Abstract
People and urban economies have benefited greatly from smart cities' better quality of life and services. They have complete power over physical objects in real-time and can provide intelligent information to people in areas such as transportation, healthcare, building automation, public safety, smart parking, and traffic systems, as well as smart agriculture. Smart city apps have the ability to collect confidential data. At different levels of the architecture, nevertheless, various security and privacy issues can arise. As a result, it's important to consider these security and privacy concerns when developing and implementing applications. The key applications of smart cities are highlighted in this paper and the major security and privacy problems in the design of smart city applications. It discusses some of the latest protection and privacy strategies for information-centric smart city applications and potential research issues that must be identified for performance enhancement.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Cui, L., Xie, G., Qu, Y., Gao, L., Yang, Y.: Security and privacy in smart cities: challenges and opportunities. IEEE Access. 6, 46134–46145 (2018)
Ever, E., Al-Turjman, F.M., Zahmatkesh, H., Riza, M.: Modelling green HetNets in dynamic ultra-large-scale applications: a case-study forfemtocells in smart-cities. Comput. Netw. 128, 78–93 (2017)
Li, Y., Lin, Y., Geertman, S.: The development of smart cities in China. In: Proceedings of the 14th International Conference on Computersin Urban Planning and Urban Management. Cambridge, MA (2015)
Sharma, G., Kumar, A., Saini, A., Upadhyay, A.: Inventors. IoT based smart plant leaf pathology classification and detection using artificial intelligence. India Patent. 202011055879 (2021)
Sharma, G., Kumar, A., Upadhyay, A.: Inventors. Development of scene perception system for visually impaired People using IOT Based System. India Patent. 2020111009212 (2021)
Wang, M., Wu, J., Li, G., Li, J., Li, Q., Wang, S.: Toward mobility support for information-centric IoV in smart city using fog computing. In: Paper Presented at IEEE International Conference on Smart Energy Grid Engineering (SEGE). Oshawa, Canada (2017)
Sheng, Z., Yang, S., Yu, Y., Vasilakos, A.V., McCann, J.A., Leung, K.K.: A survey on the ietf protocol suite for the Internet of Things: standards, challenges, and opportunities. IEEE Wirel. Commun. 20(6), 91–98 (2013). Vasilakos, A.V., Li, Z., Simon, G., You, W.: Information centric network: research challenges and opportunities. J. Netw. Comput. Appl. 52, 1–10 (2015)
Mars, D., Gammar, S.M., Lahmadi, A., Saidane, L.A.: Using information centric networking in internet of things: a survey. Wirel. Pers. Commun. 105, 87–103 (2019)
Lindgren, A., Ben Abdesslem, F., Ahlgren, B., Schelén, O., Malik, A.: Applicability and trade offs of information-centric networking for efficient IoT (2015)
Hahm, O., Baccelli, E., Schmidt, T.C., Wahlisch, M., Adjih, C.: A named data network approach to energy efficiency in IoT. In: Paper presented at: 2016 IEEE Globecom Workshops (GC Wkshps). Washington, DC (2016)
Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)
Biswas, K., Muthuk kumarasamy, V.: Securing smart cities using blockchain technology. In: Paper presented at: 2016 IEEE 18th InternationalConference on High Performance Computing and Communications, IEEE 14th International Conference on Smart City, IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). Sydney, Australia (2016)
Perevezentsev, M., Sullivan, F.: Strategic opportunity analysis of the global smart city market. Technical Report. Frost and Sullivan (2013)
