Skip to main content

Advertisement

Log in

Security and privacy issues in smart cities/industries: technologies, applications, and challenges

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The development of the Internet of things (IoT) is rapidly growing everywhere in our daily lives. Advanced information and communication technologies play a vital role in the development of smart cities/industries, including buildings, hospitals, transportation, and other related public and private environments. The emerging technologies are converging as a computing paradigm to optimize resource allocation dynamically to improve the quality of services. The deployment of interconnected devices uses heterogeneous networks and powerful data centers to perform ubiquitous sensing, which can collect and transfer real-time data to offer computational intelligence. Moreover, sustainable resources such as devices, networks, and databases are intellectually equipped to standardize governance and service deliveries. The sustainable environment has a network infrastructure to collect, store, and analyze real-time data to provide an efficient decision-making process. IoT-enabled smart sustainable environments integrate advanced technologies to build people-centric smart cities and industries. Most service intelligence and technical schemas are easily accessible and applicable to authorize the scope of civic intelligence. However, the potential issues such as security and privacy are open to deal with the challenges of security requirements. A thematic classification of security and privacy issues is primarily focused on authentication and key management protocols to secure Industrial IoT environments. To highlight the potential visions of the smart cities/industries, in this survey, numerous security threats, techniques, countermeasures, and tools are reviewed to address the key challenges of smart service intelligence within sustainable environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig.7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Ahmed ME, Kim H (2017) DDoS attack mitigation in internet of things using software-defined networking. In: 2017 IEEE third international conference on big data computing service and applications (BigDataService). IEEE, pp 271–276

  • Akbar A, Kousiouris G, Pervaiz H, Sancho J, Ta-Shma P, Carrez F, Moessner K (2018) Real-time probabilistic data fusion for large-scale IoT applications. IEEE Access 6:10015–10027

    Google Scholar 

  • Alaba FA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things security: a survey. J Netw Comput Appl 88:10–28

    Google Scholar 

  • Al-Ghaili AM, Kasim H, Othman M, Hashim W (2020) QR code based authentication method for IoT applications using three security layers. Telkomnika 18(4):2004–2011

    Google Scholar 

  • Alomair B, Poovendran R (2014) Efficient authentication for mobile and pervasive computing. IEEE Trans Mob Comput 13(3):469–481

    Google Scholar 

  • Alotaibi SS (2018) Registration center-based user authentication scheme for smart e-governance applications in smart cities. IEEE Access 7:5819–5833

    Google Scholar 

  • Al-Turjman F, Ever YK, Ever E, Nguyen HX, David DB (2017) Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks. IEEE Access 5:24617–24631

    Google Scholar 

  • Al-Turjman F, Nawaz MH, Ulusar UD (2020) Intelligence in the Internet of medical things era: a systematic review of current and future trends. Comput Commun 150:644–660

    Google Scholar 

  • Al‐Turjman F, Zahmatkesh H, Shahroze R (2019) An overview of security and privacy in smart cities' IoT communications. Trans Emerg Telecommun Technol e3677

  • Amin R, Biswas GP (2016) A secure lightweight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks. Ad Hoc Netw 36:58–80

    Google Scholar 

  • Amin R, Kumar N, Biswas GP, Iqbal R, Chang V (2018) A lightweight authentication protocol for IoT-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019

    Google Scholar 

  • Analytics I (2014) Why the Internet of things is called internet of things: definition, history, disambiguation

  • Anttiroiko AV (ed) (2008) Electronic government: concepts, methodologies, tools, and applications: concepts, methodologies, tools, and applications, vol 3. IGI Global

  • Appio FP, Lima M, Paroutis S (2019) Understanding smart cities: innovation ecosystems, technological advancements, and societal challenges. Technol Forecast Soc Change 142:1–14

    Google Scholar 

  • Armando A, Basin D, Cuellar J, Rusinowitch M, Viganò L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64(January)

  • Astill J, Dara RA, Fraser ED, Roberts B, Sharif S (2020) Smart poultry management: smart sensors, big data, and the Internet of things. Comput Electron Agric 170:105291

    Google Scholar 

  • Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 5415:2787–2805

    MATH  Google Scholar 

  • Banoth R, Arunakranthi G, Vachhani P, Kalaria S, Rathod R (2021) Implementation and mitigation for cyber attacks with proposed OCR process model. NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO, 2149–2160

  • Batty M, Axhausen KW, Giannotti F, Pozdnoukhov A, Bazzani A, Wachowicz M, Portugali Y (2012) Smart cities of the future. Eur Phys J Spec Top 214(1):481–518

    Google Scholar 

  • Bassi A, Bauer M, Fiedler M, Kramp T, van Kranenburg R, Lange S, Meissner S (eds) (2013) Enabling things to talk: designing IoT solutions with the IoT architectural reference model. Springer

  • Bibri SE, Krogstie J (2017) Smart sustainable cities of the future: an extensive interdisciplinary literature review. Sustain Cities Soc 31:183–212

    Google Scholar 

  • Biggs J (2020) BrickerBot is a vigilante worm that destroys insecure IoT devices. https://techcrunch.com/2017/04/25/brickerbot-is-a-vigilante-worm-that-destroys-insecure-iot-devices/. Accessed June 2020

  • Blanchet B, Cheval V, Allamigeon X, Smyth B (2010) ProVerif: cryptographic protocol verifier in the formal model

  • Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial Version from, 05–16

  • Braun T, Fung BC, Iqbal F, Shah B (2018) Security and privacy challenges in smart cities. Sustain Cities Soc 39:499–507

    Google Scholar 

  • Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271

    MathSciNet  MATH  Google Scholar 

  • Butt TA, Afzaal M (2019) Security and privacy in smart cities: issues and current solutions. In: Al-Masri A, Curran K (eds) Smart technologies and innovation for a sustainable future. Advances in science, technology & innovation (IEREK interdisciplinary series for sustainable development). Springer, Cham. https://doi.org/10.1007/978-3-030-01659-3_37

    Chapter  Google Scholar 

  • Cahyadi EF, Yang CY, Wu NI, Hwang MS (2021) The study on the key management and billing for wireless sensor networks. Int J Netw Secur 23(6):937–951

    Google Scholar 

  • Cardullo P, Kitchin R (2019) Being a “citizen” in the smart city: up and down the scaffold of smart citizen participation in Dublin, Ireland. GeoJournal 84(1):1–13

    Google Scholar 

  • Chaabouni N, Mosbah M, Zemmari A, Sauvignac C, Faruki P (2019) Network intrusion detection for IoT security based on learning techniques. IEEE Commun Surv Tutor 21(3):2671–2701

    Google Scholar 

  • Chahal RK, Kumar N, Batra S (2020) Trust management in social Internet of Things: a taxonomy, open issues, and challenges. Comput Commun 150:13–46

    Google Scholar 

  • Chai HS, Choi JY, Jeong J (2015) An enhanced secure mobility management scheme for building IoT applications. In: FNC/MobiSPC. pp 586–591

  • Challa S, Wazid M, Das AK, Kumar N, Reddy AG, Yoon EJ, Yoo KY (2017) Secure signature-based authenticated key establishment scheme for future IoT applications. IEEE Access 5:3028–3043

    Google Scholar 

  • Chan ACF, Zhou J (2014) Cyber-physical device authentication for the smart grid electric vehicle ecosystem. IEEE J Sel Areas Commun 32(7):1509–1517

    Google Scholar 

  • Chang IP, Lee TF, Lin TH, Liu CM (2015) Enhanced two-factor authentication and key agreement using dynamic identities in wireless sensor networks. Sensors 15(12):29841–29854

    Google Scholar 

  • Chatterjee S, Nandan M, Ghosh A, Banik S (2022) DTNMA: identifying routing attacks in delay-tolerant network. In: Tavares JMRS, Dutta P, Dutta S, Samanta D (eds) Cyber intelligence and information retrieval. Lecture notes in networks and systems, vol 291. Springer, Singapore. https://doi.org/10.1007/978-981-16-4284-5_1

    Chapter  Google Scholar 

  • Chaturvedi K, Kolbe TH (2019) Towards establishing cross-platform interoperability for sensors in smart cities. Sensors 19(3):562

    Google Scholar 

  • Chen Y, Chen J (2021) A secure three-factor-based authentication with key agreement protocol for e-Health clouds. J Supercomput 77(4):3359–3380

    Google Scholar 

  • Chen K, Zhang S, Li Z, Zhang Y, Deng Q, Ray S, Jin Y (2018) Internet-of-things security and vulnerabilities: taxonomy, challenges, and practice. J Hardw Syst Secur 2(2):97–110

    Google Scholar 

  • Chin J, Callaghan V, Allouch SB (2019) The internet-of-things: reflections on the past, present and future from a user-centered and smart environment perspective. J Ambient Intell Smart Environ 11(1):45–69

    Google Scholar 

  • Choi YJ, Kang HJ, Lee IG (2019) Scalable and secure internet of things connectivity. Electronics 8(7):752

    Google Scholar 

  • Chourabi H, Nam T, Walker S, Gil-Garcia JR, Mellouli S, Nahon K, Scholl HJ (2012) Understanding smart cities: an integrative framework. In: 2012 45th Hawaii international conference on system sciences. IEEE, pp 2289–2297

  • Clarke R (1994) Human identification in information systems. Information Technology & People

  • Cremers CJ (2008) The Scyther tool: verification, falsification, and analysis of security protocols. In: International conference on computer-aided verification. Springer, Berlin, pp 414–418

  • Cui L, Xie G, Qu Y, Gao L, Yang Y (2018a) Security and privacy in smart cities: challenges and opportunities. IEEE Access 6:46134–46145

    Google Scholar 

  • Cui J, Zhang Z, Li H, Sui R (2018b) An improved user authentication protocol for IoT. In: 2018 international conference on cyber-enabled distributed computing and knowledge discovery (CyberC). IEEE, pp 59–593

  • Da Xu L, He W, Li S (2014) Internet of things in industries: a survey. IEEE Trans Ind Inform 10(4):2233–2243

    Google Scholar 

  • Danny T (2017) MFA (Multi-Factor Authentication) with biometrics. https://www.bayometric.com/mfa-multi-factor-authentication-biometrics/ Accessed June 2020

  • Das AK, Sutrala AK, Kumari S, Odelu V, Wazid M, Li X (2016) An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks. Secur Commun Netw 9(13):2070–2092

    Google Scholar 

  • David DB (2017) Mutual authentication scheme for multimedia medical information systems. Multimed Tools Appl 76(8):10741–10759

    Google Scholar 

  • Deakin M, Al Waer H (2011) From intelligent to smart cities. Intell Build Int 3(3):140–152

