Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey
<p>The architecture of smart cities. All elements were identified by the authors. The layers and area icons of smart cities were made using Freepik, orvipixel, Mayor Icons, Barudaklier, and KP Arts from <a href="http://www.flaticon.com" target="_blank">www.flaticon.com</a>, accessed on 29 March 2023 [<a href="#B22-sensors-23-03681" class="html-bibr">22</a>].</p> "> Figure 2
<p>A common classification for the cyber threats of smart city infrastructure [<a href="#B47-sensors-23-03681" class="html-bibr">47</a>].</p> "> Figure 3
<p>The ITS communication architecture in smart cities [<a href="#B63-sensors-23-03681" class="html-bibr">63</a>].</p> "> Figure 4
<p>The components of IoT forensics [<a href="#B142-sensors-23-03681" class="html-bibr">142</a>].</p> ">
Abstract
:1. Introduction
- •
- A comprehensive review of 154 papers on cybersecurity and cyber forensics for smart cities that were published from 2015 to 2022, which revealed the key areas of research and identified major challenges and opportunities for improving the cybersecurity and cyber forensics readiness of smart cities;
- •
- A chronological organization of the research on cybersecurity and cyber forensics for smart cities, based on the key technologies that have been studied over time, such as the IoT, cloud computing, and AI, in order to provide a concise overview of the evolution of research on cybersecurity and cyber forensics for smart cities;
- •
- A comprehensive investigation of cybersecurity in smart cities, which found that the most common targets of cyberattacks are smart homes and that attacks related to the IoT are being studied very actively;
- •
- The observations that compared studies on cybersecurity in smart cities. There have been relatively few studies related to cyber forensics and that among the key city elements of smart cities, research on cyber forensics for IoT devices has been the most common.
2. Key Elements of Smart Cities
2.1. Service and Application Layer
2.2. Technology Layer
2.3. Network Communication Layer
2.4. Device and Sensor Layer
3. Cybersecurity in Smart Cities
3.1. Smart Transportation/Mobility
3.2. Smart Homes
3.3. IoT Cybersecurity Research
4. Cyber Forensics in Smart Cities
4.1. Cyber Forensics for the Service and Application Layer
4.2. IoT Cyber Forensics Research
5. Future Expectations and Research Directions
6. Summary and Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Alotaibi, A.; Alsubaie, D.; Alaskar, H.; Alhumaid, L.; Thuwayni, R.B.; Alkhalifah, R.; Alhumoud, S. Kingdom of Saudi Arabia: Era of Smart Cities. In Proceedings of the 2022 2nd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 25–27 January 2022; pp. 285–292. [Google Scholar] [CrossRef]
- Shamsuzzoha, A.; Nieminen, J.; Piya, S.; Rutledge, K. Smart city for sustainable environment: A comparison of participatory strategies from Helsinki, Singapore and London. Cities 2021, 114, 103194. [Google Scholar] [CrossRef]
- Farag, A.A. The story of NEOM city: Opportunities and challenges. In New Cities and Community Extensions in Egypt and the Middle East; Springer: Cham, Switzerland, 2019; pp. 35–49. [Google Scholar]
- Smart Sustainable Cities. 2021. Available online: https://www.itu.int/en/mediacentre/backgrounders/Pages/smart-sustainable-cities.aspx (accessed on 29 March 2023).
- Cavada, M.; Tight, M.R.; Rogers, C.D. A smart city case study of Singapore—Is Singapore truly smart? In Smart City Emergence; Elsevier: Amsterdam, The Netherlands, 2019; pp. 295–314. [Google Scholar]
- Willems, J.; Bergh, J.V.d.; Viaene, S. Smart city projects and citizen participation: The case of London. In Public Sector Management in a Globalized World; Springer: Berlin/Heidelberg, Germany, 2017; pp. 249–266. [Google Scholar]
- Gon, K.K.; Hoon, K.S. Using Threat Modeling for Risk Analysis of SmartHome. In Proceedings of the Symposium of the Korean Institute of Communications and Information Sciences, Seoul, Republic of Korea, 5 December 2015; pp. 378–379. [Google Scholar]
- Kim, K.; Cho, K.; Lim, J.; Jung, Y.H.; Sung, M.S.; Kim, S.B.; Kim, H.K. What is your protocol: Vulnerabilities and security threats related to Z-Wave protocol. Pervasive Mob. Comput. 2020, 66, 101211. [Google Scholar] [CrossRef]
- Kim, K.; Kim, J.S.; Jeong, S.; Park, J.H.; Kim, H.K. Cybersecurity for autonomous vehicles: Review of attacks and defense. Comput. Secur. 2021, 103, 102150. [Google Scholar] [CrossRef]
- Miller, C.; Valasek, C. Remote exploitation of an unaltered passenger vehicle. Black Hat USA 2015, 2015, 1–91. [Google Scholar]
- Ji-Young, K.; In, L.J.; Gon, K.K. The all-purpose sword: North korea’s cyber operations and strategies. In Proceedings of the 2019 11th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 28–31 May 2019; Volume 900, pp. 1–20. [Google Scholar]
- Lee, S.; Kim, H.K.; Kim, K. Ransomware protection using the moving target defense perspective. Comput. Electr. Eng. 2019, 78, 288–299. [Google Scholar] [CrossRef]
- Losavio, M.M.; Chow, K.; Koltay, A.; James, J. The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Secur. Priv. 2018, 1, e23. [Google Scholar] [CrossRef] [Green Version]
- Baig, Z.A.; Szewczyk, P.; Valli, C.; Rabadia, P.; Hannay, P.; Chernyshev, M.; Johnstone, M.; Kerai, P.; Ibrahim, A.; Sansurooah, K.; et al. Future challenges for smart cities: Cyber-security and digital forensics. Digit. Investig. 2017, 22, 3–13. [Google Scholar] [CrossRef]
- Khan, S.M.; Chowdhury, M.; Morris, E.A.; Deka, L. Synergizing Roadway Infrastructure Investment with Digital Infrastructure: Motivations, Current Status and Future Direction. ASCE J. Infrastruct. Syst 2019, 25, 03119001. [Google Scholar] [CrossRef] [Green Version]
- Fournaris, A.P.; Lampropoulos, K.; Koufopavlou, O. End Node Security and Trust vulnerabilities in the Smart City Infrastructure. In Proceedings of the MATEC Web of Conferences, Osaka, Japan, 21–22 September 2018; Volume 188, p. 05005. [Google Scholar]
- Sinaeepourfard, A.; Garcia, J.; Masip-Bruin, X.; Marín-Tordera, E.; Cirera, J.; Grau, G.; Casaus, F. Estimating Smart City sensors data generation. In Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), Barcelona, Spain, 20–21 June 2016; pp. 1–8. [Google Scholar]
- Kim, K.; Alfouzan, F.A.; Kim, H. Cyber-Attack Scoring Model Based on the Offensive Cybersecurity Framework. Appl. Sci. 2021, 11, 7738. [Google Scholar] [CrossRef]
- Hu, R. The state of smart cities in China: The case of Shenzhen. Energies 2019, 12, 4375. [Google Scholar] [CrossRef] [Green Version]
- Moustaka, V.; Vakali, A.; Anthopoulos, L.G. A systematic review for smart city data analytics. ACM Comput. Surv. (cSuR) 2018, 51, 1–41. [Google Scholar] [CrossRef]
- Fraga-Lamas, P.; Fernández-Caramés, T.M.; Suárez-Albela, M.; Castedo, L.; González-López, M. A review on internet of things for defense and public safety. Sensors 2016, 16, 1644. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Available online: https://www.flaticon.com (accessed on 29 March 2023).
