Uploaded by nj5379

Cyber Security Issues and Challenges for Smart Cities A survey

advertisement
2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS)
Cyber Security Issues and Challenges for Smart
Cities: A survey
Bushra Hamid1
University Institute of Information Technology
PMAS, Arid Agriculture University
Rawalpindi, Pakistan
bushrakiani@uaar.edu.pk
NZ Jhanjhi 2
School of Computing & IT (SoCIT),
Taylor’s University
Subang Jaya Selangor, Malaysia
noorzaman.jhanjhi@taylors.edu.my
Mamoona Humayun 3
Dept. of Information System, College of Computer and
Information Sciences, Jouf University Al-Jouf,
Saudi Arabia
mahumayun@ju.edu.sa
Azeem Khan 4
ADP Taylor’s University
Selangor, Malaysia
azeem@taylors.edu.my
Ahmed Alsayat 5
Dept. of Computer Science, College of Computer and
Information Sciences, Jouf University Al-Jouf,
Saudi Arabia
asayat@ju.edu.sa
Abstract— The increasing need and implementation of
Information Communication Technologies (ICT) in urban
infrastructure have led to greater attention in smart cities. Smart
cities make use of ICTs to enhance: the quality of life of citizens
by paving the way to improve local economy, enhance transport
system and transport management thereby providing conducive
environment to build strong relationships together with public
authorities. The assiduous goal of a smart cities is to improve the
quality of life and services of citizens. Nevertheless, the
instigation of ICTs has raised various issues pertaining to privacy
and security issues concerned with smart cities and the
inhabitants residing in them. The current research is an effort to
present briefly the core concepts of security and privacy issues
concerning to the smart cities and reveal cyber-attacks that were
recent targeting smart cities based on current literature. Further,
this research has elaborated and identified numerous security
weaknesses and privacy challenges pertaining to various cyber
security, the issues, challenges and recommendations in order to
provide future directions.
Keywords— Smart Cities, Cybersecurity, Cybersecurity Issues,
Cybersecurity Challenges, Smart Cities Infrastructure, Smart Cities
Cyber Attacks
I.
INTRODUCTION
mobile devices, electronic equipment’s, Internet of things, etc.
[1].
During the latest era, the notion of Smart City is becoming
the more prevalent and taking main share in literature as well
as in policies. This is the time to realize the importance of
urban areas, and to understand why people consider urban
areas safer and faster for their future growth. Main cities in any
country have significant role in their economy, environment.
[2].
A smart city is a city equipped with state-of-the-art ICT
facilities aimed at improving the quality of life by improving
the efficiency of the citizens dwelling in it. [1].
A. Dimensions of smart cities
Normally, there are six regions where cities can have the
ability to become smarter. These areas include: governance,
people, economy, living, mobility, and environment as
depicted in Figure1.Smart city does not only mean to
organizing platforms that perform city-relevant features
effectively, but it is a big idea that consists of numerous
electronic and physical objects which intermingle and
communicate.
Smart cities are those cities which incorporates the modern
technologies for automatic and effective service that are
provided to increase the lifestyle of citizens. The recent
research studies reveal that the modern cities will be populated
by 60 percent of the country’s population by 2030. Which is a
clear indication that lives in the cities will be a great challenge,
and not easy to manage easily. The smart cities concept will
only be able to accommodate this great number of population
and manage their needs, since smart cities are equipped with
the latest technologies including cloud computing, networks,
978-1-7281-4956-1/19/$31.00 ©2019 IEEE
Authorized licensed use limited to: SRM University. Downloaded on December 25,2021 at 19:42:07 UTC from IEEE Xplore. Restrictions apply.
Recent studies depict that nearly 1.6 billion of IoT devices
and modules has been used by 2017, which shows a rise of
39% compared to 2015. The same rate is even with more
exponential rise for the year 2018 which is 42%. Further
research shows that smart cities have deployed a large number
of IoT devices and components for about almost 3.3 billion
[5].
D.
Figure 1: Dimensions of Smart City
B.
