ChapterPDF Available

Threats and Security Issues in Smart City Devices

Authors:

Abstract

The main objective of this chapter is to discuss various security and privacy issues in smart cities. The development of smart cities involves both the private and public sectors. The theoretical background is also discussed in future growth of smart city devices. Thus, the literature survey part discusses different smart devices and their working principle is elaborated. Cyber security and internet security play a major role in smart cities. The primary solution of smart city security issues is to find some encryption methods. The symmetric and asymmetric encryption algorithm is analyzed and given some comparative statement. The final section discusses some possible ways to solve smart city security issues. This chapter showcases the security issues and solutions for smart city devices.
1230
Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 55
DOI: 10.4018/978-1-7998-7705-9.ch055
ABSTRACT
The main objective of this chapter is to discuss various security and privacy issues in smart cities. The
development of smart cities involves both the private and public sectors. The theoretical background is
also discussed in future growth of smart city devices. Thus, the literature survey part discusses different
smart devices and their working principle is elaborated. Cyber security and internet security play a
major role in smart cities. The primary solution of smart city security issues is to find some encryption
methods. The symmetric and asymmetric encryption algorithm is analyzed and given some comparative
statement. The final section discusses some possible ways to solve smart city security issues. This chapter
showcases the security issues and solutions for smart city devices.
INTRODUCTION
The Smart City is the concept of integrate latest technologies and to provide a modern lifestyle for all
the citizens. The latest survey shows that, in the year 2030 more than 60% of people moving and living
in the urban city. The day to day citizen’s lifestyle is growing and moving to the modern technology.
The Information and Communication Technology (ICT) plays a vibrant role in smart city concept. The
idea of smart city is a combination of traditional and modern technology. It is used to establish ICT
in an urban environment. The urban cities are expecting an innovative technology at lesser cost. The
final goal of smart city is to provide quality of life in entire citizens. The end of the 20th century smart
city concept is evolving. The short duration more innovative technologies developed in smart city. The
modern world, people are expecting more sophisticated lifestyle using modern ICT tools. The smart
city is to provide social and innovative technology in the existing model. The government service sec-
tors, health and police department is also using these ICT futures (Hernández-Muñoz et al., 2011). The
unified information and communication technology is used to optimize and control the urban life. This
Threats and Security Issues
in Smart City Devices
Jayapandian N.
Christ University, India
1231
Threats and Security Issues in Smart City Devices
ICT is also modeling and measuring the sustainable smart city development. The primary objective of
this chapter is to discuss about security and privacy issues in smart city and secondary objective is to
discuss possible solution to handle this security issues.
The terrorist attack is a major problem in developed countries. Smart city concept is to prevent this
type of terrorist attacks. This technology is used to identify the terrorist attackers. The concept of cyber
security is to prevent these smart technology devices and provide higher security. In recent days, most of
the countries are providing a unique identity number for every citizen. The people are using that unique
number or biometric system and access this smart city device. The major problem is once a hacker
hacked any one device, they can easy to get user’s personal information. The Information Communication
Technology is pillar of the smart city. The physical infrastructure and internet connectivity is a major
component of smart devices. The entire smart device is connected via internet and sharing information
from one smart device to other smart devices. The data transfer speed is also another problem in smart
device connectivity. The security concern minimal data handling is not a big task, but they handle higher
volumes of data at online cloud storage is really a biggest task. This chapter is discussed on basic struc-
ture of smart city. History and development of Information and Communication Technology tools is
also discussed. Technology and construction industry is jointly establishing this smart city. The modern
world more number of engineering graduates completing the engineering course. The employability is a
major task for producing high number of graduates. This Internet of Things (IoT) technology produces
billion and millions of jobs in forthcoming years. The financial growth and economic development of
smart city is an important role. The concept of CCTV is old, but smart CCTV is a new one. This part is
to elaborate basic technology of smart CCTV technology. The GPS based smart device is hot topic of
current technology. The GPS device is used to monitor the vehicle moments and speed.
The smart city is focused on public utility and governance establishment. The modern world indus-
trial development is the most important one; this smart city concept is not a new one. The development
of modern industrial products comes to ordinary civilians’ usage. The first commercial internet service
provider is introduced in the year of 1990s. The intelligent decision mechanism is used for inventing
the smart city. The performance of public utility is increased due to this smart city innovation. Smart
city is also used to reduce the cost of public infrastructure maintenance. The usage of mobile phone is
very high in recent days. Smart mobile phone business is also involved in smart city. The open source
android software is used to access and control the smart devices. The major problem with this technol-
ogy is high-speed wireless internet connection is needed. There is much research is going on public
WIFI technology. The reason is public WIFI is required higher bandwidth and higher transmission
power. The recent research and development term finally give some solution and provide some new
technology named as LTE (Long-Term Evolution). This technology is used to provide high-speed wire-
less communication for smart mobile (Walravens & Ballon, 2013). Figure 1 is to elaborate evaluation
of information technology field.
