SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 337
Smart City: Overview and Security Challenges
A. K. Pradhan
IEEE Member
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Technologies (ICTs) is inextricably linked with the
urban development. In last decades, smart cities have become
a hope for many of decision makers and people as well to
overcome the cumulated urban problems. Internet of Things
(IoT) is a paradigm that involves a network of physicalobjects
containing embedded technologies to collect, communicate,
sense, and interact with their internal states or the external
environment through wireless or wired connections. The
nature of IoT information exchange among the connected
objects “Things” and remote locations for data storage and
data processing gives the ability to collect numerous amounts
of data about individuals, and other things in the smart city.
Key Words: smart cities, Internet of things, authentication,
security issues, Radio frequency identification.
1. INTRODUCTION
Smart City has become an umbrella term for numerous
technologies with the goal of improving the efficiency of
future cities and the quality of life for their inhabitants, not
just by introducing new applications but also by making
existing processes smarter. It has become fashionabletocall
cities smart and there are political efforts intended to
encourage the development of smart cities [1]. There exist a
number of formal definitions of what makes a city smart:
Caragliu et al. define “a city to be smart when investments in
human and social capital and traditional (transport) and
modern (ICT) communicationinfrastructurefuel sustainable
economic growth and a high quality of life, with a wise
management of natural resources, through participatory
governance.” [2]. While others argue that there cannot be an
absolute definition as the term smartcitydoesnotdescribea
static concept but rather a process towards more liveable
and resilient cities [3], there seems to be agreement that
certain novel technologies and applications amount to
making cities smarter [4].
A smart city mean to be an urbanized town, by embedding
Information and Communication Technology in its
infrastructure which serves various innovative andadvance
services to its citizens, in order to improvise the quality of
their products.
Fig -1: Generation of Smart City
2. SMART CITY ARCHITECTURE
In order to gain collective sensing as well as refined
management of city , the information is manipulated via
smart city which is sensed from the substantial world, the
information which is transmitted in the communication
world, in addition to the information processed in the
information world for clever services [5]. The sensing
components, mixed networkinfrastructure,processingunits,
and control along with operating components are integrated
in it as shown in the Figure 1.While thedataorinformationis
being transferred from Substantial World to Communication
World and henceforth from Communication World to
Information World it shouldbesecuredinallwaysbecausein
Smart City alot smart transformations like smart healthcare,
smart governance, smartenvironment,smarttransportation,
smart energy, wasteand water managementapplicationsare
being used therefore a proper authentication mechanism as
well as encryption algorithm should be used while
transmission of information[6].
© A. Samarin 2018 A systems approach to digital healthcare and smart cities 12
Capability map view:
level 1 visualisation (example)
Leading
capabili es
ProcurementFinance Legal Media PMO ICT …
Suppor ng
capabili es
Facilies&buildingsmanagement
Energymanagement
Watermanagement
Wastemanagement
Publicsafetyandsecuritymanagement
Environment(nature)management
Transportaonmanagement
Healthcaremanagement
Educaonmanagement
Socialsidemanagement
Economicdevelopmentmanagement
Culture&entertainmentmanagement
Geoma cs Census Registries Urban info
Enabling
capabili es
Core
capabili es
Management Opera ons
Governance
Security
Safety
Privacy
Resilience
Interoperability
Low cost for opera ons
Short me to market
Emergent characteris cs
by design
Ability to evolve
Tourismmanagement
Fig -2: Application of Smart City
3. SMART CARDS
The main privacy issue in smart cards is the logging of
transactions. For example, transactions in public transport
can disclose spatio-temporal information about the card
holder. These mobility patterns can include locations,habits,
and visits to sensitive places or events. When data from
different users is correlated, possiblelinksbetweenthemcan
also be revealed. Information collected by smart cards can
contributetooptimizingpublictransportschedules,however,
it can also be repurposed for advertising, profiling, and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 338
tracking. Separationofauthenticationandservice.Separating
user authentication from theservice accessed bytheuserisa
step towards providing unlinkability between users and
transactions [7]. In some cases, this separation can be
achieved by not including identifying information on the
smart card, i.e., by usinganonymous, pre-paidsmartcards.In
other cases, for example when the smart card is used to
access buildings or to buy discounted bus tickets, the user
needs to be authenticated to ensure that they are allowed to
access the service. Even in cases where authentication is
required, it is not necessary to create a link betweenuserand
transaction. Instead, attribute-based credentials allow the
system to cryptographically verify certain of the user’s
attributes (for example, a student or discounted fares
attribute would indicate that the user is entitled to
discounted bus fares) without revealing the user identity[8].
4. INTERNET OF THINGS
Irjet Template sample paragraph .Define abbreviations and
acronyms the first time they are used in the text, even after
they have been defined in the abstract. Abbreviationssuchas
IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined.
Do not use abbreviations in the title or heads unless they are
unavoidable.
4.1 RFID tags
Radio frequency identification (RFID) tags are being used
immensely in the various components of smart city
including smart environment , industry and mobility , etc. It
has brought significant benefits in many other areas as well
through improving real-time information visibility and
traceability. This widespread technology is also prone to
many threats and attacks thus making it vulnerable to
security . According to the RFID tag is prone to give away
sensitive information through unauthorized access, creating
problem of data confidentiality and privacy. The problemsto
data integrity may also occur due to information leakage
4.2 Biometrics
Biometrics is an automated recognition of a person through
unique behavioral and biological characteristics. There are
two main types of biometric characteristics: physiological
and behavioral.Bothareacquiredbyapplyingpropersensors
and distinctive features are taken in use to get a biometric
template in authentication process . In fact, it is generally
thought that any other substitute to biometrics for
identification in integrated security applications does not
exists. Biometrics is said to play a key role in information
security issues [9], [10], [11] in a smart city. AccordingtoBill
Maheu, who is senior director for Qualcomm Government
Technologies, every year 3.7 trillion dollars are lost to global
frauds, which can be solved sufficiently by implementing
biometrics . Biometrics in fact can make various components
of a smart city secure with respect to frauds and malicious
attacks
Health
_ Education
_ Institution
_ Utility
_ Patrol and security
5. LACK OF FOCUS ON CYBERSECURITYINSMARTCITIES
Even though the fact that cyber security is important has
been established; that cyber security iscrucialininformation
heavy environment, cyber security is not one of the primary
concerns and considered as a non-challenge in a smart city
sphere (Washburn and Sindhu, 2010; Wenge et al., 2014;
Pierce and Andersson, 2017). The following section will
discuss different reasons for lack of cyber security focus into
the category of factors; knowledge and aware- ness,
organizational, financial, outsourcing. The reasons for these
categories were that there were commonidentifiablethemes
throughout the literature that have plausible effects on the
consideration of cyber security. Knowledge and awareness
category pertains to a more per- sonallevel,theperceptionof
individuals, as it is hard to gauge the knowledge and
awareness of a complete organisation. The organisational
category is then used to catch the non-per- sonal factors and
pertains to organisation wide decisions, structure and
strategy. The financial category includes factors related to
factors more economical in nature, which could potentially
lead toa lack of decisionstakenregardingcybersecurity[12],
[13]. Finally, the outsourcing category highlights different
factors connected with suppliers and contractors.
6. CHALLENGES
Despite its various applications specified in this paper, there
are some issues which need attention for its viability. The
challenges are presented inPereraetal. andbrieflyheadlined
here only for a quick reading.
(a) ArchitecturalDesigns,SensorConfiguration,DataFusing/
Filtering, Processing /Storage,Infrastructure, Energy
Consumption
(b) Standardization, Accuracy Security and Privacy,
(c) Innovation, Entrepreneurship, Entry Barriers [14], [15].
(d) Sustainability, Licensing, Business Practices, Credibility
(e)Trust,SocialAcceptance,ChangeManagement,Awareness
(f) Security and Privacy [13], Safety, Accessibility, Usability,
Legal Terms
● Enable strong encryption: All communications should be
properly protected against unauthorized eavesdropping,
interception,and modification. Encryption keysmustbewell
protected and kept in a safe place [16], [17], [18].
● Secure system administration: Avoid using a single
administrator system user to perform all actions on all
systems. Use different administrator users and passwords
and grant granular permissions
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 339
● Set strong passwords: All access to administration
interfaces, functionality, etc. should require a user account
with a strong password. Passwords policy must be defined
for password strength and duration validity. To enhance
authentication capabilities, use strong authentication
mechanisms (one-time password, certificate- or biometric-
based authentication, multifactor authentication, etc.)
especially any technology that can impact public safety[19],
[20].
● Remove unnecessary user accounts: Some solutions come
with test/default accounts and passwords that couldbeused
by unauthorized parties to access the systems, if these
accounts are not removed. Specific accounts can be created
for the implementation process, but these accounts must be
removed after the solution is installed and not used for
operation purposes. These accounts should be identified in
the product and implementation documentations for easy
identification and removal.
● Disable unused functionality and services: Some solutions
have all functionality and services enabled by default.
Disabling unused functionality and services reduces the
attack surface and prevents possible attacks that abuse
weaknesses in those functions and services.
● Enable auditing of security events: Constantly monitoring
audit logs will help to identify ongoing attacks and breaches.
● Add anti-tampering, anti-vandalism mechanisms: Devices
should be protected against unauthorizedphysicalaccessfor
modification, vandalism, or device stealing.
Malicious Insider threats: Many Cloud service providers do
not reveal the clearance and screening procedures of their
personnel and how they grant access to the resources of the
client organization (Behl, 2011).