- Serrano, M.; Griffor, E.; Wollman, D.; Dunaway, M.; Burns, M.; Rhee, S.; Greer, C. Smart Cities and Communities: A Key Performance Indicators Framework; Special Publication (NIST SP): Gaithersburg, MD, USA, 2022. [Google Scholar] [CrossRef]
- Kumar, T.M.V. Smart Environment for Smart Cities. In Advances in 21st Century Human Settlements; Springer: Berlin/Heidelberg, Germany, 2020; pp. 1–53. [Google Scholar]
- Oh, I.K.; Seo, J.W.; Lee, M.K.; Lee, T.H.; Han, Y.N.; Park, U.S.; Ji, H.B.; Lee, J.H.; Cho, K.H.; Kim, K. Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling. J. Korea Inst. Inf. Secur. Cryptol. 2020, 30, 213–230. [Google Scholar]
- Yamin, M.M.; Shalaginov, A.; Katt, B. Smart policing for a smart world opportunities, challenges and way forward. In Proceedings of the Future of Information and Communication Conference, San Francisco, CA, USA, 5–6 March 2020; pp. 532–549. [Google Scholar]
- Navarathn, P.J.; Malagi, V.P. Artificial Intelligence in Smart City Analysis. In Proceedings of the 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 13–14 December 2018; pp. 13–14. [Google Scholar]
- Talari, S.; Shafie-Khah, M.; Siano, P.; Loia, V.; Tommasetti, A.; Catalão, J.P. A review of smart cities based on the internet of things concept. Energies 2017, 10, 421. [Google Scholar] [CrossRef] [Green Version]
- Bauer, M.; Sanchez, L.; Song, J. IoT-enabled smart cities: Evolution and outlook. Sensors 2021, 21, 4511. [Google Scholar] [CrossRef] [PubMed]
- Toma, C.; Alexandru, A.; Popa, M.; Zamfiroiu, A. IoT solution for smart cities’ pollution monitoring and the security challenges. Sensors 2019, 19, 3401. [Google Scholar] [CrossRef] [Green Version]
- Thirumalaisamy, M.; Basheer, S.; Selvarajan, S.; Althubiti, S.A.; Alenezi, F.; Srivastava, G.; Lin, J.C.W. Interaction of secure cloud network and crowd computing for smart city data obfuscation. Sensors 2022, 22, 7169. [Google Scholar] [CrossRef]
- Alam, T. Cloud-based IoT applications and their roles in smart cities. Smart Cities 2021, 4, 1196–1219. [Google Scholar] [CrossRef]
- Park, J.; Chung, H.; DeFranco, J.F. Multilayered Diagnostics for Smart Cities. Computer 2022, 55, 14–22. [Google Scholar] [CrossRef]
- Lee, I.; Park, D.; Son, Y.; Lee, Y.; Park, T. Technology Trends of IoT-based Smart city application. J. Comput. Sci. Eng. 2018, 36, 61–68. [Google Scholar]
- Kumar, S.; Rathore, R.S.; Mahmud, M.; Kaiwartya, O.; Lloret, J. BEST—Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart Cities Environment. Sensors 2022, 22, 5733. [Google Scholar]
- Asif, M.; Aziz, Z.; Bin Ahmad, M.; Khalid, A.; Waris, H.A.; Gilani, A. Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities. Sensors 2022, 22, 2604. [Google Scholar] [CrossRef]
- Ibba, S.; Pinna, A.; Seu, M.; Pani, F.E. Citysense: Blockchain-oriented smart cities. In Proceedings of the the XP2017 Scientific Workshops, Cologne, Germany, 22–26 May 2017; pp. 1–12. [Google Scholar]
- Alzahrani, N.M.; Alfouzan, F.A. Augmented reality (AR) and cyber-security for smart cities—A systematic literature review. Sensors 2022, 22, 2792. [Google Scholar] [CrossRef] [PubMed]
- Jawhar, I.; Mohamed, N.; Al-Jaroodi, J. Networking architectures and protocols for smart city systems. J. Internet Serv. Appl. 2018, 9, 1–16. [Google Scholar] [CrossRef] [Green Version]
- Elsaeidy, A.; Elgendi, I.; Munasinghe, K.S.; Sharma, D.; Jamalipour, A. A smart city cyber security platform for narrowband networks. In Proceedings of the 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, Australia, 22–24 November 2017; pp. 1–6. [Google Scholar]
- Xu, K.; Wan, Y.; Xue, G. Powering smart homes with information-centric networking. IEEE Commun. Mag. 2019, 57, 40–46. [Google Scholar] [CrossRef]
- Garcia-Font, V.; Garrigues, C.; Rifà-Pous, H. A comparative study of anomaly detection techniques for smart city wireless sensor networks. Sensors 2016, 16, 868. [Google Scholar] [CrossRef] [Green Version]
- Garcia-Font, V.; Garrigues, C.; Rifà-Pous, H. Attack classification schema for smart city WSNs. Sensors 2017, 17, 771. [Google Scholar] [CrossRef] [Green Version]
- Alfouzan, F.A.; Kim, K.; Alzahrani, N.M. An efficient framework for securing the smart city communication networks. Sensors 2022, 22, 3053. [Google Scholar] [CrossRef]
- Biswas, K.; Muthukkumarasamy, V. Securing smart cities using blockchain technology. In Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications, IEEE 14th International Conference on Smart City, IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Sydney, Austrilia, 12–14 December 2016; pp. 1392–1393. [Google Scholar]
- Jiang, J.C.; Kantarci, B.; Oktug, S.; Soyata, T. Federated learning in smart city sensing: Challenges and opportunities. Sensors 2020, 20, 6230. [Google Scholar] [CrossRef]
