You are on page 1of 14

Energy Reports 7 (2021) 7999–8012

Contents lists available at ScienceDirect

Energy Reports
journal homepage: www.elsevier.com/locate/egyr

Smart city and cyber-security; technologies used, leading challenges


and future recommendations
Chen Ma
Research Center for Smart Policing and Big Data Technology, China People’s Police University, Lang Fang, He Bei, 065000, China

article info a b s t r a c t

Article history: Today, some cities around the world have tended to use new technologies and become smart city.
Received 5 July 2021 New technologies improve the quality of citizens’ life. However, the use of any technology raises
Received in revised form 5 August 2021 new issues and challenges. In a smart city, the vulnerable action of an individual or organization
Accepted 18 August 2021
can put the entire city at risk. Due to the reliance of various components of smart cities on
Available online 3 September 2021
information and communication technology, cyber-security challenges (such as information leakage
Keywords: and malicious cyber-attacks) in this field affect smart cities behavior. Therefore, in order to respond
Smart city to the enthusiastic acceptance of global smart city technologies, cyber security must develop in
Cyber-attacks same direction. The aim of this paper is survey and discus on explanation of cyber security, smart
Cyber-security cities, and survey of available relevant literature on security in that technology. For this purpose, the
Challenges and recommendations present study focuses on the four main components of a smart city, i.e. smart grid, Smart building,
Deep learning Smart transportation system, and Smart healthcare. In particular, summary of two deep learning
method and cyber-security programs as well as technology correlation in smart cities are discussed.
Furthermore, effective functional solutions in maintaining cyber-security and user privacy in smart
cities are explained. The next progress trends of smart city with cyber security are described. Solutions
need to be devised to address each of the security issues. The research in this study showed that
meeting these challenges depends on the hard work of governments, developers of equipment and
software and companies providing IT security services. In addition, designing flexible systems with high
information protection capabilities is essential to prevent serious security incidents as these incidents
can lead to disastrous financial, data, credit and loss of public trust.
© 2021 The Author. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license
(http://creativecommons.org/licenses/by-nc-nd/4.0/).

1. Introduction providing appropriate and efficient services. Urban services can


be expanded in various fields such as environment, transporta-
The meaning of smart city implies the integration of current tion, health, tourism, energy management and homes safety (Vi-
substructure with new information and communication tech- tunskaite et al., 2019). Despite the benefits of developing smart
nologies to create a comprehensive system of efficient urban cities for citizens, businesses, the environment, etc., these cities
services (Maruf et al., 2020). A smart city is a city that connects are exposed to numerous cyber-security threats that make it
physical infrastructure, information technology infrastructure, so- difficult to create a security maturity in them (Baig et al., 2017). In
cial infrastructure and business infrastructure to strengthen the a smart city, the vulnerable action of an individual or organization
city’s collective intelligence (V et al., 2018). Smart city is huge, in- can put the entire city at risk (Zhou et al., 2021). This complex
tricate, and dependent technologies that face numerous technical, city is also an important challenge for digital court investigations.
economic, political, and social challenges and issues (Al-Saidi and Ensuring security in a smart city means maintaining data and the
Zaidan, 2020). Economic and investment, the ever-changing re- lattice from any attacks and bad actions (Sengan et al., 2020).
quirements of individuals, stakeholder cooperation, user-friendly Cyber-security of software and hardware made for smart city
jointing, safety and security are instances of the issues and chal- is not commonly assessed by their vendors. Therefore, the use
lenges that smart city faces (Aghajani and Ghadimi, 2018). There of such insecurity products can lead to the system being filled
are generally six areas in which cities can befit smarter: smart with fake data, system stopped, and malfunction through hack-
government, smart people, smart economy, smart transportation, ing (Sengan et al., 2021). In addition to cyber-security, another
environment and living (Razmjoo et al., 2021). Smart cities sup- issue is the protection of privacy and citizens’ relations with
plied the requirements of businesses, citizens, and institutions by the government (Chen, 2021). The possibility of intrusion into
users’ privacy and the lack of cyber security in smart cities will
E-mail address: mulanchenchen@sohu.com. make users’ use of this technology questionable (Lim et al., 2021).

https://doi.org/10.1016/j.egyr.2021.08.124
2352-4847/© 2021 The Author. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-
nd/4.0/).
C. Ma Energy Reports 7 (2021) 7999–8012

The first step in overcoming cyber security problems in smart parking sensors, structured health awareness, instantaneous ur-
cities and protecting citizens’ privacy is to identify cyber security ban noise mapping, traffic control, lane optimization, and smart
challenges and threats to citizens’ privacy (El Hilali and Azougagh, lighting (Nakano and Washizu, 2021). The IoT is an active tech-
2021). Without being aware of such challenges, and providing nology used for the mentioned components of the smart city.
appropriate solutions, one cannot expect successful design, im- However, the cloud is an active platform for storing and interpret-
plementation, and development of a smart city (Kashef et al., ing centralized smart city data (Qayyum et al., 2021). Smart city
2021). On the other hand, according to data published by the architecture can include the following sections (as demonstrated
United Nations, the world’s population will reach about 7.9 billion in Fig. 2):
by the end of 2050. It is estimated that approximately 75% of the 1. Smart government: Smart government builds value for sustain-
population of world will be in the cities, and several cities will able public production by leveraging ICT integration for planning,
have a population of over 10 million people. management, and operations in a single layer or across layers.
Today, deep learning is widely used on data collected by In other words, in smart government, it is the implementation
researchers. Deep learning is a type of machine learning and of business processes based on information and communication
artificial intelligence that actually mimics the way the human technology that activates the continuity of information between
mind uses to learn a particular subject, and has many appli- government and the provision of high quality services. Smart
cations in the smart city (Atitallah et al., 2020). Deep learning government is the next step for e-government (Chatfield and Red-
can continuously gather and monitor information and help the dick, 2019). The smart government uses instantaneous informa-
system adapt to new spaces (Singh et al., 2020). Deep learning tion to reduce crimes by increasing the level of situational aware-
is a branch of artificial intelligence that benefits neural net- ness, providing effective and efficient response to accidents, in-
works to machine learning. In recent years, compared to tra- vestigating emergencies, and improving municipal services. Fig. 3
ditional machine learning methods, computer vision programs depicts the main goals of a smart government (Witanto et al.,
have made significant advances in natural language processing, 2018).
robotics, and many other areas compared to traditional machine 2. Smart healthcare: Smart healthcare is a health service that uses
learning methods (Belhadi et al., 2021). The purpose of this paper technologies such as wearable, the Internet of Things, and mobile
is to identify and investigate the challenges of cyber security Internet to dynamically access information, connecting people,
in smart cities (according to deep learning), and to determine health facilities, and institutions. Finally, it actively manages the
practical and effective solutions to address or reduce the impact needs of the ecosystem, and responds to them smarter (Wang
of these challenges. In this regard, other sections of the present et al., 2021). Smart healthcare consists of several basic com-
paper are structures as: ponents: physicians, patients, hospitals, and medical research
In the second Section, after introducing the smart city, its institutes. Intelligent health care has various dimensions includ-
mechanisms and components are explained in detail. The third ing disease prevention, patient monitoring, diagnosis and treat-
section deals with the cyber-security situation relying to the deep ment, hospital management, health decision making and medi-
learning model in smart cities. Fig. 1 describes the use of that cal research. Remote monitoring can be achieved by wirelessly
pattern in the smart city based-cyber security. Then, literature connecting smart devices to health centers and data analysis
review of cyber-security challenges and threats to users’ privacy systems (Singh and Chatterjee, 2021). The process in a smart city
in smart cities is provided. In the fifth Section, effective func- equipped with smart healthcare is described in Fig. 4.
tional solutions in maintaining cyber-security and user privacy in 3. Smart energy: The traditional energy grid infrastructure does
smart cities are explained. Finally, the last section is devoted to not meet the growing needs of communities. Demand for relia-
conclusion. bility, scalability, manageability, environmentally friendly energy
production and cost-effectiveness has necessitated a smart and
2. Concept definition modern energy grid (Kourgiozou et al., 2021). A smart energy
grid equipped with IC technology capabilities can back two-way
2.1. Smart city communication and electrical currents between different entities
in the grid (see Fig. 5) (Ahmad and Zhang, 2021). The smart grid
In recent years, cities have moved towards using more tech- enables immediate monitoring, ensuring optimal power flows
nologies and becoming smarter. New technologies, along with between the power grid and clients. It also enables the produc-
fast and simple communications, enable cities to make better tion of environmentally friendly energy by integrating renew-
use of their sources, save money, and enable supreme services able energy sources into the grid (on both the Power Company
to their citizens (Lebrument et al., 2021). Competition between and consumers) (Behzad et al., 2021; Huang and Marefati, 2020;
cities to attract capital, new residents and tourists has led to more Mehrpooya et al., 2021).
attention to providing a high quality of life and dynamic economic 4. Smart transportation: In modern traffic management systems,
situation (Thornbush and Golubchikov, 2021). Governments have the optimal use of existing facilities and modern technologies is
concluded that while limited budgets, scarce resources, and out- in the goals of planners. In this regard, one of the ultimate goals
dated systems frequently challenge their goals, innovative tech- of traffic management systems is to increase network efficiency
nologies can turn those challenges into opportunities (Secinaro as well as increase the safety of vehicles and humans and reduce
et al., 2021). According to Chen et al. (2021), a smart city is a city travel time. In order to achieve the above goal, the transportation
that benefits system to automatize and modify municipal duties network needs efficient systems in order to serve the trans-
and improve the citizens lives. Smart City benefits digital systems portation sector and on the other hand, proper management of
to correct the performance and modality of urban services to these systems (Jeong et al., 2021). The most important advan-
decline financial burden, and consumption of resource and to tages of using smart transportation systems are reducing traffic
communicate actively and efficiently with citizens (Barr et al., congestion, increasing the level of safety, saving time, reducing
2021). With the smart city technology advent, sectors such as fuel consumption, and improving the level of service. Among
government services and management of traffic, transportation, the notable devices of this system are monitoring and recording
energy, water, health, and waste have developed (Bjørner, 2021; systems of violations, meteorological status information system,
Behzad et al., 2021). The smart city consists of different types driver warning system and vehicle information system and ease
of Internet of Thing (IoT) sensors. These sensors include smart of fast and timely implementation of the law by the police and
8000
C. Ma Energy Reports 7 (2021) 7999–8012

