Acknowledgement
This work was supported by the Soonchunhyang University Research Fund (No. 10220011).
References
- S. K. Singh, C. Lee, and J. H. Park, "CoVAC: a P2P smart contract-based intelligent smart city architecture for vaccine manufacturing," Computers & Industrial Engineering, vol. 166, article no. 107967, 2022. https://doi.org/10.1016/j.cie.2022.107967
- J. Cha, S. K. Singh, T. W. Kim, and J. H. Park, "Blockchain-empowered cloud architecture based on secret sharing for smart city," Journal of Information Security and Applications, vol. 57, article no. 102686, 2021. https://doi.org/10.1016/j.jisa.2020.102686
- S. K. Singh and J. H. Park, "TaLWaR: blockchain-based trust management scheme for smart enterprises with augmented intelligence," IEEE Transactions on Industrial Informatics, vol. 19, n. 1, pp. 626-634, 2023. https://doi.org/10.1109/TII.2022.3204692
- S. K. Singh, Y. Pan, and J. H. Park, "Blockchain-enabled secure framework for energy-efficient smart parking in sustainable city environment," Sustainable Cities and Society, vol. 76, article no. 103364, 2022. https://doi.org/10.1016/j.scs.2021.103364
- A. E. Azzaoui, S. K. Singh, and J. H. Park, "SNS big data analysis framework for COVID-19 outbreak prediction in smart healthy city," Sustainable Cities and Society, vol. 71, article no. 102993, 2021. https://doi.org/10.1016/j.scs.2021.102993
- S. K. Singh, A. E. Azzaoui, T. W. Kim, Y. Pan, and J. H. Park, "DeepBlockScheme: a deep learning-based blockchain driven scheme for secure smart city," Human-centric Computing and Information Sciences, vol. 11, article no. 12, 2021. https://doi.org/10.22967/HCIS.2021.11.012
- C. Ma, "Smart city and cyber-security; technologies used, leading challenges and future recommendations," Energy Reports, vol. 7, pp. 7999-8012, 2021. https://doi.org/10.1016/j.egyr.2021.08.124
- E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, "Security, privacy and risks within smart cities: literature review and development of a smart city interaction framework," Information Systems Frontiers, vol. 24, pp. 393-414, 2022. https://doi.org/10.1007/s10796-020-10044-1
- F. Al-Turjman, H. Zahmatkesh, and R. Shahroze, "An overview of security and privacy in smart cities' IoT communications," Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, article no. e3677, 2022. https://doi.org/10.1002/ett.3677
- B. Bhushan, A. Khamparia, K. M. Sagayam, S. K. Sharma, M. A. Ahad, and N. C. Debnath, "Blockchain for smart cities: a review of architectures, integration trends and future research directions," Sustainable Cities and Society, vol. 61, article no. 102360, 2020. https://doi.org/10.1016/j.scs.2020.102360
- L. U. Khan, I. Yaqoob, N. H. Tran, S. M. A. Kazmi, T. N. Dang, and C. S. Hong, "Edge-computing-enabled smart cities: a comprehensive survey," IEEE Internet of Things, vol. 7, no. 10, pp. 10200-10232, 2020. https://doi.org/10.1109/JIOT.2020.2987070
- S. Singh, P. K. Sharma, B. Yoon, M. Shojafar, G. H. Cho, and I. H. Ra. "Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city," Sustainable Cities and Society, vol. 63, article no. 102364, 2020. https://doi.org/10.1016/j.scs.2020.102364
- N. Magaia, R. Fonseca, K. Muhammad, A. H. F. N. Segundo, A. V. L. Neto, and V. H. C. Albuquerque, "Industrial Internet-of-Things security enhanced with deep learning approaches for smart cities," IEEE Internet of Things, vol. 8, no. 8, pp. 6393-6405, 2021. https://doi.org/10.1109/JIOT.2020.3042174
- CISION PR Newswire, "Cynerio and Ponemon Study Finds Frequent Cyber Attacks and Insufficient Accountability in Healthcare Adversely Impact Patient Care," 2022 [Online]. Available: https://www.prnewswire.com/news-releases/cynerio-and-ponemon-study-finds-frequent-cyber-attacks-and-insufficient-accountability-in-healthcare-adversely-impact-patient-care-301604539.html
- Kaspersky, "IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019," 2019 [Online]. Available: https://www.kaspersky.com/about/press-releases/2019_iot-under-fire-kasperskydetects-more-than-100-million-attacks-on-smart-devices-in-h1-2019.