    Google Scholar 

  • Deebak BD (2020) Lightweight authentication and key management in mobile-sink for smart IoT-assisted systems. Sustain Cities Soc 63:102416

    Google Scholar 

  • Deebak BD, Al-Turjman F (2020) A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw 97:102022

    Google Scholar 

  • Deebak BD, Al-Turjman F (2021) Secure-user sign-in authentication for IoT-based eHealth systems. Complex Intell Syst 1–21

  • Deebak BD, Al-Turjman F, Mostarda L (2020) Seamless secure anonymous authentication for cloud-based mobile edge computing. Comput Electr Eng 87:106782

    Google Scholar 

  • Deebak BD, Al-Turjman F, Nayyar A (2021) Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care. Multimed Tools Appl 80(11):17103–17128

    Google Scholar 

  • Department of Economic and Social Affairs (2014) World Urbanization Prospects: the 2014 revision, highlights. United Nations Population Division, New York

  • Devarakonda S, Halgamuge MN, Mohammad A (2019) Critical issues in the invasion of the Internet of Things (IoT): security, privacy, and other vulnerabilities. In: Kaur G, Tomar P (eds) Handbook of research on big data and the IoT. IGI Global, pp 174–196. https://doi.org/10.4018/978-1-5225-7432-3.ch010

    Chapter  Google Scholar 

  • Diane Vautier (2019) Smart Security for Smart cities. https://www.globalsign.com/en/blog/smart-security-for-smart-cities. Accessed May 2019.

  • Distefano S, Longo F, Scarpa M (2015) QoS assessment of mobile crowdsensing services. J Grid Comput 13(4):629–650

    Google Scholar 

  • Dolev D, Yao A (1983) On the security of public-key protocols. IEEE Trans Inf Theory 29(2):198–208

    MathSciNet  MATH  Google Scholar 

  • Dora JR, Nemoga K (2021) Clone node detection attacks and mitigation mechanisms in static wireless sensor networks. J Cybersecur Priv 1(4):553–579

    Google Scholar 

  • Eckhoff D, Wagner I (2017) Privacy in the smart city—applications, technologies, challenges, and solutions. IEEE Commun Surv Tutor 20(1):489–516

    Google Scholar 

  • Eggers WD, Skowron J (2020) Forces of change: amart cities. https://www2.deloitte.com/insights/us/en/focus/smart-city/overview.html. Accessed June 2020.

  • El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A (2019) A survey of internet of things (IoT) authentication schemes. Sensors 19(5):1141

    Google Scholar 

  • Fadi AT, David DB (2020) Seamless authentication: for IoT-big data technologies in smart industrial application systems. IEEE Trans Ind Inform 17:2919–2927

    Google Scholar 

  • Fan K, Gong Y, Liang C, Li H, Yang Y (2016) Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur Commun Netw 9(16):3095–3104

    Google Scholar 

  • Fan K, Song P, Yang Y (2017) ULMAP: ultralightweight NFC mutual authentication protocol with pseudonyms in the tag for IoT in 5G. Mob Inf Syst 2017:2349149

    Google Scholar 

  • Far HAN, Bayat M, Das AK, Fotouhi M, Pournaghi SM, Doostari MA (2021) LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT. Wirel Netw 27(2):1389–1412

    Google Scholar 

  • Farahat IS, Tolba AS, Elhoseny M, Eladrosy W (2019) Data security and challenges in smart cities. In: Hassanien A, Elhoseny M, Ahmed S, Singh A (eds) Security in smart cities: models, applications, and challenges. Lecture notes in intelligent transportation and infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-01560-2_6

    Chapter  Google Scholar 

  • Ferrag MA, Maglaras LA, Janicke H, Jiang J, Shu L (2017) Authentication protocols for the internet of things: a comprehensive survey. Secur Commun Netw 2017:6562953

    Google Scholar 

  • Foukia N, Billard D, Solana E (2016) PISCES: a framework for privacy by design in IoT. In: 2016 14th annual conference on privacy, security and trust (PST). IEEE, pp 706–713

  • Garcia-Carrillo D, Marin-Lopez R (2018) Multihop bootstrapping with EAP through COAP intermediaries for IoT. IEEE Internet Things J 5(5):4003–4017

    Google Scholar 

  • Garcia-Font V, Garrigues C, Rifà-Pous H (2017) Attack classification schema for smart city WSNs. Sensors 17(4):771

    Google Scholar 

  • Ghahramani M, Javidan R, Shojafar M (2020) A secure biometric-based authentication protocol for global mobility networks in smart cities. J Supercomput 1–27

  • Ghani A, Mansoor K, Mehmood S, Chaudhry SA, Rahman AU, Najmus Saqib M (2019) Security and key management in IoT-based wireless sensor networks: an authentication protocol using symmetric key. Int J Commun Syst 32(16):e4139

    Google Scholar 

  • Gharaibeh A, Salahuddin MA, Hussini SJ, Khreishah A, Khalil I, Guizani M, Al-Fuqaha A (2017) Smart cities: a survey on data management, security, and enabling technologies. IEEE Commun Surv Tutor 19(4):2456–2501

    Google Scholar 

  • Ghazal TM (2021) Internet of things with artificial intelligence for health care security. Arab J Sci Eng 1–12

  • Gil D, Johnsson M, Mora H, Szymański J (2019) Review of the complexity of managing big data of the internet of things. Complexity 2019:1–12

