Security and Privacy in Smart Cities: Challenges and Opportunities

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2020 by IJETT Journal
Volume-68 Issue-2
Year of Publication : 2020
Authors : Saleem Ahmed
DOI :  10.14445/22315381/IJETT-V68I2P201

Citation 

MLA Style: Saleem Ahmed  "Security and Privacy in Smart Cities: Challenges and Opportunities" International Journal of Engineering Trends and Technology 68.2 (2020):1-8.

APA Style:Saleem Ahmed. Security and Privacy in Smart Cities: Challenges and Opportunities  International Journal of Engineering Trends and Technology, 68(2),1-8.

Abstract
Internet of Things (IoT) model is action it possible for everyday objects to combine with the Internet. This has put the foundations for the starting of future Smart cities based on systems that consist of a raise of IoT devices to enable story applications. The smart cities model deals with the public data that is recumbent to different security and privacy risks at different level of smart cities architecture. Therefore, the importance of ensuring security and privacy is fundamental in this model. This paper focuses on the security and privacy issues involved in the smart cities. The paper highlights the key applications of smart cities and then check its architecture from security point of view. The paper also reviews the current security and privacy solutions for smart cities and confirm the open issues and research challenges that still need to be declaim in this new model, Internet of Things (IoT) model is making it possible for everyday objects to integrate with the Internet. This has laid the establishment for the inception of future Smart cities based on systems that consist of a raise of IoT devices to enable novel applications. The smart cities model deals with the public data that is prone to different security and privacy risks at different level of smart cities architecture. Therefore, the importance of ensuring security and privacy is essential in this model. This paper focuses on the safety and privacy issues implicated in the smart cities. The paper highlights the key applications of smart cities and then investigates its architecture from security point of view. The paper also reviews the current security and privacy solutions for smart cities and emphasizes the open issues and research challenges that still need to be addressed in this new model.

Reference

[1] Hernández Muñoz,J.M.,Vercher,J.B.,Muñoz,L.,Galache,J.A., Presser, M., Gómez, L.A.H., Pettersson, J.: Smart Cities at the Fore front of the Future Internet,pp.447–462(2011)
[2] Albino,V.,Berardi,U.,Dangelico,R.M.:SmartCities:definition s, Dimensions, Performance, and Initiatives, vol. 22, pp. 3–21. Taylor & Francis(2015)
[3] Popescul, D., Radu, L.D.: Data Security in Smart Cities: challenges and Solutions, vol. 20, p. 29. Inforce Association (2016)
[4] Yang, K., Zhang, K., Ren, J., Shen, X.: Security and Privacy in Mobile Crowdsourcing Networks: challenges and Opportunities, vol. 53, pp. 75–81. IEEE(2015)
[5] Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: InternetofThingsforSmartCities,vol.1,pp.22– 32.IEEE(2014)
[6] Yaqoob, I., Hashem, I.A.T., Mehmood, Y., Gani, A., Mokhtar, S., Guizani, S.: Enabling Communication Technologies for Smart Cities,vol.55,pp.112– 120.IEEE(2017)
[7] Petrolo,R.,Loscri,V.,Mitton,N.:Towardsa Smart City Basedon Cloud of Things, a Survey on the Smart City Vision and Paradigms,vol.28.WileyOnlineLibrary(2017)
[8] Hashem,I.A.T.,Chang,V.,Anuar,N.B.,Adewole,K.,Yaqoob,I. , Gani, A., Ahmed, E., Chiroma, H.: The Role of Big Data in Smart City,vol.36,pp.748–758.Elsevier(2016)
[9] Al Nuaimi, E., Al Neyadi, H., Mohamed, N., Al-Jaroodi, J.: Applications of Big Data to Smart Cities, vol. 6, p. 25. Springer (2015)
[10] Xiong, Z., Sheng, H., Rong, W., Cooper, D.E.: Intelligent transportation systems for smart cities: a progress review. Sci. China Inf. Sci., 1–7(2012)
[11] Karnouskos, S., Da Silva, P.G., Ilic, D.: Energy Services for the Smart Grid City, pp. 1–6(2012)
[12] Solanas, A., Patsakis, C., Conti, M., Vlachos, I.S., Ramos, V., Falcone, F., Postolache, O., Pérez-Martínez, P.A., Di Pietro, R., Perrea, D.N., et al. Smart Health: a Context- Aware Health ParadigmWithinSmartCities,vol.52,pp.74– 81.IEEE(2014)
[13] Jeong, J.-S., Kim, M., Yoo, K.-H.: A Content Oriented Smart Education System Basedon Cloud Computing. Citeseer(2013
[14] Filipponi,L.,Vitaletti,A.,Landi,G.,Memeo,V.,Laura,G.,Puc ci, P.: Smart City: an Event Driven Architecture for Monitoring Public Spaces with Heterogeneous Sensors, pp. 281–286(2010)
[15] Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.:Cerberus: a Context-Aware Security Scheme for Smart Spaces,pp. 489–496(2003)
[16] Lee, J., Kao, H.-A., Yang, S.: Service Innovation and Smart Analytics for Industry 4.0 and Big Data Environment, vol. 16, pp. 3–8. Elsevier(2014)
[17] Martínez-Ballesté, A., Pérez-Martínez, P.A., Solanas, A.: The Pursuit of Citizens’ Privacy: a Privacy-Aware Smart City is Possible,vol.51,pp.136–141.IEEE(2013)
[18] Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things:a survey of existing protocols and open research issues, vol. 17, pp. 1294–1312. IEEE(2015)
[19] Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and Challenges, vol.20,pp.2481– 2501. Springer(2014)
[20] Xiao, Z., Xiao, Y.: Security and Privacy in Cloud Computing,vol.15, pp. 843–859. IEEE(2013).
[21] Nam, T., Pardo, T.A.: Conceptualizing Smart City with Dimen-sions of Technology, People, and Institutions, pp. 282–291(2011)
[22] Karthikeyan, S., Nesterenko, M.: RFID Security Without Exten- sive Cryptography, pp. 63–67(2005)
[23] Chien, H.-Y.: SASI: a New Ultra lightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity, vol. 4, pp. 337–340. IEEE(2007)
[24] Qiu, Y., Ma, M.: An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs. In: 2015 IEEE International Conference on Communication Workshop (ICCW) (2015)
[25] Engels,D.W.,Saarinen,M.J.O.,Schweitzer,P.,Smith,E.M.: The Humming bird-2 Lightweight Authenticated Encryption Algorithm, vol. 11, pp. 19–31. Springer(2011)
[26] Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic Encryption Appl.CloudComput.Secur.1,4–6(2012)
[27] López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly Mul- tiparty Computation on the Cloud via Multikey Fully Homomor- phic Encryption, pp. 1219–1234(2012)
[28] Brown, M., Paller, A.: Secure software development: why the development world awoke to the challenge. Inf. Secur. Techn. Rep. 13(1), 40–43(2008)
[29] Kang, J., Park, J.H.: A secure-coding and vulnerability check system based on smart-fuzzing and exploit. Neurocomputing (2017)
[30] Khan,R.:Secure software development:a prescriptive framework. Comput. Fraud Secur. 2011(8), 12–20(2011)
[31] Goswami, S., Misra, S., Taneja, C., Mukherjee, A.: Securing intra-communication in 6LoWPAN: a PKI integrated scheme. In: 2014 IEEE International Conference on Advanced Networks and Tele communcations Systems (ANTS)(2014)

Keywords
Security, privacy, smart cities, challenge, opportunity.