DOI QR코드

DOI QR Code

Recent Trends on Smart City Security: A Comprehensive Overview

  • Hyuk-Jun, Kwon (Dept. of Economics & Finance, Soonchunhyang University) ;
  • Mikail Mohammed, Salim (Dept. of Computer Science and Engineering, Seoul National University of Science & Technology (SeoulTech)) ;
  • Jong Hyuk, Park (Dept. of Computer Science and Engineering, Seoul National University of Science & Technology (SeoulTech))
  • Received : 2022.10.25
  • Accepted : 2023.01.06
  • Published : 2023.02.28

Abstract

The expansion of smart cities drives the growth of data generated from sensor devices, benefitting citizens with enhanced governance, intelligent decision-making, optimized and sustainable management of available resources. The exposure of user data during its collection from sensors, storage in databases, and processing by artificial intelligence-based solutions presents significant security and privacy challenges. In this paper, we investigate the various threats and attacks affecting the growth of future smart cities and discuss the available countermeasures using artificial intelligence and blockchain-based solutions. Open challenges in existing literature due to the lack of countermeasures against quantum-inspired attacks are discussed, focusing on postquantum security solutions for resource-constrained sensor devices. Additionally, we discuss future research and challenges for the growing smart city environment and suggest possible solutions.

Keywords

Acknowledgement

This work was supported by the Soonchunhyang University Research Fund (No. 10220011).

