Volume 20 No 12 (2022)
Download PDF
Information Security and Data Protection in Smart Cities
Bhupendra Dhakrey, Hari Om Sharan, C.S. Raghuvanshi, Md. Iqbal
Abstract
Smart cities are rapidly developing. Currently, the successful operation of many cities throughout the
world depends on a vast network of sensors, technology, and connected data-gathering portals. The use
of connected technologies will increase dramatically in the future. To enhance the quality of life for their
citizens, more local governments are embracing smart city technologies. This contemporary technology
can offer quickly adopted answers to a wide range of issues. For instance, this new infrastructure can aid
in enhancing energy efficiency, streamlining waste collection, and improving traffic flow. Cyber attacks
can target smart cities in a variety of ways. Some of the most dangerous threats are advanced persistent
threats (APTs). These dangers rely on a number of coordinated operations, frequently utilizing malware
and "zero-day" software vulnerabilities, to interfere with urban services. However, using any technology
brings up fresh problems and difficulties. A single careless act by a person or group can endanger the
entire city in a "smart city." The behavior of smart cities is impacted by information-security issues (such
as information leakage and harmful cyber-attacks) because so many aspects of smart cities depend on
information and communication technologies. Information security must therefore advance in the same
way in order to respond to the enthusiastic embrace of global smart city technology. The purpose of this
article is to review pertinent literature on security in that technology as well as explain information
security, smart cities, and other related topics. The current study's focus is on the four key elements of a
smart city, namely the smart grid, smart buildings, smart transportation infrastructure, and smart
healthcare, in order to achieve this goal.
Keywords
Information security, data protection, smart cities, smart grid, smart healthcare, software vulnerabilities
Copyright
Copyright © Neuroquantology
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.