- Kalinin, M.; Krundyshev, V.; Zegzhda, P. Cybersecurity risk assessment in smart city infrastructures. Machines 2021, 9, 78. [Google Scholar] [CrossRef]
- AlDairi, A. Cyber security attacks on smart cities and associated mobile technologies. Procedia Comput. Sci. 2017, 109, 1086–1091. [Google Scholar] [CrossRef]
- Neshenko, N. Illuminating Cyber Threats for Smart Cities: A Data-Driven Approach for Cyber Attack Detection with Visual Capabilities. Ph.D. Thesis, Florida Atlantic University, Boca Raton, FL, USA, 2021. [Google Scholar]
- Alassad, M.; Spann, B.; Al-khateeb, S.; Agarwal, N. Using computational social science techniques to identify coordinated cyber threats to smart city networks. In Proceedings of the Joint International Conference on Design and Construction of Smart City Components, Cairo, Egypt, 17–19 December 2019; pp. 316–326. [Google Scholar]
- Hamid, S.; Bawany, N.Z. ACIDS: A Secure Smart City Framework and Threat Model. In Proceedings of the 4th International Conference on Wireless, Intelligent and Distributed Environment for Communication, Pinetown, South Africa, 13–15 October 2021; pp. 79–98. [Google Scholar]
- Alibasic, A.; Al Junaibi, R.; Aung, Z.; Woon, W.L.; Omar, M.A. Cybersecurity for smart cities: A brief review. In Proceedings of the Data Analytics for Renewable Energy Integration: 4th ECML PKDD Workshop, DARE 2016, Riva del Garda, Italy, 23 September 2016; Revised Selected Papers 4. pp. 22–30. [Google Scholar]
- Al-Turjman, F.; Zahmatkesh, H.; Shahroze, R. An overview of security and privacy in smart cities’ IoT communications. Trans. Emerg. Telecommun. Technol. 2022, 33, e3677. [Google Scholar] [CrossRef]
- Alamer, M.; Almaiah, M.A. Cybersecurity in Smart City: A systematic mapping study. In Proceedings of the 2021 International Conference on Information Technology (ICIT), Guangzhou, China, 22–25 December 2021; pp. 719–724. [Google Scholar]
- Duan, L.; Lou, Y.; Wang, S.; Gao, W.; Rui, Y. AI-oriented large-scale video management for smart city: Technologies, standards, and beyond. IEEE MultiMedia 2018, 26, 8–20. [Google Scholar] [CrossRef] [Green Version]
- Lakhouil, M.; Abtoy, A. Cybersecurity of smart cities: A glimpse. In Proceedings of the 4th Smart Cities Symposium (SCS 2021), Online, 21–23 November 2021; Volume 2021, pp. 141–145. [Google Scholar]
- Ma, C. Smart city and cyber-security; technologies used, leading challenges and future recommendations. Energy Rep. 2021, 7, 7999–8012. [Google Scholar] [CrossRef]
- Figueiredo, B.J.; Costa, R.L.d.C.; Santos, L.; Rabadão, C. Cybersecurity and Privacy in Smart Cities for Citizen Welfare. In Smart Cities, Citizen Welfare, and the Implementation of Sustainable Development Goals; IGI Global: Hershey, PA, USA, 2022; pp. 197–221. [Google Scholar]
- Wang, P.; Ali, A.; Kelly, W. Data security and threat modeling for smart city infrastructure. In Proceedings of the 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), Shanghai, China, 5–7 August 2015; pp. 1–6. [Google Scholar]
- Butt, T.A.; Afzaal, M. Security and privacy in smart cities: Issues and current solutions. In Smart Technologies and Innovation for a Sustainable Future: Proceedings of the 1st American University in the Emirates International Research Conference, Dubai, United Arab Emirates 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 317–323. [Google Scholar]
- Andrade, R.O.; Tello-Oquendo, L.; Ortiz, I. Cybersecurity Risks of IoT on Smart Cities. In Cybersecurity Risk of IoT on Smart Cities; Springer: Berlin/Heidelberg, Germany, 2021; pp. 1–22. [Google Scholar]
- Juma, M.; Shaalan, K. Cyberphysical systems in the smart city: Challenges and future trends for strategic research. In Swarm Intelligence for Resource Management in Internet of Things; Elsevier: Amsterdam, The Netherlands, 2020; pp. 65–85. [Google Scholar]
- Javed, M.A.; Ben Hamida, E.; Znaidi, W. Security in intelligent transport systems for smart cities: From theory to practice. Sensors 2016, 16, 879. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Wang, Z.; Wang, Y.; Zhang, Y.; Liu, Y.; Ma, C.; Wang, H. A brief survey on cyber security attack entrances and protection strategies of intelligent connected vehicle. In Proceedings of the Smart Computing and Communication: 4th International Conference, SmartCom 2019, Birmingham, UK, 11–13 October 2019; pp. 73–82. [Google Scholar]
- Sharmila, V.C.; Aslam, H.M.; Riswan, M.M. Analysing and Identifying Harm Propagation of Cyber Threats in Autonomous Vehicles and Mitigation Through ANN. In Proceedings of the Smart Trends in Computing and Communications: Proceedings of SmartCom 2021, Las Vegas, NA, USA, 2–3 March 2021; pp. 405–417.