Fig. 1. Application of deep learning model in the smart city and cyber-security (Chen et al., 2021).

Fig. 2. Architecture of smart city (Chen et al., 2021).

increasing social security. According to the definition of ERSI, of the most important benefits of this interaction are: demand
smart transportation systems can be divided into four groups: response, effective feedback, peak shaving, and energy exchange.
active road safety to improve road safety, location based services, In general, the smart building platform has two parts: building
cooperative traffic efficiency to improve traffic psychology, and operational technology and external information technology (see
global internet services. Vehicular Ad hoc networks are part of Fig. 6) (Eini et al., 2021).
a smart transportation system created by a large number of In addition to the above components of architecture and smart
high-speed vehicles (Tao et al., 2021). city components, smart economy, security, logistics, education,
5. Smart building: Smart buildings use sensors and grid tech- and smart environment components can also be considered for
nologies to communicate between building equipment, report it (Al Dakheel et al., 2020; Li et al., 2020; Aborokbah et al., 2018).
a smart meter of recorded energy consumption to the smart
grid, and enable data to be transmitted from the smart grid to
the building. These buildings are expected to dynamically adjust 2.2. Cyber security
their energy profiles based on smart grid capabilities, as well
as allow building owners to remotely monitor building equip- Companies transfer sensitive information over systems when
ment (Mehrpooya et al., 2021; Lyu et al., 2021). Obviously, the conducting business. Meanwhile, cyber-security protects the in-
interaction of the smart building with the smart grid leads to the formation and information processing or storage systems by pro-
fulfillment of some of the main goals of the smart grid. Some viding a set of hardware and software solutions (Tam et al., 2021).
8001
C. Ma Energy Reports 7 (2021) 7999–8012

Fig. 3. Main goals of a smart government.

Fig. 4. Process in a smart city equipped with smart healthcare (http://anyk.com/)

The importance of protecting information increases with increas- challenges of today’s world; because both the number of devices
ing scale and complexity. Among these, social security data and fi- has increased and hackers have become more creative (Katsanto-
nancial data are of high priority (Tam et al., 2021). Cyber-security nis et al., 2021). Cyber-security protects computers, servers, mo-
means protecting systems, networks and programs against digital
bile phones, and electronic systems from malicious attacks and its
attacks. Accessing, alteration and destruction of important infor-
mation, extortion of money from users and disruption of business function can be summarized: protecting the devices that people
processes are the goals of cyber-attacks (Hasan et al., 2021). Im- use, protecting the information on these devices, and protecting
plementing cyber-security effectively and correctly is one of the the identity of the people who use this information (Uchendu
8002
C. Ma Energy Reports 7 (2021) 7999–8012

Fig. 5. Smart grid architecture (Sayed and Gabbar, 2017).

Fig. 6. Platform of smart building.

et al., 2021). Without cyber security, organizations cannot de- (c) Cyber-terrorism: Aims to intimidate by destroying elec-
fend themselves against data breaches and hacking attacks and tronic systems.
become a simple target for cyber-attackers. Security risks are In addition, the most common methods of threatening cyber-
increasing due to the expansion of communications on a global security include Malware (viruses, Trojans, ransom-ware, spy-
scale and the use of cloud services to store sensitive and personal ware, Adware, and Botnets), SQL injection, Phishing, Man-in-
the-middle attack, Denial-of-service attack, and Social engineer-
information (Alhayani et al., 2021). In general, cyber-security
ing (Huang et al., 2020). Table 1 summarizes the various security
threats are divided into three categories (Gunes et al., 2021): solutions available to companies.
(a) Cyber-crime: A person or group that targets systems to
2.3. Deep learning
monetize or sabotage;
(b) Cyber-attack: Often politically motivated with the goal of Deep learning is a part of machine learning and examines on
purposefully gathering information; the study and development of machines that can learn (Liu and
8003
C. Ma Energy Reports 7 (2021) 7999–8012

Table 1
A summary of the various security solutions available to companies and organizations.
Type of cyber security Description
Critical infrastructure Providing cyber-security to critical infrastructure means protecting communications networks, energy transmission networks,
security water purifiers, traffic lights, points of sale, and health centers. These centers may not be directly related to cyber-attacks,
but they can be used as a platform for malware to enter the endpoints of the systems to which they are connected.
Network security Network security protects the computer network from disruptors, which can be malware or hacking. Network security is a
set of solutions that enable organizations to keep computer networks out of the reach of hackers, organized attackers, and
malware.
Improve security by relying Software and hardware solutions such as intrusion detection systems, firewalls, intrusion prevention systems, anti-virus, and
on security programs anti-malware can be used to protect applications.
Information security Information security protects data integrity and privacy. This is done both in storage media and when transferring data.
Improve security by relying Most organizations seek to use artificial intelligence to improve their businesses, enhance customer experience, and improve
on the cloud performance. By implementing potential security solutions, cloud service companies are allowing organizations to store and
manage large amounts of data that are prone to security challenges outside of the corporate network.
Post-disaster recovery plan In the event of a cyber-attack, it is best to use a post-disaster recovery program to restore healthy information so that
businesses can continue (disaster recovery and business continuity)
Operational security Operational security includes the processes and decisions that are taken to control and protect data.
IoT security Intelligent equipment and sensors that interact with the IoT ecosystem can best protect commercial equipment by providing
companies with instant information that provides accurate reporting on equipment performance.
User training User training refers to unpredictable cyber-security. Anyone can accidentally get a virus into the security system. User
training to remove suspicious email attachments, not connecting to anonymous USBs, and other critical issues should be part
of any company’s corporate security plan.
Application security Application security focuses on the maintenance of software and devices. Before implementing the device or program, its
security must be provided.

Fig. 7. Classification of deep learning methods. (Note that: CNN: Convolutional Neural Networks; SPP: Spatial Pyramid Pooling; VGG: Visual Geometry Group; RBM:
Restricted Boltzmann machine; SPM: Spatial Pyramid Matching)

8004
C. Ma Energy Reports 7 (2021) 7999–8012

Zhang, 2021). In other words, deep learning with data processing cause erroneous warnings and cause public fear (Marahatta et al.,
and similar to a human, by learning pre-learned examples, tries 2021). Eavesdropping on consumer data reported from a smart
to extract specific features automatically, through the number of building to a smart meter by an attacker is a major risk to
sequential layers in its structure in order to create a model for customer privacy. In addition, forging a customer identity by
decision-making in solving a problem (Nagarajan et al., 2021). an attacker to remotely control building equipment can cause
The existence of this number of different layers allows deep various damages to the customer (Parasol, 2016).
learning to be able to discover specific features of the problem High dependence on the information network certainly ex-
in each layer and use it to make better decisions in solving the poses the smart grid to possible vulnerabilities related to com-
problem (Liu et al., 2020). Deep learning is based on uninter- munications and grid equipment. In traditional power grids, grid
rupted investigation and discovery of complex data structures. control systems were kept isolated from insecure environments
The learning process is achieved by building computational mod- such as the Internet. However, in the smart grid, cyber-attacks
els called neural networks that are inspired by the structure of the on the grid infrastructure can be easily carried out from different
brain (Lee et al., 2021). The structure of the network consists of parts of the infrastructure (Ben Slama, 2021). For example, an
several processing layers. Deep learning seeks the efficiency of the attacker does not need to access enclosed sites or systems (such
unknown structure in the input distribution in order to discover as generators, substations, command centers, etc.) to damage the
good representation by a hierarchical structure of concepts that power delivery process. An attacker can easily launch an attack
are the same as the processing layers (Zhang et al., 2021). Deep from anywhere on the smart grid (Dehdarian and Tucci, 2021).
learning is now able to create new data after learning from unla- Malicious intrusion into the grid will have various severe conse-
beled input data. Hence, it has become a ‘‘creative intelligence’’. quences for the smart grid. These consequences include leaks of
For example, conflict generating networks, which are the most customer information, sequences of failures such as massive shut-
popular deep generating models today, can produce high quality downs, and failure of generators and infrastructure (Singh et al.,
images, improve image quality, convert image to text, and be used 2021). The smart distribution grid is a set of new technologies
in cyber-security to simulate attacks, help medicine diagnose whose main purpose is to modernize the electricity distribution
cancer with new realistic scans and be used in a wide range of grid by integrating telecommunication systems and information
other endless possibilities (Aslam et al., 2020). Note that, deep technology in it. Smart distribution grid information infrastruc-
learning following artificial intelligence has entered the field. This ture consists of a set of software and databases. Smart grid
learning has come to the aid of artificial intelligence to respond information infrastructure software needs to communicate with
more naturally to human needs and wants. Fig. 7 shows the each other in order to function properly and coordinate (Panda
classification of deep learning methods with the work done with and Das, 2021). Millions of vital equipment is used in smart grid,
each of methods. Convolutional and recurrent neural networks and this equipment is related to SCADA server. Cyber-attacks on
are common types of neural networks. SCADA systems such as STUXNET are rigid threats to that sys-
The former is a deep learning algorithm that receives the input tem. Currently, the Open-Source Vulnerability Database contains
image, and assigns importance to each of the objects/aspects in 1096 vulnerabilities related to industrial control systems (Ma-
the image and is able to distinguish them from each other. This sood et al., 2019). Table 2 describes the security threats of this
algorithm requires less pre-processing compared to other classifi- subsystem.
cation algorithms. While the primary method filters are manually One of the security challenges of smart buildings is privacy
engineered, the convolutional neural network acquires the ability breaches. User privacy is a major concern in the smart grid. To
to learn these filters/specifications with sufficient training (Tem- optimize smart grid performance and maximize user benefits,
bely et al., 2021). Latter is a type of artificial neural network high-frequency user power consumption data is transferred from
used in speech recognition, natural language processing, as well users’ smart meters to other smart grid entities (Li et al., 2021).
as in sequential data processing. Unlike convolutional, recurrent This compromises user privacy. Sensitive information about the
neural networks have a feedback layer in which the network user may be disclosed, such as the user’s power consumption pat-
output, along with the next input is returned to the network. terns, the type of electrical equipment used, whether the building
Recurrent neural network can remember its previous input due to is empty or full, etc. (Kumar et al., 2021). In addition, traces left
its internal memory and use this memory to process a sequence by electric vehicle charges can be used by various entities such
of inputs. In other words, recurrent neural networks consist of a as charging stations and suppliers to profile the consumption
recursive loop that prevents information from previous moments and location of electric vehicles and violate the privacy of users.
from being lost and remains in the network (Su et al., 2021). Fig. 8 Furthermore, by eavesdropping the attacker may obtain private
shows the illustrations of these two neural networks. information about the client and violate privacy (Xie et al., 2021).
Another security challenge of smart buildings is change or repeats
3. Cyber security in smart cities the message. An attacker could challenge the security of a smart
building by changing or repeating various messages. An attacker
Cities need to adopt new smart technologies to become smart. could change messages containing smart meter measurement
Every new technology or urban system gives a new opportunity data (Alanne, 2021). Since measurement data is used for a variety
to cyber attackers. For example, many communications between of purposes (such as managing power flows in the grid, planning
traffic control systems and traffic lights in intelligent traffic con- future grid development, building new generation capacity, and
trol systems take place without any encryption or authentication, billing), manipulation of valid data can cause financial losses
allowing the attacker to modify or forge data (Tabaa et al., 2020). to smart grid entities and undermine grid stability. An attacker
One of the most important attacks on the smart grid is the denial could insert new consumption messages or repeat old consump-
of service through channel congestion, computational flooding of tion messages of a device into the smart meter and impose a
equipment with low computing power (such as smart meters), financial charge on the customer for energy that has not been
distributed denial of service to SCADA, or delaying a time-critical consumed (Kermani et al., 2021). The customer sells electricity to
message that may cause widespread shutdown (Marahatta et al., the grid by installing distributed energy sources in the building
2021; Ebrahimian et al., 2018). Forgery of data from various if needed. It also imports energy from the smart grid by using
sensors is another potential threat in the urban area; For example, an electric vehicle in an emergency to protect the grid from
forging sensors to detect earthquakes, floods, shootings, etc. can overload breakdowns (Shamel et al., 2016). Any message sent
8005
C. Ma Energy Reports 7 (2021) 7999–8012

Fig. 8. Illustrations of two common types of neural networks.

Table 2
Security threats to power grid subsystems (Ahmed Jamal et al., 2021; Al-Ghamdi, 2021; Alghamdie, 2021).
Type of security threat Description
Denial of Service One of the main goals of the attackers is to disrupt the monitoring and control activities of the SCADA Center. Traffic flood attacks
from various systems connected to SCADA can prevent the service of this center. Attackers try to disrupt the smart grid by
consuming computing resources and bandwidth.
Forgery of identity An attacker can disrupt the identity of any of the control and monitoring devices. For example, if an attacker poses as an
intelligent electronic monitoring device, it can send fake open/close messages to the switches, disrupting the subscribers’ power
protection and power outage systems.
Delay Some of the messages exchanged in the transmission and distribution system are time-critical and must be transmitted within a
short period of time (3 to 500 ms). It is enough for the attacker to delay sending these messages a little, to have the effect of
denial of service attack.
Distort the message Targeted change of messages sent to the control centers causes incorrect view of the grid status to the control center. As a result,
incorrect control messages are sent to various devices and the normal operation of the grid is disturbed.
Eavesdropping Eavesdropping on information sent from various equipment and sensors to the SCADA center gives the attacker sufficient
knowledge of the power situation and provides the potential for further attacks such as change or repetition.

from the smart grid to the smart building can be manipulated for electricity consumption. Changing the messages containing
by the attacker and cause large-scale instability of the smart dynamic electricity price signals from the electricity market to
grid (Mashayekhi and Heravi, 2020). The malicious customer can the customer causes receiving wrong prices from the customer
change the message containing the building consumption data and as a result inappropriate decisions for when to use high-
from the smart meter to the electricity company and refuse to pay consumption electrical appliances by the customer and finally
8006
C. Ma Energy Reports 7 (2021) 7999–8012

Fig. 9. Basic items of the security challenges of smart buildings.

impose a financial burden on the customer and increase load holds messages packets from the system that may contain vital
on the smart grid (Salerno et al., 2021). In addition, an attacker data for specific recipients (Saharan et al., 2020). One purpose
could act as a smart meter and report incorrect amounts of energy of attack could be to forbid insurance authorities from being
consumption to the smart grid, and incorrectly request/enter aware of the accident involving the attacking vehicle or to avoid
energy signals to be distributed to energy sources and electric reporting the accident to roadside access points. Eventually, hard-
vehicles, or receive signals from the smart grid. The attacker ware manipulation occurs when in-vehicle sensors or roadside
can also position himself as a customer and remotely control unit hardware are tampered with by attackers. For example, an
the building’s electrical equipment. In the impersonation of the attacker could manipulate traffic lights in front of him that are
device by the attacker, the customer makes a mistake in remote always green (Chen et al., 2017).
control and does not control the considered device (Feng et al., Security vulnerabilities in smart healthcare technologies will
2020). Fig. 9 shows the basic items of the security challenges of have different outcomes for sick. Security vulnerabilities in ser-
smart buildings. vice procurers can result in legal penalties, financial losses, or loss
The types of security challenges in a smart transportation of reputation (Cao et al., 2020). Since wearable medical devices
system can be divided into suspend message, fake information, determine health status of an individual they can easily violate a
denial of service, forgery of identity, eavesdropping, and hard- person’s privacy. In addition, because the device is accompanied
ware manipulation. Fake information occurs when information by the patient, the capability to show the system can easily
sent by an attacker, such as certificates, alerts, security messages, determine the absence or presence of a person in a specific place
and IDs, is incorrect. The attacker alters, falsifies, or repeats data and violate the spatial privacy of the user. Moreover, by tracking
to mislead other drivers (Xie et al., 2020). Denial of service oc- the connections between the source and destination nodes, it is
curs when attackers send large volumes of irrelevant messages, easy to locate patients and service providers and thus violate
clogging the communication channel and consuming computing their location (Yang et al., 2021). Today, most applications of
resources of other nodes. The purpose of this attack type is to private health have been expanded for tablets and smartphones.
disable the case network of a vehicle that can have vital conse- Conservation approaches are mostly not sufficient for these appli-
quences in the event of an emergency (Yan et al., 2020). Also, cations. Many smartphone applications send information to third
forgery of identity occurs when an attacker pretends to be an parties without the user’s notice, including the unique device ID,
authenticated vehicle or a roadside unit. Attackers use malicious phone location, and even personal information such as age and
IDs that have been hacked to inject malicious information into the gender. Malware may access a variety of information, including
network and mislead other vehicles. Eavesdropping also occurs text messages, calls, videos, and call history, as part of a health
when an attacker in a car or on a fake roadside unit eavesdrops care program. Malware can forward fake messages to people in
on wireless communications in a car network (Geng et al., 2019). the contact list or record audio (Zhong et al., 2021). On the other
An attacker could gain access to the confidential data of the target hand, online health-based social networks are widely used by
vehicles, including the real identity of the drivers, their priorities users. There are several vulnerabilities in various components of
or even their credit card information, and seriously infringe on these social networks including client side code, server side code,
the drivers privacy. Message suspension occurs as an attacker web server, etc. These vulnerabilities allow an attacker to perform
holds messages for a while before sending. An attacker electively various attacks, including stealing a user’s session, changing a
8007
C. Ma Energy Reports 7 (2021) 7999–8012

