Skip to main content

2021 | OriginalPaper | Buchkapitel

Artificial Intelligence and Machine Learning for Ensuring Security in Smart Cities

verfasst von : Sabbir Ahmed, Md. Farhad Hossain, M. Shamim Kaiser, Manan Binth Taj Noor, Mufti Mahmud, Chinmay Chakraborty

Erschienen in: Data-Driven Mining, Learning and Analytics for Secured Smart Cities

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The smart city emerged as a model with the rapid growth of robust information and communication technology and the development of ubiquitous sensing technology. A smart city offers enhanced social facilities, transport and accessibility while promoting sustainability by using different sensors to gather data from the surroundings. The data collected can then be used to control urban infrastructure, such as traffic congestion, water supply, environmental monitoring, food services, and more. The smart city can track people’s actions and deliver intelligent travel, intelligent healthcare, entertainment, and other services. Dynamic data change includes intelligent and systems solutions for the functioning of these networks to ensure confusion about events in smart cities. Recent advances in machine learning and artificial information allow intelligent cities to effectively deliver services through a reduction in resource consumption. Cloud-based machine learning models enable resource-restricted devices to interconnect and optimize efficiency. The emerging data collection and device designs are targeted at reducing energy savings rather than risks to privacy and security. Thus, the security and privacy concerns remain as intelligent city networks not only collect information from heterogeneous nodes which are the weakest link and susceptible to cyber-attack. In this chapter, we address security issues in smart city applications; and corresponding countermeasures using artificial intelligence and machine learning. Some attempts to address these protection and privacy problems are then presented for smart health, transport, and smart energy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Afsana F, Mamun SA, Kaiser MS, Ahmed MR (2015) Outage capacity analysis of cluster-based forwarding scheme for body area network using nano electromagnetic communication. In: 2015 2nd international conference on electrical information and communication technologies (EICT). pp 383–388. https://doi.org/10.1109/EICT.2015.7391981 Afsana F, Mamun SA, Kaiser MS, Ahmed MR (2015) Outage capacity analysis of cluster-based forwarding scheme for body area network using nano electromagnetic communication. In: 2015 2nd international conference on electrical information and communication technologies (EICT). pp 383–388. https://​doi.​org/​10.​1109/​EICT.​2015.​7391981
2.
Zurück zum Zitat Ahuja K, Khosla A (2019) A novel framework for data acquisition and ubiquitous communication provisioning in smart cities. Future Gener Comput Syst 101:785–803CrossRef Ahuja K, Khosla A (2019) A novel framework for data acquisition and ubiquitous communication provisioning in smart cities. Future Gener Comput Syst 101:785–803CrossRef
3.
Zurück zum Zitat Akhund TMNU et al. (2018) Adeptness: Alzheimer’s disease patient management system using pervasive sensors-early prototype and preliminary results. In: International conference on brain informatics. Springer, pp 413–422 Akhund TMNU et al. (2018) Adeptness: Alzheimer’s disease patient management system using pervasive sensors-early prototype and preliminary results. In: International conference on brain informatics. Springer, pp 413–422
4.
Zurück zum Zitat Al Mamun A, Jahangir MUF, Azam S, Kaiser MS, Karim A (2021) A combined framework of interplanetary file system and blockchain to securely manage electronic medical records. In: Proceedings of international conference on trends in computational and cognitive engineering. Springer, pp 501–511 Al Mamun A, Jahangir MUF, Azam S, Kaiser MS, Karim A (2021) A combined framework of interplanetary file system and blockchain to securely manage electronic medical records. In: Proceedings of international conference on trends in computational and cognitive engineering. Springer, pp 501–511
5.
Zurück zum Zitat Asif-Ur-Rahman M et al (2018) Toward a heterogeneous mist, fog, and cloud-based framework for the internet of healthcare things. IEEE Internet Things J 6(3):4049–4062CrossRef Asif-Ur-Rahman M et al (2018) Toward a heterogeneous mist, fog, and cloud-based framework for the internet of healthcare things. IEEE Internet Things J 6(3):4049–4062CrossRef
6.
