A comprehensive analysis of IoT security and privacy in smart city applications

Authors

  • Ahmad Anwar Zainuddin Kulliyyah of Information and Communication Technology, International Islamic University Malaysia
  • Adam Othman Kulliyyah of Information and Communication Technology, International Islamic University Malaysia
  • Nur Adlin Muhammad Zahid Kulliyyah of Information and Communication Technology, International Islamic University Malaysia
  • Nur Anis Sofea Kamarul Zaman Kulliyyah of Information and Communication Technology, International Islamic University Malaysia
  • Alin Nur Maisarah Ahmad Razmi Kulliyyah of Information and Communication Technology, International Islamic University Malaysia
  • Mohammad Haiqal Azreen Kamarul Zaman Kulliyyah of Information and Communication Technology, International Islamic University Malaysia

DOI:

https://doi.org/10.31763/businta.v8i1.645

Keywords:

IoT Security , IoT Privacy , Smart City

Abstract

With the increasing growth of smart cities, the Internet of Things (IoT) has emerged as a key enabler, integrating various systems and devices to create intelligent urban environments. However, increased interconnectedness raises significant concerns regarding security and for IoT communications privacy. This work addresses the problems with and remedies for IoT connectivity in smart cities that are related to security and privacy. The problems will be addressed by examining the potential risks and vulnerabilities associated with IoT networks, considering device authentication, data encryption, access control, and intrusion detection. Furthermore, an investigation on privacy issues and provide ways to protect sensitive data, such as differential privacy and data anonymization will be conducted. This work further provides a rundown of current safeguarding and discretion practises in IoT communications and highlight new technologies that hold promise for addressing these challenges, based on a detailed assessment of existing research and case studies. Moreover this work outlines important avenues for future study and offer suggestions for strengthening the privacy preservation of IoT communications in the context of tech cities. By solving these fundamental issues, the dependability, sustainability, and trustworthiness of IoT deployments in smart cities can be guaranteed, enabling them to reach their full potential for enhancing the quality of life for urban people.

 

References

W. S. de Amorim, A. Borchardt Deggau, G. do Livramento Gonçalves, S. da Silva Neiva, A. R. Prasath, and J. B. Salgueirinho Osório de Andrade Guerra, “Urban challenges and opportunities to promote sustainable food security through smart cities and the 4th industrial revolution,” Land use policy, vol. 87, p. 104065, Sep. 2019, doi: 10.1016/j.landusepol.2019.104065.

P. K. Sharma and J. H. Park, “Blockchain based hybrid network architecture for the smart city,” Futur. Gener. Comput. Syst., vol. 86, pp. 650–655, Sep. 2018, doi: 10.1016/j.future.2018.04.060.

T. Pratik, R. K. Lenka, G. K. Nayak, and A. Kumar, “An Architecture to Support Interoperability in IoT Devices,” in 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Oct. 2018, pp. 705–710, doi: 10.1109/ICACCCN.2018.8748483.

S. Misra, M. Reisslein, and G. Xue, “A survey of multimedia streaming in wireless sensor networks,” IEEE Commun. Surv. Tutorials, vol. 10, no. 4, pp. 18–39, Dec. 2008, doi: 10.1109/SURV.2008.080404.

K. Chopra, K. Gupta, and A. Lambora, “Future Internet: The Internet of Things-A Literature Review,” in 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), Feb. 2019, pp. 135–139, doi: 10.1109/COMITCon.2019.8862269.

M. Alja’Afreh, “A QoE Model for Digital Twin Systems in the Era of the Tactile Internet,” pp. 244, 2021. [Online]. Available at: https://ruor.uottawa.ca/handle/10393/42836%0A.

F. Amalina et al., “Blending Big Data Analytics: Review on Challenges and a Recent Study,” IEEE Access, vol. 8, pp. 3629–3645, 2020, doi: 10.1109/ACCESS.2019.2923270.

E. Benkhelifa, T. Welsh, and W. Hamouda, “A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems,” IEEE Commun. Surv. Tutorials, vol. 20, no. 4, pp. 3496–3509, 2018, doi: 10.1109/COMST.2018.2844742.