website, publishing a worm, accessing unauthorized resources, (2016) proposed three design and use checklists for encryption,
stealing an ID, etc. (Tian et al., 2019). The communication channel access permissions, authentication, and software updates when
that connects the nodes may be implemented by physical media performing new projects, manual and safe cancellation in all
and various routing and communication protocols. The physical urban systems, and develop operational plans and procedures to
layer of the network must be resistant to a variety of attacks, respond to cyber-attacks solutions to maintain cyber-security and
including congestion, eavesdropping, and blocking. Most commu- privacy in smart cities. Cerrudo et al. (2015) proposed one of
nications between monitoring devices, body sensors, and medical the most feasible solutions for smart city cyber-security. In that
care providers are wireless (Tariq et al., 2020). Therefore, secu- report, guidance was provided to infrastructures for choosing and
rity issues of wireless communications in medical care networks checking smart city-related systems. Their investigation was on
are also raised. Bluetooth, for example, which is widely used in providing suitable evaluation and testing strategies when select-
medical applications, is prone to man-in-the-middle attacks and ing these technologies and related vendors. Chen et al. (2021)
battery discharge. Finally, an attacker could exploit vulnerabilities provided a general investigation of available cyber-security based
in the hardware of medical devices to launch attacks (Creaney on six deep learning classifications. They presented the potential
et al., 2021). study points in the cyber-security. Fard et al. (2020) proposed
a multi-view ensemble method that combined the findings of
3.1. Literature review single classifiers. Their study modified a low-cost lazy approach
with various points for threat hunting. Habibzadeh et al. (2019)
In general, researchers have discussed cyber security chal- concluded that smart city usages were able to build security
lenges and threats to users’ privacy in smart cities from different vulnerabilities. In addition, destroying security vulnerabilities in-
points of view, the most important of which are mentioned volved both government and system entities. Smart cities could
below. be considered as a security level. Said and Tolba (2021) provided
AlDairi (2017) with a detailed review of research related to a deep learning model to predict the IoT communication systems
major security challenges and current solutions in smart cities performance based on a dynamic neural network approach to
introduced infrastructure security as an effective factor on infor- achieve the prediction processes. They found that the model had
mation and data security in smart cities. There are many risks a significant positive impact on the sustainable smart cities and
and vulnerabilities in the physical-cyber substructure benefits in eliminated the errors of the IoT communication system. Khan
urban intelligence. Urban infrastructure, including power sup- et al. (2021) provided a combined deep learning approach for
ply, water distribution, streets, buildings, etc. faces numerous traffic information prediction and assimilation. Results showed
betterment in accuracy, time, and faults. Ghiasi et al. (2021a)
security threats in main physical-cyber systems. These compo-
investigated the Hilbert–Huang transform approach to detecting
nents and systems include cameras, communication networks,
false data injection attacks in the micro-grid. Their work was
building management systems, transportation management sys-
based on the block-chain ledger technology and investigation of
tems. Ijaz et al. (2016) divided privacy challenges into commu-
the current and voltage signals in sensors. They found that the
nication and business privacy. Communication privacy challenges
proposed method could increase the security of data exchange
included eavesdropping, denial of service, malicious manipulation
in the micro-grid and provide a more accurate and robust de-
and attacks, channel attacks, detection, and secondary use. In
tection method. Dehghani et al. (2021) determined the indexes
addition, phishing business privacy challenges included scams
of the switching surface in the sliding mode controllers based
and attacks on data integrity. Baig et al. provided a comprehen-
on the composition of singular value decomposition and Fourier
sive view of a smart city security prospect, identifying security
transform. They also examined the proposed design in different
threats, and in-depth insights into digital smart city surveys.
types of false data injection attacks. The results showed that the
They identified security challenges based on city institutions,
proposed method is able to reduce the detection time of the
including smart grids, security of building automation systems,
attack. In addition, their design had 96% accuracy in detecting at-
drone safety, smart vehicles, IoT sensors, and cloud space. Arabo
tacks. Ghiasi et al. (2021b) investigated the resilience concepts in
(2015) investigated the functions and challenges of cyber-security power grids with introducing the evaluation process components.
of smart devices in connected smart buildings. He studied some They also provided a resilient substations optimum layout in the
of the backgrounds related to the development and demand for Noorabad grid. They used the gray wolf optimization algorithm
connecting smart devices to provide different capabilities and to determine the optimal values of the grid. Results revealed that
capabilities to users. Then he showed that these devices, de- the proposed method and the provided optimization are able to
spite their capabilities, also have risks and challenges. Finally, he improve performance and reduce grid costs.
discussed cyber-security issues related to smart devices in con-
nected smart buildings. According to that work, challenges such 4. Deep learning for smart cities
as data leakage, data manipulation, data loss and malware are
considered as the main challenges facing smart buildings. Thing In a smart city, there are many Internet of Things sensors at
(2014) investigated the prospect of existing global smart cities various data collection places to collect information on traffic,
and the security challenges and concerns in any of its main areas. citizen mobility, and drainage, so that the perceptions gained
He presented the possibility for cyber security to create a smart, from this data can be benefits to operate assets and resources (Ba-
safe and secure city. He identified security challenges and con- sori et al., 2019). DL is widely used on information collected
cerns facing key parts of the smart city, including finance, health- by researchers. The following are important applications of deep
care, government, energy, and general security concerns. Khatoun learning in smart cities (Li et al., 2019; Ashraf et al., 2021):
and Zeadally (2017) introduced the basic meanings of smart city 1- Urban modeling:
design and reviewed new layouts around the smart city. After Numerous studies have used machine learning to identify low-
defining many privacy subjects and security vulnerabilities in income areas, traffic rates in different areas for cities. Another
smart cities, they discussed various solutions, suggestions and use for urban fashion refers to DL-assisted smart parking, which
standards related to these issues applications. In addition, they identifies the most suitable place to park.
examined the main challenges facing smart cities from the per- 2- Infrastructure:
spectives of smart city cyber-security architecture and security Infrastructure, as the backbone of cities, plays a key role in
and privacy concerns of different parts of smart city. Alibasic et al. solving urban challenges, and the best decision can be made by
8008
C. Ma Energy Reports 7 (2021) 7999–8012

Table 3
Most important points of cyber security.
Report a data breach Hire a security expert to protect your information.
Obtain permission for business applications that require user data. Anonymize data to protect people’s privacy.
Do not disclose information publicly so that you do not have to answer to In case of data deficiency, report it to the relevant authorities as soon as
legal entities. possible.
Do not click on links in an email from an anonymous sender or an unfamiliar Invest in the purchase and use of tools that restrict access to information,
website. restrict access by third parties or contractors to corporate information, and
continually scan devices, databases, and leaking information.
Use long, complex passwords with two-factor or multi-factor authentication It is best to use secure communication mechanisms such as a virtual private
to secure access to user accounts. Given that the authentication mechanism network to connect to the enterprise network. This prevents hackers from
uses two or more different layers of security to secure access to accounts, if a easily implementing middle-man attacks.
hacker can accurately guess the password to the account, there is still an
additional security step to take over the account. .
It is best not to use public Wi-Fi to connect to corporate networks or send Update your software and operating system. It is better to use the latest
sensitive information, as it is possible for a hacker to intercept information. patches - Patch.
Use antivirus software. This security solution detects and clears threats. Do not open attachments received from anonymous senders as they may
Remember to always keep your antivirus up to date. contain malware.

using DL on monitored data such as traffic rates, energy con- Challenges along the way include the need for lightweight ML
sumption, and so on. One of the applications is the use of ML for algorithms for limited resources, datasets used for in-depth learn-
network routing to prevent traffic congestion. ing programs that are sometimes not readily available enough
3- Transportation: to validate results through simulation, and devices that ensure
The transportation system connects people, vehicles, substruc- security Deep learning-based systems include a camera, recording
ture and logistics copartners through the cloud platform and AI. servers and a video control center. These cameras are connected
One of its applications is to create safety in transportation in the to each other through a standard and secure protocol and are
event of accidents. processed by processors such as Intel. By using powerful pro-
4- Urban management: cessors, not only does it increase the performance and power of
Public management plays an important role in analyzing gov- video analysis by 8–10 times, but also their storage space is opti-
ernance policies and urban characteristics and also helps to un- mized (Ahmed et al., 2021). The advantage of cameras equipped
derstand the changing needs of the smart city. with deep learning system is that instead of sending all the videos
5- Resilience and sustainability: to the central operator, they send a warning as soon as an illegal
Data production is rising over time. There is an urgent require- case is detected and red lines are set, and reduce the amount of
ment to expand an effective system to portion the data that can time delay before any action is taken. Most cities today have video
be benefits to improve smart cities. The most important challenge systems that have different cameras, ports and software at the
is the limitation of environmental resources. This can be solved same time. Software development interfaces and kits generally
by modeling a smart grid that can decline pollution rates, and it allow communication between hardware and software and are
contributes to a better life. For example, research has provided a managed by single cloud management software (Sahil and Sood,
solution for optimal decision-making in the direction of industrial 2021).
waste management using neural networks.
6- Education: 5. Prospects of cyber security in smart cities
Big data analysis provides an opportunity to analyze the psy-
chology of people under training. For example, a new emotion- Over the past few years, governments have taken cyber-
sensitive method for determining students’ interest in lessons security more seriously. The GDPR is a prime example of what has
based on their head position and facial expressions has been required organizations operating in the EU to comply with strict
proposed using machine learning techniques. Such methods can EU rules, an approach that has been able to significantly prevent
answer the major challenge we face in online learning, which is data breaches. The most important points of cyber security that
not interacting with the teacher. should be pay special attention are given in Table 3. There
7- Health: are several promising directions for implementing deep learn-
Artificial intelligence has paved the way for the development ing techniques in smart cities. Clearly, an educational approach
of solutions of smart healthcare by new senses such as DL. Con- makes exact findings when the results of the set and similar
cepts such as transfer learning models and DL had been very features of the teaching and test information. Learning transfer
useful in classification. For example, diagnosing and predicting is the next study topic in which the repartition of teaching and
breast cancer using these techniques has been more accurate than test is changed or transmitted from a system to other platform.
traditional methods. In addition, scholars can investigate on integrating semantic
8- Security and privacy: systems into smart city usages to better performance.
Smart cities are the epitome of great innovation in ICT. Smart
cities citizens are jointed via smartphones and artificial and in- 6. Conclusion
tegrated tools such as the Internet of Things, which leads to an
unimaginable experience of comfort and improvement lifestyle. In this study, two important and complex issues including
Although systems such as smart meters, building equipment, privacy and cyber-security in the smart city were examined. The
and health systems make such conveniences possible, they also cyber-security of smart city is still in its infancy, and there are
bring with them challenges; including data privacy and security still many policies, architectures, plans and technical solutions in
and maintaining information totality, as well as denying unau- this important field. A review of the research literature in the
thorized access. DL and relevant systems had been prosperous field of smart cities found that some studies have provided useful
in equipping prosperous solutions for security breaches using guidance for policymakers and city managers who sought to
IoT. For example, one successful performance is the use of the better define and implement smart city strategies and operational
Random Forest algorithm, which is used to detect anomalies in plans. Other studies have described the architecture of deploying
IoT distributed devices (Anomaly Detection). and testing the IoT in the smart city to provide a platform for
8009
C. Ma Energy Reports 7 (2021) 7999–8012

testing and evaluating concepts on a large scale under real-world AlDairi, A., 2017. Cyber security attacks on smart cities and associated mobile
conditions, but a limited number of studies have studied cyber- technologies. Procedia Comput. Sci. 109, 1086–1091.
Alghamdie, M.I., 2021. A novel study of preventing the cyber security threats.
security and privacy. Users in the smart city noticed that the
Mater. Today: Proc..
study gap in this area was noticeable. Security includes illegal Alhayani, B., et al., 2021. Effectiveness of artificial intelligence techniques against
access to information and attacks that cause physical disruption cyber security risks apply of IT industry. Mater. Today: Proc..
to access to services. With the growth of population information Alibasic, A., et al., 2016. Cybersecurity for smart cities: A brief review. In:
technology in cities, it is imperative to have advanced manage- International Workshop on Data Analytics for Renewable Energy Integration.
Springer.
ment approaches that use the latest technologies and platforms
Arabo, A., 2015. Cyber security challenges within the connected home ecosystem
to make urban services smarter. Smart cities are a new kind futures. Procedia Comput. Sci. 61, 227–232.
of integration of information and communication technologies. Ashraf, J., et al., 2021. IoTBoT-IDS: A novel statistical learning-enabled botnet
By connecting and integrating systems, the rate of attacks and detection framework for protecting networks of smart cities. Sustainable
vulnerabilities will increase. On the other hand, the more data Cities Soc. 72, 103041.