- Chen, C.; Quan, S. A Summary of Security Techniques-Based Blockchain in IoV. Secur. Commun. Netw. 2022, 2022, 8689651. [Google Scholar] [CrossRef]
- Ryu, H.S.; Kwak, J. Secure data access control scheme for smart home. In Advances in Computer Science and Ubiquitous Computing: CSA &CUTE; Springer: Berlin/Heidelberg, Germany, 2015; pp. 483–488. [Google Scholar]
- McGee, T.M. Evaluating the Cyber Security in the Internet of Things: Smart Home Vulnerabilities. Ph.D. Thesis, Colorado Technical University, Colorado Springs, CO, USA, 2016. [Google Scholar]
- Liu, Y.; Hu, S. Smart home scheduling and cybersecurity: Fundamentals. In Smart Cities and Homes; Elsevier: Amsterdam, The Netherlands, 2016; pp. 191–217. [Google Scholar]
- Nsunza, W.W.; Rutunda, S.; Hei, X. Design and implementation of a low-cost software defined wireless network testbed for smart home. In Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops, Guangzhou, China, 12–15 December 2017; pp. 379–388. [Google Scholar]
- Gamundani, A.M.; Phillips, A.; Muyingi, H.N. An overview of potential authentication threats and attacks on Internet of Things (IoT): A focus on Smart home applications. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Espoo, Finland, 22–25 August 2022; pp. 50–57. [Google Scholar]
- Ghirardello, K.; Maple, C.; Ng, D.; Kearney, P. Cyber security of smart homes: Development of a reference architecture for attack surface analysis. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT-2018, London, UK, 28–29 March 2018; pp. 1–10. [Google Scholar]
- Kraemer, M.J.; Flechais, I. Researching privacy in smart homes: A roadmap of future directions and research methods. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT-2018, London, UK, 28–29 March 2018; pp. 1–10. [Google Scholar]
- Bastos, D.; Shackleton, M.; El-Moussa, F. Internet of things: A survey of technologies and security risks in smart home and city environments. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT-2018, London, UK, 28–29 March 2018; pp. 30–37. [Google Scholar]
- Sturgess, J.; Nurse, J.R.; Zhao, J. A capability-oriented approach to assessing privacy risk in smart home ecosystems. In Proceedings of the Living in the Internet of Things: Cybersecurity of the IoT-2018, London, UK, 28–29 March 2018; pp. 1–8. [Google Scholar]
- Siddhanti, P.; Asprion, P.M.; Schneider, B. Cybersecurity by Design for Smart Home Environments. In Proceedings of the ICEIS (1), Heraklion, Greece, 3–5 May 2019; pp. 587–595. [Google Scholar]
- Elmisery, A.M.; Sertovic, M. Privacy preserving threat hunting in smart home environments. In Proceedings of the Advances in Cyber Security: First International Conference, ACeS 2019, Penang, Malaysia, 30 July–1 August 2019; pp. 104–120. [Google Scholar]
- Rossi, M.T.; Greca, R.; Iovino, L.; Giacinto, G.; Bertoli, A. Defensive Programming for Smart Home Cybersecurity. In Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Genoa, Italy, 16–18 June 2020; pp. 600–605. [Google Scholar]
- Giannoutakis, K.M.; Spathoulas, G.; Filelis-Papadopoulos, C.K.; Collen, A.; Anagnostopoulos, M.; Votis, K.; Nijdam, N.A. A blockchain solution for enhancing cybersecurity defence of IoT. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Virtual, 2–6 November 2020; pp. 490–495. [Google Scholar]
- Rauti, S.; Laato, S.; Pitkämäki, T. Man-in-the-Browser Attacks Against IoT Devices: A Study of Smart Homes. In Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) 12, Online, 15–18 December 2020; pp. 727–737. [Google Scholar]
- Awang, N.F.; Zainudin, A.F.I.M.; Marzuki, S.; Alsagoff, S.N.; Tajuddin, T.; Jarno, A.D. Security and threats in the internet of things based smart home. In Innovative Systems for Intelligent Health Informatics: Data Science, Health Informatics, Intelligent Systems, Smart Computing; Springer: Berlin/Heidelberg, Germany, 2021; pp. 676–684. [Google Scholar]
- Turner, S.; Nurse, J.; Li, S. When googling it does not work: The challenge of finding security advice for smart home devices. In Proceedings of the Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual, 7–9 July 2021; pp. 115–126. [Google Scholar]
- Alshboul, Y.; Bsoul, A.A.R.; Al Zamil, M.; Samarah, S. Cybersecurity of smart home systems: Sensor identity protection. J. Netw. Syst. Manag. 2021, 29, 1–27. [Google Scholar] [CrossRef]
- Mahor, V.; Badodia, S.K.; Kumar, A.; Bijrothiya, S.; Temurnikar, A. Cyber Security for Secured Smart Home Applications Using Internet of Things, Dark Web, and Blockchain Technology in the Future. In Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence; IGI Global: Hershey, PA, USA, 2022; pp. 208–219. [Google Scholar]
- Bringhenti, D.; Valenza, F.; Basile, C. Toward Cybersecurity Personalization in Smart Homes. IEEE Secur. Priv. 2022, 20, 45–53. [Google Scholar] [CrossRef]
- Allifah, N.M.; Zualkernan, I.A. Ranking Security of IoT-Based Smart Home Consumer Devices. IEEE Access 2022, 10, 18352–18369. [Google Scholar] [CrossRef]
- Thammarat, C.; Techapanupreeda, C. Secure Key Establishment Protocol for Smart Homes Based on Symmetric Cryptography. In Proceedings of the 2022 International Conference on Information Networking (ICOIN), Jeju-si, Republic of Korea, 12–15 January 2022; pp. 46–51. [Google Scholar]
- Abomhara, M.; Køien, G.M. Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 2015, 4, 65–88. [Google Scholar] [CrossRef]
- Rohokale, V.; Prasad, R. Cyber security for intelligent world with Internet of Things and machine to machine communication. J. Cyber Secur. Mobil. 2015, 4, 23–40. [Google Scholar] [CrossRef] [Green Version]
- Saadeh, M.; Sleit, A.; Qatawneh, M.; Almobaideen, W. Authentication techniques for the internet of things: A survey. In Proceedings of the 2016 Cybersecurity and Cyberforensics Conference (CCC), Amman, Jordan, 2–4 August 2016; pp. 28–34. [Google Scholar]
- Sivanathan, A.; Loi, F.; Gharakheili, H.H.; Sivaraman, V. Experimental evaluation of cybersecurity threats to the smart-home. In Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), Bhubaneswar, India, 17–20 December 2017; pp. 1–6. [Google Scholar]
- Neshenko, N. A Network Telescope Approach for Inferring and Characterizing IoT Exploitations. Ph.D. Thesis, Florida Atlantic University, Boca Raton, FL, USA, 2018. [Google Scholar]
- Ainane, N.; Ouzzif, M.; Bouragba, K. Data security of smart cities. In Proceedings of the 3rd International Conference on Smart City Applications, Tetouan, Morocco, 10–11 October 2018; pp. 1–13. [Google Scholar]
- Vrabie, C. IoT and its role in developing smart cities. In Proceedings of the Information Systems: Research, Development, Applications, Education: 11th SIGSAND/PLAIS EuroSymposium 2018, Gdansk, Poland, 20 September 2018; pp. 105–113. [Google Scholar]
- Viswanadham, Y.V.; Jayavel, K. Blockchain Implementation in IoT Privacy and Cyber Security Feasibility Study and Analysis. In High Performance Computing and Networking: Select Proceedings of CHSN 2021; Springer: Berlin/Heidelberg, Germany, 2022; pp. 259–271. [Google Scholar]
- Lewis, M. Using Graph Databases to Assess the Security of Thingernets Based on the Thingabilities and Thingertivity of Things; IET: London, UK, 2018. [Google Scholar]
- Wu, F.J.; Solmaz, G.; Kovacs, E. Toward the Future World of Internet-of-Things. In Proceedings of the 2018 Global Internet of Things Summit (GIoTS), Aarhus, Denmark, 17–21 June 2019; pp. 1–6. [Google Scholar]
- James, F. IoT cybersecurity based smart home intrusion prevention system. In Proceedings of the 2019 3rd Cyber Security in Networking Conference (CSNet), Quito, Ecuador, 23–25 October 2019; pp. 107–113. [Google Scholar]
- Shokeen, R.; Shanmugam, B.; Kannoorpatti, K.; Azam, S.; Jonkman, M.; Alazab, M. Vulnerabilities analysis and security assessment framework for the internet of things. In Proceedings of the 2019 Cybersecurity and Cyberforensics Conference (CCC), Melbourne, Australia, 8–9 May 2019; pp. 22–29. [Google Scholar]
- Roukounaki, A.; Efremidis, S.; Soldatos, J.; Neises, J.; Walloschke, T.; Kefalakis, N. Scalable and configurable end-to-end collection and analysis of IoT security data: Towards end-to-end security in IoT systems. In Proceedings of the 2019 Global IoT Summit (GIoTS), Aarhus, Denmark, 17–21 June 2019; pp. 1–6. [Google Scholar]
- Van Kleek, M.; Seymour, W.; Binns, R.; Zhao, J.; Karandikar, D.; Shadbolt, N. IoT Refine: Making Smart Home Devices Accountable for Their Data Harvesting Practices; IET: London, UK, 2019. [Google Scholar]
- Thorburn, R.; Margheri, A.; Paci, F. Towards an Integrated Privacy Protection Framework for IoT: Contextualising Regulatory Requirements with Industry Best Practices; IET: London, UK, 2019. [Google Scholar]
- Nwafor, E.; Olufowobi, H. Towards an Interactive Visualization Framework for IoT Device Data Flow. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 4175–4178. [Google Scholar]
- Ullah, F.; Naeem, H.; Jabbar, S.; Khalid, S.; Latif, M.A.; Al-Turjman, F.; Mostarda, L. Cyber security threats detection in internet of things using deep learning approach. IEEE Access 2019, 7, 124379–124389. [Google Scholar] [CrossRef]
- Sharma, R.; Mahapatra, R.P.; Sharma, N. The internet of things and its applications in cyber security. In A Handbook of Internet of Things in Biomedical and Cyber Physical System; Springer: Berlin/Heidelberg, Germany, 2020; pp. 87–108. [Google Scholar]
- Karie, N.M.; Sahri, N.M.; Haskell-Dowland, P. IoT threat detection advances, challenges and future directions. In Proceedings of the 2020 workshop on emerging technologies for security in IoT (ETSecIoT), Sydney, Australia, 21 April 2020; pp. 22–29. [Google Scholar]
- Andrade, R.O.; Yoo, S.G.; Tello-Oquendo, L.; Ortiz-Garcés, I. A Comprehensive Study of the IoT Cybersecurity in Smart Cities. IEEE Access 2020, 8, 228922–228941. [Google Scholar] [CrossRef]
- Singh, D.; Pati, B.; Panigrahi, C.R.; Swagatika, S. Security issues in IoT and their countermeasures in smart city applications. In Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2018; Springer: Berlin/Heidelberg, Germany, 2020; Volume 2, pp. 301–313. [Google Scholar]
- Cvitić, I.; Perakovic, D.; Gupta, B.B.; Choo, K.K.R. Boosting-based DDoS detection in internet of things systems. IEEE Internet Things J. 2021, 9, 2109–2123. [Google Scholar] [CrossRef]
- Jhanjhi, N.; Humayun, M.; Almuayqil, S.N. Cyber Security and Privacy Issues in Industrial Internet of Things. Comput. Syst. Sci. Eng. 2021, 37, 361–380. [Google Scholar] [CrossRef]
- Strecker, S.; Van Haaften, W.; Dave, R. An analysis of IoT cyber security driven by machine learning. In Proceedings of the International Conference on Communication and Computational Technologies: ICCCT 2021, Virtual, 16–17 December 2021; pp. 725–753. [Google Scholar]
- Ahmed, K.D.; Askar, S. Deep learning models for cyber security in IoT networks: A review. Int. J. Sci. Bus. 2021, 5, 61–70. [Google Scholar]
- Houichi, M.; Jaidi, F.; Bouhoula, A. A systematic approach for IoT cyber-attacks detection in smart cities using machine learning techniques. In Proceedings of the Advanced Information Networking and Applications: Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12–14 May 2021; Volume 2, pp. 215–228.
- Bhargava, A.; Salunkhe, G.; Bhargava, S.; Goswami, P. A Comprehensive Study of IoT Security Risks in Building a Secure Smart City. Digit. Cities Roadmap IOT-Based Archit. Sustain. 2021, 14, 401–448. [Google Scholar]
- Al Solami, E. Replication-aware secure resource administration scheme for Internet of Things-smart city applications. Trans. Emerg. Telecommun. Technol. 2021, 32, e4200. [Google Scholar] [CrossRef]
- Hulicki, Z.; Hulicki, M. Cyber Security Aspects of Digital Services Using IoT Appliances. In Proceedings of the Recent Challenges in Intelligent Information and Database Systems: 13th Asian Conference, ACIIDS 2021, Phuket, Thailand, 7–10 April 2021; pp. 227–237. [Google Scholar]
- Ali, R.F.; Muneer, A.; Dominic, P.; Taib, S.M.; Ghaleb, E.A. Internet of things (IoT) security challenges and solutions: A systematic literature review. In Proceedings of the Advances in Cyber Security: Third International Conference, ACeS 2021, Penang, Malaysia, 24–25 August 2021; pp. 128–154. [Google Scholar]
- Debnath, D.; Chettri, S.K. Internet of Things: Current Research, Challenges, Trends and Applications. In Proceedings of the Applications of Artificial Intelligence in Engineering: Proceedings of First Global Conference on Artificial Intelligence and Applications (GCAIA 2020), Jaipur, India, 8–10 September 2020; pp. 679–694.
