Volume 20 No 12 (2022)
 Download PDF
Information Security and Data Protection in Smart Cities
Bhupendra Dhakrey, Hari Om Sharan, C.S. Raghuvanshi, Md. Iqbal
Smart cities are rapidly developing. Currently, the successful operation of many cities throughout the world depends on a vast network of sensors, technology, and connected data-gathering portals. The use of connected technologies will increase dramatically in the future. To enhance the quality of life for their citizens, more local governments are embracing smart city technologies. This contemporary technology can offer quickly adopted answers to a wide range of issues. For instance, this new infrastructure can aid in enhancing energy efficiency, streamlining waste collection, and improving traffic flow. Cyber attacks can target smart cities in a variety of ways. Some of the most dangerous threats are advanced persistent threats (APTs). These dangers rely on a number of coordinated operations, frequently utilizing malware and "zero-day" software vulnerabilities, to interfere with urban services. However, using any technology brings up fresh problems and difficulties. A single careless act by a person or group can endanger the entire city in a "smart city." The behavior of smart cities is impacted by information-security issues (such as information leakage and harmful cyber-attacks) because so many aspects of smart cities depend on information and communication technologies. Information security must therefore advance in the same way in order to respond to the enthusiastic embrace of global smart city technology. The purpose of this article is to review pertinent literature on security in that technology as well as explain information security, smart cities, and other related topics. The current study's focus is on the four key elements of a smart city, namely the smart grid, smart buildings, smart transportation infrastructure, and smart healthcare, in order to achieve this goal.
Information security, data protection, smart cities, smart grid, smart healthcare, software vulnerabilities
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.