Security and Organization within IoT and Smart Cities

An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT SecurityIntroductionArtificial Intelligence Fundamental ConceptsAI Technologies and EvolutionAI Technologies and IoTDiscussionFuture TrendsConclusionsReferencesSmart City: Evolution and Fundamental ConceptsSmart CityCharacteristics of a Smart CityComponents of Smart CityRoadmapApplication of Smart CitiesHealth ManagementSmart TransportationWaste ManagementSurveillanceWater ManagementSmart ParkingData MonitoringThree Layers of DataIssues for the City ManagementData ChallengesSelf-Driving CarsSmart Street LightningKey Takeaways for Considering Smart LightingEmergency ServicesSmart Energy ManagementSmart AgricultureIoT Applications for Smart FarmingWearable DevicesSmart EducationUnderground TunnellingFuture of Smart CitiesTechnologies Evolving Smart CitiesReferencesAdvances in AI-Based Security for Internet of Things in Wireless Virtualization EnvironmentIntroductionIoT Data CharacteristicsDifferent types of security attacks in the IoT networkSmart Home Security ThreatsDifferent AI/ML models to Combat IoT security attacksClassificationSummaryReferencesA Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty Paving the Path to Eco-Friendly Smart CitiesIntroductionRelated WorkConceptual System ModelConclusionReferencesA Novel Framework for a Cyber Secure Smart CityIntroductionCybersecurity in Smart CitySecurity in Governance, Social and Economic PerspectivePrivacy Protection in Smart CitiesCyber Threats and Countermeasures in Smart CitiesA Novel Framework for Cyber Secure Smart CityConclusionReferencesContemplating Security Challenges and Threats for Smart CitiesIntroductionPrivacy AND Security Concerns In Smart CityWhy Is Privacy a Concern in Smart City?Consequences of Privacy ConcernsConcept and Cardinals of Smart City in the WorldWhy Is Security a Concern in Smart City?Security Threats and ChallengesCybersecurity Challenges in Smart CitiesCountermeasures and Probable Strategy for Security ConcernsCountermeasures for Privacy ConcernsTabular representationsOpen IssuesConclusions and RecommendationsReferencesSelf-Monitoring Obfuscated IoT NetworkIntroductionRelated WorksProposed MethodThe Inter-Module Steganography ProtocolBehaviour LearningResults and AnalysisConclusionReferencesIntroductionState of the Art in Hardware SecuritySide Channel Attack ModelClassification of side channel attacksPower Analysis TechniquesNon-Invasive Active AttacksFault Injection AttacksPower Tampering/Voltage GlitchingHands-On-Experiments: Fault Injection AttacksExercisesReferencesCollaborative Digital Forensic Investigations Model for Law EnforcementIntroductionLiterature ReviewDefinitions of Digital ForensicsDigital Forensics for Law EnforcementThe Evolution of Existing Digital Forensic Investigation (DFI) ModelsISO StandardsTowards a new Collaborative DFI ModelWhy ROP Needs a New ModelPhases within the CDFIR ModelReadinessInitializationAcquisitionInvestigationRules and Responsibilities RACI MatrixFacilitating CollaborationConclusion and RecommendationsAcknowledgementsReferencesUnderstanding Security Requirements and Challenges in the Industrial Internet of Things A ReviewIntroductionPrivacy in IoTLightweight Cryptographic Framework for IoTConclusionReferencesG Security and the Internet of ThingsIntroductionSecurity RisksSecuring 5GFuture of 5GConclusionReferencesThe Problem of Deepfake Videos and How to Counteract Them in Smart CitiesIntroductionHow Deepfakes are MadeThe motivation to create DeepfakesThe security concerns around DeepfakesHow Organisations are Counteracting the Use of Deep Fake TechnologyDeepfakes and the LawThe Future of DeepfakesConclusionReferencesBibliographyThe Rise of Ransomware Aided by Vulnerable IoT DevicesIntroductionAttack VectorsEvolution of RansomwareHow to secure against RansomwareFuture of RansomwareConclusionReferencesSecurity Issues in Self-Driving Cars within Smart CitiesIntroductionRisks Associated with Connected and Autonomous VehiclesFuture DevelopmentsConclusionReferencesTrust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart CitiesIntroductionRelated Work and Problem DefinitionsProposed MethodResults and DiscussionConclusion and Future WorkInternal Design DetailDiffinations of the developed simulation model.Test ReportReferences
Next >