skip to main content
research-article

AI-empowered IoT Security for Smart Cities

Authors Info & Claims
Published:22 July 2021Publication History
Skip Abstract Section

Abstract

Smart cities fully utilize the new generation of Internet of Things (IoT) technology in the process of urban informatization to optimize the urban management and service. However, in the IoT system, while information exchange and communication, wireless sensor network devices may not be able to resist all forms of attacks, which may lead to security issues such as user data disclosure. Aiming at the information security risks in smart city, the typical technologies in IoT is analyzed from the perspective of IoT perception layer and provides corresponding security solutions for the existing security threats. Regarding the communication security, the emerging wireless technology, long range (LoRa), is discussed, and the performance of wireless communication protocol is analyzed through simulation experiments, to verify that the IoT technology based on LoRa communication technology can improve the security of the system in the construction of smart city. The results show that REBEB, a new backoff algorithm, is similar to the binary exponential backoff algorithm in terms of throughput performance. REBEB focuses more on fairness, which is up to 0.985, and to a certain extent, its security is significantly improved. The fairness of REBEB algorithm is more than 0.4 in different nodes and competing windows, and the fairness of the system is better when the number of nodes is small. To sum up, the IoT system based on LoRa communication can effectively improve the security performance of the system in the construction of smart city and avoid the security threats in the IoT signal transmission.

