RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism
In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resil...
Gespeichert in:
Veröffentlicht in: | Expert systems 2023-05, Vol.40 (4) |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 4 |
container_start_page | |
container_title | Expert systems |
container_volume | 40 |
creator | Almagrabi, Alaa Omran |
description | In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed. |
doi_str_mv | 10.1111/exsy.13113 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2800399233</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2800399233</sourcerecordid><originalsourceid>FETCH-LOGICAL-c633-c498d3dab01bf1f76aa3b199d847cbcafe102bcaaac147e162a919067719fec3</originalsourceid><addsrcrecordid>eNotkMFKw0AQhhdRsFYvPsGCNyF1Jxs2WW-lVi0UhJp7mGwmdkuatLtJMW_vVp3Lf_n-GeZj7B7EDMI80bcfZyAB5AWbQKKySEidXLKJiJWKkjQW1-zG-50QAtJUTdhxs8w380W-fHnmiy02DbVf5Dm2FT8NTUsOS9vYfuR0wmbA3nYt72ru9-h6bmxvA2xbvupyXtHJGuIleqp4wMxYkvNkBnfu78lssbV-f8uuamw83f3nlH2-LvPFe7T-eFst5uvIKCkjk-iskhWWAsoa6lQhyhK0rrIkNaXBmkDEIRENJCmBilGDFipNQddk5JQ9_G09uO44kO-LXTe4Nhws4kwEKTqWMlCPf5RxnfeO6uLgbHhtLEAUZ6HFWWjxK1T-AGXCaqY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2800399233</pqid></control><display><type>article</type><title>RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism</title><source>Business Source Complete</source><source>Wiley Online Library All Journals</source><creator>Almagrabi, Alaa Omran</creator><creatorcontrib>Almagrabi, Alaa Omran</creatorcontrib><description>In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed.</description><identifier>ISSN: 0266-4720</identifier><identifier>EISSN: 1468-0394</identifier><identifier>DOI: 10.1111/exsy.13113</identifier><language>eng</language><publisher>Oxford: Blackwell Publishing Ltd</publisher><subject>Cloud computing ; Computer networks ; Cybersecurity ; Information sharing ; Internet of Things ; Privacy ; Smart cities</subject><ispartof>Expert systems, 2023-05, Vol.40 (4)</ispartof><rights>2023 John Wiley & Sons, Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c633-c498d3dab01bf1f76aa3b199d847cbcafe102bcaaac147e162a919067719fec3</cites><orcidid>0000-0002-4858-9366</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Almagrabi, Alaa Omran</creatorcontrib><title>RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism</title><title>Expert systems</title><description>In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed.</description><subject>Cloud computing</subject><subject>Computer networks</subject><subject>Cybersecurity</subject><subject>Information sharing</subject><subject>Internet of Things</subject><subject>Privacy</subject><subject>Smart cities</subject><issn>0266-4720</issn><issn>1468-0394</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNotkMFKw0AQhhdRsFYvPsGCNyF1Jxs2WW-lVi0UhJp7mGwmdkuatLtJMW_vVp3Lf_n-GeZj7B7EDMI80bcfZyAB5AWbQKKySEidXLKJiJWKkjQW1-zG-50QAtJUTdhxs8w380W-fHnmiy02DbVf5Dm2FT8NTUsOS9vYfuR0wmbA3nYt72ru9-h6bmxvA2xbvupyXtHJGuIleqp4wMxYkvNkBnfu78lssbV-f8uuamw83f3nlH2-LvPFe7T-eFst5uvIKCkjk-iskhWWAsoa6lQhyhK0rrIkNaXBmkDEIRENJCmBilGDFipNQddk5JQ9_G09uO44kO-LXTe4Nhws4kwEKTqWMlCPf5RxnfeO6uLgbHhtLEAUZ6HFWWjxK1T-AGXCaqY</recordid><startdate>202305</startdate><enddate>202305</enddate><creator>Almagrabi, Alaa Omran</creator><general>Blackwell Publishing Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-4858-9366</orcidid></search><sort><creationdate>202305</creationdate><title>RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism</title><author>Almagrabi, Alaa Omran</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c633-c498d3dab01bf1f76aa3b199d847cbcafe102bcaaac147e162a919067719fec3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cloud computing</topic><topic>Computer networks</topic><topic>Cybersecurity</topic><topic>Information sharing</topic><topic>Internet of Things</topic><topic>Privacy</topic><topic>Smart cities</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Almagrabi, Alaa Omran</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Expert systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Almagrabi, Alaa Omran</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism</atitle><jtitle>Expert systems</jtitle><date>2023-05</date><risdate>2023</risdate><volume>40</volume><issue>4</issue><issn>0266-4720</issn><eissn>1468-0394</eissn><abstract>In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed.</abstract><cop>Oxford</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1111/exsy.13113</doi><orcidid>https://orcid.org/0000-0002-4858-9366</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0266-4720 |
ispartof | Expert systems, 2023-05, Vol.40 (4) |
issn | 0266-4720 1468-0394 |
language | eng |
recordid | cdi_proquest_journals_2800399233 |
source | Business Source Complete; Wiley Online Library All Journals |
subjects | Cloud computing Computer networks Cybersecurity Information sharing Internet of Things Privacy Smart cities |
title | RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T07%3A11%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RETRACTED:%20Challenges%20and%20vulnerability%20evaluation%20of%20smart%20cities%20in%20IoT%20device%20based%20on%20cybersecurity%20mechanism&rft.jtitle=Expert%20systems&rft.au=Almagrabi,%20Alaa%20Omran&rft.date=2023-05&rft.volume=40&rft.issue=4&rft.issn=0266-4720&rft.eissn=1468-0394&rft_id=info:doi/10.1111/exsy.13113&rft_dat=%3Cproquest_cross%3E2800399233%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2800399233&rft_id=info:pmid/&rfr_iscdi=true |