JETI Admin2
Abstract
Smart cities, which leverage technology and data to enhance urban living, face significant challenges in securing their infrastructure and systems from cyber-attacks. As cities become more interconnected and reliant on digital technologies, they become attractive targets for malicious actors seeking to exploit vulnerabilities. This paper highlights the unique characteristics of smart city infrastructures, the potential risks and impacts of cyber-attacks, and the key challenges faced in ensuring their security. It also discusses the need for robust cybersecurity measures, collaboration among stakeholders, and proactive approaches to mitigate cyber threats in smart cities. By addressing these challenges, smart cities can safeguard their critical systems, protect citizen data, and maintain the trust and resilience necessary for a successful digital urban transformation.
References
[1] C. Ma, “Smart city and cyber-security; technologies used, leading challenges and future recommendations”. Energy Reports, vol. 7, 2021, pp. 7999-8012. [2] R. R. Schipper and A. G. Silvius, “Characteristics of smart sustainable city development: Implications for project management”. Smart Cities, vol. 1 issue 1, 2018, pp. 75-97. [3] A.P. Binitie and J.O. Babatunde, “Adapting user interface design to mitigate shoulder surfing attacks in ussd channel”.African Journal of Environment and Natural Science Research, vol. 7 issue 1, 2024, pp. 13-27. [4] S. Alromaihi, W. Elmedany and C. Balakrishna, “Cyber security challenges of deploying IoT in smart cities for healthcare applications”. 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 2018, pp. 140-145. IEEE. [5] R. Khatoun and S. Zeadally, “Cybersecurity and privacy solutions in smart cities”. IEEE Communications Magazine, vol. 55 issue 3, 2017, pp. 51-59. [6] Z. A. Baig, P. Szewczyk, C. Valli, P. Rabadia, P.Hannay, M. Chernyshev and M. Peacock, “Future challenges for smart cities: cyber-security and digital forensics”. Digital Investigation, vol. 22, 2017, pp. 3-13. [7] V. Demertzi, S. Demertzis and K.Demertzis, ”An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities”. Applied Sciences, vol. 13 issue 2, 2023, pp. 790. [8] T. Braun, B. C .Fung, F. Iqbal and B. Shah, “Security and privacy challenges in smart cities”. Sustainable cities and society, vol. 39, 2018, pp. 499-507. [9] M. A. Jabbar and R. Aluvalu,”Cyber-security: Future challenge for a safer and secure smart city”. 2nd Smart Cities Symposium (SCS 2019), 2019, pp. 1-6. IET. [10] C. K. Toh, “Security for smart cities”. IET Smart Cities, vol. 2 issue 2, 2020, pp. 95-104. [11] R. Kitchin and M. Dodge, “The (in) security of smart cities: vulnerabilities, risks, mitigation, and prevention”. In Smart cities and innovative. Urban technologies, 2020, pp. 47-65. Routledge. [12] N. Mohamed, J. Al-Jaroodi and I. Jawhar (2020). “Opportunities and challenges of data-driven cybersecurity for smart cities”. IEEE systems security symposium (SSS), pp. 1-7. [13] A. K. M. B. Haque, B. Bhushan and G. Dhiman, “Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends.” Expert System, 2021, pp. 1-23. [14] N.Z. Bawany & J. A. Shamsi, “Smart City architecture: vision and challenges”. IJACSA Vol.6, No. 11, 2015, pp. 1-11 [15] R. Wange, X. Zhang, C. Dave, L. Chao & S. Hao, “Smart city architecture: a technology guide for implementation and design challenges”. Network Technology and Applications, 2014, pp.56-69. [16] M. Angelidou, “The role of smart city characteristics in the plans of fifteen cities”. Journal of Urban Technology, vol. 24, issue 4, 2017, pp. 3-28. [17] S. Pathak and M. Pandey, “Smart cities: Review of characteristics, composition, challenges and technologies”. 6th International Conference on Inventive Computation Technologies (ICICT), 2021, pp. 871-876. [18] L. Cui., G. Xie, Y. Qu... I. Gao,, & Y. Yang,, “Security and privacy in smart cities: challenges and opportunities”. IEEE access, 6, 2018, 46134-46145. [19] B. Hamid, N. Z. Jhanjhi, M. Humayun, A. Khan and A. Alsayat, “Cyber security issues and challenges for smart cities: A survey”. In 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), 2019, pp. 1-7. IEEE. [20] M. Aslam, M. A. KhanAbbasi, T. Khalid., R.U.Shan, S. Ullah, T. Ahmad, S. Saaeed,, A.,Dina, D.A.Alabbad., & R. Ahmad, “Getting Smarter about smart cities: improving data security and privacy through compliance”, Sensors 22(23),2011, p. 9338 [21] A. AlDairi, “Cyber security attacks on smart cities and associated mobile technologies”. Procedia computer science, vol. 109, 2017, pp. 1086-1091. [22] C. Xu, H. Lin, Y. Wu, X. Guo and W. Lin, “An sdnfv-based DDOs defence technology for smart cities”. IEEE Access, vol. 7, 2019, pp. 137866-137874 [23] D. Chen,, P. Wawrzynski, & Z. Lv,, “Cyber security in smart cities: a review of deep learning-based applications and case studies. Sustainable Cities and Society”, 66, 2021, 102655. [24] A. Arroub, B. Zahi, E. Sabir and M. Sadik, “A literature review on Smart Cities: Paradigms, opportunities and open problems”. In 2016 International conference on wireless networks and mobile Communications (WINCOM), IEEE, pp. 180-186. [25] M. M. Mijwil, R. Doshi, K. K. Hiran, A. H. Al-Mistarehi and M. Gök, “Cybersecurity Challenges in Smart Cities: An Overview and Future Prospects”. Mesopotamian journal of cybersecurity, 2022, pp. 1-4. [26] M., Alamer, and M. A. Almaiah, “Cybersecurity in Smart City: A systematic mapping study”. International conference on information technology (ICIT), 2021, pp. 719-724. IEEE. [27] M. M. Rashid, J. Kamruzzaman, M. M. Hassan, T. Imam and S. Gordon, “Cyberattacks detection in iot-based smart city applications using machine learning techniques”. International Journal of environmental research and public health, vol. 17 issue 24, 2020, pp. 9347. [28] Z. Li, D. Jin, C. Hannon, M. Shahidehpour and J. Wang, “Assessing and mitigating cybersecurity risks of traffic light systems in smart cities”. IET Cyber‐Physical Systems: Theory & Applications, vol. 1 issue 1, 2016, pp. 60-69. [29] E. Ismagilova, L. Hughes, N. P. Rana and Y. K. Dwivedi, “Security, privacy and risks within smart cities: Literature review and development of a smart city interaction frameworks. Information Systems Frontiers, 2022, pp. 1-22. [30] Z.Shah, I..Ullah., H.Li,, A. Levula, & K. Khurshid, “Blockchain based solutions to mitigate distributed denial of service (DDoS) attacks in the Internet of Things (IoT): A survey”. Sensors, 22(3), 2022, p. 1094. [31] C. Lamers, E.Spoerl, G. Levey. N. Choudhury, & M. Ahmed, “Ransomware: A Threat to Cyber Smart Cities”. In Cybersecurity for Smart Cities: Practices and Challenges, 2023, pp. 185-204. Cham: Springer International Publishing. [32] M. Sookhak, H.Tang, & F.R. Yu, “Security and privacy of smart cities: issues and challenge” In 2018 IEEE 20th International Conference on High Performance Computing and Communications; (HPCC), 2018, pp. 1350-1357, IEEE. [33] H.P.D. Nguyen, & D.D. Nguyen, “Drone application in smart cities: The general overview of security vulnerabilities and countermeasures for data communication”. Development and Future of Internet of Drones (IoD): Insights, Trends and Road Ahead, 2021, pp. 185-210. [34] S. Ijaz, M.A. Shah., A. Khan & M. Ahmed,. Smart cities: A survey on security concerns. International Journal of Advanced Computer Science and Applications, 7(2), 2016. [35] A. Chaudhuri., & K. S. Bozkus, “Cybersecurity Assurance in Smart Cities: A Risk Management Perspective”. EDPACS, 67(4), 2023, pp. 1-22. [36] S. Abaimov & M. Martellini, “Selected issues of cyber security practices in CBRNeCy critical infrastructure”. Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges: Threats and Counter Efforts, 2017, pp. 11-34. [37] D. D. Wisdom, O.R. Vincent, K. Igulu, E. A. Hyacinth, A.U. Christian, O. E. Oduntan & A.G Hauni . “Industrial IoT Security Infrastructures and Threats”, Communication Technologies and Security Challenges in IoT: Present and Future, 2024, pp. 369-402. [38] S.S. Goswami, S. Sarkar, K. K.Gupta, & S. Mondal, “The role of cyber security in advancing sustainable digitalization: Opportunities and challenges”. Journal of Decision Analytics and Intelligent Computing, 3(1), 2023, pp. 270-285. [39] C. Zhou, B. Hu, Y. Shi, Y.C. Tian, X. Li & Y. Zhao, “A unified architectural approach for cyberattacks-resilient industrial control systems” Proceedings of the IEEE, 109(4), 2020, pp.517-541. [40] A. Gauci, S. Michelin & M. Salles, “Addressing the challenge of cyber security maintenance through patch management”. CIRED-Open Access Proceedings Journal, 1, 2017, pp. 2599-2601. [41] A. P. Binitie, F. Egbokhare, A.O. Egwali, & O.S.Innocent, “Implementing existing authentication models in ussd channel”. International Conference on Electrical, Computer and Energy Technologies (ICECET) 9-10 Dec, 2021, Cape Town- South Africa, 1-5.