Abstract
Smart cities fully utilize the new generation of Internet of Things (IoT) technology in the process of urban informatization to optimize the urban management and service. However, in the IoT system, while information exchange and communication, wireless sensor network devices may not be able to resist all forms of attacks, which may lead to security issues such as user data disclosure. Aiming at the information security risks in smart city, the typical technologies in IoT is analyzed from the perspective of IoT perception layer and provides corresponding security solutions for the existing security threats. Regarding the communication security, the emerging wireless technology, long range (LoRa), is discussed, and the performance of wireless communication protocol is analyzed through simulation experiments, to verify that the IoT technology based on LoRa communication technology can improve the security of the system in the construction of smart city. The results show that REBEB, a new backoff algorithm, is similar to the binary exponential backoff algorithm in terms of throughput performance. REBEB focuses more on fairness, which is up to 0.985, and to a certain extent, its security is significantly improved. The fairness of REBEB algorithm is more than 0.4 in different nodes and competing windows, and the fairness of the system is better when the number of nodes is small. To sum up, the IoT system based on LoRa communication can effectively improve the security performance of the system in the construction of smart city and avoid the security threats in the IoT signal transmission.
- E. F. Z. Santana, A. P. Chaves, M. A. Gerosa, et al. 2017. Software platforms for smart cities: Concepts, requirements, challenges, and a unified reference architecture. ACM Comput. Surv. 50, 6 (2017), 1–37. Google Scholar
Digital Library
- Q. Zhu, S. W. Loke, R. Trujillo-Rasua, et al. 2019. Applications of distributed ledger technologies to the internet of things: A survey. ACM Comput. Surv. 52, 6 (2019), 1–34. Google Scholar
Digital Library
- L. Gonzalez-Manzano, J. M. D. Fuentes, and A. Ribagorda. 2019. Leveraging user-related internet of things for continuous authentication: A survey. ACM Comput. Surv. 52, 3 (2019), 1–38. Google Scholar
Digital Library
- R. Khatoun and S. Zeadally. 2016. Smart cities: Concepts, architectures, research opportunities. Commun. ACM 59, 8 (2016), 46–57. Google Scholar
Digital Library
- J. Liu, H. Shen, H. S. Narman, et al. 2018. A survey of mobile crowdsensing techniques: A critical component for the internet of things. ACM Trans. Cyber-Phys. Syst. 2, 3 (2018), 1–26. Google Scholar
Digital Library
- A. Bennaceur, T. T. Tun, A. K. Bandara, et al. 2018. Feature-driven mediator synthesis: Supporting collaborative security in the internet of things. ACM Trans. Cyber-Phys. Syst. 2, 3 (2018), 1–25. Google Scholar
Digital Library
- A. Rullo, D. Midi, E. Serra, et al. 2017. Pareto optimal security resource allocation for Internet of Things. ACM Trans. Priv. Secur 20, 4 (2017), 1–30. Google Scholar
Digital Library
- N. Kolbe, S. Kubler, J. Robert, et al. 2019. Linked vocabulary recommendation tools for internet of things: a survey. ACM Comput. Surv. 51, 6 (2019), 1–31. Google Scholar
Digital Library
- O. Novo and M. D. Francesco. 2020. Semantic interoperability in the IoT: Extending the web of things architecture. ACM Trans. IoT 1, 1 (2020), 1–25. Google Scholar
Digital Library
- S. Siboni, A. Shabtai, N. O. Tippenhauer, et al. 2016. Advanced security testbed framework for wearable IoT devices. ACM Trans. Internet Technol. 16, 4 (2016), 1–25. Google Scholar
Digital Library
- Y. Mehmood, F. Ahmad, I. Yaqoob, et al. 2017. Internet-of-things-based smart cities: Recent advances and challenges. IEEE Commun. Mag. 55, 9 (2017), 16–24.Google Scholar
