Skip to main content

An Overview of Security and Privacy in Smart Cities

  • Chapter
  • First Online:
IoT and IoE Driven Smart Cities

Abstract

In the twenty-first century, so many technological paradigms emerged as the result of the technological advancement of information and communication technology (ICT). Many of the technologies were used as an aid for fulfilling human needs and mitigating many of the problems associated with the environment and making everyone connected. In order to mitigate the problem of rapid urbanization smart city concept has emerged and it is being used to streamline the functions of urban cities and make the lives of citizens more easy and convenient. In a typical smart city context, citizens are already interconnected via smart mobile devices and wearable devices. The hospitals, vehicles, houses, traffic surveillance systems, public places, and other social systems in the city are all connected over the Internet, which is known as the Internet of Things (IoT). This will contribute to unprecedented changes in the condition of life in the city. In public care, public safety, emergency management, and disaster recovery, these pervasive systems which are linked through the Internet can assist citizens with greater benefits. The world is now witnessing a boom of smart cities. Although smart cities have many advantages, such as creating new economic and social possibilities, there are many challenges, such as security and privacy. These security and privacy challenges include unauthorized access to information and attacks that cause physical interruptions in the provision of city services. As all people in the city are linked to each other through the underlying ubiquitous communication technologies in the smart city, security problems can arise as a result of the vulnerabilities present in the city infrastructure, communication networks, and human errors. Different applications used in smart cities can also present new vulnerabilities, so the attackers can gain access to information which is highly confidential. The purpose of this study is to provide an extensive analysis of security and privacy problems in smart cities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. AlDairi A (2017) Cyber security attacks on smart cities and associated mobile technologies. Proc Comput Sci 109:1086–1091

    Article  Google Scholar 

  2. Elmaghraby AS, Losavio MM (2014) Cyber security challenges in smart cities: safety, security and privacy. J Adv Res 5(4):491–497

    Article  Google Scholar 

  3. Popescul D, Genete LD (2016) Data security in smart cities: challenges and solutions. Inform Econ 20(1):1–10

    Google Scholar 

  4. Ijaz S, Shah MA, Khan A, Ahmed M (2016) Smart cities: a survey on security concerns. Int J Adv Comput Sci Appl 7(2):612–625

    Google Scholar 

  5. Martínez-Ballesté A, Pérez-Martínez PA, Solanas A (2013) The pursuit of citizens’ privacy: a privacy-aware smart city is possible. IEEE Commun Mag 51(6):136–141

    Article  Google Scholar 

  6. Theodorou S, Sklavos N (2019) Blockchain-based security and privacy in smart cities. In: Smart cities cybersecurity and privacy. Elsevier, pp 21–37

    Google Scholar 

  7. Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145

    Article  Google Scholar 

  8. Zheng S, Apthorpe N, Chetty M, Feamster N (2018) User perceptions of smart home IoT privacy. In: Proceedings of the ACM on human-computer interaction, 2 (CSCW), pp 1–20

    Google Scholar 

  9. Cui L, Xie G, Qu Y, Gao L, Yang Y (2018) Security and privacy in smart cities: challenges and opportunities. IEEE Access 6:46134–46145

    Article  Google Scholar 

  10. Khatoun R, Zeadally S (2017) Cybersecurity and privacy solutions in smart cities. IEEE Commun Mag 55(3):51–59

    Article  Google Scholar 

  11. Braun T, Fung BC, Iqbal F, Shah B (2018) Security and privacy challenges in smart cities. Sustain Cities Soc 39:499–507

    Article  Google Scholar 

  12. Stojkoska BLR, Trivodaliev KV (2017) A review of Internet of Things for smart home: challenges and solutions. J Cleaner Prod 140:1454–1464

    Article  Google Scholar 

  13. Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for IoT security and privacy: the case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops). IEEE, pp 618–623

    Google Scholar 

  14. Hall RE, Bowerman B, Braverman J, Taylor J, Todosow H, Von Wimmersperg U (2000) The vision of a smart city (no. BNL-67902; 04042). Brookhaven National Lab, Upton

    Google Scholar 

  15. Strielkowski W, Veinbender T, Tvaronavičienė M, Lace N (2020) Economic efficiency and energy security of smart cities. Econ Res 33(1):788–803

    Google Scholar 

  16. Efthymiopoulos MP (2016) Cyber-security in smart cities: the case of Dubai. J Innov Entrepreneurship 5(1):11

    Article  Google Scholar 

  17. Sen M, Dutt A, Agarwal S, Nath A (2013) Issues of privacy and security in the role of software in smart cities. In: 2013 International Conference on Communication Systems and Network technologies. IEEE, pp 518–523

