DOI QR코드

DOI QR Code

Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City

  • AlEisa, Hussah N. (Department of Computer Sciences, CCIS Princess Nourah Bint Abdulrahman University)
  • Received : 2022.02.05
  • Published : 2022.02.28

Abstract

The smart cities are evolving constantly and are responsible for the current transformation of cities and countries into a completely connected network of information and technology This interconnected network of a huge number of smart devices is capable of exchanging complex information and provides tremendous support including enhanced quality of life within urban locations. Unfortunately this set-up is vulnerable to security attacks and requires the widespread ubiquitous network to authorize access through privacy and thus offer security in order to ensure civilian participation in a country. The smart network should benefit the individuals of the country by developing potential strategies to protect the smart cities and their participating entities from the unauthorized attacks. Trustworthy data sharing strategies based on the utilization of advanced technology features via smart communication network could solve some issues of privacy and security. This paper presents the challenges and issues related to protection and highlights the important aspects of securing the smart cities and its components. It also presents the role of cloud security for building a secure smart city.

Keywords

References

  1. Allan A. Friedman and Darrell M. West, "Privacy and Security in Cloud Computing", Issues in Technology Innovation, No 3, pp24-29, November 2010
  2. Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya Rabadia, Peter Hannay, Maxim Chernyshev, Mike Johnstone, Paresh Kerai, Ahmed Ibrahim, Krishnun Sansurooah, Naeem Syed, Matthew Peacock, "Future challenges for smart cities: Cyber-security and digital forensics", Journal of Digital Investigation, pp3-13, (2017).
  3. Adel S. Elmaghraby and Michael M. Losavio, "Cyber security challenges in Smart Cities: Safety, security and privacy", Journal of Advanced Research, Volume 5, pp. 491-497, 2014. https://doi.org/10.1016/j.jare.2014.02.006
  4. Anwaar AlDairi and Lo'ai Tawalbeh, "Cyber Security Attacks on Smart Cities and Associated Mobile Technologies", The International Workshop on Smart Cities Systems Engineering (SCE 2017) Procedia Computer Science, Volume 109C, pp. 1086-1091, 2017.
  5. Maro Lacinak and Jozef Ristvej, "Smart city, Safety and Security", TRANSCOM 2017: International scientific conference on sustainable, modern and safe transport, Procedia Engineering, Volume 192, pp. 522 - 527, 2017. .
  6. Rida Khatoun and Sherali Zeadally. "Smart cities: concepts, architectures, research opportunities". Magazine of Communications of the ACM, Volume 59, Issue 8, pp. 46-57 August 2016.
  7. Terence K.L. Huia, R. Simon Sherratt, Daniel Diaz Sanchez, Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies", Future Generation Computer Systems, Volume 76, 2017, pp. 358-369. https://doi.org/10.1016/j.future.2016.10.026
  8. Zakaria El Mrabet, Naima Kaabouch , Hassan El Ghazi, Hamid El Ghazi, "Cyber-security in smart grid: Survey and challenges ", Computers and Electrical Engineering, Volume 67, 2018, pp. 469-482. https://doi.org/10.1016/j.compeleceng.2018.01.015
  9. Rossouw von Solms and Johan van Niekerk," From information security to cyber security", computers and security, Volume 38, 2013, pp. 97-102 https://doi.org/10.1016/j.cose.2013.04.004
  10. Carol Hawk and Akhlesh Kaushiva, "Cybersecurity and the Smarter Grid", The Electricity Journal, Vol. 27, Issue 8, pp. 84-95, October 2014. https://doi.org/10.1016/j.tej.2014.08.008
  11. Rafal Leszczyna, "A review of standards with cybersecurity requirements for smart grid", Computers and Security Volume 77, pp. 262-276, 2018. https://doi.org/10.1016/j.cose.2018.03.011