Denial of Service Attacks (DoS): Since an outside party is
hosting the services on the Cloud, it is often easy for an
adversary to extract information about the smart city
infrastructure, as its hosted publicly making data publicly
accessible [18].
7. CONCLUSION AND FUTURE SCOPE
In this paper wehave majorlydiscussed about theSmartCity
Architecture and various privacy and security concerns and
issues related to the Smart City. We have firstly introduced
the importance of Smart City & its benefits for the users/
clients living in it. In the next section we have discussed the
Smart City Architecture.Afterthatwehavepresentedvarious
privacy and security concerns related to the Smart City. In
addition to it we have also taken into consideration various
privacy and security issues. We hope that this article sheds
more light to the Smart City Security Architecture and the
security concerns and issues related to it.
REFERENCES
[1] Tarun Dhar Diwan, Durga Chandrakar, Implementation
Of Android Based Mobile Phone Search Engine AndLive
Image Sender, International Research Journal Of
Engineering And Technology, Volume: 02 Issue: 03,
ISSN: 2395- 0056, June-2015
[2] A. Wood, L. Fang, J. Stankovic, and T. He, SIGF: A Family
of Configurable Secure Routing Protocols for Wireless
Sensor Networks, ACM Security of Ad Hoc and Sensor
Networks, Best Paper Award, October 31, 2006.
[3] S. Munir, J. Stankovic, C. Liang, and S. Lin, New Cyber
Physical System Challenges for Human-in-the-Loop
Control, 8th International Workshop on Feedback
Computing, June 2013.
[4] Somayya Madakam , R. Ramaswamy , Siddharth
Tripathi, ‘Internet of Things (IoT): A LiteratureReview’,
Journal of Computer and Communications , 2015,3,164
-173 Published Online May 201 5 in Sci Res .
[5] http://www.scirp.org/journal/jcc
[6] Alok Kulkar et al, / (IJCSIT), Healthcare applications of
the Internet of Things: A Review , International Journal
of Computer Science and Information Technologies,Vol.
5 (5) , 2014, 6229-6232
[7] Andrea Zanella, Internet of Things for Smart Cities,IEEE
INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1,
FEBRUARY 2014, pp 22-32
[8] J. P. Lynch and J. L. Kenneth, “A summary review of
wireless sensors and sensor networks f or structural
health monitoring,” Shock and Vibration Digest, vol. 38,
no. 2, pp. 91– 130, 2006
[9] T. Nuortio, J. Kytöjoki, H. Niska, and O. Bräysy,
“Improved route planning and scheduling of waste
collection andtransport,” Expert Syst. Appl., vol. 30, no.
2, pp. 223– 232, Feb. 2006.
[10] B. Jana and J. Poray, "A performance analysis on elliptic
curve cryptography in network security," 2016
International Conference on Computer, Electrical &
Communication Engineering (ICCECE), Kolkata, 2016,
pp. 1-7.doi: 10.1109/ICCECE.2016.8009587
[11] S. Mitra, B. Jana and J. Poray, "A novel scheme to detect
and remove black hole attack in cognitive radio
vehicular ad hoc networks(CR-VANETs)," 2016
International Conference on Computer, Electrical &
Communication Engineering (ICCECE), Kolkata, 2016,
pp. 1-5. doi: 10.1109/ICCECE.2016.8009589
[12] B. Jana, S. Mitra and J. Poray, "An analysis of security
threats and countermeasures in VANET," 2016
International Conference on Computer, Electrical &
Communication Engineering (ICCECE), Kolkata, 2016,
pp. 1-6. doi: 10.1109/ICCECE.2016.8009588
[13] S. Mitra, B. Jana, S. Bhattacharya, P. Pal and J. Poray,
"Quantum cryptography: Overview, security issues and
future challenges," 2017 4th International Conference
on Opto-Electronics and Applied Optics (Optronix),
Kolkata, 2017, pp. 1-7. doi:
10.1109/OPTRONIX.2017.8350006
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 340
[14] B. Jana, J. Poray, T. Mandal and M. Kule, "A multilevel
encryption technique in cloud security," 2017 7th
International Conference on Communication Systems
and Network Technologies (CSNT), Nagpur, 2017, pp.
220-224.doi: 10.1109/CSNT.2017.8418541
[15] Jana B., Poray J. (2018) A Hybrid Task Scheduling
Approach Based on Genetic Algorithm and Particle
Swarm Optimization Technique in Cloud Environment.
In: Bhateja V., Coello Coello C., Satapathy S., Pattnaik P.
(eds) Intelligent Engineering Informatics. Advances in
Intelligent Systems and Computing, vol 695. Springer,
Singapore
[16] Jana B., Chakraborty M., Mandal T. (2019) A Task
Scheduling Technique Based on Particle Swarm
Optimization Algorithm in Cloud Environment. In: Ray
K., Sharma T., Rawat S., Saini R., BandyopadhyayA.(eds)
Soft Computing: Theories and Applications.Advancesin
Intelligent Systems and Computing, vol 742. Springer,
Singapore
[17] Jana, Bappaditya and Chakraborty, Moumita and
Mandal, Tamoghna and Kule, Malay, An Overview on
Security Issues in Modern Cryptographic Techniques
(May 4, 2018). Proceedings of 3rd International
Conference on Internet of Things and Connected
Technologies (ICIoTCT), 2018 held atMalaviya National
Institute of Technology, Jaipur (India) on March 26-27,
2018. Available at
SSRN: https://ssrn.com/abstract=3173527 or http://dx.
doi.org/10.2139/ssrn.3173527
[18] Jana B., Poray J. (2016) VANET: OVERVIEW, SECURITY
ISSUES AND CHALLENGES, International Journal of
Engineering Research-Online,Vol-4,Issue-2,Pages-451-
459, http://www.ijoer.in
[19] M Chakraborty B. Jana, T. Mandal and M. Kule, " An
Performance Analysis of RSA Scheme Using Artificial
Neural Network " 2018 9th International Conferenceon
Computing, Communication and Networking
Technologies (ICCCNT)), Bengaluru, 2018,
dOI: 10.1109/ICCCNT.2018.8494032
[20] Mandal, Tamoghna & Jana, Bappaditya. (2018). A Study
on Risk Assessment in Information Security. SSRN
Electronic Journal. 10.2139/ssrn.3261593.
[21] S. Mitra, B. Jana and J. Poray, "Implementationofa Novel
Security Technique Using Triple DES in Cashless
Transaction," 2017 International Conference on
Computer, Electrical & Communication Engineering
(ICCECE), Kolkata, India, 2017, pp. 1-6.
doi: 10.1109/ICCECE.2017.8526233