Role of ICT in smart cities
The municipalities which have outsized amount of
population in cities areas needs extra effort for the managing
the resources and infrastructure, that’s why it is essential to
report the requirements of citizens and extend the solutions of
the identified problems in those areas. Several solutions are
proposed various line of action, such as below,
a) Management
of
Infrastructure
&
public
properties/buildings,
b) Well-organized/ maintainable public transport
c)
Better Urban planning
d) Citizen information and contribution instruments
The use of ICTs technologies is the backbone for smart
cities, which provide services in all sector of life, to manage
the cities in a way that citizen can be able to get access to all
desired applications/services. The contribution of citizen in the
smart cities can be measured and referred as communities
work program, which provides decision power to the citizen in
most of their needs. Digital devices permit interoperability to
provide ease of access to the citizens. The usage of ICT in a
smart city consists of four main phases that are associated to
the flow of information [4].
e) Gathering information
f)
Storage and Data Access
g) Dissemination of information
C.
IoT in Smart Cities
IoT is stated as a set of techniques that are used for
accessing the data gathered through numerous devices like
through wire and wireless Internet networks. Though there are
prominent dissimilarities in the available definitions of IoT.
While a common and most acceptable internet of things
description is the ability to extend important information to the
citizens, by collecting from several devices, users using wire
and wireless internet services.
Cyber-attacks targeting smart cities infrastructure
Smart cities face challenges in assessing susceptibilities
and improving plans. Considering that security is an expensive
activity and that it requires an enough budget which requires a
lengthier duration for processing in the public sector. Security
issues in smart cities are a real concern and need attention in
order to ensure the continued success of smart cities.
Therefore, issues related to security, privacy, are important
topics, especially in the technologies and systems of the
“smart city”, which are becoming very important for
optimizing cities and improving living standards. It is worth
noting that smart cities have brought immense paybacks to
users, while users are concerned about the privacy of their
data, which is transferred via unsecured channels. Therefore, it
is necessary to have secure communication channel to extend
secure support for moving data, especially over wireless
networks [1]. The following sections, section 2, section 3,
section 4 and section 5 are aimed at describing literature
review, issues, challenges, discussions, recommendations and
conclusions pertaining to cybersecurity for smart cities
respectively and, lastly, section 6 presents future work.
II.
LITERATURE REVIEW
In smart Cities, the researchers have been interested in the
security and privacy of data. The cybersecurity depends on
three types of concerns in the smart city, namely those that are
related to the governance, the other concerned with socioeconomic sector and lastly technological viewpoints. From
social perspective concerns are related to communication,
citizen’s safety, transportation, banking, and finance. The
governance concerns are utility, health, infrastructure,
education, transport, and technical concerns are RIFD, smart
grid, biometrics, M2M communication, Smart Phones [1].
In [6], the authors represent a model and address the
cybersecurity challenges. They discussed main challenges
concerning to privacy and security. The main elements of the
smart cities and their collaboration between them represented
by the mathematical model that are vulnerable. The graphical
and mathematical model aid for IoT by locating the security
and privacy, people, and servers, but the methodology is not
discussed.
In [7], the author’s debate the security conventions and
privacy damages and they state that these conventions are not
suited the security and privacy issue importance and criticality.
In [9] for the IoT application, a distributed framework is
proposed, which assures the information delivery with respect
to trust, privacy and security. IoT plays a significant role in
building smart cities, hence distributed framework is able to
Authorized licensed use limited to: SRM University. Downloaded on December 25,2021 at 19:42:07 UTC from IEEE Xplore. Restrictions apply.
address the issues concerned with information security
concerns to large extent in a smart cities.
The authors in [11] highlighted the requirements, benefits,
and challenges of smart city. They also discuss integration of
technology, IoT and cloud computing CC8 which forms the
new vision of the Cloud of Things (CoT), and it discusses how
CoT based can provide in the smart cities services and what are
their security concerns.
In [20], the authors presented an innovative approach to
identify denial of service (DoS) attack, with invisible hosts that
used the IEEE 802.11 DCF protocols, a DoS attack invades
wireless networks. They emphasized that the IEEE 802.11
standards are being modified by malicious nodes to illegally
hijack a network and expand the possibility of successful
packet transmission that follow protocol standards through
innocent nodes.