    Google Scholar 

  18. Kitchin R, Dodge M (2019) The (in) security of smart cities: vulnerabilities, risks, mitigation, and prevention. J Urban Technol 26(2):47–65

    Article  Google Scholar 

  19. Yoshigoe K, Dai W, Abramson M, Jacobs A (2015, December) Overcoming invasion of privacy in smart home environment with synthetic packet injection. In: 2015 TRON symposium (TRONSHOW). IEEE, pp 1–7

    Google Scholar 

  20. Davidoff S, Lee MK, Yiu C, Zimmerman J, Dey AK (2006, September) Principles of smart home control. In: International conference on ubiquitous computing. Springer, Berlin, pp 19–34

    Google Scholar 

  21. Zhang K, Ni J, Yang K, Liang X, Ren J, Shen XS (2017) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55(1):122–129

    Article  Google Scholar 

  22. Khan Z, Pervez Z, Ghafoor A (2014, December) Towards cloud based smart cities data security and privacy management. In: 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. IEEE, pp 806–811

    Google Scholar 

  23. Biswas K, Muthukkumarasamy V (2016, December) Securing smart cities using blockchain technology. In: 2016 IEEE 18th international conference on high performance computing and communications; IEEE 14th international conference on smart city; IEEE 2nd international conference on data science and systems (HPCC/SmartCity/DSS). IEEE, pp 1392–1393

    Google Scholar 

  24. Ricquebourg V, Menga D, Durand D, Marhic B, Delahoche L, Loge C (2006, December) The smart home concept: our immediate future. In: 2006 1st IEEE international conference on e-learning in industrial electronics. IEEE, pp 23–28

    Google Scholar 

  25. Mendes TD, Godina R, Rodrigues EM, Matias JC, Catalão JP (2015) Smart home communication technologies and applications: wireless protocol assessment for home area network resources. Energies 8(7):7279–7311

    Article  Google Scholar 

  26. Abi Sen AA, Eassa FA, Jambi K (2017, November) Preserving privacy of smart cities based on the fog computing. In: International Conference on Smart Cities, Infrastructure, Technologies and Applications. Springer, Cham, pp 185–191

    Google Scholar 

  27. Gharaibeh A, Salahuddin MA, Hussini SJ, Khreishah A, Khalil I, Guizani M, Al-Fuqaha A (2017) Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun Surv Tutorials 19(4):2456–2501

    Article  Google Scholar 

  28. Thilakarathne NN, Wickramaaarachchi D (2020) Improved hierarchical role based access control model for cloud computing. arXiv:2011.07764

    Google Scholar 

  29. Thilakarathne NN (2020) Security and privacy issues in IoT environment. Int J Eng Manage Res 10:18

    Article  Google Scholar 

  30. Thilakarathne NN, Kagita MK, Gadekallu TR (2020) The role of the Internet of Things in health care: a systematic and comprehensive study. Int J Eng Manage Res 10(4):145–159

    Article  Google Scholar 

  31. Thilakarathne NN, Kagita MK, Priyashan WM (2020) Green Internet of Things for a better world. arXiv:2012.01325

    Google Scholar 

  32. Thilakarathne, N. N., Kagita MK, Lanka D, Ahmad H (2020) Smart grid: a survey of architectural elements, machine learning and deep learning applications and future directions. arXiv:2010.08094

    Google Scholar 

  33. Kagita MK, Thilakarathne N, Rajput DS, Lanka DS (2020) A detail study of security and privacy issues of Internet of Things. arXiv:2009.06341

    Google Scholar 

  34. Kagita MK, Thilakarathne N, Gadekallu TR, Maddikunta PKR (2020) A review on security and privacy of internet of medical things. arXiv:2009.05394

    Google Scholar 

  35. Thilakarathne NN, Kagita MK, Gadekallu TR, Maddikunta PKR (2020) The adoption of ICT powered healthcare technologies towards managing global pandemics. arXiv:2009.05716

    Google Scholar 

  36. Kagita MK, Thilakarathne N, Gadekallu TR, Maddikunta PKR, Singh S (2020) A review on cyber crimes on the Internet of Things. arXiv:2009.05708

    Google Scholar 

  37. Kim TH, Ramos C, Mohammed S (2017) Smart city and IoT. Future Gener Comput Syst 76:159–162

    Article  Google Scholar 

  38. Angelidou M (2017) The role of smart city characteristics in the plans of fifteen cities. J Urban Technol 24(4):3–28

    Article  Google Scholar 

  39. Sharma PK, Park JH (2018) Blockchain based hybrid network architecture for the smart city. Futur Gener Comput Syst 86:650–655