References

  1. E. F. Z. Santana, A. P. Chaves, M. A. Gerosa, et al. 2017. Software platforms for smart cities: Concepts, requirements, challenges, and a unified reference architecture. ACM Comput. Surv. 50, 6 (2017), 1–37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Q. Zhu, S. W. Loke, R. Trujillo-Rasua, et al. 2019. Applications of distributed ledger technologies to the internet of things: A survey. ACM Comput. Surv. 52, 6 (2019), 1–34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Gonzalez-Manzano, J. M. D. Fuentes, and A. Ribagorda. 2019. Leveraging user-related internet of things for continuous authentication: A survey. ACM Comput. Surv. 52, 3 (2019), 1–38. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Khatoun and S. Zeadally. 2016. Smart cities: Concepts, architectures, research opportunities. Commun. ACM 59, 8 (2016), 46–57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Liu, H. Shen, H. S. Narman, et al. 2018. A survey of mobile crowdsensing techniques: A critical component for the internet of things. ACM Trans. Cyber-Phys. Syst. 2, 3 (2018), 1–26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Bennaceur, T. T. Tun, A. K. Bandara, et al. 2018. Feature-driven mediator synthesis: Supporting collaborative security in the internet of things. ACM Trans. Cyber-Phys. Syst. 2, 3 (2018), 1–25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Rullo, D. Midi, E. Serra, et al. 2017. Pareto optimal security resource allocation for Internet of Things. ACM Trans. Priv. Secur 20, 4 (2017), 1–30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Kolbe, S. Kubler, J. Robert, et al. 2019. Linked vocabulary recommendation tools for internet of things: a survey. ACM Comput. Surv. 51, 6 (2019), 1–31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. O. Novo and M. D. Francesco. 2020. Semantic interoperability in the IoT: Extending the web of things architecture. ACM Trans. IoT 1, 1 (2020), 1–25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Siboni, A. Shabtai, N. O. Tippenhauer, et al. 2016. Advanced security testbed framework for wearable IoT devices. ACM Trans. Internet Technol. 16, 4 (2016), 1–25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y. Mehmood, F. Ahmad, I. Yaqoob, et al. 2017. Internet-of-things-based smart cities: Recent advances and challenges. IEEE Commun. Mag. 55, 9 (2017), 16–24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Gharaibeh, M. A. Salahuddin, S. J. Hussini, et al. 2017. Smart cities: A survey on data management, security, and enabling technologies. IEEE Commun. Surv. Tutor. 19, 4 (2017), 2456–2501.Google ScholarGoogle ScholarCross RefCross Ref
  13. B. A. Mozzaquatro, R. Jardim-Goncalves, and C. Agostinho. 2015. Towards a reference ontology for security in the internet of things. In Proceedings of the IEEE International Workshop on Measurement & Networking. IEEE, 2015, 289–296.Google ScholarGoogle Scholar
  14. W. Li, H. Song, and F. Zeng. 2017. Policy-based secure and trustworthy sensing for internet of things in smart cities. IEEE IoT J. 5, 2 (2017), 716–723.Google ScholarGoogle Scholar
  15. D. Minoli, K. Sohraby, and B. Occhiogrosso. 2017. IoT considerations, requirements, and architectures for smart buildings—Energy optimization and next-generation building management systems. IEEE IoT J. 4, 1 (2017), 269–283.Google ScholarGoogle Scholar
  16. J. Lin, W. Yu, N. Zhang, et al. 2017. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE IoT J. 4, 5 (2017), 1125–1142.Google ScholarGoogle Scholar
  17. M. Stolpe. 2016. The internet of things: Opportunities and challenges for distributed data analysis. ACM SIGKDD Explor. Newslett. 18, 1 (2016), 15–34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. C. Schraefel, R. Gomer, A. Alan, et al. 2017. The internet of things: interaction challenges to meaningful consent at scale. Interactions 24, 6 (2017), 26–33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. E. Jennex. 2017. Big data, the internet of things, and the revised knowledge pyramid. ACM SIGMIS Database 48, 4 (2017), 69–79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. B. Billet and V. Issarny. 2017. Spinel: An opportunistic proxy for connecting sensors to the Internet of Things. ACM Trans. Internet Technol. 17, 2 (2017), 1–21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Ambrosin, P. Braca, M. Conti, et al. 2017. Odin: O bfuscation-based privacy-preserving consensus algorithm for decentralized information fusion in smart device networks. ACM Trans. Internet Technol. 18, 1 (2017), 1–22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Makhoul, C. Guyeux, M. Hakem, et al. 2016. Using an epidemiological approach to maximize data survival in the internet of things. ACM Trans. Internet Technol. 16, 1 (2016), 1–15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Dizdarević, F. Carpio, A. Jukan, et al. 2019. A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration. ACM Comput. Surv. 51, 6 (2019), 1–29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Centenaro, L. Vangelista, A. Zanella, et al. 2016. Long-range communications in unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless Commun. 23, 5 (2016), 60–67. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Y. Qian, D. Wu, W. Bao, et al. 2019. The internet of things for smart cities: Technologies and applications. IEEE Netw. 33, 2 (2019), 4–5.Google ScholarGoogle ScholarCross RefCross Ref