Zurück zum Zitat Azmoodeh A, Dehghantanha A, Choo KKR (2018) Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans Actions Sustain Comput 4(1):88–95CrossRef Azmoodeh A, Dehghantanha A, Choo KKR (2018) Robust malware detection for internet of (battlefield) things devices using deep eigenspace learning. IEEE Trans Actions Sustain Comput 4(1):88–95CrossRef
7.
Zurück zum Zitat Banerjee S, Chakraborty C, Chatterjee S (2019) A survey on IOT based traffic control and prediction mechanism. In: Internet of things and big data analytics for smart generation. Springer, pp 53–75 Banerjee S, Chakraborty C, Chatterjee S (2019) A survey on IOT based traffic control and prediction mechanism. In: Internet of things and big data analytics for smart generation. Springer, pp 53–75
8.
Zurück zum Zitat Bertot JC, Jaeger PT, Grimes JM (2010) Using ICTS to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Gov Inf Q 27(3):264–271CrossRef Bertot JC, Jaeger PT, Grimes JM (2010) Using ICTS to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Gov Inf Q 27(3):264–271CrossRef
9.
Zurück zum Zitat Bhattacharya S, Banerjee S, Chakraborty C (2019) IoT-based smart transportation system under real-time environment. Big Data-Enabled Internet Things pp 353–372 Bhattacharya S, Banerjee S, Chakraborty C (2019) IoT-based smart transportation system under real-time environment. Big Data-Enabled Internet Things pp 353–372
10.
Zurück zum Zitat Bhattacharya S, Banerjee S, Chakraborty C IoT-based smart transportation system under real-time environment. Big data-enabled internet of things. Publisher: IET Digital Library, pp 353–372 Bhattacharya S, Banerjee S, Chakraborty C IoT-based smart transportation system under real-time environment. Big data-enabled internet of things. Publisher: IET Digital Library, pp 353–372
11.
Zurück zum Zitat Biswas S, Akhter T, Kaiser M, Mamun S et al. (2014) Cloud based healthcare application architecture and electronic medical record mining: an integrated approach to improve healthcare system. In: 2014 ICCIT. IEEE, pp 286–291 Biswas S, Akhter T, Kaiser M, Mamun S et al. (2014) Cloud based healthcare application architecture and electronic medical record mining: an integrated approach to improve healthcare system. In: 2014 ICCIT. IEEE, pp 286–291
12.
Zurück zum Zitat Cadwalladr C, Graham-Harrison E (2018) Revealed: 50 million facebook profiles harvested for Cambridge analytica in major data breach. The Guardian 17:22 Cadwalladr C, Graham-Harrison E (2018) Revealed: 50 million facebook profiles harvested for Cambridge analytica in major data breach. The Guardian 17:22
15.
Zurück zum Zitat Chatterjee B, Das D, Maity S, Sen S (2018) Rf-puf: Enhancing iot security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6(1):388–398CrossRef Chatterjee B, Das D, Maity S, Sen S (2018) Rf-puf: Enhancing iot security through authentication of wireless nodes using in-situ machine learning. IEEE Internet Things J 6(1):388–398CrossRef
16.
Zurück zum Zitat Das R, Gadre A, Zhang S, Kumar S, Moura JM (2018) A deep learning approach to iot authentication. In: 2018 IEEE international conference on communications (ICC). IEEE, pp 1–6 Das R, Gadre A, Zhang S, Kumar S, Moura JM (2018) A deep learning approach to iot authentication. In: 2018 IEEE international conference on communications (ICC). IEEE, pp 1–6
17.
Zurück zum Zitat Esmalifalak M, Liu L, Nguyen N, Zheng R, Han Z (2014) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11(3):1644–1652CrossRef Esmalifalak M, Liu L, Nguyen N, Zheng R, Han Z (2014) Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst J 11(3):1644–1652CrossRef
18.
Zurück zum Zitat Farhin F, Kaiser MS, Mahmud M (2021) Secured smart healthcare system: Blockchain and bayesian inference based approach. In: Proceedings of international conference on trends in computational and cognitive engineering. Springer, pp 455–465 Farhin F, Kaiser MS, Mahmud M (2021) Secured smart healthcare system: Blockchain and bayesian inference based approach. In: Proceedings of international conference on trends in computational and cognitive engineering. Springer, pp 455–465
20.
