Skip to main content

Privacy and Security Concerns in Edge Computing-Based Smart Cities

  • Chapter
  • First Online:
Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1030))

Abstract

People and urban economies have benefited greatly from smart cities' better quality of life and services. They have complete power over physical objects in real-time and can provide intelligent information to people in areas such as transportation, healthcare, building automation, public safety, smart parking, and traffic systems, as well as smart agriculture. Smart city apps have the ability to collect confidential data. At different levels of the architecture, nevertheless, various security and privacy issues can arise. As a result, it's important to consider these security and privacy concerns when developing and implementing applications. The key applications of smart cities are highlighted in this paper and the major security and privacy problems in the design of smart city applications. It discusses some of the latest protection and privacy strategies for information-centric smart city applications and potential research issues that must be identified for performance enhancement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cui, L., Xie, G., Qu, Y., Gao, L., Yang, Y.: Security and privacy in smart cities: challenges and opportunities. IEEE Access. 6, 46134–46145 (2018)

    Article  Google Scholar 

  2. Ever, E., Al-Turjman, F.M., Zahmatkesh, H., Riza, M.: Modelling green HetNets in dynamic ultra-large-scale applications: a case-study forfemtocells in smart-cities. Comput. Netw. 128, 78–93 (2017)

    Article  Google Scholar 

  3. Li, Y., Lin, Y., Geertman, S.: The development of smart cities in China. In: Proceedings of the 14th International Conference on Computersin Urban Planning and Urban Management. Cambridge, MA (2015)

    Google Scholar 

  4. Sharma, G., Kumar, A., Saini, A., Upadhyay, A.: Inventors. IoT based smart plant leaf pathology classification and detection using artificial intelligence. India Patent. 202011055879 (2021)

    Google Scholar 

  5. Sharma, G., Kumar, A., Upadhyay, A.: Inventors. Development of scene perception system for visually impaired People using IOT Based System. India Patent. 2020111009212 (2021)

    Google Scholar 

  6. Wang, M., Wu, J., Li, G., Li, J., Li, Q., Wang, S.: Toward mobility support for information-centric IoV in smart city using fog computing. In: Paper Presented at IEEE International Conference on Smart Energy Grid Engineering (SEGE). Oshawa, Canada (2017)

    Google Scholar 

  7. Sheng, Z., Yang, S., Yu, Y., Vasilakos, A.V., McCann, J.A., Leung, K.K.: A survey on the ietf protocol suite for the Internet of Things: standards, challenges, and opportunities. IEEE Wirel. Commun. 20(6), 91–98 (2013). Vasilakos, A.V., Li, Z., Simon, G., You, W.: Information centric network: research challenges and opportunities. J. Netw. Comput. Appl. 52, 1–10 (2015)

    Google Scholar 

  8. Mars, D., Gammar, S.M., Lahmadi, A., Saidane, L.A.: Using information centric networking in internet of things: a survey. Wirel. Pers. Commun. 105, 87–103 (2019)

    Article  Google Scholar 

  9. Lindgren, A., Ben Abdesslem, F., Ahlgren, B., Schelén, O., Malik, A.: Applicability and trade offs of information-centric networking for efficient IoT (2015)

    Google Scholar 

  10. Hahm, O., Baccelli, E., Schmidt, T.C., Wahlisch, M., Adjih, C.: A named data network approach to energy efficiency in IoT. In: Paper presented at: 2016 IEEE Globecom Workshops (GC Wkshps). Washington, DC (2016)

    Google Scholar 

  11. Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)

    Article  Google Scholar 

  12. Biswas, K., Muthuk kumarasamy, V.: Securing smart cities using blockchain technology. In: Paper presented at: 2016 IEEE 18th InternationalConference on High Performance Computing and Communications, IEEE 14th International Conference on Smart City, IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). Sydney, Australia (2016)

    Google Scholar 

  13. Perevezentsev, M., Sullivan, F.: Strategic opportunity analysis of the global smart city market. Technical Report. Frost and Sullivan (2013)

    Google Scholar 

  14. Albino, V., Berardi, U., Dangelico, R.M.: Smart cities: definitions, dimensions, performance, and initiatives. J. Urban Technol. 22(1):3–21 (2015)

    Google Scholar 

  15. Smart Cities Require Smarter Cybersecurity. Technical Report. http://www.govtech.com/ (2016)

  16. He, Y., Yu, F.R., Zhao, N., Leung, V.C., Yin, H.: Software-defined networks with mobile edge computing and caching for smart cities: a big data deep reinforcement learning approach. IEEE Commun. Mag. 55(12), 31–37 (2017)

