2016
DOI: 10.12948/issn14531305/20.1.2016.03
|View full text |Cite
|
Sign up to set email alerts
|

Data Security in Smart Cities: Challenges and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 45 publications
(26 citation statements)
references
References 11 publications
0
18
0
1
Order By: Relevance
“…Furthermore, the majorities of applications in a smart city are not personal and are unattended. Their physical security is not guaranteed, especially in the public networks, the control of the objects may be lost and cascade failures may appear, caused by the interconnectivity of a large number of devices, difficult to be protected simultaneously (Popescul and Radu, 2016). In terms of big data, confidential data and information are also stored in databases.…”
Section: Information Sharing Among Different Entitiesmentioning
confidence: 99%
“…Furthermore, the majorities of applications in a smart city are not personal and are unattended. Their physical security is not guaranteed, especially in the public networks, the control of the objects may be lost and cascade failures may appear, caused by the interconnectivity of a large number of devices, difficult to be protected simultaneously (Popescul and Radu, 2016). In terms of big data, confidential data and information are also stored in databases.…”
Section: Information Sharing Among Different Entitiesmentioning
confidence: 99%
“…But while current, "classical" Internet attacks may cause damages to the information confidentiality, integrity and accessibility, similar actions in IoT can lead even to the loss of human lives. As shown in [16], there have already been demonstrations of hackers' interferences in the on-board computers of cars/planes and attacks in surgery rooms or on patients with implanted insulin pumps or other medical devices. As the list of vulnerable systems includes electric heating systems, food distribution networks, hospitals, traffic lights systems, transport networks, which are strongly interconnected in a smart city, the attack scenarios which might be envisaged starting from here are truly scaring.…”
Section: Security Challenges In Internet Of Thingsmentioning
confidence: 99%
“…Their number increases on a daily basis, and so do the connections between them. According to [16], all these things can be very smart in some situations and quite stupid in others: for example, smart in the sense that they collect, transmit, process and respond to various data, but stupid when there is a need to protect them. In [17], software, hardware and network constraints that restrict the inclusion of adequate security mechanisms (e.g.…”
Section: Not-so-smart Thingsmentioning
confidence: 99%
See 1 more Smart Citation
“…Smart cities and TEL overlap in many concerns such as: data, processes, regulations and most importantly the goal of providing optimised services based on the collected stakeholders' data [4,5]. The rest of this paper is organised as follows: section two reviews the related work in e-learning as well as smart cities, section three introduces the proposed abstract framework that combine e-learning and smart cities to enhance learning services, section four emphasises some of the consideration and challenges to be tackled and finally section five draws certain conclusions and future work.…”
Section: Introductionmentioning
confidence: 99%