Zurück zum Zitat HaddadPajouh H, Dehghantanha A, Khayami R, Choo KKR (2018) A deep recurrent neural network based approach for internet of things malware threat hunting. Futur Gener Comput Syst 85:88–96CrossRef HaddadPajouh H, Dehghantanha A, Khayami R, Choo KKR (2018) A deep recurrent neural network based approach for internet of things malware threat hunting. Futur Gener Comput Syst 85:88–96CrossRef
21.
Zurück zum Zitat Hafeez I, Ding AY, Antikainen M, Tarkoma S (2018) Real-time iot device activity detection in edge networks. In: International conference on network and system security. Springer, pp 221–236 Hafeez I, Ding AY, Antikainen M, Tarkoma S (2018) Real-time iot device activity detection in edge networks. In: International conference on network and system security. Springer, pp 221–236
22.
Zurück zum Zitat Hammi B, Khatoun R, Zeadally S, Fayad A, Khoukhi L (2017) Iot technologies for smart cities. IET Netw 7(1):1–13 Hammi B, Khatoun R, Zeadally S, Fayad A, Khoukhi L (2017) Iot technologies for smart cities. IET Netw 7(1):1–13
23.
Zurück zum Zitat Harrison C, Donnelly IA (2011) A theory of smart cities. In: Proceedings of the 55th annual meeting of the ISSS-2011, Hull, UK Harrison C, Donnelly IA (2011) A theory of smart cities. In: Proceedings of the 55th annual meeting of the ISSS-2011, Hull, UK
24.
Zurück zum Zitat Hashem IAT et al (2016) The role of big data in smart city. Int J Inf Manage 36(5):748–758CrossRef Hashem IAT et al (2016) The role of big data in smart city. Int J Inf Manage 36(5):748–758CrossRef
25.
Zurück zum Zitat Hou W, Ning Z, Guo L (2018) Green survivable collaborative edge computing in smart cities. IEEE Trans Indus Inf 14(4):1594–1605CrossRef Hou W, Ning Z, Guo L (2018) Green survivable collaborative edge computing in smart cities. IEEE Trans Indus Inf 14(4):1594–1605CrossRef
27.
Zurück zum Zitat Kaiser MS, Al Mamun S, Mahmud M, Tania MH (2020) Healthcare robots to combat covid-19. In: COVID-19: prediction, decision-making, and its impacts. Springer, pp 83–97 Kaiser MS, Al Mamun S, Mahmud M, Tania MH (2020) Healthcare robots to combat covid-19. In: COVID-19: prediction, decision-making, and its impacts. Springer, pp 83–97
28.
Zurück zum Zitat Kaiser MS et al. (2021) 6G access network for intelligent internet of healthcare things: opportunity, challenges, and research directions. In: Proceedings of international conference on trends in computational and cognitive engineering. Springer, pp 317–328 Kaiser MS et al. (2021) 6G access network for intelligent internet of healthcare things: opportunity, challenges, and research directions. In: Proceedings of international conference on trends in computational and cognitive engineering. Springer, pp 317–328
29.
Zurück zum Zitat Kaiser MS et al (2017) Advances in crowd analysis for urban applications through urban event detection. IEEE Trans ITS 19(10):3092–3112 Kaiser MS et al (2017) Advances in crowd analysis for urban applications through urban event detection. IEEE Trans ITS 19(10):3092–3112
30.
Zurück zum Zitat Kaivonen S, Ngai ECH (2020) Real-time air pollution monitoring with sensors on city bus. Digital Commun Netw 6(1):23–30CrossRef Kaivonen S, Ngai ECH (2020) Real-time air pollution monitoring with sensors on city bus. Digital Commun Netw 6(1):23–30CrossRef
31.
Zurück zum Zitat Khan Z, Kiani SL (2021) A cloud-based architecture for citizen services in smart cities. In: 2012 IEEE fifth international conference on utility and cloud computing. IEEE, pp 315–320 Khan Z, Kiani SL (2021) A cloud-based architecture for citizen services in smart cities. In: 2012 IEEE fifth international conference on utility and cloud computing. IEEE, pp 315–320
32.
Zurück zum Zitat Khanam S et al. (2014) Improvement of rfid tag detection using smart antenna for tag based school monitoring system. In: 2014 ICEEICT. IEEE, pp 1–6 Khanam S et al. (2014) Improvement of rfid tag detection using smart antenna for tag based school monitoring system. In: 2014 ICEEICT. IEEE, pp 1–6
33.
