Securing tomorrow’s urban frontiers: A holistic approach to cybersecurity in smart cities

  • Amaresh Jha School of Liberal Studies, UPES, Dehradun 248007, India http://orcid.org/0000-0002-6083-1610
  • Ananya Jha Computer Sciences & Engineering (Cybersecurity), UPES, Dehradun 248007, India
Article ID: 418
157 Views, 143 PDF Downloads
Keywords: smart city; cybersecurity; AI; ML

Abstract

To address the intricate interplay between digital infrastructure and urban ecosystems, this study will adopt a multidisciplinary approach, combining expertise from cybersecurity, urban planning, and information technology. The research will delve into the vulnerabilities and potential threats that arise with the integration of IoT devices, interconnected systems, and the extensive data networks inherent in smart cities. By understanding the technological landscape, our goal is to devise adaptive and resilient cybersecurity measures that safeguard critical infrastructure while preserving the privacy and security of citizens. The methodology involves a qualitative inquiry through an open-ended questionnaire from 50 stakeholders. The anticipated outcomes of this research include the development of practical guidelines, best practices, and policy recommendations to fortify the cybersecurity posture of existing and future smart cities. By addressing the intricate relationship between urbanization and technology, this project aspires to contribute to the creation of secure, resilient, and sustainable urban environments that harness the full potential of Smart City innovations while mitigating cybersecurity risks.

References

[1]Jia Y, Gu Z, Du L, et al. Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model. Knowledge-Based Systems. 2023, 276: 110781. doi: 10.1016/j.knosys.2023.110781

[2]Cornelius FP, Jansen van Rensburg SK, Kader S. Cyber Security Risks in Emerging South African Smart Cities: Towards a Cyber Security Framework. Perspectives on Global Development and Technology. 2023, 22(1-2): 107-141. doi: 10.1163/15691497-12341654

[3]Sangaiah AK, Javadpour A, Pinto P. Towards data security assessments using an IDS security model for cyber-physical smart cities. Information Sciences. 2023, 648: 119530. doi: 10.1016/j.ins.2023.119530

[4]Wilson RL. Smart Cities and Cyber Security Ethical and Anticipated Ethical Concerns. In: Cyber Security. Springer International Publishing; 2022. pp. 337-351. doi: 10.1007/978-3-030-91293-2_14

[5]Alzahrani NM, Alfouzan FA. Augmented Reality (AR) and Cyber-Security for Smart Cities—A Systematic Literature Review. Sensors. 2022, 22(7): 2792. doi: 10.3390/s22072792

[6]Caragliu A, Del Bo C, Nijkamp P. Smart cities in Europe. Journal of Urban Technology. 2011, 18(2): 65-82. doi: 10.1080/10630732.2011.601117

[7]Conti M, Dehghantanha A, Franke K. Security and privacy issues in smart cities. IEEE Communications Magazine. 2018; 56(4): 40-45.

[8]Aloudat A, Michael K. Toward a framework for a smart city evaluation. In: Proceedings of the IST-Africa 2015 Conference; 6-8 May 2015; Lilongwe, Malawi. pp. 1-9.

[9]Kaspersky Lab. IoT: A Malware Story. Kaspersky Lab Global Research and Analysis Team; 2018.

[10]Anthopoulos LG, Fitsilis P. A survey of smart city initiatives in Europe. Journal of Urban Technology. 2018, 17(1): 7-27.

[11]Ghahramani Z. Probabilistic machine learning and artificial intelligence. Nature. 2015, 521(7553): 452-459. doi: 10.1038/nature14541

[12]Ransbotham S, Kiron D. Analytics as a source of business innovation. MIT Sloan Management Review. 2017, 58(1): 1-21.

[13]Hollands RG. Will the real smart city please stand up? City. 2008, 12(3): 303-320. doi: 10.1080/13604810802479126

[14]Townsend AM. Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia, 1st ed. W. W. Norton & Company; 2013.

Published
2023-12-28
How to Cite
Jha, A., & Jha, A. (2023). Securing tomorrow’s urban frontiers: A holistic approach to cybersecurity in smart cities. Information System and Smart City, 3(1), 418. https://doi.org/10.59400/issc.v3i1.418
Section
Article