The authors in [21] discussed cyberattacks and presented
Wide-Area Monitoring, Protection and Control (WAMPAC) a
theoretical gaming approach to address the issue of cyberphysical security. They concluded by highlighting how cyberphysical testbeds are used for the evaluation of the security.
39% of global data Breach
due to malware Attack.
Citizen safety/ Privacy
81% attack found [42]
Entrepreneurship
III.
THE SMART CITIES CYBER SECURITY ISSUES AND
CHALLENGES
The prime cybersecurity issues and challenges pertaining to
smart cities are discussed in this section. These challenges are
categories according to the governance perspective, socioeconomic perspective, and technological perspective. Figure 2
depicts taxonomy pertaining to concerns and challenges in
smart cities.
The [39] EINSA report shows the frequency of successful
cyber-attack during the different years. This frequency is
70.5% in 2015, 75.6 % in 2016, 79.2% in 2017, 77.2%in 2018
and 78.0% in 2019. 78% organizations were affected through
the cyber-attack in 2018 [41]. In [39] the percentage of
different attack found in different elements/components of
smart city.
Table 1 Percentage of Cyber Attacks
% of Cyber Attack
Components of Smart City
70% cyber Attack found
Education Institute
64% cyber-attack through
the ransomware attack.
Smart Network /
Industrials control System
Figure 2 Smart cities Cybersecurity Taxonomy
17% data breach due to the
ransomware attack [39]
Health Care
65%
attack
delivered
through the email and 35%
via malicious URLs [39].
93% of email are cause of
spreading the Attack [39].
Communication (emailbased Attack)
A. Cyber Security concerns in socio-economic perspective of
smart cities:
The smart city provides basic platform of services for the
management and assistance of social issues according to the
peoples’ requests [19]. Smart city enhances the banking,
finance, health, education, communication, and individual
identity by providing the services.
a) Health: The cybersecurity concern related to health is
patient’s privacy and hacker can change the critical
information of the patient [29]. Multiple service
providers like hospitals and social network sellers
provide health and social data. The collaboration
between these social network vendors have some
security issues. The social cloud server can be
vulnerable by unauthorized entity. When the hospital
Authorized licensed use limited to: SRM University. Downloaded on December 25,2021 at 19:42:07 UTC from IEEE Xplore. Restrictions apply.
infers the patient’s data in an authorized way via cloud,
the user may be reluctant to share the health related
and personal data. Health data is very crucial, hence
high-end security mechanisms should be employed to
secure individual’s data; hence state-of-the-art
technology employed with intelligent systems is used
to protect health related data [30].
b) Communication:
In
the
smart
city
the
telecommunication infrastructure is very important as
well as vulnerable. Many governance and financial
actions which are carried out through the
telecommunication and wireless networks. Wireless
networking, Bluetooth, cloud computing, have security
and privacy issues. [28].
c)
Transport management systems: The smart cities
provide transport service like road traffic adjustment,
navigation, parking to the citizen. Navigation is an
important element of the intelligent transport system.
Existing GPS devices provide the static location, it
means these devices don’t have ability to measure the
distance dynamically and unable to calculate the fastest
route dynamically. Realtime analysis of data in
managing road traffic is gathered from the traveler as
well as the sensors fixed at specific locations to collect
information about traffic thereby availing dynamic
navigation that envisages the human intelligence and
live road traffic sensing from an individual moving and
the roadside sensing component [22]. During this kind
of distributed navigation, the privacy related to the
location of both querying vehicles and responding vehicles
can be vulnerable [23]. These systems face critical
problems as they cause disasters, especially when they
occur in air traffic systems. In addition, they become
the cause of immense traffic jams, which can last for
hours by hacking traffic control systems and their
sequence, their road signs and their speed limit signs.
d) Citizens’ safety/Privacy: The privacy of an individual
must be guaranteed in the smart city. Social network
privacy issues depend on the level of information
available to individual users. Social network providers
who take responsibility for not disclosing the personal
information of their users [34].
e)
Entrepreneurship: In the smart city economy, the
banking, financial and commercial sectors are essential
components. Although smart cities promise economic
growth, improved banking and business, they are the
most vulnerable components of the smart city. The
vulnerability is associated with the security of personal
financial use. Invaders can also harm the defined
organization or economy of an entire city.