Digital Library
- A. Gharaibeh, M. A. Salahuddin, S. J. Hussini, et al. 2017. Smart cities: A survey on data management, security, and enabling technologies. IEEE Commun. Surv. Tutor. 19, 4 (2017), 2456–2501.Google Scholar
Cross Ref
- B. A. Mozzaquatro, R. Jardim-Goncalves, and C. Agostinho. 2015. Towards a reference ontology for security in the internet of things. In Proceedings of the IEEE International Workshop on Measurement & Networking. IEEE, 2015, 289–296.Google Scholar
- W. Li, H. Song, and F. Zeng. 2017. Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE IoT J. 5, 2 (2017), 716–723.Google Scholar
- D. Minoli, K. Sohraby, and B. Occhiogrosso. 2017. IoT considerations, requirements, and architectures for smart buildings—Energy optimization and next-generation building management systems. IEEE IoT J. 4, 1 (2017), 269–283.Google Scholar
- J. Lin, W. Yu, N. Zhang, et al. 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE IoT J. 4, 5 (2017), 1125–1142.Google Scholar
- M. Stolpe. 2016. The internet of things: Opportunities and challenges for distributed data analysis. ACM SIGKDD Explor. Newslett. 18, 1 (2016), 15–34. Google Scholar
Digital Library
- M. C. Schraefel, R. Gomer, A. Alan, et al. 2017. The internet of things: interaction challenges to meaningful consent at scale. Interactions 24, 6 (2017), 26–33. Google Scholar
Digital Library
- M. E. Jennex. 2017. Big data, the internet of things, and the revised knowledge pyramid. ACM SIGMIS Database 48, 4 (2017), 69–79. Google Scholar
Digital Library
- B. Billet and V. Issarny. 2017. Spinel: An opportunistic proxy for connecting sensors to the Internet of Things. ACM Trans. Internet Technol. 17, 2 (2017), 1–21. Google Scholar
Digital Library
- M. Ambrosin, P. Braca, M. Conti, et al. 2017. Odin: O bfuscation-based privacy-preserving consensus algorithm for decentralized information fusion in smart device networks. ACM Trans. Internet Technol. 18, 1 (2017), 1–22. Google Scholar
Digital Library
- A. Makhoul, C. Guyeux, M. Hakem, et al. 2016. Using an epidemiological approach to maximize data survival in the internet of things. ACM Trans. Internet Technol. 16, 1 (2016), 1–15. Google Scholar
Digital Library
- J. Dizdarević, F. Carpio, A. Jukan, et al. 2019. A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Comput. Surv. 51, 6 (2019), 1–29. Google Scholar
Digital Library
- M. Centenaro, L. Vangelista, A. Zanella, et al. 2016. Long-range communications in unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless Commun. 23, 5 (2016), 60–67. Google Scholar
Digital Library
- Y. Qian, D. Wu, W. Bao, et al. 2019. The internet of things for smart cities: Technologies and applications. IEEE Netw. 33, 2 (2019), 4–5.Google Scholar
Cross Ref
- Y. Zhang, Z. Xiong, D. Niyato, et al. 2020. Information trading in internet of things for smart cities: A market-oriented analysis. IEEE Netw. 34, 1 (2020), 122–129.Google Scholar
Cross Ref
- E. Fernandes, A. Rahmati, K. Eykholt, et al. 2017. Internet of things security research: A rehash of old ideas or new intellectual challenges. IEEE Secur. Priv. 15, 4 (2017), 79–84.Google Scholar
Digital Library
- J. Hu, K. Yang, S. T. Marin, et al. 2018. Guest editorial special issue on Internet-of-Things for smart cities. IEEE IoT J. 5, 2 (2018), 468–472.Google Scholar
- K. F. Tsang and V. Huang. 2019. Conference on sensors and internet of things standard for smart city and inauguration of IEEE P2668 internet of things maturity index [Chapter News]. IEEE Industr. Electr. Mag. 13, 4 (2019), 130–131.Google Scholar
Cross Ref