Zurück zum Zitat Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80–84CrossRef Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80–84CrossRef
34.
Zurück zum Zitat Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853CrossRef Li X, Jiang P, Chen T, Luo X, Wen Q (2020) A survey on the security of blockchain systems. Future Gener Comput Syst 107:841–853CrossRef
36.
Zurück zum Zitat Mahmud M, Kaiser MS (2020) Machine learning in fighting pandemics: a covid-19 case study. In: COVID-19: prediction, decision-making, and its impacts. Springer, pp 77–81 Mahmud M, Kaiser MS (2020) Machine learning in fighting pandemics: a covid-19 case study. In: COVID-19: prediction, decision-making, and its impacts. Springer, pp 77–81
37.
Zurück zum Zitat Mahmud M, Kaiser MS, McGinnity TM, Hussain A (2020) Deep learning in mining biological data. Cognitive Comput 1–33 Mahmud M, Kaiser MS, McGinnity TM, Hussain A (2020) Deep learning in mining biological data. Cognitive Comput 1–33
38.
Zurück zum Zitat Mahmud M et al (2018) A brain-inspired trust management model to assure security in a cloud based iot framework for neuroscience applications. Cognitive Comput 10(5):864–873CrossRef Mahmud M et al (2018) A brain-inspired trust management model to assure security in a cloud based iot framework for neuroscience applications. Cognitive Comput 10(5):864–873CrossRef
39.
Zurück zum Zitat Ozay M et al (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773–1786MathSciNetCrossRef Ozay M et al (2015) Machine learning methods for attack detection in the smart grid. IEEE Trans Neural Netw Learn Syst 27(8):1773–1786MathSciNetCrossRef
40.
Zurück zum Zitat Rahman S, Al Mamun S, Ahmed MU, Kaiser MS (2016) Phy/mac layer attack detection system using neuro-fuzzy algorithm for iot network. In: 2016 ICEEOT. IEEE, pp 2531–2536 Rahman S, Al Mamun S, Ahmed MU, Kaiser MS (2016) Phy/mac layer attack detection system using neuro-fuzzy algorithm for iot network. In: 2016 ICEEOT. IEEE, pp 2531–2536
41.
Zurück zum Zitat Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for iot. Appl Soft Comput 72:79–89CrossRef Rathore S, Park JH (2018) Semi-supervised learning based distributed attack detection framework for iot. Appl Soft Comput 72:79–89CrossRef
42.
Zurück zum Zitat Rehmani MH, Davy A, Jennings B, Assi C (2019) Software defined networks-based smart grid communication: a comprehensive survey. IEEE Commun Surv Tutor 21(3):2637–2670CrossRef Rehmani MH, Davy A, Jennings B, Assi C (2019) Software defined networks-based smart grid communication: a comprehensive survey. IEEE Commun Surv Tutor 21(3):2637–2670CrossRef
43.
Zurück zum Zitat Saeed A, Ahmadinia A, Javed A, Larijani H (2016) Intelligent intrusion detection in low-power iots. ACM Trans Internet Technol (TOIT) 16(4):1–25CrossRef Saeed A, Ahmadinia A, Javed A, Larijani H (2016) Intelligent intrusion detection in low-power iots. ACM Trans Internet Technol (TOIT) 16(4):1–25CrossRef
45.
Zurück zum Zitat Shafiq M, Tian Z, Sun Y, Du X, Guizani M (2020) Selection of effective machine learning algorithm and bot-iot attacks traffic identification for internet of things in smart city. Futur Gener Comput Syst 107:433–442CrossRef Shafiq M, Tian Z, Sun Y, Du X, Guizani M (2020) Selection of effective machine learning algorithm and bot-iot attacks traffic identification for internet of things in smart city. Futur Gener Comput Syst 107:433–442CrossRef
46.
Zurück zum Zitat Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM (2018) Maintaining security and privacy in health care system using learning based deep-q-networks. J Med Syst 42(10):1–10 Shakeel PM, Baskar S, Dhulipala VS, Mishra S, Jaber MM (2018) Maintaining security and privacy in health care system using learning based deep-q-networks. J Med Syst 42(10):1–10
47.