More Related Content

What's hot

IRJET- Smart Building Automation using Internet of Things
IRJET- Smart Building Automation using Internet of ThingsIRJET- Smart Building Automation using Internet of Things
IRJET- Smart Building Automation using Internet of ThingsIRJET Journal
 
Connected Products for the Industrial World
Connected Products for the Industrial WorldConnected Products for the Industrial World
Connected Products for the Industrial WorldCognizant
 
M2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesM2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesSoumya Kanti Datta
 
Internet of things for smart cities
Internet of things for smart citiesInternet of things for smart cities
Internet of things for smart citiesBiplab Mahanta
 
Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...redpel dot com
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01ictseserv
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)ictseserv
 
IRJET- A Survey on Blockchain Technology and Municipal Corporation System
IRJET- A Survey on Blockchain Technology and Municipal Corporation SystemIRJET- A Survey on Blockchain Technology and Municipal Corporation System
IRJET- A Survey on Blockchain Technology and Municipal Corporation SystemIRJET Journal
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsINFOGAIN PUBLICATION
 
Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...ijtsrd
 

What's hot (18)

IRJET- Smart Building Automation using Internet of Things
IRJET- Smart Building Automation using Internet of ThingsIRJET- Smart Building Automation using Internet of Things
IRJET- Smart Building Automation using Internet of Things
 
Connected Products for the Industrial World
Connected Products for the Industrial WorldConnected Products for the Industrial World
Connected Products for the Industrial World
 
INTERNET OF THINGS
INTERNET OF THINGSINTERNET OF THINGS
INTERNET OF THINGS
 
M2M communications and internet of things for smart cities
M2M communications and internet of things for smart citiesM2M communications and internet of things for smart cities
M2M communications and internet of things for smart cities
 
Internet of things for smart cities
Internet of things for smart citiesInternet of things for smart cities
Internet of things for smart cities
 
Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...Recent advances in industrial wireless sensor networks toward efficient manag...
Recent advances in industrial wireless sensor networks toward efficient manag...
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic)
 
IRJET- A Survey on Blockchain Technology and Municipal Corporation System
IRJET- A Survey on Blockchain Technology and Municipal Corporation SystemIRJET- A Survey on Blockchain Technology and Municipal Corporation System
IRJET- A Survey on Blockchain Technology and Municipal Corporation System
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 
Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...
 

Similar to Smart City Security Challenges

Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...ijtsrd
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET Journal
 
IRJET - IoT in Real World
IRJET - IoT in Real WorldIRJET - IoT in Real World
IRJET - IoT in Real WorldIRJET Journal
 
IOT Based Smart Cities
IOT Based Smart CitiesIOT Based Smart Cities
IOT Based Smart Citiesijtsrd
 
IRJET- Review on Applications Areas of Smart Cities
IRJET- Review on Applications Areas of Smart CitiesIRJET- Review on Applications Areas of Smart Cities
IRJET- Review on Applications Areas of Smart CitiesIRJET Journal
 
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docxjesusamckone
 
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...IRJET Journal
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...IJMIT JOURNAL
 
Mediating and moderating factors affecting readiness to io t applications the...
Mediating and moderating factors affecting readiness to io t applications the...Mediating and moderating factors affecting readiness to io t applications the...
Mediating and moderating factors affecting readiness to io t applications the...IJMIT JOURNAL
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT DevicesIRJET Journal
 
Analyzing Role of Big Data and IoT in Smart Cities
Analyzing Role of Big Data and IoT in Smart CitiesAnalyzing Role of Big Data and IoT in Smart Cities
Analyzing Role of Big Data and IoT in Smart CitiesIJAEMSJORNAL
 
Smart cities: Understanding policies, standards, applications and case studies
Smart cities: Understanding policies, standards, applications and case studies Smart cities: Understanding policies, standards, applications and case studies
Smart cities: Understanding policies, standards, applications and case studies IJECEIAES
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
 
An overview of big data analysis
An overview of big data analysisAn overview of big data analysis
An overview of big data analysisjournalBEEI
 
IRJET- Internet of Things for Industries and Enterprises
IRJET- Internet of Things for Industries and EnterprisesIRJET- Internet of Things for Industries and Enterprises
IRJET- Internet of Things for Industries and EnterprisesIRJET Journal
 
Advancements in Supply Chain Management Using IoT
Advancements in Supply Chain Management Using IoTAdvancements in Supply Chain Management Using IoT
Advancements in Supply Chain Management Using IoTIRJET Journal
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 

Similar to Smart City Security Challenges (20)

Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...Internet of Things IoT Based Smart Environment Integrating Various Business A...
Internet of Things IoT Based Smart Environment Integrating Various Business A...
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
 
IRJET - IoT in Real World
IRJET - IoT in Real WorldIRJET - IoT in Real World
IRJET - IoT in Real World
 
IOT Based Smart Cities
IOT Based Smart CitiesIOT Based Smart Cities
IOT Based Smart Cities
 
IRJET- Review on Applications Areas of Smart Cities
IRJET- Review on Applications Areas of Smart CitiesIRJET- Review on Applications Areas of Smart Cities
IRJET- Review on Applications Areas of Smart Cities
 
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
2958 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, .docx
 
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
IRJET- Internet of Things Technologies for Future of Smart Cities: Artificial...
 
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
MEDIATING AND MODERATING FACTORS AFFECTING READINESS TO IOT APPLICATIONS: THE...
 
Mediating and moderating factors affecting readiness to io t applications the...
Mediating and moderating factors affecting readiness to io t applications the...Mediating and moderating factors affecting readiness to io t applications the...
Mediating and moderating factors affecting readiness to io t applications the...
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Analyzing Role of Big Data and IoT in Smart Cities
Analyzing Role of Big Data and IoT in Smart CitiesAnalyzing Role of Big Data and IoT in Smart Cities
Analyzing Role of Big Data and IoT in Smart Cities
 
Smart cities: Understanding policies, standards, applications and case studies
Smart cities: Understanding policies, standards, applications and case studies Smart cities: Understanding policies, standards, applications and case studies
Smart cities: Understanding policies, standards, applications and case studies
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
An overview of big data analysis
An overview of big data analysisAn overview of big data analysis
An overview of big data analysis
 
IRJET- Internet of Things for Industries and Enterprises
IRJET- Internet of Things for Industries and EnterprisesIRJET- Internet of Things for Industries and Enterprises
IRJET- Internet of Things for Industries and Enterprises
 
IoT and Smart Cities
IoT and Smart CitiesIoT and Smart Cities
IoT and Smart Cities
 
Advancements in Supply Chain Management Using IoT
Advancements in Supply Chain Management Using IoTAdvancements in Supply Chain Management Using IoT
Advancements in Supply Chain Management Using IoT
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
Cyber security in smart cities
Cyber security in smart cities  Cyber security in smart cities
Cyber security in smart cities
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 

