2018
DOI: 10.1051/matecconf/201818805005
|View full text |Cite
|
Sign up to set email alerts
|

End Node Security and Trust vulnerabilities in the Smart City Infrastructure

Abstract: As cities gradually introduce intelligence in their core services and infrastructure thus becoming “smart cities”, they are deploying new Information Technology devices in the urban grid that are interconnected to a broad network. The main focus of widely implemented smart cities' services was the operation of sensors and smart devices across city areas that need low energy consumption and high connectivity. However, as 5G technologies are gradually been adopted in the smart city infrastructure thus solving th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…As shown in Table 1 , several authors have attempted to identify the key elements of smart cities. By analysing the papers found using these keywords [ 15 , 16 , 17 , 18 , 19 , 20 , 21 ], we derived the core elements of smart cities, as shown in Figure 1 .…”
Section: Key Elements Of Smart Citiesmentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in Table 1 , several authors have attempted to identify the key elements of smart cities. By analysing the papers found using these keywords [ 15 , 16 , 17 , 18 , 19 , 20 , 21 ], we derived the core elements of smart cities, as shown in Figure 1 .…”
Section: Key Elements Of Smart Citiesmentioning
confidence: 99%
“…While the mass proliferation of IoT devices has provided advanced services based on hyperconnectivity, end-node devices focus on confidentiality and have weak security [ 16 ], which can affect connected smart devices.…”
Section: Key Elements Of Smart Citiesmentioning
confidence: 99%
“…System uptime and dependability may be compromised as a result of these security vulnerabilities. Fournaris, Lampropoulos and Koufopavlou [26], for instance, mentions the aspect of trust, and integrating trust into systems is expensive undertaking and timeconsuming Information access, user authentication, data privacy, and data link collapsing are all part of the application layer's security. As a result, there is an increasing need for providing security requirements for each application, as the use of critical and sensitive technologies, which are controlled and monitored in real time, is increasing in importance and volume.…”
Section: Security Analysis At the Application Layermentioning
confidence: 99%