    Article  Google Scholar 

  40. Eremia M, Toma L, Sanduleac M (2017) The smart city concept in the 21st century. Proc Eng 181:12–19

    Article  Google Scholar 

  41. Hashem IAT, Chang V, Anuar NB, Adewole K, Yaqoob I, Gani A, Chiroma H (2016) The role of big data in smart city. Int J Inf Manage 36(5):748–758

    Article  Google Scholar 

  42. Lacinák M, Ristvej J (2017) Smart city, safety and security. Proc Eng 192:522–527

    Article  Google Scholar 

  43. Eckhoff D, Wagner I (2017) Privacy in the smart city—applications, technologies, challenges, and solutions. IEEE Commun Surv Tutorials 20(1):489–516

    Article  Google Scholar 

  44. Laufs J, Borrion H, Bradford B (2020) Security and the smart city: a systematic review. Sustain Cities Soc 55:102023

    Article  Google Scholar 

  45. Smart cities: acceleration, technology, cases and evolutions in the smart city (2020, August 28) https://www.i-scoop.eu/internet-of-things-guide/smart-cities-smart-city/. Accessed 8 Dec 2020

  46. Written by Anat Koren September 16 (n.d.) The biggest smart city security challenges in 2019. https://blog.mobility.here.com/smart-city-challenges. Accessed 8 Dec 2020

  47. Nelson O (2019, August) Smart city security. https://cyberexperts.com/smart-city-security/. Accessed 8 Dec 2020

  48. The Importance of Smart City Security (2018, June 22). https://safesmart.city/en/importance-smart-city-security/. Accessed 8 Dec 2018

  49. Smart Cities Need Smarter Security (2019, October 08). https://www.cisecurity.org/blog/smart-cities-need-smarter-security/. Accessed 8 Dec 2020

  50. PricewaterhouseCoopers (n.d.) Smart cities: five smart steps to cybersecurity. https://www.pwc.com/us/en/services/consulting/cybersecurity/library/broader-perspectives/smart-cities.html. Accessed 8 Dec 2020

  51. The search engine for the Internet of Things (n.d.). https://www.shodan.io/. Accessed 10 Dec 2020

  52. Offensive Security’s Exploit Database Archive (n.d.). https://www.exploit-db.com/google-hacking-database. Accessed 10 Dec 2020

  53. Yaqoob I, Ahmed E, Hashem IAT, Ahmed AIA, Gani A, Imran M, Guizani M (2017) Internet of Things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Commun 24(3):10–16

    Article  Google Scholar 

  54. Moy de Vitry M, Schneider MY, Wani OF, Manny L, Leitão JP, Eggimann S (2019) Smart urban water systems: what could possibly go wrong? Environ Res Lett 14(8):081001

    Article  Google Scholar 

  55. Your fridge is full of SPAM: proof of an IoT-driven attack: proofpoint US (2018, December 14) https://www.proofpoint.com/us/threat-insight/post/Your-Fridge-is-Full-of-SPAM. Accessed 10 Dec 2020

  56. Bracken A, Bracken B (n.d.) Lax security exposes smart-irrigation systems to attack across the globe. https://threatpost.com/lax-security-smart-irrigation-attack/160625/. Accessed 10 Dec 2020

  57. Wen M, Lei J, Bi Z (2013) SSE: a secure searchable encryption scheme for urban sensing and querying. Int J Distrib Sens Netw 9(12):302147

    Article  Google Scholar 

  58. Suciu G, Vulpe A, Halunga S, Fratu O, Todoran G, Suciu V (2013, May) Smart cities built on resilient cloud computing and secure Internet of Things. In: 2013 19th international conference on control systems and computer science. IEEE, pp 513–518

    Google Scholar 

  59. Galdon-Clavell G (2013) (Not so) smart cities?: the drivers, impact and risks of surveillance-enabled smart environments. Sci Public Policy 40(6):717–723

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Navod Neranjan Thilakarathne .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thilakarathne, N.N., Madhuka Priyashan, W.D. (2022). An Overview of Security and Privacy in Smart Cities. In: Nath Sur, S., Balas, V.E., Bhoi, A.K., Nayyar, A. (eds) IoT and IoE Driven Smart Cities. EAI/Springer Innovations in Communication and Computing. Springer, Cham. https://doi.org/10.1007/978-3-030-82715-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-82715-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-82714-4

  • Online ISBN: 978-3-030-82715-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics