Abstract
The Gulf Cooperation Council (GCC) possesses a unique opportunity to realize secure internet-of-things (IoT) applications for government and public safety services. The security of IoT is considered to be of the same level of importance as public safety networks. This chapter discusses the security vulnerabilities of such a promising technology and presents the approach to mitigate them today through a vision of unification and cooperation of public safety agencies in the GCC. Methods of security implementation, based on the fundamentals of intelligence sharing are provided and discussed. The work in this chapter also establishes the economies of scale that can be leveraged by the GCC member states to secure IoT for smart cities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
3rd Generation Partnership Project (3GPP). 3rd Generation Partnership Project Technical Specification. 3GPP TS 36.211, vol. v9.1.0.
Clancy, T. (2011). Efficient OFDM denial: pilot jamming and pilot nulling, in 2011 IEEE International Conference on Communications, New York, NY.
Ilic, A., Xu, R., Frey, R.M., Vuckovac, D., Fuchs, K., Huebner, J., and Fleisch, E. (2016). Year in Review, Annual Report, Auto-ID Labs ETH/HSG, Zurich, Switzerland.
Lichtman, M., Reed, J. H., Clancy, T. C., and Norton, M. (2013). Vulnerability of LTE to hostile interference, in Proceedings of the IEEE Global Conference on Signal and Information Processing, Austin, TX.
Perez, D., and Pico, J. (2011). A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications, in In BlackHat, Washington, DC.
Rossler, A. (2009). Cell search and cell selection in UMTS LTE. White paper, Rhode & Schwarz, Abu Dhabi, United Arab Emirates (UAE).
Talbot, D. (2012). One simple trick could disable a city 4G phone network. MIT Technology Review, Boston, MA.
Xu, W. Ma, K., Trappe, W., and Zhang, Y. (2006). Jamming sensor networks: attack and defense strategies. IEEE Netw. 20(3), 41–47.
Xu, W., Zhang, Y., and Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks, in Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, Urbana-Champaign, IL.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Raza, A. (2019). Opportunities and Challenges in Internet-of-Things (IoT) Deployment for Smart Cities. In: Samad, W.A., Azar, E. (eds) Smart Cities in the Gulf. Palgrave Macmillan, Singapore. https://doi.org/10.1007/978-981-13-2011-8_10
Download citation
DOI: https://doi.org/10.1007/978-981-13-2011-8_10
Published:
Publisher Name: Palgrave Macmillan, Singapore
Print ISBN: 978-981-13-2010-1
Online ISBN: 978-981-13-2011-8
eBook Packages: Business and ManagementBusiness and Management (R0)