- Toutsop, O.; Das, S.; Kornegay, K. Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks. In Proceedings of the 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), Atlanta, GA, USA, 18–21 October 2021; pp. 407–415. [Google Scholar]
- Balaji, S.; Jaishanker, A.; Gokhale, S.; Sinhal, S.; Rajeshkumar, M. A Review on Cybersecurity of Internet of Things. In Proceedings of the Microelectronic Devices, Circuits and Systems: Second International Conference, ICMDCS 2021, Vellore, India, 11–13 February 2021; pp. 172–196. [Google Scholar]
- Khan, M.A. A formal method for privacy-preservation in cognitive smart cities. Expert Syst. 2022, 39, e12855. [Google Scholar] [CrossRef]
- Nakkeeran, M.; Mathi, S. A Generalized Comprehensive Security Architecture Framework for IoT Applications Against Cyber-Attacks. In Artificial Intelligence and Technologies: Select Proceedings of ICRTAC-AIT 2020; Springer: Berlin/Heidelberg, Germany, 2021; pp. 455–471. [Google Scholar]
- Kowta, A.S.L.; Harida, P.; Venkatraman, S.V.; Das, S.; Priya, V. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders, and Attacks. In Proceedings of the International Conference on Computational Intelligence and Data Engineering: ICCIDE 2021, Vijayawada, India, 13–14 August 2021; pp. 387–401. [Google Scholar]
- Maidamwar, P.R.; Bartere, M.M.; Lokulwar, P.P. Implementation of network intrusion detection system using artificial intelligence: Survey. In Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications: ICMISC 2021, Hyderabad, India, 28–29 March 2021; pp. 185–198. [Google Scholar]
- Raimundo, R.J.; Rosário, A.T. Cybersecurity in the Internet of Things in Industrial Management. Appl. Sci. 2022, 12, 1598. [Google Scholar] [CrossRef]
- Fan, J.; Yang, W.; Lam, K.Y. Cybersecurity Challenges Of IoT-enabled Smart Cities: A Survey. arXiv 2022, arXiv:2202.05023. [Google Scholar]
- Ryu, J.H.; Moon, S.Y.; Park, J.H. The study on data of smart home system as digital evidence. In Advances in Computer Science and Ubiquitous Computing; Springer: Berlin/Heidelberg, Germany, 2017; pp. 967–972. [Google Scholar]
- Awasthi, A.; Read, H.O.; Xynos, K.; Sutherland, I. Welcome pwn: Almond smart home hub forensics. Digit. Investig. 2018, 26, S38–S46. [Google Scholar] [CrossRef]
- Brotsis, S.; Kolokotronis, N.; Limniotis, K.; Shiaeles, S.; Kavallieros, D.; Bellini, E.; Pavué, C. Blockchain solutions for forensic evidence preservation in IoT environments. In Proceedings of the 2019 IEEE Conference on Network Softwarization (NetSoft), Paris, France, 24–28 June 2019; pp. 110–114. [Google Scholar]
- Iqbal, A.; Olegård, J.; Ghimire, R.; Jamshir, S.; Shalaginov, A. Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis. In Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA, 10–13 December 2020; pp. 2283–2290. [Google Scholar]
- Kim, S.; Park, M.; Lee, S.; Kim, J. Smart home forensics—Data analysis of IoT devices. Electronics 2020, 9, 1215. [Google Scholar] [CrossRef]
- Feng, X.; Dawam, E.S.; Amin, S. Digital forensics model of smart city automated vehicles challenges. In Proceedings of the Bigdata-2017, Boston, MA, USA, 11–14 December 2017. [Google Scholar]
- Hossain, M.M.; Hasan, R.; Zawoad, S. Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV). In Proceedings of the ICIOT, Honolulu, HI, USA, 25–30 June 2017; pp. 25–32. [Google Scholar]
- Zhang, M.; Zhou, J.; Cong, P.; Zhang, G.; Zhuo, C.; Hu, S. LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV. IEEE Trans. Autom. Sci. Eng. 2022, 1–16. [Google Scholar] [CrossRef]
- Tyagi, R.; Sharma, S.; Mohan, S. Blockchain Enabled Intelligent Digital Forensics System for Autonomous Connected Vehicles. In Proceedings of the 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), Chennai, India, 10–11 March 2022; pp. 1–6. [Google Scholar]
- Zia, T.; Liu, P.; Han, W. Application-specific digital forensics investigative model in internet of things (iot). In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August–1 September 2017; pp. 1–7. [Google Scholar]
- Rizal, R.; Riadi, I.; Prayudi, Y. Network forensics for detecting flooding attack on internet of things (IoT) device. Int. J. Cyber-Secur. Digit. Forensics 2018, 7, 382–390. [Google Scholar]
- Hou, J.; Li, Y.; Yu, J.; Shi, W. A survey on digital forensics in Internet of Things. IEEE Internet Things J. 2019, 7, 1–15. [Google Scholar] [CrossRef]
- Jayakrishnan, A.; Vasanthi, V. Forensic Analysis on IoT Devices. In Proceedings of the International Conference on Intelligent Data Communication Technologies and Internet of Things, Coimbatore, India, 12–13 September 2019; pp. 59–68. [Google Scholar]
- Qatawneh, M.; Almobaideen, W.; Khanafseh, M.; Al Qatawneh, I.; Al-Ain, P. Dfim: A New digital forensics investigation model for internet of things. J. Theor. Appl. Inf. Technol. 2019, 97, 1–15. [Google Scholar]
- Yaqoob, I.; Hashem, I.A.T.; Ahmed, A.; Kazmi, S.A.; Hong, C.S. Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges. Future Gener. Comput. Syst. 2019, 92, 265–275. [Google Scholar] [CrossRef]
- Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.; Markakis, E.K. A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues. IEEE Commun. Surv. Tutorials 2020, 22, 1191–1221. [Google Scholar] [CrossRef]
- Patil, S.S.; JCER, B.; Dinesha, H.; SGBIT, B. Secure Cyber Forensic Frameworks for Internet of Things. Int. J. Eng. Appl. Sci. Technol. 2020, 5, 591–595. [Google Scholar] [CrossRef]
- Jayakrishnan, A.; Vasanthi, V. Internet of things forensics honeynetcloud investigation model. In Proceedings of the 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2–4 July 2020; pp. 660–666. [Google Scholar]
- Atlam, H.F.; Hemdan, E.E.D.; Alenezi, A.; Alassafi, M.O.; Wills, G.B. Internet of things forensics: A review. Internet Things 2020, 11, 100220. [Google Scholar] [CrossRef]
- Patel, R.; Malek, Z. Brief overview of existing challenges in IoT. Int. J. Emerg. Trends Technol. Computer Sci. (IJETTCS) 2020, 9, 29–35. [Google Scholar]
- Yang, W.; Johnstone, M.N.; Sikos, L.F.; Wang, S. Security and forensics in the internet of things: Research advances and challenges. In Proceedings of the 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), Sydney, Australia, 21 April 2020; pp. 12–17. [Google Scholar]
- Bandil, A.; Al-Masri, E. VTA-IH: A Fog-based Digital Forensics Framework. In Proceedings of the 2020 6th International Conference on Science in Information Technology (ICSITech), Palu, Indonesia, 21–22 October 2020; pp. 103–108. [Google Scholar]
- Janarthanan, T.; Bagheri, M.; Zargari, S. IoT forensics: An overview of the current issues and challenges. In Digital Forensic Investigation of Internet of Things (IoT) Devices; Springer: Cham, Switzerland, 2021; pp. 223–254. [Google Scholar]
