RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism

In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resil...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Expert systems 2023-05, Vol.40 (4)
1. Verfasser: Almagrabi, Alaa Omran
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 4
container_start_page
container_title Expert systems
container_volume 40
creator Almagrabi, Alaa Omran
description In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed.
doi_str_mv 10.1111/exsy.13113
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2800399233</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2800399233</sourcerecordid><originalsourceid>FETCH-LOGICAL-c633-c498d3dab01bf1f76aa3b199d847cbcafe102bcaaac147e162a919067719fec3</originalsourceid><addsrcrecordid>eNotkMFKw0AQhhdRsFYvPsGCNyF1Jxs2WW-lVi0UhJp7mGwmdkuatLtJMW_vVp3Lf_n-GeZj7B7EDMI80bcfZyAB5AWbQKKySEidXLKJiJWKkjQW1-zG-50QAtJUTdhxs8w380W-fHnmiy02DbVf5Dm2FT8NTUsOS9vYfuR0wmbA3nYt72ru9-h6bmxvA2xbvupyXtHJGuIleqp4wMxYkvNkBnfu78lssbV-f8uuamw83f3nlH2-LvPFe7T-eFst5uvIKCkjk-iskhWWAsoa6lQhyhK0rrIkNaXBmkDEIRENJCmBilGDFipNQddk5JQ9_G09uO44kO-LXTe4Nhws4kwEKTqWMlCPf5RxnfeO6uLgbHhtLEAUZ6HFWWjxK1T-AGXCaqY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2800399233</pqid></control><display><type>article</type><title>RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism</title><source>Business Source Complete</source><source>Wiley Online Library All Journals</source><creator>Almagrabi, Alaa Omran</creator><creatorcontrib>Almagrabi, Alaa Omran</creatorcontrib><description>In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed.</description><identifier>ISSN: 0266-4720</identifier><identifier>EISSN: 1468-0394</identifier><identifier>DOI: 10.1111/exsy.13113</identifier><language>eng</language><publisher>Oxford: Blackwell Publishing Ltd</publisher><subject>Cloud computing ; Computer networks ; Cybersecurity ; Information sharing ; Internet of Things ; Privacy ; Smart cities</subject><ispartof>Expert systems, 2023-05, Vol.40 (4)</ispartof><rights>2023 John Wiley &amp; Sons, Ltd</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c633-c498d3dab01bf1f76aa3b199d847cbcafe102bcaaac147e162a919067719fec3</cites><orcidid>0000-0002-4858-9366</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Almagrabi, Alaa Omran</creatorcontrib><title>RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism</title><title>Expert systems</title><description>In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed.</description><subject>Cloud computing</subject><subject>Computer networks</subject><subject>Cybersecurity</subject><subject>Information sharing</subject><subject>Internet of Things</subject><subject>Privacy</subject><subject>Smart cities</subject><issn>0266-4720</issn><issn>1468-0394</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNotkMFKw0AQhhdRsFYvPsGCNyF1Jxs2WW-lVi0UhJp7mGwmdkuatLtJMW_vVp3Lf_n-GeZj7B7EDMI80bcfZyAB5AWbQKKySEidXLKJiJWKkjQW1-zG-50QAtJUTdhxs8w380W-fHnmiy02DbVf5Dm2FT8NTUsOS9vYfuR0wmbA3nYt72ru9-h6bmxvA2xbvupyXtHJGuIleqp4wMxYkvNkBnfu78lssbV-f8uuamw83f3nlH2-LvPFe7T-eFst5uvIKCkjk-iskhWWAsoa6lQhyhK0rrIkNaXBmkDEIRENJCmBilGDFipNQddk5JQ9_G09uO44kO-LXTe4Nhws4kwEKTqWMlCPf5RxnfeO6uLgbHhtLEAUZ6HFWWjxK1T-AGXCaqY</recordid><startdate>202305</startdate><enddate>202305</enddate><creator>Almagrabi, Alaa Omran</creator><general>Blackwell Publishing Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-4858-9366</orcidid></search><sort><creationdate>202305</creationdate><title>RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism</title><author>Almagrabi, Alaa Omran</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c633-c498d3dab01bf1f76aa3b199d847cbcafe102bcaaac147e162a919067719fec3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cloud computing</topic><topic>Computer networks</topic><topic>Cybersecurity</topic><topic>Information sharing</topic><topic>Internet of Things</topic><topic>Privacy</topic><topic>Smart cities</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Almagrabi, Alaa Omran</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Expert systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Almagrabi, Alaa Omran</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism</atitle><jtitle>Expert systems</jtitle><date>2023-05</date><risdate>2023</risdate><volume>40</volume><issue>4</issue><issn>0266-4720</issn><eissn>1468-0394</eissn><abstract>In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a constant battle to stay on top of the latest threats. Knowledge sharing, sometimes called intelligence sharing, can enhance collective resilience and responsiveness in the face of dangers if peers are willing to share information proactively. Internet of Things (IoT) is the buzz word which integrates almost all the technology concerning computation and communication. Before the IoT goal can be fully realized, some barriers must be addressed, with security and privacy being two of the most essential. When IoT devices connect to an IoT gateway or other edge device, the sensor data they gather is either transmitted to the cloud for analysis or processed locally. Based on the received information, they act and it can expose a device as well as its data. Insufficient or no device authentication and authorization are common problems, as is poor or no encryption. Due to restricted energy supplies and low processing power, IoT security and privacy are complex, especially for resource‐constrained devices. In this article, IoT‐CS security problems and associated threats are discussed. The overarching goals were identifying assets and exploring possible threats, assaults, and vulnerabilities encountered by the IoT in the sectors like healthcare, transportation, utilities, safety, and environmental health that might be significantly improved with IoT‐CS deployment in smart cities. The predominant challenges in the deployment of the IoT related technologies had been studied in the aspects of cyber security and mitigation strategies had been discussed.</abstract><cop>Oxford</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1111/exsy.13113</doi><orcidid>https://orcid.org/0000-0002-4858-9366</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0266-4720
ispartof Expert systems, 2023-05, Vol.40 (4)
issn 0266-4720
1468-0394
language eng
recordid cdi_proquest_journals_2800399233
source Business Source Complete; Wiley Online Library All Journals
subjects Cloud computing
Computer networks
Cybersecurity
Information sharing
Internet of Things
Privacy
Smart cities
title RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T07%3A11%3A45IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RETRACTED:%20Challenges%20and%20vulnerability%20evaluation%20of%20smart%20cities%20in%20IoT%20device%20based%20on%20cybersecurity%20mechanism&rft.jtitle=Expert%20systems&rft.au=Almagrabi,%20Alaa%20Omran&rft.date=2023-05&rft.volume=40&rft.issue=4&rft.issn=0266-4720&rft.eissn=1468-0394&rft_id=info:doi/10.1111/exsy.13113&rft_dat=%3Cproquest_cross%3E2800399233%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2800399233&rft_id=info:pmid/&rfr_iscdi=true