    Google Scholar 

  • Gope P, Sikdar B (2018) Lightweight and privacy-preserving two-factor authentication scheme for IoT devices. IEEE Internet Things J 6(1):580–589

    Google Scholar 

  • Gope P, Amin R, Islam SH, Kumar N, Bhalla VK (2018a) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for a smart city environment. Future Gener Comput Syst 83:629–637

    Google Scholar 

  • Gope P, Lee J, Quek TQ (2018b) Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Trans Inf Forensics Secur 13(11):2831–2843

    Google Scholar 

  • Grammatikis PIR, Sarigiannidis PG, Moscholios ID (2019) Securing the internet of things: challenges, threats and solutions. Internet Things 5:41–70

    Google Scholar 

  • Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Future Gener Comput Syst 29(7):1645–1660

    Google Scholar 

  • Gupta A, Tripathi M, Shaikh TJ, Sharma A (2019) A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput Netw 149:29–42

    Google Scholar 

  • Habeeb RAA, Nasaruddin F, Gani A, Hashem IAT, Ahmed E, Imran M (2019) Real-time big data processing for anomaly detection: a survey. Int J Inf Manag 45:289–307

    Google Scholar 

  • Habibzadeh H, Soyata T, Kantarci B, Boukerche A, Kaptan C (2018) Sensing, communication and security planes: a new challenge for a smart city system design. Comput Netw 144:163–200

    Google Scholar 

  • Habibzadeh H, Kaptan C, Soyata T, Kantarci B, Boukerche A (2019) Smart city system design: a comprehensive study of the application and data planes. ACM Comput Surv (CSUR) 52(2):1–38

    Google Scholar 

  • Hammi B, Fayad A, Khatoun R, Zeadally S, Begriche Y (2020) A lightweight ECC-based authentication scheme for Internet of things (IoT). IEEE Syst J 14:3440–3450

    Google Scholar 

  • Haseeb K, Almogren A, Ud Din I, Islam N, Altameem A (2020) SASC: secure and authentication-based sensor cloud architecture for intelligent internet of things. Sensors 20(9):2468

    Google Scholar 

  • He W, Golla M, Padhi R, Ofek J, Dürmuth M, Fernandes E, Ur B (2018) Rethinking access control and authentication for the home internet of things (IoT). In: 27th {USENIX} security symposium {USENIX} security. USENIX, Baltimore, MD, pp 255–272

    Google Scholar 

  • Heartfield R, Loukas G (2015) A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks. ACM Comput Surv (CSUR) 48(3):1–39

    Google Scholar 

  • Hernandez-Castro JC, Tapiador JM, Peris-Lopez P, Quisquater JJ (2008) Cryptanalysis of the SASI ultralightweight RFID authentication protocol with modular rotations. arXiv preprint arXiv:0811.4257

  • Hernandez-Castro JC, Peris-Lopez P, Phan RCW, Tapiador JM (2010) Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol. In: International workshop on radio frequency identification: security and privacy issues. Springer, Berlin, pp 22–34

  • Hodo E, Bellekens X, Hamilton A, Tachtatzis C, Atkinson R (2017) Shallow and deep networks intrusion detection system: a taxonomy and survey. arXiv preprint arXiv:1701.02145

  • Hu VC, Ferraiolo D, Kuhn R, Friedman AR, Lang AJ, Cogdell MM, Scarfone K (2013) Guide to attribute-based access control (abac) definition and considerations (draft). NIST Spec Publ 800(162):1–54

    Google Scholar 

  • Iqbal MA, Olaleye OG, Bayoumi MA (2017) A review on internet of things (IoT): security and privacy requirements and the solution approaches. Glob J Comput Sci Technol 16(7):1–9

    Google Scholar 

  • Jan MA, Nanda P, He X, Tan Z, Liu RP (2014) A robust authentication scheme for observing resources in the internet of things environment. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications. IEEE, pp 205–211

  • Jeschke S, Brecher C, Song H, Rawat DB (eds) (2016) Industrial Internet of Things: cybermanufacturing systems. Springer

  • Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392

    Google Scholar 

  • Jiang Y, Yin S, Kaynak O (2018) Data-driven monitoring and safety control of industrial cyber-physical systems: basics and beyond. IEEE Access 6:47374–47384

    Google Scholar 

  • Jiang Q, Zhang X, Zhang N, Tian Y, Ma X, Ma J (2021) Three-factor authentication protocol using physical unclonable function for IoV. Comput Commun 173:45–55

    Google Scholar 

  • Jin J, Gubbi J, Marusic S, Palaniswami M (2014) An information framework for creating a smart city through internet of things. IEEE Internet Things J 1(2):112–121

    Google Scholar 

  • Jurcut AD, Ranaweera P, Xu L (2020) Introduction to IoT security. IoT Secur Adv Authentication 27–64

  • Kalra S, Sood SK (2015) Secure authentication scheme for IoT and cloud servers. Pervasive Mob Comput 24:210–223

    Google Scholar 

  • Kashyap S (2019) 10 real world applications of internet of things (IoT). https://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-internet-of-things-iot/. Accessed May 2019

  • Khalid M, Mujahid U, Park H, Najam-ul-Islam M (2019) Cryptanalysis of the ultralightweight MAC protocol. In: 2019 13th international conference on open source systems and technologies (ICOSST). IEEE, pp 1–4