    Article  Google Scholar 

  17. Maamar, Z., Baker, T., Sellami, M., Asim, M., Ugljanin, E., Faci, N.: Cloud versus edge: who serves the Internet-of-Things better. Internet Technol. Lett. 1(5), e66 (2018)

    Google Scholar 

  18. Kikuchi, Y., Shibata, Y.: Mobile cloud computing for distributed disaster information system in challenged communication environment. In: Proceeding of IEEE 29th International Conferences on Advanced Information Networking and Applications Workshops (WAINA), pp. 512–517 (2015)

    Google Scholar 

  19. Mahmud, R., Kotagiri, R., Buyya, R.: Fog computing: a taxonomy, survey and future directions. In: Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives. Singapore: Springer Nature Singapore Pte Ltd, pp. 103–130 (2018)

    Google Scholar 

  20. Liang, K., Zhao, L., Chu, X., Chen, H.H.: An integrated architecture for software defined and virtualized radio access networks with fog computing. IEEE Network 31(1), 80–87 (2017)

    Article  Google Scholar 

  21. Chaitanya, K.S., Kumar, A., Kumar, R.: Secure storage of data using cryptography for network. Int. J. Eng. Sci. Technol. 4(4), 1638–1645 (2012)

    Google Scholar 

  22. Abbas, N., Asim, M., Tariq, N., Baker, T., Abbas, S.: A mechanism for securing IoT-enabled applications at the fog layer. J. Sens. Actuator Netw. 8(1), 16 (2019)

    Article  Google Scholar 

  23. Cui, S., Belguith, S., De Alwis, P., Asghar, M.R., Russello, G.: Collusion defender: preserving subscribers’ privacy in publish and subscribe systems. IEEE Trans. Dependable Secure Comput. 1 (2019)

    Google Scholar 

  24. Ferraz, F.S., Sampaio, C., Ferraz, C.: Towards a smart-city security architecture: proposal and analysis of impact of major smart-city security issues. In: Proceedings of the First International Conference on Advances and Trends in Software Engineering (SOFTENG). Barcelona, Spain (2015)

    Google Scholar 

  25. Butt, T.A., Afzaal, M.A.: Security and privacy in smart cities: issues and current solutions. In: Smart Technologies and Innovation for a Sustainable Future: Proceedings of the 1st American University in the Emirates International Research Conference, Dubai, UAE 2017. Cham, Switzerland. Springer Nature Switzerland AG, pp. 317–323 (2019)

    Google Scholar 

  26. Gharaibeh, A., Salahuddin, M.A., Hussini, S.J., et al.: Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun. Surv. Tutor. 19(4), 2456–2501 (2017)

    Google Scholar 

  27. Eckhoff, D., Wagner, I.: Privacy in the smart city—applications, technologies, challenges, and solutions. IEEE Commun. Surv. Tutor. 20(1), 489–516 (2018)

    Article  Google Scholar 

  28. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  29. Tan, L., Wang, N.: Future internet: the internet of things. In: Paper presented at: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE). Chengdu, China (2010)

    Google Scholar 

  30. Hwang, I., Shin, D.: Application level network virtualization using selective connection. In: Paper presented at: IEEE International Conference on Consumer Electronics (ICCE). Las Vegas, NV (2018)

    Google Scholar 

  31. Anoh, K., Ikpehai, A., Bajovic, D., et al.: Virtual microgrids: a management concept for peer-to-peer energy trading. In: Proceedings of the 2nd ACM International Conference on Future Networks and Distributed Systems (ICFNDS). Amman, Jordan (2018)

    Google Scholar 

  32. Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of Things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)

    Article  Google Scholar 

  33. Li, X., Lu, R., Liang, X., Shen, X., Chen, J., Lin, X.: Smart community: an internet of things application. IEEE Commun Mag. 49(11), 68–75 (2011)

    Article  Google Scholar 

  34. Ni, J., Lin, X., Zhang, K., Shen, X.: Privacy-preserving real-time navigation system using vehicular crowdsourcing. In: Paper presented 2015 IEEE 84th Vehicular Technology Conference (VTC-Fall). Montreal, Canada (2016)

    Google Scholar 

  35. Catarinucci, L., de Donno, D., Mainetti, L., et al.: An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2(6), 515–526 (2015)