Smart city system is a bridge of the consumer and service provider. That means the consumer get full
freedom to give feedback of any public utility. The implementation of this smart city is to provide better
QoS (Quality of Service). Advantage of this smart city is to encourage citizens to participate in social
activity. The smart city device is a dynamic system because each innovation is a unique concept. The
smart city is a combination of science, engineering, innovation and technology. The primary role in this
smart device is whenever data needed, they can access it. The information is available at anywhere and
anytime. This technology is based on both hardware and software components. The Internet of Things
(IoT) is a significant concept of smart city. The modern house is fully automated with the use of IoT
... Due to the lack of standard security protocols and operation manuals, IoT devices are prone to several implementation and functional risks and security issues. This is primarily because of the reasons shown in Figure 4 [30,40,[51][52][53][54][55]. (1) Heterogeneity of the Smart IoT based devices ...
Article
Full-text available
The overwhelming popularity of technology-based solutions and innovations to address day-to-day processes has significantly contributed to the emergence of smart cities. where millions of interconnected devices and sensors generate and share huge volumes of data. The easy and high availability of rich personal and public data generated in these digitalized and automated ecosystems renders smart cities vulnerable to intrinsic and extrinsic security breaches. Today, with fast-developing technologies, the classical username and password approaches are no longer adequate to secure valuable data and information from cyberattacks. Multi-factor authentication (MFA) can provide an effective solution to minimize the security challenges associated with legacy single-factor authentication systems (both online and offline). This paper identifies and discusses the role and need of MFA for securing the smart city ecosystem. The paper begins by describing the notion of smart cities and the associated security threats and privacy issues. The paper further provides a detailed description of how MFA can be used for securing various smart city entities and services. A new concept of blockchain-based multi-factor authentication named “BAuth-ZKP” for securing smart city transactions is presented in the paper. The concept focuses on developing smart contracts between the participating entities within the smart city and performing the transactions with zero knowledge proof (ZKP)-based authentication in a secure and privacy-preserved manner. Finally, the future prospects, developments, and scope of using MFA in smart city ecosystem are discussed.
... Henceforth, it requires a good understanding of the decision-making patterns between the human operator and the AI system. The security issues are also found in smart city environment [19]. Further, some autonomous systems based on deep learning neural networks do not provide complete transparency regarding input output operations causing barriers to man-machine teaming. ...
Chapter
We live in a period when historical fiction has become current reality. With our future being automated, using AI on a daily basis will only get more convenient. Making military weapons to detect, monitor, and engage a human being with attacks may all be done in the privacy of one's own garden. There is a plethora of AI software out there that can be readily integrated into combat weapons. The automobile industry is already incorporating AI into vehicles to assess driving circumstances and give augmented reality to drivers via heads-up displays in order to assist avert accidents. Similarly, artificial intelligence will be utilized to study the battlefield and give soldiers with augmented reality information via heads-up displays and weapon control systems. Since AI is not a single technology, it has been argued that it might be used by the military in a variety of ways. Intelligence, surveillance, and reconnaissance (ISR) activities, as well as processing and interpreting sensor data and geographic imaging analysis, are all examples of AI. Artificial intelligence has the potential to reduce human involvement in conflict, whether it is employed for combat robots or data analysis. AI has the potential to profoundly alter the nature of war. The article mainly focussed on warfare technologies and applications. The main aim of this review is to understand the current applications being used in armed forces and proposed technologies of artificial intelligence.
Conference Paper
This research aims to understand how groups of agents can make decisions collectively without relying on a central authority. The research could focus on developing algorithms and models for distributed problem solving, such as consensus-reaching and voting methods, or for coordinating actions among agents in a decentralized manner. The research could also look into the application of these methods in various fields like distributed robotics, swarm intelligence, and multi-agent systems in smart cities and transportation networks. Swarm intelligence in decentralization is an emerging field that combines the principles of swarm intelligence and decentralized systems to design highly adaptive and scalable systems. These systems consist of a large number of autonomous agents that interact with each other and the environment through local communication and adapt their behaviors based on environmental cues. The decentralized nature of these systems makes them highly resilient and efficient, with potential applications in areas such as robotics, optimization, and block chain technology. However, designing algorithms and communication protocols that enable effective interaction among agents without relying on a centralized controller remains a key challenge. This article proposes a model for swarm intelligence in decentralization, including agents, communication, environment, learning, decision-making, and coordination, and presents a block diagram to visualize the key components of the system. The paper concludes by highlighting the potential benefits of swarm intelligence in decentralization and the need for further research in this area.