Albino, V., Berardi, U., Dangelico, R.M.: Smart cities: definitions, dimensions, performance, and initiatives. J. Urban Technol. 22(1):3–21 (2015)
Smart Cities Require Smarter Cybersecurity. Technical Report. http://www.govtech.com/ (2016)
He, Y., Yu, F.R., Zhao, N., Leung, V.C., Yin, H.: Software-defined networks with mobile edge computing and caching for smart cities: a big data deep reinforcement learning approach. IEEE Commun. Mag. 55(12), 31–37 (2017)
Maamar, Z., Baker, T., Sellami, M., Asim, M., Ugljanin, E., Faci, N.: Cloud versus edge: who serves the Internet-of-Things better. Internet Technol. Lett. 1(5), e66 (2018)
Kikuchi, Y., Shibata, Y.: Mobile cloud computing for distributed disaster information system in challenged communication environment. In: Proceeding of IEEE 29th International Conferences on Advanced Information Networking and Applications Workshops (WAINA), pp. 512–517 (2015)
Mahmud, R., Kotagiri, R., Buyya, R.: Fog computing: a taxonomy, survey and future directions. In: Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives. Singapore: Springer Nature Singapore Pte Ltd, pp. 103–130 (2018)
Liang, K., Zhao, L., Chu, X., Chen, H.H.: An integrated architecture for software defined and virtualized radio access networks with fog computing. IEEE Network 31(1), 80–87 (2017)
Chaitanya, K.S., Kumar, A., Kumar, R.: Secure storage of data using cryptography for network. Int. J. Eng. Sci. Technol. 4(4), 1638–1645 (2012)
Abbas, N., Asim, M., Tariq, N., Baker, T., Abbas, S.: A mechanism for securing IoT-enabled applications at the fog layer. J. Sens. Actuator Netw. 8(1), 16 (2019)
Cui, S., Belguith, S., De Alwis, P., Asghar, M.R., Russello, G.: Collusion defender: preserving subscribers’ privacy in publish and subscribe systems. IEEE Trans. Dependable Secure Comput. 1 (2019)
Ferraz, F.S., Sampaio, C., Ferraz, C.: Towards a smart-city security architecture: proposal and analysis of impact of major smart-city security issues. In: Proceedings of the First International Conference on Advances and Trends in Software Engineering (SOFTENG). Barcelona, Spain (2015)
Butt, T.A., Afzaal, M.A.: Security and privacy in smart cities: issues and current solutions. In: Smart Technologies and Innovation for a Sustainable Future: Proceedings of the 1st American University in the Emirates International Research Conference, Dubai, UAE 2017. Cham, Switzerland. Springer Nature Switzerland AG, pp. 317–323 (2019)
Gharaibeh, A., Salahuddin, M.A., Hussini, S.J., et al.: Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun. Surv. Tutor. 19(4), 2456–2501 (2017)
Eckhoff, D., Wagner, I.: Privacy in the smart city—applications, technologies, challenges, and solutions. IEEE Commun. Surv. Tutor. 20(1), 489–516 (2018)
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Tan, L., Wang, N.: Future internet: the internet of things. In: Paper presented at: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE). Chengdu, China (2010)
Hwang, I., Shin, D.: Application level network virtualization using selective connection. In: Paper presented at: IEEE International Conference on Consumer Electronics (ICCE). Las Vegas, NV (2018)
Anoh, K., Ikpehai, A., Bajovic, D., et al.: Virtual microgrids: a management concept for peer-to-peer energy trading. In: Proceedings of the 2nd ACM International Conference on Future Networks and Distributed Systems (ICFNDS). Amman, Jordan (2018)
Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of Things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)