  • Khan R, Khan SU, Zaheer R, Khan S (2012) Future Internet the Internet of things architecture, possible applications and key challenges. In: 2012 10th international conference on frontiers of information technology. IEEE, pp 257–260

  • Korba AA, Nafaa M, Salim G (2013) Survey of routing attacks and countermeasures in mobile ad hoc networks. In: 2013 UK Sim 15th international conference on computer modelling and simulation. IEEE, pp 693–698

  • Kraijak S, Tuwanut P (2015) A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends

  • Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428–6453

    Google Scholar 

  • Lalli M, Graphy GS (2017) Prediction based dual authentication model for VANET. In: 2017 international conference on computing methodologies and communication (ICCMC). IEEE, pp 693–699

  • Lee C, Wang C, Kim E, Helal S (2017) Blueprint flow: a declarative service composition framework for cloud applications. IEEE Access 5:17634–17643

    Google Scholar 

  • Lee J, Yu S, Park K, Park Y, Park Y (2019) Secure three-factor authentication protocol for multi-gateway IoT environments. Sensors 19(10):2358

    Google Scholar 

  • Li H, Lu R, Zhou L, Yang B, Shen X (2013) An efficient Merkle-tree-based authentication scheme for smart grid. IEEE Syst J 8(2):655–663

    Google Scholar 

  • Li Q, Dou R, Chen F, Nan G (2014) A QoS-oriented Web service composition approach based on a multi-population genetic algorithm for Internet of things. Int J Comput Intell Syst 7(sup2):26–34

    Google Scholar 

  • Li W, Song H, Zeng F (2017) Policy-based secure and trustworthy sensing for Internet of things in smart cities. IEEE Internet Things J 5(2):716–723

    Google Scholar 

  • Li D, Aung Z, Williams JR, Sanchez A (2012) Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis. In: 2012 IEEE PES innovative smart grid technologies (ISGT). IEEE, pp 1–8

  • Li Y, Lin Y, Geertman S (2015) The development of smart cities in China. In: Proceedings of the 14th international conference on computers in urban planning and urban management. AESOP, Massachusetts USA, pp 7–10

    Google Scholar 

  • Li W, Li B, Zhao Y, Wang P, Wei F (2018a) Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks. Wirel Commun Mob Comput 2018:8539674

    Google Scholar 

  • Li D, Peng W, Deng W, Gai F (2018b) A blockchain-based authentication and security mechanism for IoT. In: 2018 27th international conference on computer communication and networks (ICCCN). IEEE, pp 1–6

  • Li C, Ji X, Zhou X, Zhang J, Tian J, Zhang Y, Xu W (2018c) HlcAuth: key-free and secure communications via home-limited channel. In: Proceedings of the 2018 on Asia conference on computer and communications security. ASIACCS’18, Incheon, Republic of Korea, pp 29–35

  • Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on Internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142

    Google Scholar 

  • Liu W, Liu H, Wan Y, Kong H, Ning H (2016) The yoking-proof-based authentication protocol for cloud-assisted wearable devices. Pers Ubiquit Comput 20(3):469–479

    Google Scholar 

  • Liu J, Yu Y, Jia J, Wang S, Fan P, Wang H, Zhang H (2019) Lattice-based double-authentication-preventing ring signature for security and privacy in vehicular Ad-Hoc networks. Tsinghua Sci Technol 24(5):575–584

    Google Scholar 

  • Lloyd E, Ibbotson G, Pournouri S (2021) An Investigation into the impact Covid-19 has had on the cyber threat landscape and remote working for UK Organizations. In: Information security technologies for controlling pandemics. Springer, Cham, pp 151–170

  • Lohachab A, Lohachab A, Jangra A (2020) A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks. Internet Things 9:100174

    Google Scholar 

  • Luo E, Bhuiyan MZA, Wang G, Rahman MA, Wu J, Atiquzzaman M (2018) Privacy protector: privacy-protected patient data collection in IoT-based healthcare systems. IEEE Commun Mag 56(2):163–168

    Google Scholar 

  • Mabkhot MM, Al-Ahmari AM, Salah B, Alkhalefah H (2018) Requirements of the smart factory system: a survey and perspective. Machines 6(2):23

    Google Scholar 

  • Mahmood Z (ed) (2020) Connected vehicles in the internet of things: concepts, technologies, and frameworks for the IoV. Springer Nature, Berlin

    Google Scholar 

  • Malhi AK, Batra S, Pannu HS (2020) Security of vehicular ad-hoc networks: a comprehensive survey. Comput Secur 89:101664

    Google Scholar 

  • Maresch D, Gartner J (2018) Make disruptive technological change happen—the case of additive manufacturing. Technol Forecast Soc Change 155:119216

    Google Scholar 

  • Martínez JA, Hernández-Ramos JL, Beltrán V, Skarmeta A, Ruiz PM (2017) A user-centric internet of things platform to empower users for managing security and privacy concerns in the internet of energy. Int J Distrib Sens Netw 13(8):1550147717727974

    Google Scholar 

  • Masters G (2020) New IoT bot Persirai ensnaring IP cameras. https://www.scmagazineuk.com/new-iot-bot-persirai-ensnaring-ip-cameras/article/1474692. Accessed June 2020

  • McAfee (2017) McAfee Labs Threats Report; Technical Report; McAfee: Santa Clara

  • Merabet F, Cherif A, Belkadi M, Blazy O, Conchon E, Sauveron D (2020) New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications. Peer Peer Netw Appl 13(2):439–474