    Article  Google Scholar 

  36. Fajardo, J.T.B., Yasumoto, K., Shibata, N., Sun, W., Ito, M.: Disaster information collection with opportunistic communication and message aggregation. J. Inf. Proc. 22(2), 106–117 (2014)

    Google Scholar 

  37. Aouini, I., Azzouz, L.B.: Smart grids cyber security issues and challenges. Int. J. Electron. Commun. Eng. 9(11), 1263–1269 (2015)

    Google Scholar 

  38. Petinrin, J.O., Shaaban, M.: Smart power grid: technologies and applications. In: Paper presented at: 2012 IEEE International Conference onPower and Energy (PECon). Kota Kinabalu, Malaysia (2012)

    Google Scholar 

  39. Vlahogianni, E.I., Kepaptsoglou, K., Tsetsos, V., Karlaftis, M.G.: A real-time parking prediction system for smart cities. J. Intell. Trans. Syst. 20(2), 192–204 (2016)

    Article  Google Scholar 

  40. Tang, B., Chen, Z., Hefferman, G., Wei, T., He, H., Yang, Q.: A hierarchical distributed fog computing architecture for big data analysis in smartcities. In: Proceedings of the ASE Big Data and Social Informatics (ASE BD&SI). Kaohsiung, Taiwan (2015)

    Google Scholar 

  41. Ding, D., Conti, M., Solanas, A.: A smart health application and its related privacy issues. In: Paper presented at: Smart City Security and Privacy Work shop (SCSP-W). Vienna, Austria (2016)

    Google Scholar 

  42. Gungor, V.C., Sahin, D., Kocak, T., et al.: Smart grid technologies: communication technologies and standards. IEEE Trans. Ind. Inform. 7(4), 529–539 (2011)

    Article  Google Scholar 

  43. Bello, O., Zeadally, S.: Toward efficient smartification of the internet of things (IoT) services. Future Gener. Comput. Syst. 92, 663–673 (2019)

    Article  Google Scholar 

  44. Mohanty, S.P., Choppali, U., Kougianos, E.: Everything you wanted to know about smart cities: the Internet of Things is the backbone. IEEE Consumer Electron Mag. 5(3), 60–70 (2016)

    Google Scholar 

  45. Gong, T., Huang, H., Li, P., Zhang, K., Jiang, H.: A medical healthcare system for privacy protection based on IoT. In: Paper Presented 2015 Seventh IEEE International Symposium on Parallel Architectures, Algorithms and Programming (PAAP). Nanjing, China (2015)

    Google Scholar 

  46. Ning, Z., Xia, F., Ullah, N., Kong, X., Hu, X.: Vehicular social networks: enabling smart mobility. IEEE Commun. Mag. 55(5), 16–55 (2017). Wagner, M., Kuba, M., Oeder, A.: Smart grid cyber security: a German perspective. Paper presented at: IEEE International Conference onSmart Grid Technology, Economics and Policies (SG-TEP); Nuremberg, Germany (2012)

    Google Scholar 

  47. Delgado-Gomes, V., Martins, J.F., Lima, C., Borza, P.N.: Smart grid security issues. In: Paper presented at: 2015 9th IEEE International Conference on Compatibility and Power Electronics (CPE). Costa da Caparica, Portugal (2015)

    Google Scholar 

  48. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)

    Article  Google Scholar 

  49. Ghafir, I., Prenosil, V., Hammoudeh, M., et al.: BotDet: a system for real time botnet command and control traffic detection. IEEE Access. 6, 38947–38958 (2018)

    Article  Google Scholar 

  50. Hutson, M.: A matter of trust. Science 358(6369), 1375–1377 (2017)

    Article  Google Scholar 

  51. Weber, R.H.: Internet of things–new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)

    Article  Google Scholar 

  52. Chaum, D.: Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston, MA (1983)

    Chapter  Google Scholar 

  53. Schaub, F., Kargl, F., Ma, Z., Weber, M.: V-tokens for conditional pseudonymity in VANETs. In: IEEE Wireless Communication and Networking Conference (WCNC) IEEE Sydney, Australia, pp.1–6 (2010)

    Google Scholar 

  54. Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: safety, security and privacy. J. Adv. Res. 5(4), 491–497 (2014)

    Article  Google Scholar 

  55. Zhou, L., Su, C., Chiu, W., Yeh, K.H.: You think, therefore you are: transparent authentication system with brainwave-oriented bio-featuresfor IoT networks. IEEE Trans. Emerg. Top Comput. 1 (2017)