W. Xing, R. Guo, E. Petakovic, and S. Goggins, “Participation-based student final performance prediction model through interpretable Genetic Programming: Integrating learning analytics, educational data mining and theory,” Comput. Human Behav., vol. 47, pp. 168–181, Jun. 2015, doi: 10.1016/j.chb.2014.09.034.

R. Amin, R. S. Sherratt, D. Giri, S. H. Islam, and M. K. Khan, “A software agent enabled biometric security algorithm for secure file access in consumer storage devices,” IEEE Trans. Consum. Electron., vol. 63, no. 1, pp. 53–61, Feb. 2017, doi: 10.1109/TCE.2017.014735.

S. Pirbhulal, V. Gkioulos, and S. Katsikas, “A Systematic Literature Review on RAMS analysis for critical infrastructures protection,” Int. J. Crit. Infrastruct. Prot., vol. 33, p. 100427, Jun. 2021, doi: 10.1016/j.ijcip.2021.100427.

I. V. Lokshina, M. Greguš, and W. L. Thomas, “Application of Integrated Building Information Modeling, IoT and Blockchain Technologies in System Design of a Smart Building,” Procedia Comput. Sci., vol. 160, pp. 497–502, Jan. 2019, doi: 10.1016/j.procs.2019.11.058.

M. M. Ogonji, G. Okeyo, and J. M. Wafula, “A survey on privacy and security of Internet of Things,” Comput. Sci. Rev., vol. 38, p. 100312, Nov. 2020, doi: 10.1016/j.cosrev.2020.100312.

T. M. Ghazal et al., “IoT for Smart Cities: Machine Learning Approaches in Smart Healthcare—A Review,” Futur. Internet, vol. 13, no. 8, p. 218, Aug. 2021, doi: 10.3390/fi13080218.

Q. D. La, T. Q. S. Quek, J. Lee, S. Jin, and H. Zhu, “Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things,” IEEE Internet Things J., vol. 3, no. 6, pp. 1025–1035, Dec. 2016, doi: 10.1109/JIOT.2016.2547994.

F. Irram, M. Ali, M. Naeem, and S. Mumtaz, “Physical layer security for beyond 5G/6G networks: Emerging technologies and future directions,” J. Netw. Comput. Appl., vol. 206, p. 103431, Oct. 2022, doi: 10.1016/j.jnca.2022.103431.

A. Bhattacharjya, X. Zhong, J. Wang, and X. Li, “Secure IoT Structural Design for Smart Homes,” in Smart Cities Cybersecurity and Privacy, Elsevier, 2019, pp. 187–201, doi: 10.1016/B978-0-12-815032-0.00013-5.

M. Alshahrani and I. Traore, “Secure mutual authentication and automated access control for IoT smart home using cumulative Keyed-hash chain,” J. Inf. Secur. Appl., vol. 45, pp. 156–175, Apr. 2019, doi: 10.1016/j.jisa.2019.02.003.

N. P. Owoh and M. M. Singh, “Security analysis of mobile crowd sensing applications,” Appl. Comput. Informatics, vol. 18, no. 1/2, pp. 2–21, Mar. 2022, doi: 10.1016/j.aci.2018.10.002.

A. Cuzzocrea and E. Damiani, “Privacy-Preserving Big Data Exchange: Models, Issues, Future Research Directions,” in 2021 IEEE International Conference on Big Data (Big Data), Dec. 2021, pp. 5081–5084, doi: 10.1109/BigData52589.2021.9671686.

A. S. Sani, D. Yuan, J. Jin, L. Gao, S. Yu, and Z. Y. Dong, “Cyber security framework for Internet of Things-based Energy Internet,” Futur. Gener. Comput. Syst., vol. 93, pp. 849–859, Apr. 2019, doi: 10.1016/j.future.2018.01.029.

D. Oladimeji, K. Gupta, N. A. Kose, K. Gundogan, L. Ge, and F. Liang, “Smart Transportation: An Overview of Technologies and Applications,” Sensors, vol. 23, no. 8, p. 3880, Apr. 2023, doi: 10.3390/s23083880.