B. Cyber Security concerns in Governance perspective of
smart cities
a) Collaborative and transparent government TMS:
The systems pertaining to governance are always at
risk of intrusions critically because they can cause
disasters, especially when they occur or lead to control
or transportation systems. These systems are
vulnerable to attacks some of the instances discussed in
available literature is that they can cause huge traffic
jams, which may be long lasting based on the traffic
controller malfunctioning and their sequence, traffic
signs and speed limitation signs.
b) Management Systems:
The developers and designers of these systems usually
focus on the tools provided and neglect cybersecurity
issues which results in lack of the cyber security, as
their manufacturers do not support this, and do not
respond to the vulnerabilities.
C. Cyber Security concerns in the technological perspective
of smart cities Units
a) RFID: This is the technology that is in rampant use in
several sectors and extensively used in the smart
environment, smart industry and smart mobility in
order to connect the cyber-physical entity [31]. The
vulnerabilities of RFID tags are a major problem for
the smart city. These tags are vulnerable to
unauthorized access to sensitive information and are
prone to create data privacy issues. RFID tags and
RFID readers communicate via the unique Electronic
Product Code (EPC). A malicious intruder can seize
and read confidential tags if he manages to access
RFID readers or an EPC. The exploitation of RFID can
be achieved by removing tags, cloning tags, interfering
with the signal, scrambling, rejecting the service attack
and monitoring. By compromising with the system, an
intruder can also disrupt the frequency of the message
being sent and push the message away from the
expected receiver in any circumstance. [13].
b) Biometrics: Biometrics automatically recognize a
person by the behavioral and biological characteristics.
Biometric characteristics are of two types:
physiological and behavioral characteristics acquired
through the application of appropriate sensors [16].
Biometrics plays a significant role for several security
aspects of a smart city specifically things pertaining to
malicious attacks, data theft and online frauds [17]; the
application in the smart cities related to biometrics are
Health, Education, Utility, Institution, corporate
sectors, Patrol and security [28].
c)
Smart Grid: Smart grids have vital role in smart
cities, where they are responsible for energy
development. Smart grids are comprised of sensors
enabled with networks that can communicate remotely.
[18]. The application of smart grids in smart cities
envisages energy, power, utility, smart homes, smart
appliances, and infrastructure to avail them. The
security concern related to the smart grids are; threats
to the availability of networks.
d) Smart Networks: Since smart grids are the source to
enforce the smart cities. However, in case of
malfunctioning by the hackers it can be used as major
source to create disturbance. [31] For instance, in case
Authorized licensed use limited to: SRM University. Downloaded on December 25,2021 at 19:42:07 UTC from IEEE Xplore. Restrictions apply.
of smart grid compromised the hacker can easily
control the power management and power distribution
as well, which leads to the power failure, and which
further leads to the smart devices and smart systems
deactivations [2].
e)
Smart Phones: The weaknesses of smartphones that
could affect the security of smart cities contain smart
apps, harmful GPS location and GPS, as well as threats
from social networks. Ijaz et al. note that [5]
Smartphones are a crucial in smart city infrastructure,
because they are the source of many installations, and
intelligent applications. Invaders can download
harmful smart apps to the phone of an unsuspecting
user to contaminate the device that serves as a link to
the smart city. If an invader is able to infect several
smartphones, thereby creating a botnet that can
undergo instant attacks on the smart grid. User privacy
on smartphones and security can be tempered by taking
risks with the GPS services offered by smartphones,
like the yacht previously declared used by researchers
for $ 80 million. The use of spyware involves listening
to users' conversations or accessing their sensitive
information. These attacks can be carried out over the
Internet, through Wi-Fi networks that are not secure
and are not reliable with connectivity or unauthorized
Bluetooth networks. Similarly, social networking sites
that host personal user information on a smartphone
may be attacked if personal id’s are used [13].