Li, X., Lu, R., Liang, X., Shen, X., Chen, J., Lin, X.: Smart community: an internet of things application. IEEE Commun Mag. 49(11), 68–75 (2011)
Ni, J., Lin, X., Zhang, K., Shen, X.: Privacy-preserving real-time navigation system using vehicular crowdsourcing. In: Paper presented 2015 IEEE 84th Vehicular Technology Conference (VTC-Fall). Montreal, Canada (2016)
Catarinucci, L., de Donno, D., Mainetti, L., et al.: An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2(6), 515–526 (2015)
Fajardo, J.T.B., Yasumoto, K., Shibata, N., Sun, W., Ito, M.: Disaster information collection with opportunistic communication and message aggregation. J. Inf. Proc. 22(2), 106–117 (2014)
Aouini, I., Azzouz, L.B.: Smart grids cyber security issues and challenges. Int. J. Electron. Commun. Eng. 9(11), 1263–1269 (2015)
Petinrin, J.O., Shaaban, M.: Smart power grid: technologies and applications. In: Paper presented at: 2012 IEEE International Conference onPower and Energy (PECon). Kota Kinabalu, Malaysia (2012)
Vlahogianni, E.I., Kepaptsoglou, K., Tsetsos, V., Karlaftis, M.G.: A real-time parking prediction system for smart cities. J. Intell. Trans. Syst. 20(2), 192–204 (2016)
Tang, B., Chen, Z., Hefferman, G., Wei, T., He, H., Yang, Q.: A hierarchical distributed fog computing architecture for big data analysis in smartcities. In: Proceedings of the ASE Big Data and Social Informatics (ASE BD&SI). Kaohsiung, Taiwan (2015)
Ding, D., Conti, M., Solanas, A.: A smart health application and its related privacy issues. In: Paper presented at: Smart City Security and Privacy Work shop (SCSP-W). Vienna, Austria (2016)
Gungor, V.C., Sahin, D., Kocak, T., et al.: Smart grid technologies: communication technologies and standards. IEEE Trans. Ind. Inform. 7(4), 529–539 (2011)
Bello, O., Zeadally, S.: Toward efficient smartification of the internet of things (IoT) services. Future Gener. Comput. Syst. 92, 663–673 (2019)
Mohanty, S.P., Choppali, U., Kougianos, E.: Everything you wanted to know about smart cities: the Internet of Things is the backbone. IEEE Consumer Electron Mag. 5(3), 60–70 (2016)
Gong, T., Huang, H., Li, P., Zhang, K., Jiang, H.: A medical healthcare system for privacy protection based on IoT. In: Paper Presented 2015 Seventh IEEE International Symposium on Parallel Architectures, Algorithms and Programming (PAAP). Nanjing, China (2015)
Ning, Z., Xia, F., Ullah, N., Kong, X., Hu, X.: Vehicular social networks: enabling smart mobility. IEEE Commun. Mag. 55(5), 16–55 (2017). Wagner, M., Kuba, M., Oeder, A.: Smart grid cyber security: a German perspective. Paper presented at: IEEE International Conference onSmart Grid Technology, Economics and Policies (SG-TEP); Nuremberg, Germany (2012)
Delgado-Gomes, V., Martins, J.F., Lima, C., Borza, P.N.: Smart grid security issues. In: Paper presented at: 2015 9th IEEE International Conference on Compatibility and Power Electronics (CPE). Costa da Caparica, Portugal (2015)
Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046–2069 (2013)
Ghafir, I., Prenosil, V., Hammoudeh, M., et al.: BotDet: a system for real time botnet command and control traffic detection. IEEE Access. 6, 38947–38958 (2018)
Hutson, M.: A matter of trust. Science 358(6369), 1375–1377 (2017)
Weber, R.H.: Internet of things–new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23–30 (2010)
Chaum, D.: Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston, MA (1983)
Schaub, F., Kargl, F., Ma, Z., Weber, M.: V-tokens for conditional pseudonymity in VANETs. In: IEEE Wireless Communication and Networking Conference (WCNC) IEEE Sydney, Australia, pp.1–6 (2010)
Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: safety, security and privacy. J. Adv. Res. 5(4), 491–497 (2014)
Zhou, L., Su, C., Chiu, W., Yeh, K.H.: You think, therefore you are: transparent authentication system with brainwave-oriented bio-featuresfor IoT networks. IEEE Trans. Emerg. Top Comput. 1 (2017)
Amin, R., Sherratt, R.S., Giri, D., Islam, S.H., Khan, M.K.: A software agent enabled biometric security algorithm for secure file access in consumer storage devices. IEEE Trans. Consum. Electron. 63(1), 53–61 (2017)
Sharma, P., Walia, G.S., Rohilla, R.: Alignment-Free Cancelable Biometric: A Contemporary Survey, Opportunities & Challenges. In: 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Thoothukudi, India, pp. 881–889 (2020). https://doi.org/10.1109/ICISS49785.2020.9316054
Natgunanathan, I., Mehmood, A., Xiang, Y., Beliakov, G., Yearwood, J.: Protection of privacy in biometric data. IEEE Access 4, 880–892 (2016)
Singandhupe, A., La, H.M., Feil-Seifer, D.: Reliable security algorithm for drones using individual characteristics from an EEG signal. IEEE Access 6, 22976–22986 (2018)
Sharma, P., Walia, G.S., Rohilla, R.: Recent advancement in cancelable biometric for user recognition: a brief survey. In: 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, pp. 137–146 (2020). https://doi.org/10.1109/SMART50582.2020.9337107
Alsheikh, M.A., Lin, S., Niyato, D., Tan, H.P.: Machine learning in wireless sensor networks: algorithms, strategies, and applications. IEEE Commun. Surv. Tutor. 16(4), 1996–2018 (2014)
Luo, X., Zhang, D., Yang, L.T., Liu, J., Chang, X., Ning, H.: A kernel machine-based secure data sensing and fusion scheme in wireless sensornetworks for the cyber-physical systems. Futur. Gener. Comput. Syst. 61, 85–96 (2016)
Aminanto, M.E., Choi, R., Tanuwidjaja, H.C., Yoo, P.D., Kim, K.: Deep abstraction and weighted feature selection for Wi-Fi impersonation detection. IEEE Trans. Inf. Forensics Secur. 13(3), 621–636. 228–241 (2018)
Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., Ande, R.: IoT standardisation: challenges, perspectives and solution. In: Proceedings of the 2nd ACM International Conference on Future Networks and Distributed Systems (ICFNDS). Amman, Jordan (2018)
Jerkins, J.A.: Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code. In: Paper presented 7th IEEE Annual Computing and Communication Workshop and Conference (CCWC). Las Vegas, NV (2017)
Flauzac, O., González, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and improvement of the security. In: Paper presented 201529th IEEE International Conference on Advanced Information Networking and Applications Workshops. Gwangju, South Korea (2015)
Wang, Q., Ren, K., Yu, S., Lou, W.: Dependable and secure sensor data storage with dynamic integrity assurance. ACM Trans. Sens. Netw. 8(1), 9 (2011)
Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Proceedings of the Privacy Enhancing Technologies: 11th Inter-national Symposium, PETS 2011, Waterloo, ON, Canada, July 27–29. Berlin, Germany, Springer, Heidelberg, 175–191 (2011)
Shi, J., Zhang, R., Liu, Y., Zhang, Y.: PriSense: privacy-preserving data aggregation in people-centric urban sensing systems. In: Proceedings IEEE INFOCOM. San Diego, CA (2010)
Gürses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. Comput. Priv. Data Prot. 14(3), 25 (2011)
Le Métayer D. Privacy by design: a formal framework for the analysis of architectural choices. In: Proceedings of the Third ACMConference on Data and Application Security and Privacy (CODASPY); 2013; San Antonio, TX.