S. Vappangi and V. V. Mani, “Concurrent illumination and communication: A survey on Visible Light Communication,” Phys. Commun., vol. 33, pp. 90–114, Apr. 2019, doi: 10.1016/j.phycom.2018.12.017.

Y. Pan and L. Zhang, “Roles of artificial intelligence in construction engineering and management: A critical review and future trends,” Autom. Constr., vol. 122, p. 103517, Feb. 2021, doi: 10.1016/j.autcon.2020.103517.

R. Bibi et al., “Edge AI-Based Automated Detection and Classification of Road Anomalies in VANET Using Deep Learning,” Comput. Intell. Neurosci., vol. 2021, pp. 1–16, Sep. 2021, doi: 10.1155/2021/6262194.

H. (Harrison) Jeong, Y. (Chris) Shen, J. (Paul) Jeong, and T. (Tom) Oh, “A comprehensive survey on vehicular networking for safe and efficient driving in smart transportation: A focus on systems, protocols, and applications,” Veh. Commun., vol. 31, p. 100349, Oct. 2021, doi: 10.1016/j.vehcom.2021.100349.

A. Pramono and T. I. W. Primadani, “Smart home apps for saving energy usage at griyapram guesthouse malang,” in AIP Conference Proceedings, Apr. 2023, vol. 2594, no. 1, p. 060008, doi: 10.1063/5.0109445.

W. Li, T. Yigitcanlar, I. Erol, and A. Liu, “Motivations, barriers and risks of smart home adoption: From systematic literature review to conceptual framework,” Energy Res. Soc. Sci., vol. 80, p. 102211, Oct. 2021, doi: 10.1016/j.erss.2021.102211.

R. Pastorino et al., “Benefits and challenges of Big Data in healthcare: an overview of the European initiatives,” Eur. J. Public Health, vol. 29, no. Supplement_3, pp. 23–27, Oct. 2019, doi: 10.1093/eurpub/ckz168.

C. Chen, Y. Hu, M. Karuppiah, and P. M. Kumar, “Artificial intelligence on economic evaluation of energy efficiency and renewable energy technologies,” Sustain. Energy Technol. Assessments, vol. 47, p. 101358, Oct. 2021, doi: 10.1016/j.seta.2021.101358.

A. AlDairi and L. Tawalbeh, “Cyber Security Attacks on Smart Cities and Associated Mobile Technologies,” Procedia Comput. Sci., vol. 109, pp. 1086–1091, Jan. 2017, doi: 10.1016/j.procs.2017.05.391.

M. H. Panahi Rizi and S. A. Hosseini Seno, “A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city,” Internet of Things, vol. 20, p. 100584, Nov. 2022, doi: 10.1016/j.iot.2022.100584.

M. K. Hasan et al., “A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet‐of‐Medical‐Things,” IET Commun., vol. 16, no. 5, pp. 421–432, Mar. 2022, doi: 10.1049/cmu2.12301.

Z. A. Baig et al., “Future challenges for smart cities: Cyber-security and digital forensics,” Digit. Investig., vol. 22, pp. 3–13, Sep. 2017, doi: 10.1016/j.diin.2017.06.015.

B. Bhushan, C. Sahoo, P. Sinha, and A. Khamparia, “Unification of Blockchain and Internet of Things (BIoT): requirements, working model, challenges and future directions,” Wirel. Networks, vol. 27, no. 1, pp. 55–90, Jan. 2021, doi: 10.1007/s11276-020-02445-6.

K. Biswas and V. Muthukkumarasamy, “Securing Smart Cities Using Blockchain Technology,” in 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Dec. 2016, pp. 1392–1393, doi: 10.1109/HPCC-SmartCity-DSS.2016.0198.

A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for IoT security and privacy: The case study of a smart home,” in 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), Mar. 2017, pp. 618–623, doi: 10.1109/PERCOMW.2017.7917634.

L. Zhou, C. Su, W. Chiu, and K.-H. Yeh, “You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks,” IEEE Trans. Emerg. Top. Comput., vol. 8, no. 2, pp. 303–312, Apr. 2020, doi: 10.1109/TETC.2017.2759306.