    Google Scholar 

  56. Amin, R., Sherratt, R.S., Giri, D., Islam, S.H., Khan, M.K.: A software agent enabled biometric security algorithm for secure file access in consumer storage devices. IEEE Trans. Consum. Electron. 63(1), 53–61 (2017)

    Article  Google Scholar 

  57. Sharma, P., Walia, G.S., Rohilla, R.: Alignment-Free Cancelable Biometric: A Contemporary Survey, Opportunities & Challenges. In: 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Thoothukudi, India, pp. 881–889 (2020). https://doi.org/10.1109/ICISS49785.2020.9316054

  58. Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., Yearwood, J.: Protection of privacy in biometric data. IEEE Access 4, 880–892 (2016)

    Google Scholar 

  59. Singandhupe, A., La, H.M., Feil-Seifer, D.: Reliable security algorithm for drones using individual characteristics from an EEG signal. IEEE Access 6, 22976–22986 (2018)

    Google Scholar 

  60. Sharma, P., Walia, G.S., Rohilla, R.: Recent advancement in cancelable biometric for user recognition: a brief survey. In: 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, pp. 137–146 (2020). https://doi.org/10.1109/SMART50582.2020.9337107

  61. Alsheikh, M.A., Lin, S., Niyato, D., Tan, H.P.: Machine learning in wireless sensor networks: algorithms, strategies, and applications. IEEE Commun. Surv. Tutor. 16(4), 1996–2018 (2014)

    Article  Google Scholar 

  62. Luo, X., Zhang, D., Yang, L.T., Liu, J., Chang, X., Ning, H.: A kernel machine-based secure data sensing and fusion scheme in wireless sensornetworks for the cyber-physical systems. Futur. Gener. Comput. Syst. 61, 85–96 (2016)

    Article  Google Scholar 

  63. Aminanto, M.E., Choi, R., Tanuwidjaja, H.C., Yoo, P.D., Kim, K.: Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Trans. Inf. Forensics Secur. 13(3), 621–636. 228–241 (2018)

    Google Scholar 

  64. Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., Ande, R.: IoT standardisation: challenges, perspectives and solution. In: Proceedings of the 2nd ACM International Conference on Future Networks and Distributed Systems (ICFNDS). Amman, Jordan (2018)

    Google Scholar 

  65. Jerkins, J.A.: Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In: Paper presented 7th IEEE Annual Computing and Communication Workshop and Conference (CCWC). Las Vegas, NV (2017)

    Google Scholar 

  66. Flauzac, O., González, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and improvement of the security. In: Paper presented 201529th IEEE International Conference on Advanced Information Networking and Applications Workshops. Gwangju, South Korea (2015)

    Google Scholar 

  67. Wang, Q., Ren, K., Yu, S., Lou, W.: Dependable and secure sensor data storage with dynamic integrity assurance. ACM Trans. Sens. Netw. 8(1), 9 (2011)

    Google Scholar 

  68. Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Proceedings of the Privacy Enhancing Technologies: 11th Inter-national Symposium, PETS 2011, Waterloo, ON, Canada, July 27–29. Berlin, Germany, Springer, Heidelberg, 175–191 (2011)

    Google Scholar 

  69. Shi, J., Zhang, R., Liu, Y., Zhang, Y.: PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: Proceedings IEEE INFOCOM. San Diego, CA (2010)

    Google Scholar 

  70. Gürses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. Comput. Priv. Data Prot. 14(3), 25 (2011)

    Google Scholar 

  71. Le Métayer D. Privacy by design: a formal framework for the analysis of architectural choices. In: Proceedings of the Third ACMConference on Data and Application Security and Privacy (CODASPY); 2013; San Antonio, TX.

    Google Scholar 

  72. Monreale, A., Rinzivillo, S., Pratesi, F., Giannotti, F., Pedreschi, D.: Privacy-by-design in big data analytics and social mining. EPJ Data Sci. 3(1), 10 (2014)

    Article  Google Scholar 

  73. Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacksand lessons. In: Proceedings of the 11th ACM International Conference on Ubiquitous Computing (UbiComp). Orlando, FL (2009)

    Google Scholar 

  74. Jha, S., Kruger, L., Shmatikov, V.: Towards practical privacy for genomic computation. In: Paper presented at: 2008 IEEE Symposium on Security and Privacy (SP). Oakland, CA (2008)

    Google Scholar 

  75. Chakrabarty, S., Engels, D.W.: A secure IoT architecture for smart cities. In: Paper presented 2016 13th IEEE Annual Consumer Communications and Networking Conference (CCNC). Las Vegas, NV (2016)