  26. Y. Zhang, Z. Xiong, D. Niyato, et al. 2020. Information trading in internet of things for smart cities: A market-oriented analysis. IEEE Netw. 34, 1 (2020), 122–129.Google ScholarGoogle ScholarCross RefCross Ref
  27. E. Fernandes, A. Rahmati, K. Eykholt, et al. 2017. Internet of things security research: A rehash of old ideas or new intellectual challenges. IEEE Secur. Priv. 15, 4 (2017), 79–84.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Hu, K. Yang, S. T. Marin, et al. 2018. Guest editorial special issue on Internet-of-Things for smart cities. IEEE IoT J. 5, 2 (2018), 468–472.Google ScholarGoogle Scholar
  29. K. F. Tsang and V. Huang. 2019. Conference on sensors and internet of things standard for smart city and inauguration of IEEE P2668 internet of things maturity index [Chapter News]. IEEE Industr. Electr. Mag. 13, 4 (2019), 130–131.Google ScholarGoogle ScholarCross RefCross Ref
  30. H. Fu, M. Wang, P. Li, et al. 2019. Tracing knowledge development trajectories of the internet of things domain: A main path analysis. IEEE Trans. Industr. Inf 15, 12 (2019), 6531–6540.Google ScholarGoogle ScholarCross RefCross Ref
  31. H. Wang, S. Yu, S. Zeadally, et al. 2020. Introduction to the special section on network science for Internet of Things (IoT). IEEE Trans. Netw. Sci. Eng. 7, 1 (2020), 237–238.Google ScholarGoogle ScholarCross RefCross Ref
  32. M. Sookhak, H. Tang, Y. He, et al. 2018. Security and privacy of smart cities: A survey, research issues and challenges. IEEE Commun. Surv. Tutor. 21, 2 (2018), 1718–1743.Google ScholarGoogle ScholarCross RefCross Ref
  33. Y. Lu and L. Da Xu. 2018. Internet of things (iot) cybersecurity research: A review of current research topics. IEEE IoT J. 6, 2 (2018), 2103–2115.Google ScholarGoogle Scholar
  34. Z. Lv, S. Zhang, and W. Xiu. 2020. Solving the security problem of intelligent transportation system with deep learning. IEEE Trans. Intell. Transport. Syst. DOI:10.1109/TITS.2020.2980864Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. F. Piccialli, G. Casolla, S. Cuomo, F. Giampaolo, and V. S. di Cola. 2020. Decision making in IoT environment through unsupervised learning. IEEE Intelligent Systems. 35, 1 (2020), 27--35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Z. Lv and H. Song. 2020. Mobile internet of things under data physical fusion technology. IEEE IoT J. 7, 5 (2020), 4616--4624.Google ScholarGoogle Scholar
  37. G. Casolla, S. Cuomo, V. S. Di Cola, and F. Piccialli. 2020. Exploring Unsupervised Learning techniques for the Internet of Things. IEEE Trans. Industr. Inf. 16, 4 (2020), 2621--2628.Google ScholarGoogle ScholarCross RefCross Ref
  38. R. Shi, Y. Gan, and Y. Wang. 2018. Evaluating scalability bottlenecks by workload extrapolation. In Proceedings of the IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS’18). 333–347.Google ScholarGoogle Scholar
  39. Z. Lv, W. Kong, X. Zhang, D. Jiang, H. Lv, and X. Lu. 2020. Intelligent security planning for regional distributed energy internet. IEEE Trans. Industr. Inf. 16, 5 (2020), 3540--3547.Google ScholarGoogle ScholarCross RefCross Ref
  40. F. Piccialli, S. Cuomo, V. S. di Cola, and G. Casolla. 2019. A machine learning approach for IoT cultural data. J. Ambient Intell. Human. Comput. (2019), 1–12.Google ScholarGoogle Scholar
  41. Z. Lv, X. Li, H. Lv, and W. Xiu. 2020. BIM Big Data Storage in WebVRGIS. IEEE Trans. Industr. Inf. 16, 4 (2020), 2566--2573.Google ScholarGoogle ScholarCross RefCross Ref
  42. S. Dang, O. Amin, B. Shihada, and M. S. Alouini. 2020. What should 6G be?. Nat. Electr. 3, 1 (2020), 20–29.Google ScholarGoogle ScholarCross RefCross Ref
  43. H. Lu, Y. Zhang, Y. Li, C. Jiang and H. Abbas. 2021. User-Oriented virtual mobile network resource management for vehicle communications. IEEE Trans. Intell. Transport. Syst. 22, 6 (2021), 3521--3532.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. AI-empowered IoT Security for Smart Cities

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Internet Technology
        ACM Transactions on Internet Technology  Volume 21, Issue 4
        November 2021
        520 pages
        ISSN:1533-5399
        EISSN:1557-6051
        DOI:10.1145/3472282
        • Editor:
        • Ling Lu
        Issue’s Table of Contents

        Copyright © 2021 Association for Computing Machinery.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 July 2021
        • Revised: 1 June 2020
        • Accepted: 1 June 2020
        • Received: 1 April 2020
        Published in toit Volume 21, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!