Recently uploaded (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 

Smart City Security Challenges

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 337 Smart City: Overview and Security Challenges A. K. Pradhan IEEE Member ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Technologies (ICTs) is inextricably linked with the urban development. In last decades, smart cities have become a hope for many of decision makers and people as well to overcome the cumulated urban problems. Internet of Things (IoT) is a paradigm that involves a network of physicalobjects containing embedded technologies to collect, communicate, sense, and interact with their internal states or the external environment through wireless or wired connections. The nature of IoT information exchange among the connected objects “Things” and remote locations for data storage and data processing gives the ability to collect numerous amounts of data about individuals, and other things in the smart city. Key Words: smart cities, Internet of things, authentication, security issues, Radio frequency identification. 1. INTRODUCTION Smart City has become an umbrella term for numerous technologies with the goal of improving the efficiency of future cities and the quality of life for their inhabitants, not just by introducing new applications but also by making existing processes smarter. It has become fashionabletocall cities smart and there are political efforts intended to encourage the development of smart cities [1]. There exist a number of formal definitions of what makes a city smart: Caragliu et al. define “a city to be smart when investments in human and social capital and traditional (transport) and modern (ICT) communicationinfrastructurefuel sustainable economic growth and a high quality of life, with a wise management of natural resources, through participatory governance.” [2]. While others argue that there cannot be an absolute definition as the term smartcitydoesnotdescribea static concept but rather a process towards more liveable and resilient cities [3], there seems to be agreement that certain novel technologies and applications amount to making cities smarter [4]. A smart city mean to be an urbanized town, by embedding Information and Communication Technology in its infrastructure which serves various innovative andadvance services to its citizens, in order to improvise the quality of their products. Fig -1: Generation of Smart City 2. SMART CITY ARCHITECTURE In order to gain collective sensing as well as refined management of city , the information is manipulated via smart city which is sensed from the substantial world, the information which is transmitted in the communication world, in addition to the information processed in the information world for clever services [5]. The sensing components, mixed networkinfrastructure,processingunits, and control along with operating components are integrated in it as shown in the Figure 1.While thedataorinformationis being transferred from Substantial World to Communication World and henceforth from Communication World to Information World it shouldbesecuredinallwaysbecausein Smart City alot smart transformations like smart healthcare, smart governance, smartenvironment,smarttransportation, smart energy, wasteand water managementapplicationsare being used therefore a proper authentication mechanism as well as encryption algorithm should be used while transmission of information[6]. © A. Samarin 2018 A systems approach to digital healthcare and smart cities 12 Capability map view: level 1 visualisation (example) Leading capabili es ProcurementFinance Legal Media PMO ICT … Suppor ng capabili es Facilies&buildingsmanagement Energymanagement Watermanagement Wastemanagement Publicsafetyandsecuritymanagement Environment(nature)management Transportaonmanagement Healthcaremanagement Educaonmanagement Socialsidemanagement Economicdevelopmentmanagement Culture&entertainmentmanagement Geoma cs Census Registries Urban info Enabling capabili es Core capabili es Management Opera ons Governance Security Safety Privacy Resilience Interoperability Low cost for opera ons Short me to market Emergent characteris cs by design Ability to evolve Tourismmanagement Fig -2: Application of Smart City 3. SMART CARDS The main privacy issue in smart cards is the logging of transactions. For example, transactions in public transport can disclose spatio-temporal information about the card holder. These mobility patterns can include locations,habits, and visits to sensitive places or events. When data from different users is correlated, possiblelinksbetweenthemcan also be revealed. Information collected by smart cards can contributetooptimizingpublictransportschedules,however, it can also be repurposed for advertising, profiling, and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 338 tracking. Separationofauthenticationandservice.Separating user authentication from theservice accessed bytheuserisa step towards providing unlinkability between users and transactions [7]. In some cases, this separation can be achieved by not including identifying information on the smart card, i.e., by usinganonymous, pre-paidsmartcards.In other cases, for example when the smart card is used to access buildings or to buy discounted bus tickets, the user needs to be authenticated to ensure that they are allowed to access the service. Even in cases where authentication is required, it is not necessary to create a link betweenuserand transaction. Instead, attribute-based credentials allow the system to cryptographically verify certain of the user’s attributes (for example, a student or discounted fares attribute would indicate that the user is entitled to discounted bus fares) without revealing the user identity[8]. 