    Google Scholar 

  • Miettinen M, Nguyen TD, Sadeghi AR, Asokan N (2018) Revisiting context-based authentication in IoT. In: Proceedings of the 55th annual design automation conference. IEEE, San Francisco, CA, USA, pp 1–6

    Google Scholar 

  • Ming Y, Cheng H (2019) Efficient certificateless conditional privacy-preserving authentication scheme in VANETs. Mob Inf Syst 2019:7593138

    Google Scholar 

  • Mohsin JK, Han L, Hammoudeh M, Hegarty R (2017) Two factor vs multi-factor, an authentication battle in mobile cloud computing environments. In: Proceedings of the international conference on future networks and distributed systems. ACM, NY, US, pp 1–10

    Google Scholar 

  • Montori F, Bedogni L, Bononi L (2017) A collaborative internet of things architecture for smart cities and environmental monitoring. IEEE Internet Things J 5(2):592–605

    Google Scholar 

  • Moustaka V, Theodosiou Z, Vakali A, Kounoudes A, Anthopoulos LG (2019) Εnhancing social networking in smart cities: privacy and security borderlines. Technol Forecast Soc Change 142:285–300

    Google Scholar 

  • Mujahid U, Najam-ul-Islam M, Khalid M (2018) Efficient hardware implementation of KMAP+: an ultralightweight mutual authentication protocol. J Circuits Syst Comput 27(02):1850033

    Google Scholar 

  • Mujahid U, Unabia G, Choi H, Tran B (2020) A review of ultralightweight mutual authentication protocols. Int J Electr Comput Eng 14(4):96–101

    Google Scholar 

  • Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun Surv Tutor 15(4):2027–2045

    Google Scholar 

  • Nam T, Pardo TA (2011) Conceptualizing smart city with dimensions of technology, people, and institutions. In: Proceedings of the 12th annual international digital government research conference: digital government innovation in challenging times. ACM, NY, US, pp 282–291

    Google Scholar 

  • Naranjo PGV, Pooranian Z, Shojafar M, Conti M, Buyya R (2019) FOCAN: a Fog-supported smart city network architecture for management of applications in the internet of everything environments. J Parallel Distrib Comput 132:274–283

    Google Scholar 

  • Newaz AKM, Sikder AK, Rahman MA, Uluagac AS (2020) A survey on security and privacy issues in modern healthcare systems: attacks and defenses. arXiv preprint arXiv:2005.07359

  • Nicanfar H, Jokar P, Leung VC (2011) Smart grid authentication and key management for unicast and multicast communications. In: 2011 IEEE PES innovative smart grid technologies. IEEE, pp 1–8

  • Nikravan M, Reza A (2020) A multi-factor user authentication and key agreement protocol based on bilinear pairing for the Internet of Things. Wirel Pers Commun 111(1):463–494

    Google Scholar 

  • Ometov A, Bezzateev S, Mäkitalo N, Andreev S, Mikkonen T, Koucheryavy Y (2018) Multi-factor authentication: a survey. Cryptography 2(1):1

    Google Scholar 

  • Ometov A, Petrov V, Bezzateev S, Andreev S, Koucheryavy Y, Gerla M (2019) Challenges of multi-factor authentication for securing advanced IoT applications. IEEE Netw 33(2):82–88

    Google Scholar 

  • Ostad-Sharif A, Arshad H, Nikooghadam M, Abbasinezhad-Mood D (2019) Three-party, secure data transmission in IoT networks through design of a lightweight, authenticated key agreement scheme. Future Gener Comput Syst 100:882–892

    Google Scholar 

  • Park Y, Park Y (2016) Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 16(12):2123

    Google Scholar 

  • Paul A, Jeyaraj R (2019) Internet of things: a primer. Hum Behav Emerg Technol 1(1):37–47

    Google Scholar 

  • Pellicer S, Santa G, Bleda AL, Maestre R, Jara AJ, Skarmeta AG (2013) A global perspective of smart cities: a survey. In: 2013 seventh international conference on innovative mobile and internet services in ubiquitous computing. IEEE, pp 439–444

  • Perera P, Patel VM (2019) Deep transfer learning for multiple class novelty detection. In: Proceedings of the IEEE conference on computer vision and pattern recognition. IEEE, Long Beach, CA, USA, pp 11544–11552

    Google Scholar 

  • Phan RCW (2008) Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans Dependable Secur Comput 6(4):316–320

    Google Scholar 

  • Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M (2014) PauthKey: a pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. Int J Distrib Sens Netw 10(7):357430

    Google Scholar 

  • Qin W, Chen S, Peng M (2020) Recent advances in industrial internet: insights and challenges. Digit Commun Netw 6(1):1–13

    Google Scholar 

  • Radu AI, Garcia FD (2016) LeiA: a lightweight authentication protocol for CAN. In: European symposium on research in computer security. Springer, Cham, pp 283–300

  • Ragab A, Selim G, Wahdan A, Madani A (2019) Robust hybrid lightweight cryptosystem for protecting IoT smart devices. In: International conference on security, privacy and anonymity in computation, communication and storage. Springer, Cham, pp 5–19

  • Rao V, Prema KV (2019) Lightweight hashing method for user authentication in internet-of-things. Ad Hoc Netw 89:97–106

    Google Scholar 

  • Raza U, Kulkarni P, Sooriyabandara M (2017) Low power wide area networks: an overview. IEEE Commun Surv Tutor 19(2):855–873