- H. Fu, M. Wang, P. Li, et al. 2019. Tracing knowledge development trajectories of the internet of things domain: A main path analysis. IEEE Trans. Industr. Inf 15, 12 (2019), 6531–6540.Google Scholar
Cross Ref
- H. Wang, S. Yu, S. Zeadally, et al. 2020. Introduction to the special section on network science for Internet of Things (IoT). IEEE Trans. Netw. Sci. Eng. 7, 1 (2020), 237–238.Google Scholar
Cross Ref
- M. Sookhak, H. Tang, Y. He, et al. 2018. Security and privacy of smart cities: A survey, research issues and challenges. IEEE Commun. Surv. Tutor. 21, 2 (2018), 1718–1743.Google Scholar
Cross Ref
- Y. Lu and L. Da Xu. 2018. Internet of things (iot) cybersecurity research: A review of current research topics. IEEE IoT J. 6, 2 (2018), 2103–2115.Google Scholar
- Z. Lv, S. Zhang, and W. Xiu. 2020. Solving the security problem of intelligent transportation system with deep learning. IEEE Trans. Intell. Transport. Syst. DOI:10.1109/TITS.2020.2980864Google Scholar
Digital Library
- F. Piccialli, G. Casolla, S. Cuomo, F. Giampaolo, and V. S. di Cola. 2020. Decision making in IoT environment through unsupervised learning. IEEE Intelligent Systems. 35, 1 (2020), 27--35.Google Scholar
Digital Library
- Z. Lv and H. Song. 2020. Mobile internet of things under data physical fusion technology. IEEE IoT J. 7, 5 (2020), 4616--4624.Google Scholar
- G. Casolla, S. Cuomo, V. S. Di Cola, and F. Piccialli. 2020. Exploring Unsupervised Learning techniques for the Internet of Things. IEEE Trans. Industr. Inf. 16, 4 (2020), 2621--2628.Google Scholar
Cross Ref
- R. Shi, Y. Gan, and Y. Wang. 2018. Evaluating scalability bottlenecks by workload extrapolation. In Proceedings of the IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS’18). 333–347.Google Scholar
- Z. Lv, W. Kong, X. Zhang, D. Jiang, H. Lv, and X. Lu. 2020. Intelligent security planning for regional distributed energy internet. IEEE Trans. Industr. Inf. 16, 5 (2020), 3540--3547.Google Scholar
Cross Ref
- F. Piccialli, S. Cuomo, V. S. di Cola, and G. Casolla. 2019. A machine learning approach for IoT cultural data. J. Ambient Intell. Human. Comput. (2019), 1–12.Google Scholar
- Z. Lv, X. Li, H. Lv, and W. Xiu. 2020. BIM Big Data Storage in WebVRGIS. IEEE Trans. Industr. Inf. 16, 4 (2020), 2566--2573.Google Scholar
Cross Ref
- S. Dang, O. Amin, B. Shihada, and M. S. Alouini. 2020. What should 6G be?. Nat. Electr. 3, 1 (2020), 20–29.Google Scholar
Cross Ref
- H. Lu, Y. Zhang, Y. Li, C. Jiang and H. Abbas. 2021. User-Oriented virtual mobile network resource management for vehicle communications. IEEE Trans. Intell. Transport. Syst. 22, 6 (2021), 3521--3532.Google Scholar
Cross Ref
Index Terms
AI-empowered IoT Security for Smart Cities
Recommendations
Joint IoT/ML Platforms for Smart Societies and Environments: A Review on Multimodal Information-Based Learning for Safety and Security
The application of the Internet of Things (IoT) is highly expected to have comprehensive economic, business, and societal implications for our smart lives; indeed, IoT technologies play an essential role in creating a variety of smart applications that ...
Data security of smart cities
SCA '18: Proceedings of the 3rd International Conference on Smart City ApplicationsThe smart city is a new concept of urban development. It is about improving the life quality of city dwellers by making the city more adaptive and efficient, using new technologies that rely on an ecosystem of objects and services. The scope covering ...
An SDN-IoT-based secure simulation system for smart cities
The massive spike in security threats is one of the greatest security problems facing the internet of things (IoT). Many IoT gadgets do not have any protection features, and even the ones they have are mostly primitive and can thus easily be subject to ...






Comments