- Surange, G.; Khatri, P. IoT forensics: A review on current trends, approaches and foreseen challenges. In Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 17–19 March 2021; pp. 909–913. [Google Scholar]
- Kim, S.; Jo, W.; Lee, J.; Shon, T. AI-enabled device digital forensics for smart cities. J. Supercomput. 2022, 78, 3029–3044. [Google Scholar] [CrossRef]
- Ganesh, N.; Venkatesh, N.; Prasad, D. A Systematic Literature Review on Forensics in Cloud, IoT, AI & Blockchain. In Illumination of Artificial Intelligence in Cybersecurity and Forensics; Springer: Cham, Switzerland, 2022; pp. 197–229. [Google Scholar]
- Sharma, J.; Singh, M. Web Services Oriented Architecture for DPI based Network Forensics Grid. Int. J. Energy, Inf. Commun. 2015, 6, 19–28. [Google Scholar]
- Mishra, A.; Singh, C.; Dwivedi, A.; Singh, D.; Biswal, A.K. Network Forensics: An approach towards detecting Cyber Crime. In Proceedings of the 2021 International Conference in Advances in Power, Signal, and Information Technology (APSIT), Bansuri Guru Auditorium, India, 8–10 October 2021; pp. 1–6. [Google Scholar]
Ref. | Key Elements |
---|---|
Khan et al. [15] | Smart homes, smart education, smart governance, smart environments, smart communities, smart healthcare, smart transportation, and smart energy |
Fournaris et al. [16] | Application (traffic management, waste management, smart parking, smart buildings, public safety, etc.), processing (service platforms, APIs, data storage, information processing, network management, etc.), communication (wireless networks (Wi-Fi, 4G, LoRa, ZigBee, and NB-IoT), optical networks, telephony, etc.), and sensing (sensors (temperature, traffic, parking, etc.), citizens (mobile phones, etc.), radio frequency identification (RFID), cameras, etc.) |
Sinaeepourfard et al. [17] | Smart city applications (situation rooms, control centers, and applications), city operating systems (city semantics, analytics, processes, events repository and management, and security management), and city information sources (sensors, cameras, and apps) |
Kim et al. [18] | Smart homes, smart mobility, smart people, and smart economy |
Hu [19] | Public services, public security, urban governance, smart industries, smart city operation and management centers, urban big data centers, and smart city sensor network systems |
Moustaka et al. [20] | Smart living, smart mobility, smart people, smart environments, smart economy, and smart governance |
Fraga-Lamas et al. [21] | Smart energy, smart industries, smart networks, defense and public safety, smart living, smart retail, smart healthcare, smart farming, and smart transportation |
Category | Authors | Year | Approach/Experiment |
---|---|---|---|
Smart Mobility | Javed et al. [63] | 2016 | ECC-based digital signatures and the encryption of smart city ITSs |
Wang et al. [64] | 2019 | Key protection strategies for smart vehicles | |
Kim et al. [9] | 2021 | A systemic survey of research on autonomous attacks and defence | |
Sharmila et al. [65] | 2022 | A mitigation model of cybersecurity vulnerabilities and threats | |
Chen and Quan [66] | 2022 | Security solutions for the BIoV and its security challenges | |
Smart Homes | Ryu and Kwak [67] | 2015 | Authenticated devices and safe access controls for smart homes |
McGee [68] | 2016 | The development of SECaaS to evaluate smart home ecosystem data-link layers | |
Liu and Hu [69] | 2016 | Algorithms to prevent hackers from altering energy bills | |
Nsunza et al. [70] | 2017 | An evaluation of the performance of TCP and UDP network traffic by FPGA | |
Gamundani et al. [71] | 2018 | Cyberattack and authentication threats on the IoT in smart homes | |
Ghirardello et al. [72] | 2018 | An analysis of various attacks and key vulnerabilities | |
Kraemer and Flechais [73] | 2018 | A systematic review of research on privacy in smart homes | |
Bastos et al. [74] | 2018 | IoT security solutions and anticipated attacks on data protocols | |
Sturgess et al. [75] | 2018 | A discussion of heterogeneous threats to personal information | |
Siddhanti et al. [76] | 2019 | Good practice in cybersecurity maturity assessment | |
Elmisery and Sertovic [77] | 2020 | The preservation of event log privacy for smart homeowners | |
Rossi et al. [78] | 2020 | Monitoring and defence against exploiting devices using Shodan APIs | |
Giannoutakis et al. [79] | 2020 | Blocking malicious IPs using dynamic and immutable management | |
Rauti et al. [80] | 2021 | A demonstration of a man-in-the-browser attack on a smart home system | |
Awang et al. [81] | 2021 | Solutions for threats to smart home operational environments | |
Turner et al. [82] | 2021 | Best practice and recommendations for smart homeowners | |
Alshboul et al. [83] | 2021 | Protecting sensor identities from being recognized | |
Mahor et al. [84] | 2022 | A multivariate correlation analysis and correlation detection | |
Bringhenti et al. [85] | 2022 | Cybersecurity personalization based on policy-based management | |
Allifah and Zualkernan [86] | 2022 | A ranking of the critical vulnerabilities of smart home devices | |
Thammarat and Techapanupreeda [87] | 2022 | A symmetric cryptographic protocol for smart homes |
Category | Authors | Year | Approach/Experiment |
---|---|---|---|
IoT | Abomhara and Køien [88] | 2015 | Threat classification, attack characterization and an analysis of IoT devices |
Rohokale and Prasad [89] | 2015 | A critical systematic review of cyberthreats to heterogeneous IoT networks | |
Saadeh et al. [90] | 2016 | A survey of IoT authentication techniques | |
Sivanathan et al. [91] | 2017 | An evaluation of vulnerabilities through CIA and the capability of DDoS attacks | |
Neshenko [92] | 2018 | An evaluation of large-scale malicious IoT data from cyberthreat intelligence | |
Ainane et al. [93] | 2018 | An identification of data and protocol exchanges between users and IoT applications | |
Vrabie [94] | 2018 | How IoT networks and services can develop smart cities | |
Viswanadham and Jayavel [95] | 2018 | The implementation of blockchain in IoT security and its domain | |
Lewis [96] | 2018 | The security of IoT networks and devices | |
Wu et al. [97] | 2018 | Hyperconnected interdependent IoT services and future applications | |
James [98] | 2019 | The detection of critical attacks on IoT devices by executing cybersecurity- based attacks | |
Shokeen et al. [99] | 2019 | An accurate evaluation of each vulnerability of IoT systems | |
Roukounaki et al. [100] | 2019 | The identification of threats using security analytics algorithms, vulnerabilities, and attacks | |
