RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism
In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resil...
Saved in:
Published in: | Expert systems Vol. 40; no. 4 |
---|---|
Main Author: | |
Format: | Journal Article |
Language: | English |
Published: |
Oxford
Blackwell Publishing Ltd
01-05-2023
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed. |
---|---|
ISSN: | 0266-4720 1468-0394 |
DOI: | 10.1111/exsy.13113 |