R. Amin, R. S. Sherratt, D. Giri, S. H. Islam, and M. K. Khan, “A software agent enabled biometric security algorithm for secure file access in consumer storage devices,” IEEE Trans. Consum. Electron., vol. 63, no. 1, pp. 53–61, Feb. 2017, doi: 10.1109/TCE.2017.014735.

Y. Wang, J. Wan, J. Guo, Y.-M. Cheung, and P. C. Yuen, “Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 40, no. 7, pp. 1611–1624, Jul. 2018, doi: 10.1109/TPAMI.2017.2727048.

C.-W. Tsai, C.-F. Lai, M.-C. Chiang, and L. T. Yang, “Data Mining for Internet of Things: A Survey,” IEEE Commun. Surv. Tutorials, vol. 16, no. 1, pp. 77–97, 2014, doi: 10.1109/SURV.2013.103013.00206.

Q. D. La, T. Q. S. Quek, J. Lee, S. Jin, and H. Zhu, “Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things,” IEEE Internet Things J., vol. 3, no. 6, pp. 1025–1035, Dec. 2016, doi: 10.1109/JIOT.2016.2547994.

X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, “A game-theoretic approach for achieving k-anonymity in Location Based Services,” in 2013 Proceedings IEEE INFOCOM, Apr. 2013, pp. 2985–2993, doi: 10.1109/INFCOM.2013.6567110.

Lei Xu, Chunxiao Jiang, Yan Chen, Yong Ren, and K. J. R. Liu, “Privacy or Utility in Data Collection? A Contract Theoretic Approach,” IEEE J. Sel. Top. Signal Process., vol. 9, no. 7, pp. 1256–1269, Oct. 2015, doi: 10.1109/JSTSP.2015.2425798.

N. Walravens, “Mobile Business and the Smart City: Developing a Business Model Framework to Include Public Design Parameters for Mobile City Services,” J. Theor. Appl. Electron. Commer. Res., vol. 7, no. 3, pp. 21–22, 2012, doi: 10.4067/S0718-18762012000300011.

M. Batty et al., “Smart cities of the future,” Eur. Phys. J. Spec. Top., vol. 214, no. 1, pp. 481–518, Nov. 2012, doi: 10.1140/epjst/e2012-01703-3.

N. Aleisa and K. Renaud, “Yes, I know this IoT Device Might Invade my Privacy, but I Love it Anyway! A Study of Saudi Arabian Perceptions,” in Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, 2017, pp. 198–205, doi: 10.5220/0006233701980205.

M. U. Younus, S. ul Islam, I. Ali, S. Khan, and M. K. Khan, “A survey on software defined networking enabled smart buildings: Architecture, challenges and use cases,” J. Netw. Comput. Appl., vol. 137, pp. 62–77, Jul. 2019, doi: 10.1016/j.jnca.2019.04.002.

N. Azzaoui, A. Korichi, B. Brik, M. el amine Fekair, and C. A. Kerrache, “Wireless communication in internet of vehicles networks,” in Proceedings of the 4th International Conference on Smart City Applications, Oct. 2019, pp. 1–6, doi: 10.1145/3368756.3368998.

F. Touati, A. Ben Mnaouer, O. Erdene‐Ochir, W. Mehmood, A. Hassan, and B. Gaabab, “Feasibility and performance evaluation of a 6LoWPAN‐enabled platform for ubiquitous healthcare monitoring,” Wirel. Commun. Mob. Comput., vol. 16, no. 10, pp. 1271–1281, Jul. 2016, doi: 10.1002/wcm.2601.

T. Monahan and J. T. Mokos, “Crowdsourcing urban surveillance: The development of homeland security markets for environmental sensor networks,” Geoforum, vol. 49, pp. 279–288, Oct. 2013, doi: 10.1016/j.geoforum.2013.02.001.

S. Shah, C. B. Soriano, and A. D. Coutroubis, “Is big data for everyone? the challenges of big data adoption in SMEs,” in 2017 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Dec. 2017, vol. 2017-Decem, pp. 803–807, doi: 10.1109/IEEM.2017.8290002.

I. Rubinstein, “Big Data: The End of Privacy or a New Beginning?,” SSRN Electron. J., pp. 12-56, Oct. 2012, doi: 10.2139/ssrn.2157659.