Zurück zum Zitat Sinaeepourfard A, Garcia J, Masip-Bruin X, Marın-Tordera E, Cirera J, Grau G, Casaus F (2016) Estimating smart city sensors data generation. In: 2016 mediterranean ad hoc networking workshop (Med-Hoc-Net). IEEE, pp 1–8 Sinaeepourfard A, Garcia J, Masip-Bruin X, Marın-Tordera E, Cirera J, Grau G, Casaus F (2016) Estimating smart city sensors data generation. In: 2016 mediterranean ad hoc networking workshop (Med-Hoc-Net). IEEE, pp 1–8
48.
Zurück zum Zitat Srivastava S, Bisht A, Narayan N (2017) Safety and security in smart cities using artificial intelligence—a review. In: 2017 7th international conference on cloud computing, data science & engineering-confluence. IEEE, pp 130–133 Srivastava S, Bisht A, Narayan N (2017) Safety and security in smart cities using artificial intelligence—a review. In: 2017 7th international conference on cloud computing, data science & engineering-confluence. IEEE, pp 130–133
49.
Zurück zum Zitat Sumi AI et al. (2018) fassert: a fuzzy assistive system for children with autism using internet of things. In: International conference on brain informatics. Springer, pp 403–412 Sumi AI et al. (2018) fassert: a fuzzy assistive system for children with autism using internet of things. In: International conference on brain informatics. Springer, pp 403–412
50.
Zurück zum Zitat Sundararajan A (2017) The sharing economy: the end of employment and the rise of crowd-based capitalism. Mit Press Sundararajan A (2017) The sharing economy: the end of employment and the rise of crowd-based capitalism. Mit Press
51.
Zurück zum Zitat Tomovic S, Yoshigoe K, Maljevic I, Radusinovic I (2017) Software-defined fog net- work architecture for iot. Wireless Pers Commun 92(1):181–196CrossRef Tomovic S, Yoshigoe K, Maljevic I, Radusinovic I (2017) Software-defined fog net- work architecture for iot. Wireless Pers Commun 92(1):181–196CrossRef
52.
Zurück zum Zitat Tyagi AK (2019) Building a smart and sustainable environment using internet of things. In: Proceedings of international conference on sustainable computing in science, technology and management (SUSCOM). Amity University Rajasthan, Jaipur, India Tyagi AK (2019) Building a smart and sustainable environment using internet of things. In: Proceedings of international conference on sustainable computing in science, technology and management (SUSCOM). Amity University Rajasthan, Jaipur, India
53.
Zurück zum Zitat Viegas E, Santin A, Oliveira L, Franca A, Jasinski R, Pedroni V (2018) A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems. Comput Secur 78:16–32CrossRef Viegas E, Santin A, Oliveira L, Franca A, Jasinski R, Pedroni V (2018) A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems. Comput Secur 78:16–32CrossRef
54.
Zurück zum Zitat Wang J, Zhang L, Zhang D, Li K (2012) An adaptive longitudinal driving assistance system based on driver characteristics. IEEE Trans Intell Transp Syst 14(1):1–12CrossRef Wang J, Zhang L, Zhang D, Li K (2012) An adaptive longitudinal driving assistance system based on driver characteristics. IEEE Trans Intell Transp Syst 14(1):1–12CrossRef
55.
Zurück zum Zitat Ye J, Cheng X, Zhu J, Feng L, Song L (2018) A ddos attack detection method based on svm in software defined network. Secur Commun Netw 2018 Ye J, Cheng X, Zhu J, Feng L, Song L (2018) A ddos attack detection method based on svm in software defined network. Secur Commun Netw 2018
56.
Zurück zum Zitat Zhou W, Yu B (2018) A cloud-assisted malware detection and suppression framework for wireless multimedia system in iot based on dynamic differential game. China Commun 15(2):209–223CrossRef Zhou W, Yu B (2018) A cloud-assisted malware detection and suppression framework for wireless multimedia system in iot based on dynamic differential game. China Commun 15(2):209–223CrossRef
Metadaten
Titel
Artificial Intelligence and Machine Learning for Ensuring Security in Smart Cities
verfasst von
Sabbir Ahmed
Md. Farhad Hossain
M. Shamim Kaiser
Manan Binth Taj Noor
Mufti Mahmud
Chinmay Chakraborty
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-72139-8_2