Smartphones used in IoT rely on security services,
such as secure messaging capability, secure and safer
browsing, and other internet transactions.
device that transmits radio signals may interfere with or
block the operation of the RFID reader. Two Dos
attack methods are commonly used: flood services and
failure services [27].
c)
Spoofing: It is a security threat in which malicious
attackers links their MAC address with the IP address
of the vulnerable network. Through this attack, data
can be theft and deleted. In case of RFID security
protocol is used, the data is duplicated and then
communicated to the reader [26]. For example, in case
of an electronic mail, the information can send through
an address that is not the real address of the person who
is sending the message. Three common types of
spoofing are ARP (address resolution protocol)
Spoofing, IP Spoofing, and DNS spoofing attack.
d)
Cryptanalysis attack: The cryptanalysis technique is
used to breach the cryptographic security system and
get access to encrypted messages. There are many
techniques of cryptanalysis attacks like cipher-text
attacks, differential cryptanalysis attacks, Man-in-themiddle attacks, Integral cryptanalysis attacks, and
dictionary attacks [26].
e)
D. Security and privacy attacks:
This section is focused on discussion of some attacks that
are causes of the security and privacy loopholes and
susceptibilities in the smart city. “An attack is an
information security threat that destroys, reveals the
information without authorized access”.
a) Jamming attack: This attack disturbs communication
in the wireless environments. Some devices like
cordless phones and Bluetooth-enabled devices can be
vulnerable through this attack. Powerful transmitters
are used in this attack [26]. The jamming attack is done
on the physical (Media Access Control) layer of the
network. Jamming attack has different techniques like
jams concerned with the barrage, sweep, deceptive and
spot Jamming technique. Different anti-jamming
technique are proposed like JAM, Ant System, and
Channel hopping, Reactive jamming detection using
BER.
b)
Denial of Service: it is also acronymized as DoS, this
attack shut downs the network or machine and the
authentic user is unable to use it. Usually, Banking,
media companies, government organizations, trade
organization, and commerce applications are
vulnerable of this attack. This attack does not steal
information but can cause a lot of cost and time. This
attack is importantly regarded to RFID technology. A
Eavesdropping attack: This attack passively listens
to network communication and steal the information.
This attack is done in two ways: Directly listening to
digital or analog voice communication, interception or
sniffing of the data. Eavesdropping are the most
common attack on a RFID system. Data have a unique
identifier that is emitted by RFID tag. It is at the risk of
snooping when the data is communicated to the RFID
readers. In this particular situation, spying is performed
by infectious data on the invader with a reader
corresponding to the appropriate tag family and reading
at a tag by the official reader [26].
f)
Botnets:
Botnet is basically a number of
interconnected devices and running on one or
more bot. DDos (distributed denial-of-service)
attack is performed through the botnet. It steals the
information allows the intruder to access the
device and connection. It attacks with malware
that persecute largely using an e-mail attachment
or from smart applications or harmful websites.
g) Spyware: it is malware that gathers information
about a person and organization secretly.
Attackers use this information to hack the cell
phone, which enables hackers to grasp the control
of smart phone completely by controlling their,
mike, camera, GPS and other services.
IV.
DISCUSSION AND RECOMMENDATIONS
• Here we mention some suggestions to prevent the
security threat in the smart city.
•
The first thing to maintain the citizen’s privacy and
secrecy, privacy-aware communication should be
provided. Privacy measurement should be strong.
Authorized licensed use limited to: SRM University. Downloaded on December 25,2021 at 19:42:07 UTC from IEEE Xplore. Restrictions apply.
Homomorphic encryption can use to user data privacy
and social network and health data can make invisible
to the unsafe cloud servers [30]
•
A security solution should be simple, easy, and
efficient to ensure the authenticity and integrity of
data. It should secure IoT devices and communication
with the cloud application center.