- Y. Kim, H. Lee, and D. Hwang, "IoT malware detection and family classification using entropy time series data extraction and recurrent neural networks," KIPS Transactions on Software and Data Engineering, vol. 11, no. 5, pp. 197-202, 2022. https://doi.org/10.3745/KTSDE.2022.11.5.197
- R. Yumlembam, B. Issac, S. M. Jacob, and L. Yang, "IoT-based Android malware detection using graph neural network with adversarial defense," IEEE Internet of Things, 2022. https://doi.org/10.1109/JIOT.2022.3188583
- P. Bajpai and R. Enbody, "Preparing smart cities for ransomware attacks," in Proceedings of 2020 3rd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, 2020, pp. 127-133.
- B. Hamid, N. Jhanjhi, M. Humayun, A. Khan, and A. Alsayat, "Cyber security issues and challenges for smart cities: a survey," in Proceedings of 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 2019, pp. 1-7.
- L. Bilge and T. Dumitras, "Before we knew it: an empirical study of zero-day attacks in the real world," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, 2012, pp. 833-844.
- Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, M. Gao, H. Hou, and C. Wang, "Machine learning and deep learning methods for cybersecurity," IEEE Access, vol. 6, pp. 35365-35381, 2018. https://doi.org/10.1109/access.2018.2836950
- W. A. Alberto Torres, R. Steinfeld, A. Sakzad, J. K. Liu, V. Kuchta, N. Bhattacharjee, M. H. Au, and J. Cheng, "Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1. 0)," in Information Security and Privacy. Cham, Switzerland: Springer, 2018, pp. 558-576.
- Y. L. Gao, X. B. Chen, Y. L. Chen, Y. Sun, X. X. Niu, and Y. X. Yang, "A secure cryptocurrency scheme based on post-quantum blockchain," IEEE Access, vol. 6, pp. 27205-27213, 2018. https://doi.org/10.1109/access.2018.2827203
- J. Zhang, C. Shen, H. Su, M. T. Arafin, and G. Qu, "Voltage over-scaling-based lightweight authentication for IoT security," IEEE Transactions on Computers, vol. 71, no. 2, pp. 323-336, 2022. https://doi.org/10.1109/TC.2021.3049543
- V. A. Thakor, M. A. Razzaque, and M. R. Khandaker, "Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities," IEEE Access, vol. 9, pp. 28177-28193, 2021. https://doi.org/10.1109/ACCESS.2021.3052867
- R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinez-del-Rincon, and D. Siracusa, "LUCID: a practical, lightweight deep learning solution for DDoS attack detection," IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 876-889, 2020. https://doi.org/10.1109/TNSM.2020.2971776
- X. Yang, X. Yi, I. Khalil, J. Luo, E. Bertino, S. Nepal, and X. Huang, "Secure and lightweight authentication for mobile-edge computing enabled WBANs," IEEE Internet of Things, vol. 19, no. 14, pp. 876-889, 2022. https://doi.org/10.1109/JIOT.2021.3138989
- K. Cao, S. Hu, Y. Shi, A. W. Colombo, S. Karnouskos, and X. Li, "A survey on edge and edge-cloud computing assisted cyber-physical systems," IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7806-7819, 2021. https://doi.org/10.1109/TII.2021.3073066
- M. Yahuza, M. Y. I. B. Idris, A. W. N. A. Wahab, A. T. Ho, S. Khan, S. N. B. Musa, and A. Z. B. Taha, "Systematic review on security and privacy requirements in edge computing: state of the art and future research opportunities," IEEE Access, vol. 8, pp. 76541-76567, 2020. https://doi.org/10.1109/access.2020.2989456
- W. Rafique, L. Qi, I. Yaqoob, M. Imran, R. U. Rasool, and W. Dou, "Complementing IoT services through software defined networking and edge computing: a comprehensive survey," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1761-1804, 2020. https://doi.org/10.1109/COMST.2020.2997475