4. INTERNET OF THINGS Irjet Template sample paragraph .Define abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviationssuchas IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable. 4.1 RFID tags Radio frequency identification (RFID) tags are being used immensely in the various components of smart city including smart environment , industry and mobility , etc. It has brought significant benefits in many other areas as well through improving real-time information visibility and traceability. This widespread technology is also prone to many threats and attacks thus making it vulnerable to security . According to the RFID tag is prone to give away sensitive information through unauthorized access, creating problem of data confidentiality and privacy. The problemsto data integrity may also occur due to information leakage 4.2 Biometrics Biometrics is an automated recognition of a person through unique behavioral and biological characteristics. There are two main types of biometric characteristics: physiological and behavioral.Bothareacquiredbyapplyingpropersensors and distinctive features are taken in use to get a biometric template in authentication process . In fact, it is generally thought that any other substitute to biometrics for identification in integrated security applications does not exists. Biometrics is said to play a key role in information security issues [9], [10], [11] in a smart city. AccordingtoBill Maheu, who is senior director for Qualcomm Government Technologies, every year 3.7 trillion dollars are lost to global frauds, which can be solved sufficiently by implementing biometrics . Biometrics in fact can make various components of a smart city secure with respect to frauds and malicious attacks Health _ Education _ Institution _ Utility _ Patrol and security 5. LACK OF FOCUS ON CYBERSECURITYINSMARTCITIES Even though the fact that cyber security is important has been established; that cyber security iscrucialininformation heavy environment, cyber security is not one of the primary concerns and considered as a non-challenge in a smart city sphere (Washburn and Sindhu, 2010; Wenge et al., 2014; Pierce and Andersson, 2017). The following section will discuss different reasons for lack of cyber security focus into the category of factors; knowledge and aware- ness, organizational, financial, outsourcing. The reasons for these categories were that there were commonidentifiablethemes throughout the literature that have plausible effects on the consideration of cyber security. Knowledge and awareness category pertains to a more per- sonallevel,theperceptionof individuals, as it is hard to gauge the knowledge and awareness of a complete organisation. The organisational category is then used to catch the non-per- sonal factors and pertains to organisation wide decisions, structure and strategy. The financial category includes factors related to factors more economical in nature, which could potentially lead toa lack of decisionstakenregardingcybersecurity[12], [13]. Finally, the outsourcing category highlights different factors connected with suppliers and contractors. 6. CHALLENGES Despite its various applications specified in this paper, there are some issues which need attention for its viability. The challenges are presented inPereraetal. andbrieflyheadlined here only for a quick reading. (a) ArchitecturalDesigns,SensorConfiguration,DataFusing/ Filtering, Processing /Storage,Infrastructure, Energy Consumption (b) Standardization, Accuracy Security and Privacy, (c) Innovation, Entrepreneurship, Entry Barriers [14], [15]. (d) Sustainability, Licensing, Business Practices, Credibility (e)Trust,SocialAcceptance,ChangeManagement,Awareness (f) Security and Privacy [13], Safety, Accessibility, Usability, Legal Terms ● Enable strong encryption: All communications should be properly protected against unauthorized eavesdropping, interception,and modification. Encryption keysmustbewell protected and kept in a safe place [16], [17], [18]. ● Secure system administration: Avoid using a single administrator system user to perform all actions on all systems. Use different administrator users and passwords and grant granular permissions
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 339 ● Set strong passwords: All access to administration interfaces, functionality, etc. should require a user account with a strong password. Passwords policy must be defined for password strength and duration validity. To enhance authentication capabilities, use strong authentication mechanisms (one-time password, certificate- or biometric- based authentication, multifactor authentication, etc.) especially any technology that can impact public safety[19], [20]. ● Remove unnecessary user accounts: Some solutions come with test/default accounts and passwords that couldbeused by unauthorized parties to access the systems, if these accounts are not removed. Specific accounts can be created for the implementation process, but these accounts must be removed after the solution is installed and not used for operation purposes. These accounts should be identified in the product and implementation documentations for easy identification and removal. ● Disable unused functionality and services: Some solutions have all functionality and services enabled by default. Disabling unused functionality and services reduces the attack surface and prevents possible attacks that abuse weaknesses in those functions and services. ● Enable auditing of security events: Constantly monitoring audit logs will help to identify ongoing attacks and breaches. ● Add anti-tampering, anti-vandalism mechanisms: Devices should be protected against unauthorizedphysicalaccessfor modification, vandalism, or device stealing. Malicious Insider threats: Many Cloud service providers do not reveal the clearance and screening procedures of their personnel and how they grant access to the resources of the client organization (Behl, 2011). Denial of Service Attacks (DoS): Since an outside party is hosting the services on the Cloud, it is often easy for an adversary to extract information about the smart city infrastructure, as its hosted publicly making data publicly accessible [18]. 