Article
Full-text available
Abstract—Tracking systems were first developed for the shipping industry because they wanted to determine where each vehicle was at any given time. Passive systems were developed in the beginning to fulfill these requirements. For the applications which require real time location information of the vehicle, these systems can’t be employed because they save the location information in the internal storage and location information can only be accessed when vehicle is available. To achieve Automatic Vehicle Location system that can transmit the location information in real time, Active systems are developed. Real time vehicular tracking system incorporates a hardware device installed in the vehicle (In-Vehicle Unit) and a remote Tracking server. The information is transmitted to Tracking server using GSM/GPRS modem on GSM network by using SMS or using direct TCP/IP connection with Tracking server through GPRS. Tracking server also has GSM/GPRS modem that receives vehicle location information via GSM network and stores this information in database. This information is available to authorized users of the system via website over the internet Keywords—GSM, GPS, GPRS, GM862
Article
Full-text available
Cloud computing is one of the great tasks in the business world nowadays, which provides shared processing resources. In cloud area network, security is the main challenge faced by cloud providers and their customers. The advantage of cloud computing includes reduced cost, re-provisioning of resources etc. The cloud network makes use of standard encryption method to secure documents while storing in online. In this paper, we have depicted two efficient encryption algorithms that meet security demand in cloud. Probabilistic encryption, one of these algorithms may be used to produce randomness of text encryption. With this algorithm, if the same message is encrypted twice it should yield different secret coded texts on both calculations. Another crucial algorithm is homomorphic encryption, is a cryptographic method to define the sample system and to provide a software implementation. In order to maintain quality of service (QoS) and improve customer satisfaction, we are going to propose an efficient algorithm which combines the characteristics of both probabilistic and homomorphic encryption techniques, to provide high level of security. Our proposed scheme will yield better encryption techniques reduce security attacks, increased throughput and improve the QoS.
Article
Full-text available
Tracking systems were first developed for the shipping industry because they wanted to determine where each vehicle was at any given time. Passive systems were developed in the beginning to fulfill these requirements. For the applications which require real time location information of the vehicle, these systems can't be employed because they save the location information in the internal storage and location information can only be accessed when vehicle is available. To achieve Automatic Vehicle Location system that can transmit the location information in real time, Active systems are developed. Real time vehicular tracking system incorporates a hardware device installed in the vehicle (In-Vehicle Unit) and a remote Tracking server. The information is transmitted to Tracking server using GSM/GPRS modem on GSM network by using SMS or using direct TCP/IP connection with Tracking server through GPRS. Tracking server also has GSM/GPRS modem that receives vehicle location information via GSM network and stores this information in database. This information is available to authorized users of the system via website over the internet.
Article
Full-text available
This article did the preliminary study of the application of algorithm for MD5 in the digital watermark. It proposed that copyright information will be encrypted using an algorithm MD5, and made rules for the second value image watermarks, through DCT algorithm that embeds an image by the carrier. The extraction algorithms can pick up the watermark and restore MD5 code.
Article
Full-text available
‘Smart cities’ is a term that has gained traction in academia, business and government to describe cities that, on the one hand, are increasingly composed of and monitored by pervasive and ubiquitous computing and, on the other, whose economy and governance is being driven by innovation, creativity and entrepreneurship, enacted by smart people. This paper focuses on the former and, drawing on a number of examples, details how cities are being instrumented with digital devices and infrastructure that produce ‘big data’. Such data, smart city advocates argue enables real-time analysis of city life, new modes of urban governance, and provides the raw material for envisioning and enacting more efficient, sustainable, competitive, productive, open and transparent cities. The final section of the paper provides a critical reflection on the implications of big data and smart urbanism, examining five emerging concerns: the politics of big urban data, technocratic governance and city development, corporatisation of city governance and technological lock-ins, buggy, brittle and hackable cities, and the panoptic city.
Conference Paper
Cloud computing paradigm is still evolving and it is a long dreamed vision as a utility, where users can remotely store their data and enjoy the high quality of on-demand services and applications from a pool of shared configurable resources. It has recently gained tremendous momentum. However, privacy issues and security pose as the key roadblock to its fast adoption. Security is one of the major issues which declines the growth of the cloud computing and complications with the protection of data and privacy continue to plague the market. Cloud service users must be vigilant in data breaches of risk in this new environment. In this paper, a approach of existing different security issues that has emanated due to the service and the idea of implementing the fingerprints in the upcoming models that shows the proposed schemes are provably secure and highly efficient.
Article
The fast expansion of popular Websites reinforces the importance of online strategic alliances through e-partnerships and their business successes. However, many e-business partnerships fail to achieve their goals of partnerships. Written from an international perspective, Maximize Business Profits Through E-Partnerships provides a practical, insightful and comprehensive guide for both brick-and-mortar and dot.com companies to address the challenges of building and managing productive e-partnerships to capitalize on business earnings. It provides practical solutions to developing effective e-partnerships through a systematic inquiry into the nature and processes of e-partnering.
Article
Many of the pioneers of Internet business, both dot-corns and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way - and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it off en makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects.. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.
Article
This article presents a theoretical framework for the analysis of platform business models that involve public actors, and city governments in particular, in the value network. It starts from an established business model framework and expands it to include an additional set of parameters required to successfully perform an analysis of the business models of new (mostly digital) services offered by cities. It then applies this framework to several divergent cases from the mobile services sector in which city governments are involved as part of their efforts to become "smarter cities".