    Google Scholar 

  • Reddy AG, Suresh D, Phaneendra K, Shin JS, Odelu V (2018) Provably secure pseudo-identity based device authentication for smart cities environment. Sustain Cities Soc 41:878–885

    Google Scholar 

  • Rekik M, Meddeb-Makhlouf A, Zarai F, Obaidat MS (2017) Improved dual authentication and key management techniques in vehicular ad hoc networks. In: 2017 IEEE/ACS 14th international conference on computer systems and applications (AICCSA). IEEE, pp 1133–1140

  • Robert J, Kubler S, Kolbe N, Cerioni A, Gastaud E, Främling K (2017) Open IoT ecosystem for enhanced interoperability in smart cities—example of Métropole De Lyon. Sensors 17(12):2849

    Google Scholar 

  • Roberts B, Akkaya K, Bulut E, Kisacikoglu M (2017) An authentication framework for electric vehicle-to-electric vehicle charging applications. In: 2017 IEEE 14th international conference on mobile ad hoc and sensor systems (MASS). IEEE, pp 565–569

  • Roggema R (2020) The convenient city: smart urbanism for a resilient city. In: Data-driven multivalence in the built environment. Springer, Cham, pp 37–55

  • Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698

    Google Scholar 

  • Rouse M (2018) IoT Security (Internet of things Security). https://internetofthingsagenda.techtarget.com/definition/IoT-security-Internet-of-Things-security. Accessed June 2020

  • Sabri C, Kriaa L, Azzouz SL (2017) Comparison of IoT constrained devices operating systems: a survey. In: 2017 IEEE/ACS 14th international conference on computer systems and applications (AICCSA). IEEE, pp 369–375

  • Safkhani M, Bagheri N (2016) Generalized desynchronization attack on UMAP: application to RCIA, KMAP, SLAP and SASI+ protocols. IACR Cryptol 2016:905

    Google Scholar 

  • Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression (p. 19). Technical report, SRI International

  • Sanchez-Gomez J, Garcia-Carrillo D, Marin-Perez R, Skarmeta AF (2020) Secure authentication and credential establishment in narrowband IoT and 5G. Sensors 20(3):882

    Google Scholar 

  • Sato H, Kanai A, Tanimoto S, Kobayashi T (2016) Establishing trust in the emerging era of Iot. In: 2016 IEEE symposium on service-oriented system engineering (SOSE). IEEE, pp 398–406

  • Scroxton A (2020) Robust security and consumer buy-in needed for smart city success. https://www.computerweekly.com/news/2240240594/Robust-security-and-consumer-buy-in-needed-for-smart-city-success. Accessed June 2020

  • Sengupta J, Ruj S, Bit SD (2020) A Comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT. J Netw Comput Appl 149:102481

    Google Scholar 

  • Seo D, Jeon YB, Lee SH, Lee KH (2016) Cloud computing for ubiquitous computing on M2M and IoT environment mobile application. Clust Comput 19(2):1001–1013

    Google Scholar 

  • Sharma G, Kalra S (2017) A secure remote user authentication scheme for smart cities e-governance applications. J Reliab Intell Environ 3(3):177–188

    Google Scholar 

  • Sharma G, Kalra S (2019) Advanced multi-factor user authentication scheme for E-governance applications in smart cities. Int J Comput Appl 41(4):312–327

    Google Scholar 

  • Sharma V, You I, Jayakody DNK, Atiquzzaman M (2017) Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social internet of things. Future Gener Comput Syst 92:758–776

    Google Scholar 

  • Shilenge M, Telukdarie A (2021) 4IR integration of information technology best practice framework in operational technology. J Ind Eng Manag 14(3):457–476

    Google Scholar 

  • Smart Cities Mission (2020) A step towards Smart India. https://www.india.gov.in/spotlight/smart-cities-mission-step-towards-smart-india. Accessed June 2020

  • Sookhak M, Tang H, He Y, Yu FR (2018) Security and privacy of smart cities: a survey, research issues and challenges. IEEE Commun Surv Tutor 21(2):1718–1743

    Google Scholar 

  • Srinivas J, Mukhopadhyay S, Mishra D (2017) Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Netw 54:147–169

    Google Scholar 

  • Sudqi Khater B, Abdul Wahab AWB, Idris MYIB, Abdulla Hussain M, Ahmed Ibrahim A (2019) A lightweight perceptron-based intrusion detection system for fog computing. Appl Sci 9(1):178

    Google Scholar 

  • Sun X, Ansari N (2017) Traffic load balancing among brokers at the IoT application layer. IEEE Trans Netw Serv Manag 15(1):489–502

    Google Scholar 

  • Sun HM, Ting WC, Wang KH (2009) On the security of Chien’s ultralightweight RFID authentication protocol. IEEE Trans Dependable Secur Comput 8(2):315–317

    Google Scholar 

  • Tewari A, Gupta BB (2020) Security, privacy and trust of different layers in internet-of-things (IoTs) framework. Future Gener Comput Syst 108:909–920

    Google Scholar 

  • Townsend AM (2013) Smart cities: big data, civic hackers, and the quest for a new utopia. WW Norton & Company, New York

    Google Scholar 

  • Trappe W, Howard R, Moore RS (2015) Low-energy security: limits and opportunities in the Internet of things. IEEE Secur Priv 13(1):14–21

