Volume 20 No 13 (2022)
 Download PDF
SECURITY ISSUES AND SOLUTIONS FOR SMART CITIES POWERED BY IoT
Bhupendra Dhakrey, Hari Om Sharan, C. S. Raghuvanshi
Abstract
The city has started the transition to becoming a smart city in order to draw in new people and businesses, enhance resident quality of life, manage existing resources like roads and water in an economically sustainable manner, and minimise environmental pollution. The city, its citizens, tourists, and business and private entities with a presence in the city have all benefited from the transformation to a smart city. However, due to the interconnectedness of the OT (Operational Technology) and IT (Information Technology) infrastructures, there are now cyber security vulnerabilities. However, the increased connectivity and data sharing with intelligent machines and their software come with a significant risk of IT security issues; security for emerging IoT technologies must not be a development afterthought as the future of humanity and society will depend on it. Internet of Things (IoT) technologies offer new ways for businesses and governments to create value. Both traditional methods like malware, data manipulation, and DDOS as well as a variety of cyber attack tactics including remote execution and signal jamming can be used against smart cities. This article will provide a multilayered security strategy for protecting their smart city infrastructure and the data that goes along with it
Keywords
Information security, IoT, data protection, smart cities, smart healthcare, software vulnerabilities
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.