Empowering smart city governance through decentralized blockchain solutions for security and privacy in IoT communications

Authors

  • Ahmad Anwar Zainuddin International Islamic University Malaysia
  • Nurul Fadhilah Ahmad Muhammad International Islamic University Malaysia
  • Amir Husaini Mohd Hasli International Islamic University Malaysia
  • Nor Ani Jannah Ahmad Zaini International Islamic University Malaysia
  • Nureen Batrisyia Balqis Karimudin International Islamic University Malaysia
  • Hannah Sabrina Saiful Bahri International Islamic University Malaysia
  • Muhamad Khaleesh Mirza Khairul Nizam Kolej Kemahiran Tinggi MARA Petaling Jaya
  • Saidatul Izyanie Kamarudin University Technology MARA (UiTM)
  • Nasyitah Ghazalli Research and Technology Thales

DOI:

https://doi.org/10.31763/businta.v7i2.642

Keywords:

Smart city, Urban issues, Security, Privacy

Abstract

This paper highlights the benefits and challenges of smart cities, which leverage technology to offer a wide range of services to citizens. While these services have the potential to greatly improve the quality of life in metropolitan areas, they also raise significant privacy and security concerns. The study emphasizes the need to employ "privacy by design" principles to ensure that personal data is protected throughout the entire lifecycle of data, and data owners have the self-control to manage their data according to their preferences. Smart contracts, built on blockchain technology, offer a secure and transparent way of conducting transactions, particularly in e-governance, and automating processes. By leveraging these technologies, smart cities can address the privacy and security challenges they face while continuing to offer cutting-edge services to their inhabitants. Ultimately, the study emphasizes the importance of a proactive approach to privacy and security in the development and implementation of smart cities.

 

Author Biographies

Nurul Fadhilah Ahmad Muhammad, International Islamic University Malaysia

 

 

Amir Husaini Mohd Hasli, International Islamic University Malaysia

 

 

Nor Ani Jannah Ahmad Zaini, International Islamic University Malaysia

 

 

Nureen Batrisyia Balqis Karimudin, International Islamic University Malaysia

 

 

Hannah Sabrina Saiful Bahri, International Islamic University Malaysia

 

 

Muhamad Khaleesh Mirza Khairul Nizam, Kolej Kemahiran Tinggi MARA Petaling Jaya

 

 

Saidatul Izyanie Kamarudin, University Technology MARA (UiTM)

 

 

Nasyitah Ghazalli, Research and Technology Thales

 

 

References

C. Grison et al., “Integrated Water Resources Management in Cities in the World: Global Challenges,” Water Resour. Manag., vol. 37, no. 6–7, pp. 2787–2803, May 2023, doi: 10.1007/s11269-023-03475-3.

C. Rochet, Smart Cities. Wiley, pp. 1-206, 2018, doi: 10.1002/9781119507321.

E. Ahmed et al., “The role of big data analytics in Internet of Things,” Comput. Networks, vol. 129, pp. 459–471, Dec. 2017, doi: 10.1016/j.comnet.2017.06.013.

R. Bryant, R. Katz, E. Lazowska, Y. Zheng, F. Liu, and H.-P. Hsieh, “Big-Data Computing: Creating Revolutionary Breakthroughs in Commerce, Science and Society,” Proc. 19th ACM SIGKDD Int. Conf. Knowl. Discov. data Min. - KDD ’13, pp. 1–15, 2013, [Online]. Available at: https://cra.org/ccc/wp-content/uploads/sites/2/2015/05/Big_Data.pdf.

J. L. Hernandez-Ramos et al., “Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions,” IEEE Secur. Priv., vol. 19, no. 1, pp. 12–23, Jan. 2021, doi: 10.1109/MSEC.2020.3012353.

M. Sookhak, H. Tang, Y. He, and F. R. Yu, “Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges,” IEEE Commun. Surv. Tutorials, vol. 21, no. 2, pp. 1718–1743, 2019, doi: 10.1109/COMST.2018.2867288.

S. Chakrabarty and D. W. Engels, “A secure IoT architecture for Smart Cities,” in 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Jan. 2016, pp. 812–813, doi: 10.1109/CCNC.2016.7444889.