    Google Scholar 

  76. Commonwealth Scientific and Industrial Research Organisation (CSIRO).: Phenonet: Distributed Sensor Network for Phenomics Supportedby High Resolution Plant Phenomics Centre, CSIRO ICT Centre, and CSIRO Sensor and Sensor Networks TCP. Technical Report (2011)

    Google Scholar 

  77. Zao, J.K., Gan, T.T., You, C.K., et al.: Augmented brain computer interaction based on fog computing and linked data. In: Paper presented 2014 International Conference on Intelligent Environments. Shanghai, China (2014)

    Google Scholar 

  78. Mishra, A., Gupta, N., Gupta, B.B.: Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecomm. Syst. 1–16 (2021)

    Google Scholar 

  79. He, D., Chan, S., Guizani, M.: User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 22(1), 28–34 (2015)

    Article  Google Scholar 

  80. Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles, and Applications. John Wiley and Sons, Hoboken, NJ (2017)

    Book  Google Scholar 

  81. He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590–2601 (2017)

    Article  Google Scholar 

  82. Tewari, A., Gupta, B.B.: Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Futur. Gener. Comput. Syst. 108, 909–920 (2020)

    Article  Google Scholar 

  83. Esposito, C., Ficco, M., Gupta, B.B.: Blockchain-based authentication and authorization for smart city applications. Inf. Proc. Manag. 58(2), 102468 (2021)

    Google Scholar 

  84. Li, D., Deng, L., et al.: A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. 479, 432–447 (2019)

    Article  Google Scholar 

  85. Jiang, F., Fu, Y., Gupta, B.B., Liang, Y., Rho, S., Lou, F., Tian, Z.: Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans. Sustain. Comput. 5(2), 204–212 (2018)

    Article  Google Scholar 

  86. Gupta, B.B., Quamara, M.: An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21), e4946 (2020)

    Google Scholar 

  87. Bhushan, K., Gupta, B.B.: Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J. Ambient. Intell. Humaniz. Comput. 10(5), 1985–1997 (2019)

    Article  Google Scholar 

  88. Stergiou, C.L., Psannis, K.E., Gupta, B.B.: IoT-based Big Data secure management in the Fog over a 6G Wireless Network. IEEE Int. Things J. (2020)

    Google Scholar 

  89. Zhang, K., Lu, R., Liang, X., Qiao, J., Shen, X.S.: PARK: a privacy-preserving aggregation scheme with adaptive key management for smart grid. In: Paper presented at: 2013 IEEE/CIC International Conference on Communications in China (ICCC). Xi'an, China (2013)

    Google Scholar 

  90. McGregory, S.: Preparing for the next DDoS attack. Netw. Secur. 2013(5), 5–6 (2013)

    Article  Google Scholar 

  91. Brewster, T.: Smart or stupid: will our cities of the future be easier to hack. The Guardian (2014)

    Google Scholar 

  92. Cédric, L.B., Darra, E., Bachlechner, D., et al.: Cyber security for smart cities-an architecture model for public transport. ENISA (2015)

    Google Scholar 

  93. Angrishi, K.: Turning the internet of things (IoT) into the internet of vulnerabilities (IoV): IoT botnets. arXiv:1702.03681 (2017)

  94. Wang, Y., Wan, J., Guo, J., Cheung, Y.M., Yuen, P.C.: Inference-based similarity search in randomized Montgomery domains for privacy-preserving biometric identification. IEEE Trans. Pattern Anal. Mach. Intell. 40(7), 1611–1624 (2018)

    Google Scholar 

  95. Carlin, A., Hammoudeh, M., Aldabbas, O.: Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. Int. J. Adv. Comput. Sci. Appl. 6(6) (2015)

    Google Scholar 

  96. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: Paper presented 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW). Riyadh, Saudi Arabia (2015)

    Google Scholar 

  97. Conti, M., Kumar, M., et al.: Opportunities in Opportunistic Computing. Computer 43(1), 42–50 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kumar, A., Upadhyay, A., Mishra, N., Nath, S., Yadav, K.R., Sharma, G. (2022). Privacy and Security Concerns in Edge Computing-Based Smart Cities. In: Nedjah, N., Abd El-Latif, A.A., Gupta, B.B., Mourelle, L.M. (eds) Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities. Studies in Computational Intelligence, vol 1030. Springer, Cham. https://doi.org/10.1007/978-3-030-96737-6_5

Download citation

Publish with us

Policies and ethics