•
Citizens should be aware to utilize resources of the IoT
network safely.
•
The secure health system should develop that make
sure the security and privacy of the patients records
from all unauthorized access. The health systems must
be ensuring the security concept of confidentiality,
integrity and availability besides of privacy. The
patient record may be prevented from its location as
well from the unauthorized user’s access.
•
Eavesdropping can be prevented by using data
aggregation effectively on smart phones [14].
•
Interference problems in the RFID system can be
distributed by coding, data integrity checking and
multiple retransmission [28]. Hash Link and HashLock methods are also significant as they offer better
authentication. There are some other verification
techniques depends on hash like ID exchange and
distributed RFID challenge/answer authentication
[15].
•
•
•
•
In the smart city, there is a need of effective and safe
executions of all services of mobile devices. From this
point of view, Elliptic Curve Cryptography
acronymized as ECC is considered to be the most
reliable solution for protecting devices and embedded
systems with limited resources. It uses public key
cryptography and depends on the algebraic structure
of elliptic curves over finite fields. The advantages of
ECC are the ability to offer a level of security similar
to that of other cryptography algorithms, but there
should be lower memory, smaller keys, and
computational requirements [29].
PKI, Digital Licenses and Data Encryption Secure
Wi-Fi network solutions ensure secure management
of network access control to prevent unofficial
access.
Susceptibility and attack surfaces increase when
systems come together and integrate. For that reason,
it is imperative to build solutions with robust
mitigation strategies and integrated cybersecurity
[24It is very important to plan systems with secure
information and flexibility to stop serious security
events that can have catastrophic results in terms of
data, financial reliability, and damage to reputation.
[25].
Smart cities have major concerns of security as
mentioned in [46-50]. These security concerns could
be linked with smart applications authentication
mechanisms or likely to be misused of hacked data for
ransomware use. Hence, security in all aspects is the
core requirement of the smart cities, to making sure its
successful operations.
V. CONCLUSION
In smart cities, the major concern is providing the
unmatched quality service for the citizens to make their living
better and avail standard living. Thus, it is essential to consider
the confidentiality, safety measures and challenges to assure
the privacy of the citizens. In this research, we have examined
the smart city’s security and privacy challenges in three
perspectives, 1) socio-economic, 2) governance, and 3)
technological perspective, and also discuss security and privacy
attacks. In addition, this research provides some suggestions to
prevent the attacks pertaining to security and privacy for the
smart cities.
VI. FUTURE WORK
Safety and confidentiality are the primary concerns and are
considered as the open threats in smart cities and are obliged
to be explored further by providing a model to address the
security issues availing context-awareness, privacy-respecting
and privacy-preserving solutions.
REFERENCES
[1]
AlDairi, Anwaar. "Cyber security attacks on smart cities and associated
mobile technologies." Procedia Computer Science 109 (2017): 10861091.
[2] Albino, Vito, Umberto Berardi, and Rosa Maria Dangelico. "Smart
cities: Definitions, dimensions, performance, and initiatives." Journal of
urban technology 22.1 (2015): 3-21.
[3] https://www.techopedia.com/definition/31494/smart-city
[4] Pla-Castells, Marta, et al. "Use of ICT in Smart Cities. A practical case
applied to traffic management in the city of Valencia." 2015 Smart
Cities Symposium Prague (SCSP). IEEE, 2015.
[5] Park, Eunil, Angel del Pobil, and Sang Kwon. "The role of internet of
things (IoT) in smart cities: Technology roadmap-oriented approaches."
Sustainability 10.5 (2018): 1388.
[6] Elmaghraby, Adel S., and Michael M. Losavio. "Cyber security
challenges in Smart Cities: Safety, security and privacy." Journal of
advanced research 5.4 (2014): 491-497.
[7] Bartoli, A., et al. "On the ineffectiveness of today’s privacy regulations
for secure smart city networks." Smart Cities Council, Washington, DC
(2012).
[8] Bohli, Jens-Matthias, Peter Langendörfer, and Antonio F. Skarmeta.