Aslam, M., Lee, J.-M., Hong, S., 2020. A multi-layer perceptron based deep
is generated about the location and activities of digital citizens,
learning model to quantify the energy potentials of a thin film a-Si PV
the more unstable privacy will be. Therefore, it is important to system. Energy Rep. 6, 1331–1336.
provide solutions with a focus on sustainable cyber security and Atitallah, S.B., et al., 2020. Leveraging deep learning and IoT big data analytics to
risk reduction strategies. The research in this study showed that support the smart cities development: Review and future directions. Comp.
meeting these challenges depends on the hard work of govern- Sci. Rev. 38, 100303.
Baig, Z.A., et al., 2017. Future challenges for smart cities: Cyber-security and
ments, developers of equipment and software and companies digital forensics. Digit. Investig. 22, 3–13.
providing IT security services. In addition, designing flexible sys- Barr, S., et al., 2021. Smart Cities and Behavioural Change: (Un)Sustainable
tems with high information protection capabilities is essential to Mobilities in the Neo-Liberal City. Geoforum.
prevent serious security incidents as these incidents can lead to Basori, A.H., et al., 2019. iMars: Intelligent municipality augmented reality service
for efficient information dissemination based on deep learning algorithm in
disastrous financial, data, credit and loss of public trust. Since
smart city of Jeddah. Procedia Comput. Sci. 163, 93–108.
cyber security challenges and threats to users’ privacy are not Behzad, r., Mehrpooya, M., Marefati, M., 2021. Parametric design and per-
equally important in the smart city, and relevant authorities formance evaluation of a novel solar assisted thermionic generator and
and policymakers have limited resources to respond to them, it thermoelectric device hybrid system. Renew. Energy 164, 194–210.
is recommended that future research provide a mechanism for Belhadi, A., et al., 2021. Deep learning for pedestrian collective behavior analysis
in smart cities: A model of group trajectory outlier detection. Inf. Fusion 65,
assessing and rating.
13–20.
Ben Slama, S., 2021. Prosumer in smart grids based on intelligent edge com-
CRediT authorship contribution statement puting: A review on artificial intelligence scheduling techniques. Ain Shams
Eng. J..
Chen Ma: Conceptualization, Investigation, Formal analysis, Bjørner, T., 2021. The advantages of and barriers to being smart in a smart city:
The perceptions of project managers within a smart city cluster project in
Writing – original draft, Writing – review & editing.
Greater Copenhagen. Cities 114, 103187.
Cao, L., et al., 2020. Electrical load prediction of healthcare buildings through
Declaration of competing interest single and ensemble learning. Energy Rep. 6, 2751–2767.
Cerrudo, C., Hasbini, A., Russell, B., 2015. Cyber Security Guidelines for Smart
The authors declare that they have no known competing finan- City Technology Adoption. Cloud Security Alliance.
Chatfield, A.T., Reddick, C.G., 2019. A framework for Internet of Things-enabled
cial interests or personal relationships that could have appeared
smart government: A case of IoT cybersecurity policies and use cases in U.S.
to influence the work reported in this paper. federal government. Gov. Inf. Q. 36 (2), 346–357.
Chen, Z., 2021. Application of environmental ecological strategy in smart city
Acknowledgments space architecture planning. Environ. Technol. Innov. 23, 101684.
Chen, Y., Ardila-Gomez, A., Frame, G., 2017. Achieving energy savings by
intelligent transportation systems investments in the context of smart cities.
National key R & D Program ‘‘Research on innovative business Transp. Res. D 54, 381–396.
operation and strategic technology system of invigorating police Chen, D., Wawrzynski, P., Lv, Z., 2021. Cyber security in smart cities: A review
by science and technology’’ (No. 2020YFC0832604); Key Scientific of deep learning-based applications and case studies. Sustainable Cities Soc.
Research Projects of the China People’s Police University ‘‘Intelli- 66, 102655.
gent fire risk assessment and early warning technology based on Creaney, R., Reid, L., Currie, M., 2021. The contribution of healthcare smart homes
to older peoples’ wellbeing: A new conceptual framework. Wellbeing Space
big data analysis’’ (No. ZDZX202102). Soc. 2, 100031.
Dehdarian, A., Tucci, C.L., 2021. A complex network approach for analyzing early
References evolution of smart grid innovations in Europe. Appl. Energy 298, 117143.
Dehghani, M., et al., 2021. Fourier singular values-based false data injection
Aborokbah, M.M., et al., 2018. Adaptive context aware decision computing attack detection in AC smart-grids. Appl. Sci. 11 (12).
paradigm for intensive health care delivery in smart cities—A case analysis. Ebrahimian, H., et al., 2018. The price prediction for the energy market based
Sustainable Cities Soc. 41, 919–924. on a new method. Econ. Res. 31 (1), 313–337.
Aghajani, G., Ghadimi, N., 2018. Multi-objective energy management in a Eini, R., et al., 2021. Smart building management system: Performance
micro-grid. Energy Rep. 4, 218–225. specifications and design requirements. J. Build. Eng. 39, 102222.
Ahmad, T., Zhang, D., 2021. Using the Internet of Things in smart energy systems El Hilali, S., Azougagh, A., 2021. A netnographic research on citizen’s perception
and networks. Sustainable Cities Soc. 68, 102783. of a future smart city. Cities 115, 103233.
Ahmed, I., et al., 2021. Adapting Gaussian YOLOv3 with transfer learning for Fard, S.M.H., et al., 2020. Ensemble sparse representation-based cyber threat
overhead view human detection in smart cities and societies. Sustainable hunting for security of smart cities. Comput. Electr. Eng. 88, 106825.
Cities Soc. 70, 102908. Feng, W., et al., 2020. A conditional value-at-risk-based dispatch approach for the
Ahmed Jamal, A., et al., 2021. A review on security analysis of cyber physical energy management of smart buildings with HVAC systems. Electr. Power
systems using machine learning. Mater. Today: Proc.. Syst. Res. 188, 106535.
Al Dakheel, J., et al., 2020. Smart buildings features and key performance Geng, L., et al., 2019. Smart charging management system for electric vehicles in
indicators: A review. Sustainable Cities Soc. 61, 102328. coupled transportation and power distribution systems. Energy 189, 116275.
Al-Ghamdi, M.I., 2021. Effects of knowledge of cyber security on prevention of Ghiasi, M., et al., 2021a. Cyber-attack detection and cyber-security enhancement
attacks. Mater. Today: Proc.. in smart DC-microgrid based on blockchain technology and Hilbert Huang
Al-Saidi, M., Zaidan, E., 2020. Gulf futuristic cities beyond the headlines: transform. IEEE Access 9, 29429–29440.
Understanding the planned cities megatrend. Energy Rep. 6, 114–121. Ghiasi, M., et al., 2021b. Resiliency/cost-based optimal design of distribution
Alanne, K., 2021. A novel performance indicator for the assessment of the network to maintain power system stability against physical attacks: A
learning ability of smart buildings. Sustainable Cities Soc. 72, 103054. practical study case. IEEE Access 9, 43862–43875.