E. Borgia, “The Internet of Things vision: Key features, applications and open issues,” Comput. Commun., vol. 54, pp. 1–31, Dec. 2014, doi: 10.1016/j.comcom.2014.09.008.

M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating Critical Security Issues of the IoT World: Present and Future Challenges,” IEEE Internet Things J., vol. 5, no. 4, pp. 2483–2495, Aug. 2018, doi: 10.1109/JIOT.2017.2767291.

G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner, “Smart Locks,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, May 2016, pp. 461–472, doi: 10.1145/2897845.2897886.

M. Lom and O. Pribyl, “Smart city model based on systems theory,” Int. J. Inf. Manage., vol. 56, p. 102092, Feb. 2021, doi: 10.1016/j.ijinfomgt.2020.102092.

I. Chatzigiannakis, “Apps for smart buildings,” in Start-Up Creation, Elsevier, 2016, pp. 465–479, doi: 10.1016/B978-0-08-100546-0.00019-4.

S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric recognition: security and privacy concerns,” IEEE Secur. Priv., vol. 1, no. 2, pp. 33–42, Mar. 2003, doi: 10.1109/MSECP.2003.1193209.

M. G. Samaila, M. Neto, D. A. B. Fernandes, M. M. Freire, and P. R. M. Inácio, “Challenges of securing Internet of Things devices: A survey,” Secur. Priv., vol. 1, no. 2, p. e20, Mar. 2018, doi: 10.1002/spy2.20.

Y. Lu and L. Da Xu, “Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics,” IEEE Internet Things J., vol. 6, no. 2, pp. 2103–2115, Apr. 2019, doi: 10.1109/JIOT.2018.2869847.

V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures,” IEEE Access, vol. 7, pp. 82721–82743, 2019, doi: 10.1109/ACCESS.2019.2924045.

D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Futur. Gener. Comput. Syst., vol. 28, no. 3, pp. 583–592, Mar. 2012, doi: 10.1016/j.future.2010.12.006.

G. Sivathanu, C. P. Wright, and E. Zadok, “Ensuring data integrity in storage,” in Proceedings of the 2005 ACM workshop on Storage security and survivability, Nov. 2005, pp. 26–36, doi: 10.1145/1103780.1103784.

R. Yang, F. R. Yu, P. Si, Z. Yang, and Y. Zhang, “Integrated Blockchain and Edge Computing Systems: A Survey, Some Research Issues and Challenges,” IEEE Commun. Surv. Tutorials, vol. 21, no. 2, pp. 1508–1532, 2019, doi: 10.1109/COMST.2019.2894727.

N. A. Akbar, A. Muneer, N. ElHakim, and S. M. Fati, “Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses,” Futur. Internet, vol. 13, no. 11, p. 285, Nov. 2021, doi: 10.3390/fi13110285.

C. Zhang, “Design and application of fog computing and Internet of Things service platform for smart city,” Futur. Gener. Comput. Syst., vol. 112, pp. 630–640, Nov. 2020, doi: 10.1016/j.future.2020.06.016.

W. Shi and S. Dustdar, “The Promise of Edge Computing,” Computer (Long. Beach. Calif)., vol. 49, no. 5, pp. 78–81, May 2016, doi: 10.1109/MC.2016.145.

A. Kumari, S. Tanwar, S. Tyagi, and N. Kumar, “Fog computing for Healthcare 4.0 environment: Opportunities and challenges,” Comput. Electr. Eng., vol. 72, pp. 1–13, Nov. 2018, doi: 10.1016/j.compeleceng.2018.08.015.

Downloads

Published

2024-04-26

How to Cite

Zainuddin, A. A., Othman , A. ., Adlin Muhammad Zahid , N. ., Anis Sofea Kamarul Zaman , N. ., Nur Maisarah Ahmad Razmi , A. ., & Haiqal Azreen Kamarul Zaman , M. . (2024). A comprehensive analysis of IoT security and privacy in smart city applications. Bulletin of Social Informatics Theory and Application, 8(1), 37–58. https://doi.org/10.31763/businta.v8i1.645