B. Hamid, N. Jhanjhi, M. Humayun, A. Khan, and A. Alsayat, “Cyber Security Issues and Challenges for Smart Cities: A survey,” in 2019 13th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS), Dec. 2019, pp. 1–7, doi: 10.1109/MACS48846.2019.9024768.

L. Cui, G. Xie, Y. Qu, L. Gao, and Y. Yang, “Security and Privacy in Smart Cities: Challenges and Opportunities,” IEEE Access, vol. 6, pp. 46134–46145, Jul. 2018, doi: 10.1109/ACCESS.2018.2853985.

R. Ganti, F. Ye, and H. Lei, “Mobile crowdsensing: current state and future challenges,” IEEE Commun. Mag., vol. 49, no. 11, pp. 32–39, Nov. 2011, doi: 10.1109/MCOM.2011.6069707.

F. Al‐Turjman, H. Zahmatkesh, and R. Shahroze, “An overview of security and privacy in smart cities’ IoT communications,” Trans. Emerg. Telecommun. Technol., vol. 33, no. 3, p. e3677, Mar. 2022, doi: 10.1002/ett.3677.

F. Zantalis, G. Koulouras, S. Karabetsos, and D. Kandris, “A Review of Machine Learning and IoT in Smart Transportation,” Futur. Internet, vol. 11, no. 4, p. 94, Apr. 2019, doi: 10.3390/fi11040094.

Z. Chen, C. Wang, G. Li, Z. Lou, S. Jiang, and A. Galis, “NEW IP Framework and Protocol for Future Applications,” in NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, Apr. 2020, pp. 1–5, doi: 10.1109/NOMS47738.2020.9110352.

L. Zhou, C. Su, W. Chiu, and K.-H. Yeh, “You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks,” IEEE Trans. Emerg. Top. Comput., vol. 8, no. 2, pp. 303–312, Apr. 2020, doi: 10.1109/TETC.2017.2759306.

R. Amin, R. S. Sherratt, D. Giri, S. H. Islam, and M. K. Khan, “A software agent enabled biometric security algorithm for secure file access in consumer storage devices,” IEEE Trans. Consum. Electron., vol. 63, no. 1, pp. 53–61, Feb. 2017, doi: 10.1109/TCE.2017.014735.

I. Natgunanathan, A. Mehmood, Y. Xiang, G. Beliakov, and J. Yearwood, “Protection of Privacy in Biometric Data,” IEEE Access, vol. 4, pp. 880–892, 2016, doi: 10.1109/ACCESS.2016.2535120.

Y. Wang, J. Wan, J. Guo, Y.-M. Cheung, and P. C. Yuen, “Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 40, no. 7, pp. 1611–1624, Jul. 2018, doi: 10.1109/TPAMI.2017.2727048.

S. Yu, “Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data,” IEEE Access, vol. 4, pp. 2751–2763, 2016, doi: 10.1109/ACCESS.2016.2577036.

C. T. Do et al., “Game Theory for Cyber Security and Privacy,” ACM Comput. Surv., vol. 50, no. 2, pp. 1–37, Mar. 2018, doi: 10.1145/3057268.

A. A. Alabdel Abass, L. Xiao, N. B. Mandayam, and Z. Gajic, “Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage,” IEEE Access, vol. 5, pp. 8482–8491, 2017, doi: 10.1109/ACCESS.2017.2691326.

H. Sedjelmaci, S. M. Senouci, and T. Taleb, “An Accurate Security Game for Low-Resource IoT Devices,” IEEE Trans. Veh. Technol., vol. 66, no. 10, pp. 9381–9393, Oct. 2017, doi: 10.1109/TVT.2017.2701551.

Q. D. La, T. Q. S. Quek, J. Lee, S. Jin, and H. Zhu, “Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things,” IEEE Internet Things J., vol. 3, no. 6, pp. 1025–1035, Dec. 2016, doi: 10.1109/JIOT.2016.2547994.