8010
C. Ma Energy Reports 7 (2021) 7999–8012

Gunes, B., Kayisoglu, G., Bolat, P., 2021. Cyber security risk assessment for Panda, D.K., Das, S., 2021. Smart grid architecture model for control, optimization
seaports: A case study of a container port. Comput. Secur. 103, 102196. and data analytics of future power networks with more renewable energy.
Habibzadeh, H., et al., 2019. A survey on cybersecurity, data privacy, and policy J. Cleaner Prod. 301, 126877.
issues in cyber–physical system deployments in smart cities. Sustainable Parasol, M., 2016. The impact of China’s 2016 cyber security law on foreign
Cities Soc. 50, 101660. technology firms, and on China’s big data and smart city dreams. Comput.
Hasan, S., et al., 2021. Evaluating the cyber security readiness of organizations Law Secur. Rev. 34 (1), 67–98.
and its influence on performance. J. Inform. Secur. Appl. 58, 102726. Qayyum, S., et al., 2021. Managing smart cities through six sigma DMADICV
Huang, W., Marefati, M., 2020. Energy, exergy, environmental and economic method: A review-based conceptual framework. Sustainable Cities Soc. 72,
comparison of various solar thermal systems using water and Thermia oil B 103022.
base fluids, and CuO and Al2O3 nanofluids. Energy Rep. 6, 2919–2947. Razmjoo, A., et al., 2021. Effective policies to overcome barriers in the
Huang, J., et al., 2020. Secure remote state estimation against linear development of smart cities. Energy Res. Soc. Sci. 79, 102175.
man-in-the-middle attacks using watermarking. Automatica 121, 109182. Saharan, S., Bawa, S., Kumar, N., 2020. Dynamic pricing techniques for intel-
Ijaz, S., et al., 2016. Smart cities: A survey on security concerns. Int. J. Adv. ligent transportation system in smart cities: A systematic review. Comput.
Comput. Sci. Appl. 7 (2), 612–625. Commun. 150, 603–625.
Jeong, H., et al., 2021. A comprehensive survey on vehicular networking for safe Sahil, Sood, S.K., 2021. Smart vehicular traffic management: An edge cloud
and efficient driving in smart transportation: A focus on systems, protocols, centric IoT based framework. Internet of Things 14, 100140.
and applications. Veh. Commun. 31, 100349. Said, O., Tolba, A., 2021. Accurate performance prediction of IoT communica-
Kashef, M., Visvizi, A., Troisi, O., 2021. Smart city as a smart service system: tion systems for smart cities: An efficient deep learning based solution.
Human–computer interaction and smart city surveillance systems. Comput. Sustainable Cities Soc. 69, 102830.
Hum. Behav. 124, 106923. Salerno, I., et al., 2021. Adaptable energy management system for smart
Katsantonis, M.N., Mavridis, I., Gritzalis, D., 2021. Design and evaluation of buildings. J. Build. Eng. 102748.
COFELET-based approaches for cyber security learning and training. Comput. Sayed, K., Gabbar, H.A., 2017. SCADA and smart energy grid control automation.
Secur. 105, 102263. In: Gabbar, H.A. (Ed.), Smart Energy Grid Engineering. Academic Press, pp.
Kermani, M., et al., 2021. Intelligent energy management based on SCADA system 481–514, (Chapter 18).
in a real microgrid for smart building applications. Renew. Energy 171, Secinaro, S., et al., 2021. Towards a hybrid model for the management of smart
1115–1127. city initiatives. Cities 116, 103278.
Khan, S., et al., 2021. Deep learning-based urban big data fusion in smart cities: Sengan, S., et al., 2020. Enhancing cyber–physical systems with hybrid smart
Towards traffic monitoring and flow-preserving fusion. Comput. Electr. Eng. city cyber security architecture for secure public data-smart network. Future
89, 106906. Gener. Comput. Syst. 112, 724–737.
Khatoun, R., Zeadally, S., 2017. Cybersecurity and privacy solutions in smart Sengan, S., et al., 2021. Detection of false data cyber-attacks for the assessment of
cities. IEEE Commun. Mag. 55 (3), 51–59. security in smart grid using deep learning. Comput. Electr. Eng. 93, 107211.
Kourgiozou, V., et al., 2021. Scalable pathways to net zero carbon in the UK
Shamel, A., et al., 2016. Designing a PID controller to control a fuel cell voltage
higher education sector: A systematic review of smart energy systems in
using the imperialist competitive algorithm. Adv. Sci. Technol. Res. J. 10 (30).
university campuses. Renew. Sustain. Energy Rev. 147, 111234.
Singh, A., Chatterjee, K., 2021. Securing smart healthcare system with edge
Kumar, A., et al., 2021. Secure and energy-efficient smart building architecture
computing. Comput. Secur. 108, 102353.
with emerging technology IoT. Comput. Commun. 176, 207–217.
Singh, S.K., Jeong, Y.-S., Park, J.H., 2020. A deep learning-based IoT-oriented
Lebrument, N., et al., 2021. Triggering participation in smart cities: Political
infrastructure for secure smart city. Sustainable Cities Soc. 60, 102252.
efficacy, public administration satisfaction and sense of belonging as drivers
Singh, P., et al., 2021. Blockchain and homomorphic encryption-based privacy-
of citizens’ intention. Technol. Forecast. Soc. Change 171, 120938.
preserving data aggregation model in smart grid. Comput. Electr. Eng. 93,
Lee, K., Silva, B.N., Han, K., 2021. Algorithmic implementation of deep learning
107209.
layer assignment in edge computing based smart city environment. Comput.
Su, Q., et al., 2021. An optimized algorithm for optimal power flow based on
Electr. Eng. 89, 106909.
deep learning. Energy Rep. 7, 2113–2124.
Li, D., et al., 2019. IoT data feature extraction and intrusion detection system
Tabaa, M., et al., 2020. Green Industrial Internet of Things from a smart industry
for smart cities based on deep migration learning. Int. J. Inf. Manage. 49,
perspectives. Energy Rep. 6, 430–446.
533–545.
Tam, T., Rao, A., Hall, J., 2021. The bad and the missing: A narrative review of
Li, W., et al., 2020. Assessment of coordinated development between social
cyber-security implications for Australian small businesses. Comput. Secur.
economy and ecological environment: Case study of resource-based cities
102385.
in northeastern China. Sustainable Cities Soc. 59, 102208.
Li, P., et al., 2021. Scientometric mapping of smart building research: Towards Tao, H., et al., 2021. Shrewd vehicle framework model with a streamlined
a framework of human-cyber–physical system (HCPS). Autom. Constr. 129, informed approach for green transportation in smart cities. Environ. Impact
103776. Assess. Rev. 87, 106542.
Lim, C., Cho, G.-H., Kim, J., 2021. Understanding the linkages of smart-city Tariq, N., et al., 2020. Blockchain and smart healthcare security: A survey.
technologies and applications: Key lessons from a text mining approach and Procedia Comput. Sci. 175, 615–620.
a call for future research. Technol. Forecast. Soc. Change 170, 120893. Tembely, M., AlSumaiti, A.M., Alameri, W.S., 2021. Machine and deep learning
Liu, L., Zhang, Y., 2021. Smart environment design planning for smart city based for estimating the permeability of complex carbonate rock from X-ray
on deep learning. Sustain. Energy Technol. Assess. 47, 101425. micro-computed tomography. Energy Rep. 7, 1460–1472.
Liu, Y., et al., 2020. Analyzing the robotic behavior in a smart city with deep Thing, V.L., 2014. Cyber security for a smart nation. In: 2014 IEEE International
enforcement and imitation learning using IoRT. Comput. Commun. 150, Conference on Computational Intelligence and Computing Research. IEEE.
346–356. Thornbush, M., Golubchikov, O., 2021. Smart energy cities: The evolution of the
Lyu, C., Jia, Y., Xu, Z., 2021. Fully decentralized peer-to-peer energy sharing city-energy-sustainability nexus. Environ. Dev. 100626.
framework for smart buildings with local battery system and aggregated Tian, S., et al., 2019. Smart healthcare: Making medical care more intelligent.
electric vehicles. Appl. Energy 299, 117243. Glob. Health J. 3 (3), 62–65.
Marahatta, A., et al., 2021. Priority-based low voltage DC microgrid system for Uchendu, B., et al., 2021. Developing a cyber security culture: Current practices
rural electrification. Energy Rep. 7, 43–51. and future needs. Comput. Secur. 102387.
Maruf, M.H., et al., 2020. Adaptation for sustainable implementation of smart V, S.K., Prasad, J., Samikannu, R., 2018. Barriers to implementation of smart grids
grid in developing countries like Bangladesh. Energy Rep. 6, 2520–2530. and virtual power plant in sub-saharan region—focus Botswana. Energy Rep.
Mashayekhi, A., Heravi, G., 2020. A decision-making framework opted for smart 4, 119–128.
building’s equipment based on energy consumption and cost trade-off using Vitunskaite, M., et al., 2019. Smart cities and cyber security: Are we there yet?
BIM and MIS. J. Build. Eng. 32, 101653. A comparative study on the role of standards, third party risk management
Masood, Z., Samar, R., Raja, M.A.Z., 2019. Design of a mathematical model for the and security ownership. Comput. Secur. 83, 313–331.
stuxnet virus in a network of critical control infrastructure. Comput. Secur. Wang, W., et al., 2021. Computation-transferable authenticated key agreement
87, 101565. protocol for smart healthcare. J. Syst. Archit. 118, 102215.
Mehrpooya, M., et al., 2021. Numerical investigation of a new combined Witanto, J.N., Lim, H., Atiquzzaman, M., 2018. Smart government framework with
energy system includes parabolic dish solar collector, stirling engine and geo-crowdsourcing and social media analysis. Future Gener. Comput. Syst.
thermoelectric device. Int. J. Energy Res.. 89, 1–9.
Nagarajan, S.M., et al., 2021. Effective task scheduling algorithm with deep Xie, S., et al., 2020. The optimal planning of smart multi-energy systems
learning for Internet of Health Things (IoHT) in sustainable smart cities. incorporating transportation, natural gas and active distribution networks.
Sustainable Cities Soc. 71, 102945. Appl. Energy 269, 115006.
Nakano, S., Washizu, A., 2021. Will smart cities enhance the social capital of Xie, X., et al., 2021. Does historical data still count? Exploring the applicability of
residents? The importance of smart neighborhood management. Cities 115, smart building applications in the post-pandemic period. Sustainable Cities
103244. Soc. 69, 102804.

8011
C. Ma Energy Reports 7 (2021) 7999–8012

Yan, J., Liu, J., Tseng, F.-M., 2020. An evaluation system based on the self- Zhang, T., Bai, H., Sun, S., 2021. A self-adaptive deep learning algorithm for
organizing system framework of smart cities: A case study of smart intelligent natural gas pipeline control. Energy Rep. 7, 3488–3496.
transportation systems in China. Technol. Forecast. Soc. Change 153, 119371. Zhong, H., et al., 2021. An efficient and outsourcing-supported attribute-based
Yang, C.-H., Hsu, W., Wu, Y.-L., 2021. A hybrid multiple-criteria decision portfolio access control scheme for edge-enabled smart healthcare. Future Gener.
with the resource constraints model of a smart healthcare management Comput. Syst. 115, 486–496.
system for public medical centers. Socioecon. Plan. Sci. 101073. Zhou, X., et al., 2021. Information diffusion across cyber–physical-social systems
in smart city: A survey. Neurocomputing 444, 203–213.

8012

You might also like