"Security and privacy challenge in data aggregation for the iot in smart
cities." Internet of Things: Converging Technologies for Smart
Environments and Integrated Ecosystems (2013): 225-244.
[9] Batty, Michael, et al. "Smart cities of the future." The European Physical
Journal Special Topics 214.1 (2012): 481-518.
[10] Petrolo, Riccardo, Valeria Loscri, and Nathalie Mitton. "Towards a
smart city based on cloud of things, a survey on the smart city vision and
paradigms." Transactions on Emerging Telecommunications
Technologies 28.1 (2017): e2931.
[11] Khatoun, Rida, and Sherali Zeadally. "Cybersecurity and privacy
solutions in smart cities." IEEE Communications Magazine 55.3 (2017):
51-59.
Authorized licensed use limited to: SRM University. Downloaded on December 25,2021 at 19:42:07 UTC from IEEE Xplore. Restrictions apply.
[12] Ijaz, Sidra, et al. "Smart cities: A survey on security concerns."
International Journal of Advanced Computer Science and Applications
7.2 (2016): 612-625.
[13] Rebollo‐Monedero, David, et al. "Reconciling privacy and efficient
utility management in smart cities." Transactions on Emerging
Telecommunications Technologies 25.1 (2014): 94-108.
[14] Xiwen, Shao. "Study on Security Issue of Internet of Things based on
RFID." 2012 Fourth International Conference on Computational and
Information Sciences. IEEE, 2012.
[15] Rathgeb, Christian, and Andreas Uhl. "A survey on biometric
cryptosystems and cancelable biometrics." EURASIP Journal on
Information Security 2011.1 (2011): 3.
[16] Mpitziopoulos, Aristides, et al. "A survey on jamming attacks and
countermeasures in WSNs." IEEE Communications Surveys & Tutorials
11.4 (2009): 42-56. …….
[17] Clastres, Cédric. "Smart grids: Another step towards competition,
energy security and climate change objectives." Energy policy 39.9
(2011): 5399-5408.
[18] Su, Kehua, Jie Li, and Hongbo Fu. "Smart city and the applications."
2011 international conference on electronics, communications and
control (ICECC). IEEE, 2011.
[19] Soryal, Joseph, Xijie Liu, and Tarek Saadawi. "DoS detection in IEEE
802.11 with the presence of hidden nodes." Journal of advanced research
5.4 (2014): 415-422.
[20] Soryal, Joseph, Xijie Liu, and Tarek Saadawi. "DoS detection in IEEE
802.11 with the presence of hidden nodes." Journal of advanced
research 5.4 (2014): 415-422.
[21] Ashok, Aditya, Adam Hahn, and Manimaran Govindarasu. "Cyberphysical security of wide-area monitoring, protection and control in a
smart grid environment." Journal of advanced research 5.4 (2014): 481489.
[22] Liu, Jiaqiang, et al. "Software-defined internet of things for smart urban
sensing." IEEE communications magazine 53.9 (2015): 55-63.
[23] Zhang, Kuan, et al. "Security and privacy in smart city applications:
Challenges and solutions." IEEE Communications Magazine 55.1
(2017): 122-129.
[24] Nanni, Giampiero. "Transformational Smart Cities: cyber security and
resilience." Symantec Corporation (2013).
[25] Giampiero Nanni. (January 07, 2014). Transformational Smart Cities:
cyber security and resilience. Retrieved November 19, 2014, from
http://www.symantec.com/connect/blogs/transformational-smartcitiescyber- security-and-resilience.
[26] Mohite, Sangita, Gurudatt Kulkarni, and Ramesh Sutar. "RFID security
issues." International Journal of Engineering Research & Technology
(IJERT) 2.9 (2013): 746-748.
[27] Xiao, Qinghan, Cam Boulet, and Thomas Gibbons. "RFID security
issues in military supply chains." The Second International Conference
on Availability, Reliability and Security (ARES'07). IEEE, 2007.
[28] Ijaz, Sidra, et al. "Smart cities: A survey on security concerns."
International Journal of Advanced Computer Science and Applications
7.2 (2016): 612-625.