References

  1. S. K. Singh, C. Lee, and J. H. Park, "CoVAC: a P2P smart contract-based intelligent smart city architecture for vaccine manufacturing," Computers & Industrial Engineering, vol. 166, article no. 107967, 2022. https://doi.org/10.1016/j.cie.2022.107967
  2. J. Cha, S. K. Singh, T. W. Kim, and J. H. Park, "Blockchain-empowered cloud architecture based on secret sharing for smart city," Journal of Information Security and Applications, vol. 57, article no. 102686, 2021. https://doi.org/10.1016/j.jisa.2020.102686
  3. S. K. Singh and J. H. Park, "TaLWaR: blockchain-based trust management scheme for smart enterprises with augmented intelligence," IEEE Transactions on Industrial Informatics, vol. 19, n. 1, pp. 626-634, 2023. https://doi.org/10.1109/TII.2022.3204692
  4. S. K. Singh, Y. Pan, and J. H. Park, "Blockchain-enabled secure framework for energy-efficient smart parking in sustainable city environment," Sustainable Cities and Society, vol. 76, article no. 103364, 2022. https://doi.org/10.1016/j.scs.2021.103364
  5. A. E. Azzaoui, S. K. Singh, and J. H. Park, "SNS big data analysis framework for COVID-19 outbreak prediction in smart healthy city," Sustainable Cities and Society, vol. 71, article no. 102993, 2021. https://doi.org/10.1016/j.scs.2021.102993
  6. S. K. Singh, A. E. Azzaoui, T. W. Kim, Y. Pan, and J. H. Park, "DeepBlockScheme: a deep learning-based blockchain driven scheme for secure smart city," Human-centric Computing and Information Sciences, vol. 11, article no. 12, 2021. https://doi.org/10.22967/HCIS.2021.11.012
  7. C. Ma, "Smart city and cyber-security; technologies used, leading challenges and future recommendations," Energy Reports, vol. 7, pp. 7999-8012, 2021. https://doi.org/10.1016/j.egyr.2021.08.124
  8. E. Ismagilova, L. Hughes, N. P. Rana, and Y. K. Dwivedi, "Security, privacy and risks within smart cities: literature review and development of a smart city interaction framework," Information Systems Frontiers, vol. 24, pp. 393-414, 2022. https://doi.org/10.1007/s10796-020-10044-1
  9. F. Al-Turjman, H. Zahmatkesh, and R. Shahroze, "An overview of security and privacy in smart cities' IoT communications," Transactions on Emerging Telecommunications Technologies, vol. 33, no. 3, article no. e3677, 2022. https://doi.org/10.1002/ett.3677
  10. B. Bhushan, A. Khamparia, K. M. Sagayam, S. K. Sharma, M. A. Ahad, and N. C. Debnath, "Blockchain for smart cities: a review of architectures, integration trends and future research directions," Sustainable Cities and Society, vol. 61, article no. 102360, 2020. https://doi.org/10.1016/j.scs.2020.102360
  11. L. U. Khan, I. Yaqoob, N. H. Tran, S. M. A. Kazmi, T. N. Dang, and C. S. Hong, "Edge-computing-enabled smart cities: a comprehensive survey," IEEE Internet of Things, vol. 7, no. 10, pp. 10200-10232, 2020. https://doi.org/10.1109/JIOT.2020.2987070
  12. S. Singh, P. K. Sharma, B. Yoon, M. Shojafar, G. H. Cho, and I. H. Ra. "Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city," Sustainable Cities and Society, vol. 63, article no. 102364, 2020. https://doi.org/10.1016/j.scs.2020.102364
  13. N. Magaia, R. Fonseca, K. Muhammad, A. H. F. N. Segundo, A. V. L. Neto, and V. H. C. Albuquerque, "Industrial Internet-of-Things security enhanced with deep learning approaches for smart cities," IEEE Internet of Things, vol. 8, no. 8, pp. 6393-6405, 2021. https://doi.org/10.1109/JIOT.2020.3042174
  14. CISION PR Newswire, "Cynerio and Ponemon Study Finds Frequent Cyber Attacks and Insufficient Accountability in Healthcare Adversely Impact Patient Care," 2022 [Online]. Available: https://www.prnewswire.com/news-releases/cynerio-and-ponemon-study-finds-frequent-cyber-attacks-and-insufficient-accountability-in-healthcare-adversely-impact-patient-care-301604539.html
  15. Kaspersky, "IoT under fire: Kaspersky detects more than 100 million attacks on smart devices in H1 2019," 2019 [Online]. Available: https://www.kaspersky.com/about/press-releases/2019_iot-under-fire-kasperskydetects-more-than-100-million-attacks-on-smart-devices-in-h1-2019.
  16. Y. Kim, H. Lee, and D. Hwang, "IoT malware detection and family classification using entropy time series data extraction and recurrent neural networks," KIPS Transactions on Software and Data Engineering, vol. 11, no. 5, pp. 197-202, 2022. https://doi.org/10.3745/KTSDE.2022.11.5.197
  17. R. Yumlembam, B. Issac, S. M. Jacob, and L. Yang, "IoT-based Android malware detection using graph neural network with adversarial defense," IEEE Internet of Things, 2022. https://doi.org/10.1109/JIOT.2022.3188583
  18. P. Bajpai and R. Enbody, "Preparing smart cities for ransomware attacks," in Proceedings of 2020 3rd International Conference on Data Intelligence and Security (ICDIS), South Padre Island, TX, 2020, pp. 127-133.
  19. B. Hamid, N. Jhanjhi, M. Humayun, A. Khan, and A. Alsayat, "Cyber security issues and challenges for smart cities: a survey," in Proceedings of 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Karachi, Pakistan, 2019, pp. 1-7.
  20. L. Bilge and T. Dumitras, "Before we knew it: an empirical study of zero-day attacks in the real world," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh, NC, 2012, pp. 833-844.
  21. Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, M. Gao, H. Hou, and C. Wang, "Machine learning and deep learning methods for cybersecurity," IEEE Access, vol. 6, pp. 35365-35381, 2018. https://doi.org/10.1109/access.2018.2836950
  22. W. A. Alberto Torres, R. Steinfeld, A. Sakzad, J. K. Liu, V. Kuchta, N. Bhattacharjee, M. H. Au, and J. Cheng, "Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (lattice RingCT v1. 0)," in Information Security and Privacy. Cham, Switzerland: Springer, 2018, pp. 558-576.
  23. Y. L. Gao, X. B. Chen, Y. L. Chen, Y. Sun, X. X. Niu, and Y. X. Yang, "A secure cryptocurrency scheme based on post-quantum blockchain," IEEE Access, vol. 6, pp. 27205-27213, 2018. https://doi.org/10.1109/access.2018.2827203
  24. J. Zhang, C. Shen, H. Su, M. T. Arafin, and G. Qu, "Voltage over-scaling-based lightweight authentication for IoT security," IEEE Transactions on Computers, vol. 71, no. 2, pp. 323-336, 2022. https://doi.org/10.1109/TC.2021.3049543
  25. V. A. Thakor, M. A. Razzaque, and M. R. Khandaker, "Lightweight cryptography algorithms for resource-constrained IoT devices: a review, comparison and research opportunities," IEEE Access, vol. 9, pp. 28177-28193, 2021. https://doi.org/10.1109/ACCESS.2021.3052867
  26. R. Doriguzzi-Corin, S. Millar, S. Scott-Hayward, J. Martinez-del-Rincon, and D. Siracusa, "LUCID: a practical, lightweight deep learning solution for DDoS attack detection," IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 876-889, 2020. https://doi.org/10.1109/TNSM.2020.2971776
  27. X. Yang, X. Yi, I. Khalil, J. Luo, E. Bertino, S. Nepal, and X. Huang, "Secure and lightweight authentication for mobile-edge computing enabled WBANs," IEEE Internet of Things, vol. 19, no. 14, pp. 876-889, 2022. https://doi.org/10.1109/JIOT.2021.3138989
  28. K. Cao, S. Hu, Y. Shi, A. W. Colombo, S. Karnouskos, and X. Li, "A survey on edge and edge-cloud computing assisted cyber-physical systems," IEEE Transactions on Industrial Informatics, vol. 17, no. 11, pp. 7806-7819, 2021. https://doi.org/10.1109/TII.2021.3073066
  29. M. Yahuza, M. Y. I. B. Idris, A. W. N. A. Wahab, A. T. Ho, S. Khan, S. N. B. Musa, and A. Z. B. Taha, "Systematic review on security and privacy requirements in edge computing: state of the art and future research opportunities," IEEE Access, vol. 8, pp. 76541-76567, 2020. https://doi.org/10.1109/access.2020.2989456
  30. W. Rafique, L. Qi, I. Yaqoob, M. Imran, R. U. Rasool, and W. Dou, "Complementing IoT services through software defined networking and edge computing: a comprehensive survey," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1761-1804, 2020. https://doi.org/10.1109/COMST.2020.2997475