K. Wang, M. Du, S. Maharjan, and Y. Sun, “Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid,” IEEE Trans. Smart Grid, vol. 8, no. 5, pp. 2474–2482, Sep. 2017, doi: 10.1109/TSG.2017.2670144.

L. Xiao, Y. Li, G. Han, G. Liu, and W. Zhuang, “PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks,” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 10037–10047, Dec. 2016, doi: 10.1109/TVT.2016.2524258.

X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, “A game-theoretic approach for achieving k-anonymity in Location Based Services,” in 2013 Proceedings IEEE INFOCOM, Apr. 2013, pp. 2985–2993, doi: 10.1109/INFCOM.2013.6567110.

M. Kearns, M. M. Pai, A. Roth, and J. Ullman, “Mechanism Design in Large Games: Incentives and Privacy,” ITCS 2014 - Proc. 2014 Conf. Innov. Theor. Comput. Sci., pp. 403–409, Jul. 2012, doi: 10.1145/2554797.2554834.

Lei Xu, Chunxiao Jiang, Yan Chen, Yong Ren, and K. J. R. Liu, “Privacy or Utility in Data Collection? A Contract Theoretic Approach,” IEEE J. Sel. Top. Signal Process., vol. 9, no. 7, pp. 1256–1269, Oct. 2015, doi: 10.1109/JSTSP.2015.2425798.

M. Tao, J. Zuo, Z. Liu, A. Castiglione, and F. Palmieri, “Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes,” Futur. Gener. Comput. Syst., vol. 78, pp. 1040–1051, Jan. 2018, doi: 10.1016/j.future.2016.11.011.

M. Mohsin, Z. Anwar, F. Zaman, and E. Al-Shaer, “IoTChecker: A data-driven framework for security analytics of Internet of Things configurations,” Comput. Secur., vol. 70, pp. 199–223, Sep. 2017, doi: 10.1016/j.cose.2017.05.012.

S.-H. Kim, I.-Y. Ko, and S.-H. Kim, “Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computing,” Comput. Secur., vol. 66, pp. 1–19, May 2017, doi: 10.1016/j.cose.2017.01.002.

O.-J. Lee, H. L. Nguyen, J. E. Jung, T.-W. Um, and H.-W. Lee, “Towards Ontological Approach on Trust-Aware Ambient Services,” IEEE Access, vol. 5, pp. 1589–1599, 2017, doi: 10.1109/ACCESS.2017.2663407.

G. Xu, Y. Cao, Y. Ren, X. Li, and Z. Feng, “Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things,” IEEE Access, vol. 5, pp. 21046–21056, Aug. 2017, doi: 10.1109/ACCESS.2017.2734681.

N. Walravens, “Mobile Business and the Smart City: Developing a Business Model Framework to Include Public Design Parameters for Mobile City Services,” J. Theor. Appl. Electron. Commer. Res., vol. 7, no. 3, pp. 121–135, 2012, doi: 10.4067/S0718-18762012000300011.

M. Batty et al., “Smart cities of the future,” Eur. Phys. J. Spec. Top., vol. 214, no. 1, pp. 481–518, Nov. 2012, doi: 10.1140/epjst/e2012-01703-3.

N. Aleisa and K. Renaud, “Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions,” in Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, 2017, pp. 198–205, doi: 10.5220/0006233701980205.

C. Sarkar, S. N. A. U. Nambi, R. V. Prasad, and A. Rahim, “A scalable distributed architecture towards unifying IoT applications,” in 2014 IEEE World Forum on Internet of Things (WF-IoT), Mar. 2014, pp. 508–513, doi: 10.1109/WF-IoT.2014.6803220

Downloads

Published

2023-11-27

How to Cite

Zainuddin, A. A., Muhammad, N. F. A., Hasli, A. H. M., Zaini, N. A. J. A., Karimudin, N. B. B., Bahri, H. S. S., Nizam, M. K. M. K., Kamarudin, S. I., & Ghazalli, N. (2023). Empowering smart city governance through decentralized blockchain solutions for security and privacy in IoT communications. Bulletin of Social Informatics Theory and Application, 7(2), 104–117. https://doi.org/10.31763/businta.v7i2.642

Issue

Section

Articles