    Google Scholar 

  • Urbieta A, González-Beltrán A, Mokhtar SB, Hossain MA, Capra L (2017) Adaptive and context-aware service composition for IoT-based smart cities. Future Gener Comput Syst 76:262–274

    Google Scholar 

  • Vembu V (2020) Smart cities mission: welcome to tomorrow's world. 28th January 2016, http://www.thehindubusinessline.com/economy/smart-cities-mission-welcome-to-tomorrowsworld/article8163690.ece Accessed June 2020

  • Vijayakumar P, Azees M, Chang V, Deborah J, Balusamy B (2017) Computationally efficient privacy-preserving authentication and key distribution techniques for vehicular ad hoc networks. Clust Comput 20(3):2439–2450

    Google Scholar 

  • Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S (2019) Deep learning approach for intelligent intrusion detection system. IEEE Access 7:41525–41550

    Google Scholar 

  • Von Oheimb D (2005) The high-level protocol specification language HLPSL developed in the EU project AVISPA. In: Proceedings of APPSEM 2005 workshop. APPSEM'05, Tallinn, Estonia, pp 1–17

    Google Scholar 

  • Wang C, Xu G, Sun J (2017) An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12):2946

    Google Scholar 

  • Wang Y, Su Z, Ni J, Zhang N, Shen X (2021) Blockchain-empowered space-air-ground integrated networks: opportunities, challenges, and solutions. IEEE Commun Surv Tutor 2021:1–1

    Google Scholar 

  • Watson SM (2017) What the UK can learn from Singapore's smart city. Will plans for urban innovation hubs cure the UK's anxiety over an uncertain future? Just ask Singapore. https://www.wired.co.uk/article/sara-watson-singapore-smart-cities. Accessed June 2020

  • Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31(2):286–291

    Google Scholar 

  • Wu M, Lu TJ, Ling FY, Sun J, Du HY (2010) Research on the architecture of the internet of things. In: 2010 3rd international conference on advanced computer theory and engineering (ICACTE), vol 5. IEEE, pp V5–484

  • Wu L, Zhang Y, Li L, Shen J (2016) Efficient and anonymous authentication scheme for wireless body area networks. J Med Syst 40(6):134

    Google Scholar 

  • Wu F, Xu L, Kumari S, Li X, Shen J, Choo KKR, Das AK (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J Netw Comput Appl 89:72–85

    Google Scholar 

  • Wu J, Guo S, Huang H, Liu W, Xiang Y (2018a) Information and communications technologies for sustainable development goals: state-of-the-art, needs and perspectives. IEEE Commun Surv Tutor 20(3):2389–2406

    Google Scholar 

  • Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018b) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener Comput Syst 82:727–737

    Google Scholar 

  • Xu H, Ding J, Li P, Zhu F, Wang R (2018) A lightweight RFID mutual authentication protocol based on physical unclonable function. Sensors 18(3):760

    Google Scholar 

  • Xu X, Xue Y, Qi L, Yuan Y, Zhang X, Umer T, Wan S (2019) An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Gener Comput Syst 96:89–100

    Google Scholar 

  • Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250–1258

    Google Scholar 

  • Yang T, Zhang G, Liu L, Yang Y, Zhao S, Sun H, Wang W (2019) New features of authentication scheme for the IoT: a survey. In: Proceedings of the 2nd international ACM workshop on security and privacy for the internet-of-things. ACM, New York, NY, United States, pp 44–49

    Google Scholar 

  • Yao X, Farha F, Li R, Psychoula I, Chen L, Ning H (2020) Security and privacy issues of physical objects in the IoT: challenges and opportunities. Digit Commun Netw 7:373–384

    Google Scholar 

  • Yu S, Park K, Park Y (2019) A secure lightweight three-factor authentication scheme for IoT in cloud computing environment. Sensors 19(16):3598

    Google Scholar 

  • Zeng E, Roesner F (2019) Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study. In: 28th {USENIX} security symposium ({USENIX} security 19). USENIX, Santa Clara, CA, USA, pp 159–176

    Google Scholar 

  • Zeng X, Garg SK, Strazdins P, Jayaraman PP, Georgakopoulos D, Ranjan R (2017) IOTSim: a simulator for analyzing IoT applications. J Syst Archit 72:93–107

    Google Scholar 

  • Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S (2014) IoT security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications. IEEE, pp 230–234

  • Zhang K, Ni J, Yang K, Liang X, Ren J, Shen XS (2017a) Security and privacy in smart city applications: challenges and solutions. IEEE Commun Mag 55(1):122–129

    Google Scholar 

  • Zhang W, Lin D, Zhang H, Chen C, Zhou X (2017b) A lightweight anonymous mutual authentication with key agreement protocol on ECC. In: 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE, pp 170–176

  • Zhao C, Huang L, Zhao Y, Du X (2017) Secure machine-type communications toward LTE heterogeneous networks. IEEE Wirel Commun 24(1):82–87

    Google Scholar 

  • Zhou J, Li P, Zhou Y, Wang B, Zang J, Meng L (2018) Toward new-generation intelligent manufacturing. Engineering 4(1):11–20

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. D. Deebak.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rao, P.M., Deebak, B.D. Security and privacy issues in smart cities/industries: technologies, applications, and challenges. J Ambient Intell Human Comput 14, 10517–10553 (2023). https://doi.org/10.1007/s12652-022-03707-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-022-03707-1

Keywords

Navigation