Skip to main content
Top
Published in:
Cover of the book

2019 | OriginalPaper | Chapter

Security and Privacy in Smart City Applications and Services: Opportunities and Challenges

Authors : Alka Verma, Abhirup Khanna, Amit Agrawal, Ashraf Darwish, Aboul Ella Hassanien

Published in: Cybersecurity and Secure Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A Smart City can be described as an urbanized town, wherein Information and Communication Technology are at the core of its infrastructure. Smart cities serve several innovative and advanced services for its citizens in order to improve the quality of their life. A Smart City must encompass all the forthcoming and highly advanced and integrated technology, the essence of which is the Internet of Things (IoT). Smart technologies like smart governance, smart communication, smart environment, smart transportation, smart energy, waste and water management applications promise the smart growth of the city, but at the same time, it needs to enforce pervasive security and privacy of the large volume of data associated with these smart applications. Special smart measures are required to cover urbanization trends in the innovative administration of urban transference and various smart services to the residents, visitors and local government to meet the ever expanding and manifold demands. When the city goes urban, its residents may suffer from various privacy and security issues due to smart city applications vulnerabilities. This chapter delivers a comprehensive overview of the security and privacy threats, vulnerabilities, and challenges of a smart city project; and suggests solutions in order to facilitate smart city development and governance.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference The Science and Information Organization (2016) Int J Adv Comput Sci Appl 7(2) The Science and Information Organization (2016) Int J Adv Comput Sci Appl 7(2)
2.
go back to reference Naphade M, Banavar G, Harrison C, Paraszczak J, Morris R (2011) Smarter cities and their innovation challenges. Computer 44(6):32–39CrossRef Naphade M, Banavar G, Harrison C, Paraszczak J, Morris R (2011) Smarter cities and their innovation challenges. Computer 44(6):32–39CrossRef
3.
go back to reference Ijaz S, Shah MA, Khan A, Ahmed M (2016) Smart cities: A survey on security concerns. Int J Adv Comput Sci Appl (IJACSA) 7(2) Ijaz S, Shah MA, Khan A, Ahmed M (2016) Smart cities: A survey on security concerns. Int J Adv Comput Sci Appl (IJACSA) 7(2)
4.
go back to reference Anderson R (2001, Dec). Why information security is hard-an economic perspective. In: Proceedings 17th annual computer security applications conference, 2001 (ACSAC). IEEE, pp 358–365 Anderson R (2001, Dec). Why information security is hard-an economic perspective. In: Proceedings 17th annual computer security applications conference, 2001 (ACSAC). IEEE, pp 358–365
5.
go back to reference Van Zoonen L (2016) Privacy concerns in smart cities. GovMent Inf Q 33(3):472–480 Van Zoonen L (2016) Privacy concerns in smart cities. GovMent Inf Q 33(3):472–480
6.
go back to reference Khanna A, Anand R (2016, Jan) IoT based smart parking system. In: International conference on internet of things and applications (IOTA), IEEE. pp. 266–270 Khanna A, Anand R (2016, Jan) IoT based smart parking system. In: International conference on internet of things and applications (IOTA), IEEE. pp. 266–270
7.
go back to reference Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32CrossRef Zanella A, Bui N, Castellani A, Vangelista L, Zorzi M (2014) Internet of things for smart cities. IEEE Internet Things J 1(1):22–32CrossRef
8.
go back to reference Elmaghraby AS (2013) Security and privacy in the smart city. In: Proceedings of the 6th ajman international urban planning conference Elmaghraby AS (2013) Security and privacy in the smart city. In: Proceedings of the 6th ajman international urban planning conference
9.
go back to reference Ramos A, Lazaro A, Girbau D (2014) Multi-sensor UWB time-coded RFID tags for smart cities applications. In: Microwave Conference (EuMC), Oct 2014 44th European. IEEE, pp259–262 Ramos A, Lazaro A, Girbau D (2014) Multi-sensor UWB time-coded RFID tags for smart cities applications. In: Microwave Conference (EuMC), Oct 2014 44th European. IEEE, pp259–262
10.
go back to reference Zhu X, Mukhopadhyay SK, Kurata H (2012) A review of RFID technology and its managerial applications in different industries. J Eng Tech Manage 29(1):152–167CrossRef Zhu X, Mukhopadhyay SK, Kurata H (2012) A review of RFID technology and its managerial applications in different industries. J Eng Tech Manage 29(1):152–167CrossRef
11.
go back to reference Luvisi A, Lorenzini G (2014) RFID-plants in the smart city: Applications and outlook for urban green management. Urban For & Urban Green 13(4):630–637CrossRef Luvisi A, Lorenzini G (2014) RFID-plants in the smart city: Applications and outlook for urban green management. Urban For & Urban Green 13(4):630–637CrossRef
