Professional Documents
Culture Documents
A smart city is an idea of how cities may better serve its residents by utilising new types of
technology. A city is a significant human settlement that provides for the people who live there.
about technology. In this essay, we concentrate on the primary smart city domains—smart utilities,
smart transportation, smart dwellings, and smart healthcare
To reach the intelligence that we want in our smart domains, several IoT applications have been
created, ranging from small industrial IoT systems like nuclear and energy management systems to
personal gadgets like health trackers and smart watches. However, many of the IoT solutions for
smart cities now in use can be improved if the effectiveness of their security measures is taken into
account. Imperfect system security architectures
Introduction:
Smart cities are a new revolution that use a variety of cutting-edge technology, Including AI and Data
science, to improve the convenience of city life. A clear vision of a smart city has not yet been
established, but we can envision all the possibilities that it could have. Every smart city ultimately
represents the collective decision and vision of all parties concerned.
The basic requirements of a person include food, water, place, rest, travelling, safety and
security which make up the basic design of smart cities.
Smart transportation systems are in charge of quickly distributing resources and people across cities.
Smart homes are designed to provide comfortability for those living in cities. Smart healthcare
systems will be there to provide health security. Smart utility systems are necessary for the efficient
provision of operations. The few key smart city domains can be smart utilities, smart transportation,
smart residences, the widespread adoption of Internet of Things (IoT) devices will strengthen all
smart city areas.
to provide a comprehensive context and comprehend the key points by introducing the
characteristics, architecture, and common uses of smart cities.
Smart Healthcare
An overview of significant breakthroughs in smart healthcare and some potential links between
them are , One telehealth system that provides remote health monitoring and consultation services
for its users . In TMIS, IoT sensors are utilised to deliver real-time or recurring updates on patient
physiological data, including smart wearable body sensors, smart healthcare sensors, and other IoT
sensors. Medical practitioners can examine medical issues by collecting and analysing or monitoring
data such as ECG data, physical activity, and air quality on remote servers.
Smart Utilities:
An overview of significant smart utility developments and some potential links between them can
include three types of common smart utilities .
systems: smart grids, smart water management systems, and smart gas management systems. Our
gas systems are equipped with smart sensors as part of smart gas management systems, which are
primarily intended for system monitoring (load monitoring) and detection (gas or fire detection).
Cities can better monitor and operate their water systems thanks to smart water systems. Its
fundamental challenge is the lack of a uniform data interpretation and a consistent methodology to
construct a comprehensive water management infrastructure that includes every component of a
city's water network, leading to partial solutions that only handle particular issues in a given
situation.
Smart Transportation:
The goal of intelligence transport systems (ITS) is to enhance the road safety, effectiveness, and user
experience for all road users, including pedestrians, railway passengers, and other vehicles.
riders, motorcyclists, and everyone else who uses the society's transit system. Many smart
transportation applications have developed as a result, allowing us to transform our safety-critical
transportation system into one that is data-driven, interoperable, and equipped with real-time
intelligence.
The Internet-of-Vehicles , distributed trust, and intelligent traffic management systems are a few of
the major advancements in the direction of smart transportation, in addition to unmanned aerial
vehicles (UAVs) and smart charging for electric vehicles (EVs). An alternative trust is the distributed
Internet-of-Vehicle trust.
Smart Homes:
An automated home, commonly referred to as a smart home, is one that is outfitted with the
physical manifestation of an integrated and
Our quality of life has been improved by an automated, context-aware support system . Our
interactive home system's context awareness is what gives it intelligence. It acquires its perception
from sensor readings from Internet of Things (IoT) devices, which quantify the physical phenomena
arising from human activities and convey the environment surrounding the occupant . A smart home
is one that is data-driven, context-aware, individualised, and interoperable, to put it briefly.Their
integration with the internet of things is one of the most important improvements in smart home
systems.
Smart Government:
In a smart city, smart government is essential. Smart government aims to provide better services to
citizens and
Significant issues have been discovered in several application settings in recent years. For instance,
the smart metering infrastructure in smart grids may keep an eye on residents' private life, including
their daily routines and employment hours. Similar access to sensitive data is possible for device
manufacturers and service providers in the context of smart homes and healthcare.