Monreale, A., Rinzivillo, S., Pratesi, F., Giannotti, F., Pedreschi, D.: Privacy-by-design in big data analytics and social mining. EPJ Data Sci. 3(1), 10 (2014)
Denning, T., Matuszek, C., Koscher, K., Smith, J.R., Kohno, T.: A spotlight on security and privacy risks with future household robots: attacksand lessons. In: Proceedings of the 11th ACM International Conference on Ubiquitous Computing (UbiComp). Orlando, FL (2009)
Jha, S., Kruger, L., Shmatikov, V.: Towards practical privacy for genomic computation. In: Paper presented at: 2008 IEEE Symposium on Security and Privacy (SP). Oakland, CA (2008)
Chakrabarty, S., Engels, D.W.: A secure IoT architecture for smart cities. In: Paper presented 2016 13th IEEE Annual Consumer Communications and Networking Conference (CCNC). Las Vegas, NV (2016)
Commonwealth Scientific and Industrial Research Organisation (CSIRO).: Phenonet: Distributed Sensor Network for Phenomics Supportedby High Resolution Plant Phenomics Centre, CSIRO ICT Centre, and CSIRO Sensor and Sensor Networks TCP. Technical Report (2011)
Zao, J.K., Gan, T.T., You, C.K., et al.: Augmented brain computer interaction based on fog computing and linked data. In: Paper presented 2014 International Conference on Intelligent Environments. Shanghai, China (2014)
Mishra, A., Gupta, N., Gupta, B.B.: Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecomm. Syst. 1–16 (2021)
He, D., Chan, S., Guizani, M.: User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 22(1), 28–34 (2015)
Song, H., Srinivasan, R., Sookoor, T., Jeschke, S.: Smart Cities: Foundations, Principles, and Applications. John Wiley and Sons, Hoboken, NJ (2017)
He, D., Zeadally, S., Kumar, N., Lee, J.H.: Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 11(4), 2590–2601 (2017)
Tewari, A., Gupta, B.B.: Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Futur. Gener. Comput. Syst. 108, 909–920 (2020)
Esposito, C., Ficco, M., Gupta, B.B.: Blockchain-based authentication and authorization for smart city applications. Inf. Proc. Manag. 58(2), 102468 (2021)
Li, D., Deng, L., et al.: A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. 479, 432–447 (2019)
Jiang, F., Fu, Y., Gupta, B.B., Liang, Y., Rho, S., Lou, F., Tian, Z.: Deep learning based multi-channel intelligent attack detection for data security. IEEE Trans. Sustain. Comput. 5(2), 204–212 (2018)
Gupta, B.B., Quamara, M.: An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols. Concurrency and Computation: Practice and Experience, 32(21), e4946 (2020)
Bhushan, K., Gupta, B.B.: Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J. Ambient. Intell. Humaniz. Comput. 10(5), 1985–1997 (2019)
Stergiou, C.L., Psannis, K.E., Gupta, B.B.: IoT-based Big Data secure management in the Fog over a 6G Wireless Network. IEEE Int. Things J. (2020)
Zhang, K., Lu, R., Liang, X., Qiao, J., Shen, X.S.: PARK: a privacy-preserving aggregation scheme with adaptive key management for smart grid. In: Paper presented at: 2013 IEEE/CIC International Conference on Communications in China (ICCC). Xi'an, China (2013)
McGregory, S.: Preparing for the next DDoS attack. Netw. Secur. 2013(5), 5–6 (2013)
Brewster, T.: Smart or stupid: will our cities of the future be easier to hack. The Guardian (2014)
Cédric, L.B., Darra, E., Bachlechner, D., et al.: Cyber security for smart cities-an architecture model for public transport. ENISA (2015)
Angrishi, K.: Turning the internet of things (IoT) into the internet of vulnerabilities (IoV): IoT botnets. arXiv:1702.03681 (2017)
Wang, Y., Wan, J., Guo, J., Cheung, Y.M., Yuen, P.C.: Inference-based similarity search in randomized Montgomery domains for privacy-preserving biometric identification. IEEE Trans. Pattern Anal. Mach. Intell. 40(7), 1611–1624 (2018)
Carlin, A., Hammoudeh, M., Aldabbas, O.: Intrusion detection and countermeasure of virtual cloud systems-state of the art and current challenges. Int. J. Adv. Comput. Sci. Appl. 6(6) (2015)
Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P.: One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: Paper presented 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW). Riyadh, Saudi Arabia (2015)
Conti, M., Kumar, M., et al.: Opportunities in Opportunistic Computing. Computer 43(1), 42–50 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kumar, A., Upadhyay, A., Mishra, N., Nath, S., Yadav, K.R., Sharma, G. (2022). Privacy and Security Concerns in Edge Computing-Based Smart Cities. In: Nedjah, N., Abd El-Latif, A.A., Gupta, B.B., Mourelle, L.M. (eds) Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities. Studies in Computational Intelligence, vol 1030. Springer, Cham. https://doi.org/10.1007/978-3-030-96737-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-96737-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96736-9
Online ISBN: 978-3-030-96737-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)