12.
go back to reference Arora A, Khanna A, Rastogi A, Agarwal A (2017, Jan) Cloud security ecosystem for data security and privacy. In: 2017 7th international conference on cloud computing, data science & engineering-confluence. IEEE, pp. 288–292 Arora A, Khanna A, Rastogi A, Agarwal A (2017, Jan) Cloud security ecosystem for data security and privacy. In: 2017 7th international conference on cloud computing, data science & engineering-confluence. IEEE, pp. 288–292
13.
go back to reference Turn R, Ware WH (1976) Privacy and security issues in information systems. IEEE Trans Comput 12:1353–1361CrossRef Turn R, Ware WH (1976) Privacy and security issues in information systems. IEEE Trans Comput 12:1353–1361CrossRef
14.
go back to reference Li W, Chao J, Ping Z (2012, Nov). Security structure study of city management platform based on cloud computing under the conception of smart city. In: 2012 Fourth international conference on Multimedia information networking and security (MINES). IEEE, pp 91–94 Li W, Chao J, Ping Z (2012, Nov). Security structure study of city management platform based on cloud computing under the conception of smart city. In: 2012 Fourth international conference on Multimedia information networking and security (MINES). IEEE, pp 91–94
15.
go back to reference Okuhara M, Shiozaki T, Suzuki T (2010) Security architecture for cloud computing. Fujitsu Sci Tech J 46(4):397–402 Okuhara M, Shiozaki T, Suzuki T (2010) Security architecture for cloud computing. Fujitsu Sci Tech J 46(4):397–402
16.
go back to reference Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P (2013) Security patterns: integrating security and systems engineering. Wiley Schumacher M, Fernandez-Buglioni E, Hybertson D, Buschmann F, Sommerlad P (2013) Security patterns: integrating security and systems engineering. Wiley
17.
go back to reference Sen M, Dutt A, Agarwal S, Nath A (2013, Apr) Issues of privacy and security in the role of software in smart cities. In: 2013 International conference on communication systems and network technologies (CSNT). IEEE, pp 518–523 Sen M, Dutt A, Agarwal S, Nath A (2013, Apr) Issues of privacy and security in the role of software in smart cities. In: 2013 International conference on communication systems and network technologies (CSNT). IEEE, pp 518–523
18.
go back to reference Loukides G, Gkoulalas-Divanis A, Shao J (2013) Efficient and flexible anonymization of transaction data. Knowl Inf Syst 36(1):153–210CrossRef Loukides G, Gkoulalas-Divanis A, Shao J (2013) Efficient and flexible anonymization of transaction data. Knowl Inf Syst 36(1):153–210CrossRef
19.
go back to reference Martínez-Ballesté A, Pérez-Martínez PA, Solanas A (2013) The pursuit of citizens’ privacy: a privacy-aware smart city is possible. IEEE Commun Mag 51(6):136–141CrossRef Martínez-Ballesté A, Pérez-Martínez PA, Solanas A (2013) The pursuit of citizens’ privacy: a privacy-aware smart city is possible. IEEE Commun Mag 51(6):136–141CrossRef
20.
go back to reference Bartoli A, Hernández-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D (2011, Dec) Security and privacy in your smart city. In: Proceedings of the barcelona smart cities congress, pp 1–6 Bartoli A, Hernández-Serrano J, Soriano M, Dohler M, Kountouris A, Barthel D (2011, Dec) Security and privacy in your smart city. In: Proceedings of the barcelona smart cities congress, pp 1–6
22.
go back to reference Abouzakhar N (2013) Critical infrastructure cybersecurity: a review of recent threats and violations. in european conference on cyber warfare and security (p 1), April 2013, Academic Conferences International Limited Abouzakhar N (2013) Critical infrastructure cybersecurity: a review of recent threats and violations. in european conference on cyber warfare and security (p 1), April 2013, Academic Conferences International Limited
23.
go back to reference Nanni G (2013) Transformational ‘smart cities’: cyber security and resilience. Symantec Corporation Nanni G (2013) Transformational ‘smart cities’: cyber security and resilience. Symantec Corporation
24.
go back to reference Van Zoonen L (2016) Privacy concerns in smart cities. Gov Inf Quart 33(3):472–480CrossRef Van Zoonen L (2016) Privacy concerns in smart cities. Gov Inf Quart 33(3):472–480CrossRef
25.
go back to reference Ukil A (2012, Apr) Connect with your friends and share private information safely. In: 2012 Ninth international conference on information technology: new generations (ITNG). IEEE, pp. 367–372 Ukil A (2012, Apr) Connect with your friends and share private information safely. In: 2012 Ninth international conference on information technology: new generations (ITNG). IEEE, pp. 367–372
Metadata
Title
Security and Privacy in Smart City Applications and Services: Opportunities and Challenges
Authors
Alka Verma
Abhirup Khanna
Amit Agrawal
Ashraf Darwish
Aboul Ella Hassanien
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-16837-7_1

Premium Partner