  12. Ilhami Colak, Seref Sagiroglu, Gianluca Fulli, Mehmet Yesilbudak, Catalin Felix Covrig, "A survey on the critical issues in smart grid technologies", Renewable and Sustainable Energy Reviews, Volume 54, pp. 396-405, February 2016. https://doi.org/10.1016/j.rser.2015.10.036
  13. Aakanksha Tewari, B.B. Gupta, "Security, privacy and trust of different layers in Internet of Things (IoTs) framework", Future Generation Computer Systems, May 2018. Available at https://doi.org/10.1016/j.future.2018.04.027
  14. Zhihong Yang, Yingzhao Yue, Yu Yang, Yufeng Peng, Xiaobo Wang, Wenji Liu, "Study and application on the architecture and key technologies for IoT", in: Proceeding of 2011 International Conference on Multimedia Technology, pp. 747-751, ( ICMT), 2011.
  15. Rishika Mehtaa , Jyoti Sahnib, Kavita Khannac, "Internet of Things: Vision, Applications and Challenges", International Conference on Computational Intelligence and Data Science (ICCIDS 2018), Procedia Computer Science, Vol. 132, pp. 1263-1269, 2018.
  16. S. Sicari, A. Rizzardi, L.A. Grieco, A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead", Computer Networks Journal, Vol. 76, pp. 146-164, 2015. https://doi.org/10.1016/j.comnet.2014.11.008
  17. Mahmoud Ammar, Giovanni Russello, Bruno Crispo, "Internet of Things: A survey on the security of IoT frameworks", Journal of Information Security and Applications, Vol. 38, pp. 8-27, 2018. https://doi.org/10.1016/j.jisa.2017.11.002
  18. Christos Stergioua, Kostas E. Psannisa, Brij B. Guptab, Yutaka Ishibashic, "Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT", Sustainable Computing: Informatics and Systems, Vol. 19, pp. 174-184, 2018. https://doi.org/10.1016/j.suscom.2018.06.003
  19. Jianwei Hou, Leilei Qu, Wenchang Shi, "A survey on internet of things security from data perspectives", Computer Networks Journal, in press, Dec 2018.
  20. Zhifeng Xiao ; Yang Xiao, "Security and Privacy in Cloud Computing", IEEE Communications Surveys & Tutorials, Volume 15 , Issue 2 , pp. 843 - 859, Second Quarter 2013. https://doi.org/10.1109/surv.2012.060912.00182
  21. Jeevitha B. K., Thriveni J., Venugopal K. R, "Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey", International Journal of Computer Applications (0975 - 8887) Volume 156 - No 12, December 2016, pp. 16-27.
  22. Sumitra Binu and Mohammed Misbahuddin, "A Survey of Traditional and Cloud Specific Security Issue" International Symposium on Security in computing and Communication, SSCC 2013: Security in Computing and Communications, Sabu M. Thampi et al. (Eds.): SSCC 2013, pp. 110-129, 2013.
  23. Saeed Shafieian, Mohammad Zulkernine, Anwar Haque, "Attacks in Public Clouds: Can They Hinder the Rise of the Cloud", n: Mahmood Z. (eds) Cloud Computing. Computer Communications and Networks. Springer, Vol 6, pp. 3-22. 2014.
  24. Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem, "Cloud Computing Security: A Survey", Journal of Computers, Volume 3, pp. 1-35, 2014.
  25. "Top Threats to Cloud Computing + Industry Insights", CLOUD SECURITY ALLIANCE The Treacherous 12, 2017.
  26. Hassan Takabi, James B.D. Joshi, Gail-Joon Ahn, " Security and Privacy Challenges in Cloud Computing Environments", IEEE Security & Privacy, Vol. 8, No. 6, pp. 24-31, 2010. https://doi.org/10.1109/MSP.2010.186
  27. Ramnath, Deepak , Krishnakumar, Vijayaraghavan, S., Ramanathan, R. "An improved secret key update for multiple intersymbol obfuscation in physical layer security" in Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), India, 13-16 September 2017.
  28. Lu Z.; Shakeri., Razo M, Tacca, M.; Fumagalli, A., Galimberti, Martinelli,, Swallow, G. "Orchestration of reliable three-layer networks", in Proceedings of the 19th International Conference on Transparent Optical Networks (ICTON), Spain, 2-6 July 2017.
  29. Al-Salloum, Wolthusen, "A link-layer-based self-replicating vulnerability discovery agent" in Proceedings of the IEEE symposium on Computers and Communications, Italy, 22-25 June 2010.