Security and Privacy in Smart Cities: Issues and Current Solutions

  • Talal Ashraf ButtEmail author
  • Muhammad Afzaal
Conference paper
Part of the Advances in Science, Technology & Innovation book series (ASTI)


Internet of Things (IoT) paradigm is making it possible for everyday objects to integrate with the Internet. This has laid the foundations for the inception of future Smart cities based on systems that consist of a plethora of IoT devices to enable novel applications. The smart cities paradigm deals with the public data that is prone to different security and privacy risks at different level of smart cities architecture. Therefore, the importance of ensuring security and privacy is paramount in this paradigm. This paper focuses on the security and privacy issues involved in the smart cities. The paper highlights the key applications of smart cities and then investigates its architecture from security point of view. The paper also reviews the current security and privacy solutions for smart cities and emphasizes the open issues and research challenges that still need to be addressed in this new paradigm.


Security Privacy Smart city Internet of things 


  1. 1.
    Hernández-Muñoz, J.M., Vercher, J. B., Muñoz, L., Galache, J.A., Presser, M., Gómez, L.A.H., Pettersson, J.: Smart Cities at the Forefront of the Future Internet, pp. 447–462 (2011)CrossRefGoogle Scholar
  2. 2.
    Albino, V., Berardi, U., Dangelico, R.M.: Smart Cities: definitions, Dimensions, Performance, and Initiatives, vol. 22, pp. 3–21. Taylor & Francis (2015)Google Scholar
  3. 3.
    Popescul, D., Radu, L.D.: Data Security in Smart Cities: challenges and Solutions, vol. 20, p. 29. Inforce Association (2016)Google Scholar
  4. 4.
    Yang, K., Zhang, K., Ren, J., Shen, X.: Security and Privacy in Mobile Crowdsourcing Networks: challenges and Opportunities, vol. 53, pp. 75–81. IEEE (2015)CrossRefGoogle Scholar
  5. 5.
    Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of Things for Smart Cities, vol. 1, pp. 22–32. IEEE (2014)CrossRefGoogle Scholar
  6. 6.
    Yaqoob, I., Hashem, I.A.T., Mehmood, Y., Gani, A., Mokhtar, S., Guizani, S.: Enabling Communication Technologies for Smart Cities, vol. 55, pp. 112–120. IEEE (2017)CrossRefGoogle Scholar
  7. 7.
    Petrolo, R., Loscri, V., Mitton, N.: Towards a Smart City Based on Cloud of Things, a Survey on the Smart City Vision and Paradigms, vol. 28. Wiley Online Library (2017)Google Scholar
  8. 8.
    Hashem, I.A.T., Chang, V., Anuar, N.B., Adewole, K., Yaqoob, I., Gani, A., Ahmed, E., Chiroma, H.: The Role of Big Data in Smart City, vol. 36, pp. 748–758. Elsevier (2016)Google Scholar
  9. 9.
    Al Nuaimi, E., Al Neyadi, H., Mohamed, N., Al-Jaroodi, J.: Applications of Big Data to Smart Cities, vol. 6, p. 25. Springer (2015)Google Scholar
  10. 10.
    Xiong, Z., Sheng, H., Rong, W., Cooper, D.E.: Intelligent transportation systems for smart cities: a progress review. Sci. China Inf. Sci., 1–7 (2012)Google Scholar
  11. 11.
    Karnouskos, S., Da Silva, P.G., Ilic, D.: Energy Services for the Smart Grid City, pp. 1–6 (2012)Google Scholar
  12. 12.
    Solanas, A., Patsakis, C., Conti, M., Vlachos, I.S., Ramos, V., Falcone, F., Postolache, O., Pérez-Martínez, P.A., Di Pietro, R., Perrea, D.N., et al. Smart Health: a Context-Aware Health Paradigm Within Smart Cities, vol. 52, pp. 74–81. IEEE (2014)CrossRefGoogle Scholar
  13. 13.
    Jeong, J.-S., Kim, M., Yoo, K.-H.: A Content Oriented Smart Education System Based on Cloud Computing. Citeseer (2013)Google Scholar
  14. 14.
    Filipponi, L., Vitaletti, A., Landi, G., Memeo, V., Laura, G., Pucci, P.: Smart City: an Event Driven Architecture for Monitoring Public Spaces with Heterogeneous Sensors, pp. 281–286 (2010)Google Scholar
  15. 15.
    Al-Muhtadi, J., Ranganathan, A., Campbell, R., Mickunas, M.D.: Cerberus: a Context-Aware Security Scheme for Smart Spaces, pp. 489–496 (2003)Google Scholar
  16. 16.
    Lee, J., Kao, H.-A., Yang, S.: Service Innovation and Smart Analytics for Industry 4.0 and Big Data Environment, vol. 16, pp. 3–8. Elsevier (2014)Google Scholar
  17. 17.
    Martínez-Ballesté, A., Pérez-Martínez, P.A., Solanas, A.: The Pursuit of Citizens’ Privacy: a Privacy-Aware Smart City is Possible, vol. 51, pp. 136–141. IEEE (2013)Google Scholar
  18. 18.
    Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues, vol. 17, pp. 1294–1312. IEEE (2015)CrossRefGoogle Scholar
  19. 19.
    Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and Challenges, vol. 20, pp. 2481–2501. Springer (2014)Google Scholar
  20. 20.
    Xiao, Z., Xiao, Y.: Security and Privacy in Cloud Computing, vol. 15, pp. 843–859. IEEE (2013)Google Scholar
  21. 21.
    Nam, T., Pardo, T.A.: Conceptualizing Smart City with Dimensions of Technology, People, and Institutions, pp. 282–291 (2011)Google Scholar
  22. 22.
    Karthikeyan, S., Nesterenko, M.: RFID Security Without Extensive Cryptography, pp. 63–67 (2005)Google Scholar
  23. 23.
    Chien, H.-Y.: SASI: a New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity, vol. 4, pp. 337–340. IEEE (2007)Google Scholar
  24. 24.
    Qiu, Y., Ma, M.: An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs. In: 2015 IEEE International Conference on Communication Workshop (ICCW) (2015)Google Scholar
  25. 25.
    Engels, D.W., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The Hummingbird-2 Lightweight Authenticated Encryption Algorithm, vol. 11, pp. 19–31. Springer (2011)Google Scholar
  26. 26.
    Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic Encryption Appl. Cloud Comput. Secur. 1, 4–6 (2012)Google Scholar
  27. 27.
    López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption, pp. 1219–1234 (2012)Google Scholar
  28. 28.
    Brown, M., Paller, A.: Secure software development: why the development world awoke to the challenge. Inf. Secur. Techn. Rep. 13(1), 40–43 (2008)CrossRefGoogle Scholar
  29. 29.
    Kang, J., Park, J.H.: A secure-coding and vulnerability check system based on smart-fuzzing and exploit. Neurocomputing (2017)Google Scholar
  30. 30.
    Khan, R.: Secure software development: a prescriptive framework. Comput. Fraud Secur. 2011(8), 12–20 (2011)CrossRefGoogle Scholar
  31. 31.
    Goswami, S., Misra, S., Taneja, C., Mukherjee, A.: Securing intra-communication in 6LoWPAN: a PKI integrated scheme. In: 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS) (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.American University in the EmiratesDubaiUAE

Personalised recommendations