[29] Khatoun, Rida, and Sherali Zeadally. "Smart cities: Concepts,
architectures, research opportunities." Commun. Acm 59.8 (2016): 4657.
[30] Zhang, Kuan, et al. "Security and privacy in smart city applications:
Challenges and solutions." IEEE Communications Magazine 55.1
(2017): 122-129.
[31] AlDairi, Anwaar. "Cyber security attacks on smart cities and associated
mobile technologies." Procedia Computer Science 109 (2017): 10861091.
[32] Grover, Kanika, Alvin Lim, and Qing Yang. "Jamming and antijamming techniques in wireless networks: a survey." International
Journal of Ad Hoc and Ubiquitous Computing 17.4 (2014): 197-215.
[33] Ijaz, Sidra, et al. "Smart cities: A survey on security concerns."
International Journal of Advanced Computer Science and Applications
7.2 (2016): 612-625.
[34] Raiyn, Jamal. “A survey of Cyber Attack Detection Strategies.” (2014).
[35] Joshi, Jignesh, and Chandresh Parekh. "Android smartphone
vulnerabilities: a survey." 2016 International Conference on Advances in
Computing, Communication, & Automation (ICACCA)(Spring). IEEE,
2016.
[36] Chen, Pin-Yu, Shin-Ming Cheng, and Kwang-Cheng Chen. "Smart
attacks in smart grid communication networks." IEEE Communications
Magazine 50.8 (2012): 24-29.
[37] Chen, Pin-Yu, Shin-Ming Cheng, and Kwang-Cheng Chen. "Smart
attacks in smart grid communication networks." IEEE Communications
Magazine 50.8 (2012): 24-29.
[38] Tsakalidis, George, et al. "Cybersecurity threats: a proposed system for
assessing threat severity." Proceedings of the the forth international
conference on decision support system technology–ICDSST 2018. 2018.
[39] Version, F. (2019). ENISA Threat Landscape Report 2018 15 Top
Cyberthreats and Trends. https://doi.org/10.2824/622757
[40] Rt, R. E. P. O. (2019). Report 2019
[41] Europe, N. A. (2019). 2019 Cyberthreat Defense Report.
[42] Security, I., & Report, T. (2019). Internet Security Threat Report
Volume 24 | February 2019, 24(February).
[43] Yan, Ye, et al. "A survey on cyber security for smart grid
communications." IEEE Communications Surveys & Tutorials 14.4
(2012): 998-1010.
[44] Wang, Wenye, and Zhuo Lu. "Cyber security in the smart grid: Survey
and challenges." Computer networks 57.5 (2013): 1344-1371.
[45] El Mrabet, Zakaria, et al. "Cyber-security in smart grid: Survey and
challenges." Computers & Electrical Engineering 67 (2018): 469-482.
[46] Z.A. Almusaylim and N. Zaman, “A review on smart home present state
and challenges: linked to context-awareness internet of things (IoT)
Wireless Networks”, 25 (6), 3193-3204.
[47] M. Almulhim, and N. Zaman, “Proposing secure and lightweight
authentication scheme for IoT based E-health applications”, 2018 20th
International Conference on Advanced Communication Technology
(ICACT), 481-487.
[48] M. Almulhim, N. Islam and N. Zaman, “A Lightweight and Secure
Authentication Scheme for IoT Based E-Health Applications”,
International Journal of Computer Science and Network Security 19 (1),
107-120.
[49] K. Hussain, S.J. Hussain, NZ. Jhanjhi and M. Humayun, “SYN Flood
Attack Detection based on Bayes Estimator (SFADBE) For MANET”,
International Conference on Computer and Information Sciences
(ICCIS), 1-4, 2019.
[50] S.H. Kok, A. Abdullah, NZ. Jhanjhi and M. Supramaniam, “A Review
of Intrusion Detection System using Machine Learning Approach”,
International Journal of Engineering Research and Technology 12 (1), 815.
Authorized licensed use limited to: SRM University. Downloaded on December 25,2021 at 19:42:07 UTC from IEEE Xplore. Restrictions apply.
Download