Van Kleek et al. [101] | 2019 | The classification of IoT device data in privacy-empowering networks | |
Thorburn et al. [102] | 2019 | Basic future frameworks for IoT devices that share data with third parties | |
Nwafor and Olufowobi [103] | 2019 | An anomaly detection system for events in IoT ecosystems | |
Ullah et al. [104] | 2019 | The detection of infected SW and files across IoT networks using deep learning (DL) | |
Sharma et al. [105] | 2020 | The computerized security of IoT devices | |
Karie et al. [106] | 2020 | A literature review of IoT threat detection and security challenges | |
Andrade et al. [107] | 2020 | An evaluation of IoT cybersecurity maturity in smart cities according to its risk levels | |
Singh et al. [108] | 2020 | The types of IoT security threats and their countermeasures | |
Cvitić et al. [109] | 2021 | The detection of DDoS traffic attack using logistic model trees on different IoT devices | |
Jhanjhi et al. [110] | 2021 | An investigation of cyberattacks that target the four layers of the IoT | |
Strecker et al. [111] | 2021 | The detection of malicious and anomalous data in IoT systems using machine learning (ML) | |
Ahmed et al. [112] | 2021 | An analysis of the security and privacy concepts in IoT networks using ML and DL | |
Houichi et al. [113] | 2021 | The detection of infected IoT devices, alerts, and reports based on ML and other methods | |
Bhargava et al. [114] | 2021 | The implementation of ML/DL on IoT platforms to prevent security issues | |
Al Solami [115] | 2021 | The use of secure resource administration to stop IoT services from being replicated | |
Hulicki and Hulicki [116] | 2021 | The threats to network security mechanisms and their vulnerabilities to attacks | |
Ali et al. [117] | 2021 | A literature review of IoT security issues, their classification, and solutions | |
Debnath and Chettri [118] | 2021 | A literature review of the security challenges in IoT applications | |
Toutsop et al. [119] | 2021 | DoS attacks on IoT devices through networks | |
Balaji et al. [120] | 2021 | An analysis of cyberthreats and prevention methods for avoiding IoT attacks | |
Khan [121] | 2021 | Privacy preservation based on pseudonymization and anonymization | |
Nakkeeran and Mathi [122] | 2021 | The detection of anomalies in IoT networks and solutions for cross-layer issues | |
Kowta et al. [123] | 2022 | A identification of security threats to different IoT devices by implementing attacks on them | |
Maidamwar et al. [124] | 2022 | An intrusion detection design for the WSN-based IoT | |
Raimundo and Rosário [125] | 2022 | A literature review of cybersecurity threats to the IoT | |
Fan et al. [126] | 2022 | Security guidelines for developing IoT-enabled smart cities |
Category | Authors | Year | Approach/Experiment |
---|---|---|---|
Smart Homes | Ryu et al. [127] | 2017 | Smart home forensics models based on attack scenarios |
Awasthi et al. [128] | 2018 | Forensic data acquisition and analysis based on the smart home Wi-Fi system Almond+ | |
Brotsis et al. [129] | 2019 | Smart home data collection and the preservation of evidence using blockchain | |
Iqbal et al. [130] | 2020 | Challenges in smart plug forensic analysis and investigation | |
Kim et al. [131] | 2020 | Google Nest Hub, Samsung Smart Things, and Kasa Cam forensics | |
Autonomous Vehicles | Feng et al. [132] | 2017 | Digital forensics models for autonomous vehicle cases |
Hossain et al. [133] | 2017 | Trusting the IoV to collect and store evidence from distributed infrastructure | |
Zhang et al. [134] | 2022 | An incentive lightweight authentication scheme for forensics services in the IoV | |
Tyagi et al. [135] | 2022 | Using local Ethereum blockchain to collect evidence from connected vehicles |
Category | Authors | Year | Approach/Experiment |
---|---|---|---|
IoT | Zia et al. [136] | 2017 | An application-specific digital forensics investigative model for the IoT |
Rizal et al. [137] | 2018 | An evaluated network forensics method to detect flooding attacks | |
Hou et al. [138] | 2019 | A survey of IoT forensics in the technical, temporal, and spatial dimensions | |
Jayakrishnan and Vasanthi [139] | 2019 | An attack simulation to identify advanced encryption standard (AES) keys | |
Qatawneh et al. [140] | 2019 | A digital forensics investigation model (DFIM) for the IoT | |
Yaqoob et al. [141] | 2019 | An IoT taxonomy based on different forensics processes | |
Stoyanova et al. [142] | 2020 | Cloud security challenges and data acquisition using blockchain | |
Patil et al. [143] | 2020 | A comparative analysis of IoT cyber forensics research | |
Jayakrishnan and Vasanthi [144] | 2020 | A process model for forensics using an IoT HoneyNetCloud | |
Atlam et al. [145] | 2020 | IoT forensics techniques and the need for AI in IoT forensics | |
Patel and Malek [146] | 2020 | Existing IoT forensics frameworks and their challenges | |
Yang et al. [147] | 2020 | Biometric-based authentication and forensics for the IoT | |
Bandil and Al-Masri [148] | 2020 | Real-time events associated with IoT data streams | |
Janarthanan et al. [149] | 2021 | Challenges in smart home investigations and forensics | |
Surange and Khatri [150] | 2021 | A survey of developments in IoT forensics and the identification of research gaps | |
Kim et al. [151] | 2022 | A data acquisition framework for smart devices | |
Ganesh et al. [152] | 2022 | AI use cases of forensics in blockchain, the IoT, and cloud computing | |
Multi- Area | Sharma and Singh [153] | 2015 | A forensic analysis of deep packet inspection (DPI) networks |
Mishra et al. [154] | 2021 | The identification of suspicious packets to detect cybercrimes using a packet analyser |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kim, K.; Alshenaifi, I.M.; Ramachandran, S.; Kim, J.; Zia, T.; Almorjan, A. Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors 2023, 23, 3681. https://doi.org/10.3390/s23073681
Kim K, Alshenaifi IM, Ramachandran S, Kim J, Zia T, Almorjan A. Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors. 2023; 23(7):3681. https://doi.org/10.3390/s23073681
Chicago/Turabian StyleKim, Kyounggon, Istabraq Mohammed Alshenaifi, Sundaresan Ramachandran, Jisu Kim, Tanveer Zia, and Abdulrazaq Almorjan. 2023. "Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey" Sensors 23, no. 7: 3681. https://doi.org/10.3390/s23073681
APA StyleKim, K., Alshenaifi, I. M., Ramachandran, S., Kim, J., Zia, T., & Almorjan, A. (2023). Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey. Sensors, 23(7), 3681. https://doi.org/10.3390/s23073681