffic flow. Intell. Syst. Appl. 2023, 17, 200189.
  63. Clement, J.; Manjon, M.; Crutzen, N. Factors for collaboration amongst smart city stakeholders: A local government perspective. Gov. Inf. Q. 2022, 39, 101746.
  64. Williamson, B. Educating the smart city: Schooling smart citizens through computational urbanism. Big Data Soc. 2015, 2, 1–13.
More
Information
Contributor MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register :
View Times: 318
Revisions: 2 times (View History)
Update Date: 01 Sep 2023
1000/1000
Video Production Service