Smart City Gnosys

Smart city article details

Title Cybersecurity In Large-Scale Smart Cities: Novel Proposals For Anomaly Detection From Edge To Cloud
ID_Doc 17026
Authors Sinaeepourfard A.; Sengupta S.; Krogstie J.; Delgado R.R.
Year 2019
Published 2019 International Conference on Internet of Things, Embedded Systems and Communications, IINTEC 2019 - Proceedings
DOI http://dx.doi.org/10.1109/IINTEC48298.2019.9112114
Abstract Smart cities are a complicated blend of Information and communications technology (ICT) as well as Internet of Things (IoT) from physical (such as sensors and actuators) and non-physical (such as external databases) data sources. The smart physical data sources contribute to developing the level of safety and security of citizens' daily life through different smart solutions such as optimization for autonomous power grids and human health applications. Those physical devices generate a massive amount of data that is necessary for analytic applications to be applied in user services. Cloud computing technologies utilize as a centralized ICT architecture to collect the massive amount of data from all scale of the city and build the citizens' services by developers. However, several challenges in cybercrime and cybersecurity exist in Cloud computing technologies as well as large scale IoT environments and smart cities. Those challenges are i) the new generation of the attack on an IoT network is to create a problem with the availability of IoT data for the Cloud applications by overwhelming devices with information requests; ii) complex communication and computation resource constraints has a big concern to moving forward to detect attack at the edge of networks. Therefore, heading off the threat of cybercrime in large scale IoT and smart cities calls for a new study on designing cybersecurity models for ICT architecture. In this paper, we first present our fully hierarchal Distributed-to-Centralized ICT (D2C-ICT) architecture for the Zero Emission Neighborhoods (ZEN) center in the context of the smart cities. Second, we propose two different novel anomaly detection models by using the contribution of Fog to cloudlet and Cloud technologies through our presented D2C-ICT Architecture in the context of the smart city. Finally, we discuss two different use cases for attack detection. We envisage that we can enhance the level of attack detection techniques through different technologies of the D2C-ICT from edge to Cloud networks. © 2019 IEEE.
Author Keywords Anomaly Detection; Cybersecurity; Distributed-to-Centralized ICT (D2C-ICT) Architecture; Fog-to-cloudlet-to-Cloud ICT (F2c2C-ICT) Architecture; IoT; Machine Learning techniques; Smart City


Similar Articles


Id Similarity Authors Title Published
14401 View0.924Gore S.; Mahankale N.; Gore S.; Kadu S.; Belhe S.A.Cloud Computing For Effective Cyber Security Attack Detection In Smart Cities2023 4th IEEE Global Conference for Advancement in Technology, GCAT 2023 (2023)
14402 View0.914Kale N.R.; Metre K.V.; Chitte P.P.; Mahankale N.; Gore S.; Gore S.Cloud Computing For Effective Cyber Security Attack Detection In Smart CitiesInternational Journal on Recent and Innovation Trends in Computing and Communication, 11, 9s (2023)
46457 View0.914Balasaheb B.P.; Kumar M.S.Review Of Iot-Enabled Smart Cities: Cybersecurity Threat Detection Using Cloud Computing2024 15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024 (2024)
17030 View0.91James S.K.; Deepalakshmi P.Cybersecurity In Smart Cities: Integrating Advanced Technologies For Urban Infrastructure ProtectionIEMECON 2024 - 12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks (2024)
17000 View0.904Kim K.; Alshenaifi I.M.; Ramachandran S.; Kim J.; Zia T.; Almorjan A.Cybersecurity And Cyber Forensics For Smart Cities: A Comprehensive Literature Review And SurveySensors, 23, 7 (2023)
16948 View0.898Houichi M.; Jaidi F.; Bouhoula A.Cyber Security Within Smart Cities: A Comprehensive Study And A Novel Intrusion Detection-Based ApproachComputers, Materials and Continua, 81, 1 (2024)
17002 View0.889Habib M.Y.; Qureshi H.A.; Khan S.A.; Mansoor Z.; Chishti A.R.Cybersecurity And Smart Cities: Current Status And FutureProceedings - 2023 IEEE International Conference on Emerging Trends in Engineering, Sciences and Technology, ICES and T 2023 (2023)
962 View0.889Andrade, RO; Yoo, SG; Tello-Oquendo, L; Ortiz-Garcés, IA Comprehensive Study Of The Iot Cybersecurity In Smart CitiesIEEE ACCESS, 8 (2020)
47802 View0.888Alauthman M.; Hadi W.; Al-Qerem A.; Alateef S.; Ashraf M.; Alkasassbeh M.Securing The Digital Backbone Of Smart Cities: Threat Detection, Infrastructure Hardening, And Data GovernanceRevolutionizing Urban Development and Governance With Emerging Technologies (2025)
6153 View0.887Alrashdi I.; Alqazzaz A.; Aloufi E.; Alharthi R.; Zohdy M.; Ming H.Ad-Iot: Anomaly Detection Of Iot Cyberattacks In Smart City Using Machine Learning2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019 (2019)