7. CONCLUSION AND FUTURE SCOPE In this paper wehave majorlydiscussed about theSmartCity Architecture and various privacy and security concerns and issues related to the Smart City. We have firstly introduced the importance of Smart City & its benefits for the users/ clients living in it. In the next section we have discussed the Smart City Architecture.Afterthatwehavepresentedvarious privacy and security concerns related to the Smart City. In addition to it we have also taken into consideration various privacy and security issues. We hope that this article sheds more light to the Smart City Security Architecture and the security concerns and issues related to it. REFERENCES [1] Tarun Dhar Diwan, Durga Chandrakar, Implementation Of Android Based Mobile Phone Search Engine AndLive Image Sender, International Research Journal Of Engineering And Technology, Volume: 02 Issue: 03, ISSN: 2395- 0056, June-2015 [2] A. Wood, L. Fang, J. Stankovic, and T. He, SIGF: A Family of Configurable Secure Routing Protocols for Wireless Sensor Networks, ACM Security of Ad Hoc and Sensor Networks, Best Paper Award, October 31, 2006. [3] S. Munir, J. Stankovic, C. Liang, and S. Lin, New Cyber Physical System Challenges for Human-in-the-Loop Control, 8th International Workshop on Feedback Computing, June 2013. [4] Somayya Madakam , R. Ramaswamy , Siddharth Tripathi, ‘Internet of Things (IoT): A LiteratureReview’, Journal of Computer and Communications , 2015,3,164 -173 Published Online May 201 5 in Sci Res . [5] http://www.scirp.org/journal/jcc [6] Alok Kulkar et al, / (IJCSIT), Healthcare applications of the Internet of Things: A Review , International Journal of Computer Science and Information Technologies,Vol. 5 (5) , 2014, 6229-6232 [7] Andrea Zanella, Internet of Things for Smart Cities,IEEE INTERNET OF THINGS JOURNAL, VOL. 1, NO. 1, FEBRUARY 2014, pp 22-32 [8] J. P. Lynch and J. L. Kenneth, “A summary review of wireless sensors and sensor networks f or structural health monitoring,” Shock and Vibration Digest, vol. 38, no. 2, pp. 91– 130, 2006 [9] T. Nuortio, J. Kytöjoki, H. Niska, and O. Bräysy, “Improved route planning and scheduling of waste collection andtransport,” Expert Syst. Appl., vol. 30, no. 2, pp. 223– 232, Feb. 2006. [10] B. Jana and J. Poray, "A performance analysis on elliptic curve cryptography in network security," 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, 2016, pp. 1-7.doi: 10.1109/ICCECE.2016.8009587 [11] S. Mitra, B. Jana and J. Poray, "A novel scheme to detect and remove black hole attack in cognitive radio vehicular ad hoc networks(CR-VANETs)," 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, 2016, pp. 1-5. doi: 10.1109/ICCECE.2016.8009589 [12] B. Jana, S. Mitra and J. Poray, "An analysis of security threats and countermeasures in VANET," 2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, 2016, pp. 1-6. doi: 10.1109/ICCECE.2016.8009588 [13] S. Mitra, B. Jana, S. Bhattacharya, P. Pal and J. Poray, "Quantum cryptography: Overview, security issues and future challenges," 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix), Kolkata, 2017, pp. 1-7. doi: 10.1109/OPTRONIX.2017.8350006
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 340 [14] B. Jana, J. Poray, T. Mandal and M. Kule, "A multilevel encryption technique in cloud security," 2017 7th International Conference on Communication Systems and Network Technologies (CSNT), Nagpur, 2017, pp. 220-224.doi: 10.1109/CSNT.2017.8418541 [15] Jana B., Poray J. (2018) A Hybrid Task Scheduling Approach Based on Genetic Algorithm and Particle Swarm Optimization Technique in Cloud Environment. In: Bhateja V., Coello Coello C., Satapathy S., Pattnaik P. (eds) Intelligent Engineering Informatics. Advances in Intelligent Systems and Computing, vol 695. Springer, Singapore [16] Jana B., Chakraborty M., Mandal T. (2019) A Task Scheduling Technique Based on Particle Swarm Optimization Algorithm in Cloud Environment. In: Ray K., Sharma T., Rawat S., Saini R., BandyopadhyayA.(eds) Soft Computing: Theories and Applications.Advancesin Intelligent Systems and Computing, vol 742. Springer, Singapore [17] Jana, Bappaditya and Chakraborty, Moumita and Mandal, Tamoghna and Kule, Malay, An Overview on Security Issues in Modern Cryptographic Techniques (May 4, 2018). Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held atMalaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018. Available at SSRN: https://ssrn.com/abstract=3173527 or http://dx. doi.org/10.2139/ssrn.3173527 [18] Jana B., Poray J. (2016) VANET: OVERVIEW, SECURITY ISSUES AND CHALLENGES, International Journal of Engineering Research-Online,Vol-4,Issue-2,Pages-451- 459, http://www.ijoer.in [19] M Chakraborty B. Jana, T. Mandal and M. Kule, " An Performance Analysis of RSA Scheme Using Artificial Neural Network " 2018 9th International Conferenceon Computing, Communication and Networking Technologies (ICCCNT)), Bengaluru, 2018, dOI: 10.1109/ICCCNT.2018.8494032 [20] Mandal, Tamoghna & Jana, Bappaditya. (2018). A Study on Risk Assessment in Information Security. SSRN Electronic Journal. 10.2139/ssrn.3261593. [21] S. Mitra, B. Jana and J. Poray, "Implementationofa Novel Security Technique Using Triple DES in Cashless Transaction," 2017 International Conference on Computer, Electrical & Communication Engineering (ICCECE), Kolkata, India, 2017, pp. 1-6. doi: 10.1109/ICCECE.2017.8526233