Threats to privacy leaks include the storage of sensor data, unencrypted communications between
VR devices, and sensitive information exchanged with other parties.
Unfortunately, creators and users of these new applications have not taken into account privacy in a
suitable and thorough manner because they have been rushed to market.
3- Privacy protection
Even when a system is safe and not compromised by criminals, the privacy of citizens can
occasionally be violated.
The potent data mining techniques are one possible mechanism for this to happen. Some
service providers and third parties can readily find the personal information of consumers
using data mining methods, as shown by the example given by . In light of this, privacy-
preserving data mining (PPDM) techniques must be used.
It is also important to keep in mind that, even though they have some beneficial impacts,
adopting solely technical solutions is insufficient. Government, education, and policies are
some more defences that should be used.
4- Data sensitivity:
Even the input data to an application might have various levels of sensitivity since different
data types have varied levels of sensitivity. An in-home health monitoring system may
receive live video of the patient, data from a mobility tracker, and pulse readings all at once.
The patient's live video data requires the most rigorous security measure it can offer from a
privacy-preserving perspective. From the standpoint of a healthcare product, pulse data
should be kept strictly confidential to satisfy consumers' demands for the confidentiality of
their health information. The question of how different data kinds should be safeguarded
follows the definition of the sensitivity of input data.
Security and Privacy Protection Strategies:
1- Cryptography:
Because they prevent unauthorised parties from accessing sensitive data during
transmission, cryptographic algorithms are the foundation of security and privacy protection
for the services of smart applications. The computational complexity and energy
consumption of traditional algorithm and encryption standards make them insufficient for
devices with limited resources . As a result, a prerequisite for using cryptographic technology
in practise is now lightweight encryption. A lightweight authentication system was created
for an IoT scenario that can defend end-to-end user communications from DDoS attacks.
2- BioMetric:
Biometrics are frequently used in IoT-based systems for authentication. In particular,
this technology can be used to instantly identify a person based on distinctive
behavioural and biological traits. Fingerprints, faces, voices, handwritten signatures, and
other biometric data are used to retrieve the information. Brainwave-based
authentication is one technique that merits attention in this context since it can
guarantee efficiency while also achieving a high level of authentication accuracy.
4- Ontology:
Many ontology-based initiatives to address security and privacy issues, such as cyber
attack detection and security risk management, have evolved as a result of the
aforementioned intrinsic qualities . However, ontology application to the IoT domain is a
new field, and there have only been a few recent initiatives in this area. In the field of
smart homes, Tao et al. created a novel ontology-based security management paradigm
that enhances system security while facilitating smart devices' improved
interoperability.
In order to facilitate automatically recording consistencies in the course of interactions,
Mohsin et al. suggested an ontology-driven security analysis methodology that was also
applicable to smart homes. The fact that most ontology-based studies on IoT security
concentrate on a single application scenario or demand without having a unified model
is a clear restriction of these studies' applicability. Unfortunately, this approach ignores
the entire security issues in favour of concentrating just on the network layer of the IoT
architecture
5- BlockChain:
We use this subsection to introduce the blockchain technique even though it is a
specialised technology rather than a discipline due to the significantly increased interest
it has attracted in recent years. Many blockchain-based IoT applications are popular
because of the decentralised nature of blockchain, which allows for dispersed operation
of apps. Clearly, blockchain technology is still in its infancy in the IoT era, despite the fact
that it has recently gained popularity and given rise to more useful and convenient
applications. To address grave privacy and security concerns, we must improve how we
use this technology.
Summary:
There are numerous security and privacy risks as a result of the increased use of smart applications.
The creation of more sophisticated protection frameworks and models is crucial and in great
demand in both the academic and industrial worlds.
We examined the most recent efforts and developments in the viewpoints of several disciplines as a
result of these considerations. In order to build the groundwork for subsequent research, we also
talked about current topics and unresolved problems that have surfaced in recent years. In recent
years, numerous defence mechanisms and tactics have been created.
To meet the many security requirements of these quickly evolving smart applications, there is still
much work to be done. It is reasonable to expect that in the coming years, reducing the obstacles
that are currently being faced will be the main priority of smart cities