Review on architecture and challenges on smart cities
Subject Areas : IT Strategy
Mehdi Azadimotlagh
1
*
,
Narges Jafari
2
,
Reza Sharafdini
3
1 - Department of Computer Engineering of Jam, Persian Gulf University, Jam, Iran
2 - Department of Computer Engineering, Amirkabir University of Technology, Tehran, Iran
3 - Department of Mathematics, Persian Gulf University, Bushehr, Iran
Keywords: Urban Growth, Internet of Things, Smart Utilities, Infrastructure Implementation, Security,
Abstract :
Due to rapid urbanization, a balance between resources and urban growth is required. For the achievement of this equilibrium, the use of information technologies is essential. Smart cities are the answer to this requirement, as a result, they improve various aspects of urban life and address related challenges and/or mitigate them. Modern technologies, including a wide range of Internet of Things (IoT) sensors, are used in smart cities for collecting and analyzing data on different aspects of urban life to enhance their inhabitants' lives. Smart cities improve the sustainability and efficiency of urban dynamics. Today, smart cities can enhance services and citizens' lives in various fields such as governance, education, healthcare, transportation, and energy. Smart city applications require collaboration among individuals from various disciplines, including engineering, architecture, urban design, and economics, to plan, design, implement, and deploy a smart solution for a specific task. Therefore, a proper understanding of the applications and architecture of smart cities and the challenges they face is crucial. In this paper, we will provide background information about the applications of smart cities, describe the architecture of applications in smart cities, present security and privacy challenges to examine robustness and flexibility in smart city applications, and examine new trends in this field.
[1] K. Ahmad, M. Maabreh, M. Ghaly, K. Khan, J. Qadir, and A. Al-Fuqaha, "Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges," Computer Science Review, vol. 43, p. 100452, 2022/02/01/ 2022, doi: https://doi.org/10.1016/j.cosrev.2021.100452.
[2] A. Gharaibeh et al., "Smart Cities: A Survey on Data Management, Security, and Enabling Technologies," IEEE Communications Surveys & Tutorials, vol. 19, no. 4, pp. 2456-2501, 2017, doi: 10.1109/COMST.2017.2736886.
[3] B. Green, The Smart Enough City: Putting Technology in Its Place to Reclaim Our Urban Future. The MIT Press, 2019.
[4] I. A. Mohammed, "Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework," SSRN Electronic Journal, vol. 8, pp. 55-59, 01/03 2020.
[5] A. AlDairi and L. a. Tawalbeh, "Cyber Security Attacks on Smart Cities and Associated Mobile Technologies," Procedia Computer Science, vol. 109, pp. 1086-1091, 2017/01/01/ 2017, doi: https://doi.org/10.1016/j.procs.2017.05.391.
[6] T. Guelzim, M. Obaidat, and B. Sadoun, "Introduction and overview of key enabling technologies for smart cities and homes," 2016, pp. 1-16.
[7] H. Habibzadeh, Z. Qin, T. Soyata, and B. Kantarci, "Large-Scale Distributed Dedicated- and Non-Dedicated Smart City Sensing Systems," IEEE Sensors Journal, vol. 17, no. 23, pp. 7649-7658, 2017, doi: 10.1109/JSEN.2017.2725638.
[8] B. Ali and A. I. Awad, "Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes," Sensors, vol. 18, no. 3, p. 817, 2018. [Online]. Available: https://www.mdpi.com/1424-8220/18/3/817.
[9] H. Habibzadeh, T. Soyata, B. Kantarci, A. Boukerche, and C. Kaptan, "Sensing, communication and security planes: A new challenge for a smart city system design," Computer Networks, vol. 144, pp. 163-200, 2018/10/24/ 2018, doi: https://doi.org/10.1016/j.comnet.2018.08.001.
[10] A. S. Elmaghraby and M. M. Losavio, "Cyber security challenges in Smart Cities: Safety, security and privacy," Journal of Advanced Research, vol. 5, no. 4, pp. 491-497, 2014/07/01/ 2014, doi: https://doi.org/10.1016/j.jare.2014.02.006.
[11] M. Caţă, "Smart university, a new concept in the Internet of Things," in 2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER), 24-26 Sept. 2015 2015, pp. 195-197, doi: 10.1109/RoEduNet.2015.7311993.
[12] M. Razaghi and M. Finger, "Smart Governance for Smart Cities," Proceedings of the IEEE, vol. 106, no. 4, pp. 680-689, 2018, doi: 10.1109/JPROC.2018.2807784.
[13] S. Y. Tan and A. Taeihagh, "Smart City Governance in Developing Countries: A Systematic Literature Review," Sustainability, vol. 12, no. 3, p. 899, 2020. [Online]. Available: https://www.mdpi.com/2071-1050/12/3/899.
[14] G. Pereira, P. Parycek, E. Falco, and R. Kleinhans, "Smart governance in the context of smart cities: A literature review," Information Polity, vol. 23, pp. 1-20, 05/14 2018, doi: 10.3233/IP-170067.
[15] J. C. F. De Guimarães, E. A. Severo, L. A. Felix Júnior, W. P. L. B. Da Costa, and F. T. Salmoria, "Governance and quality of life in smart cities: Towards sustainable development goals," Journal of Cleaner Production, vol. 253, p. 119926, 2020/04/20/ 2020, doi: https://doi.org/10.1016/j.jclepro.2019.119926.
[16] A. Khanna et al., "Blockchain: Future of e-Governance in Smart Cities," Sustainability, vol. 13, no. 21, p. 11840, 2021. [Online]. Available: https://www.mdpi.com/2071-1050/13/21/11840.
[17] M. Collotta and G. Pau, "A Novel Energy Management Approach for Smart Homes Using Bluetooth Low Energy," IEEE Journal on Selected Areas in Communications, vol. 33, no. 12, pp. 2988-2996, 2015, doi: 10.1109/JSAC.2015.2481203.
[18] M. Daher, A. Diab, M. E. B. E. Najjar, M. A. Khalil, and F. Charpillet, "Elder Tracking and Fall Detection System Using Smart Tiles," IEEE Sensors Journal, vol. 17, no. 2, pp. 469-479, 2017, doi: 10.1109/JSEN.2016.2625099.
[19] J. Zhang, Y. Shan, and K. Huang, "ISEE Smart Home (ISH): Smart video analysis for home security," Neurocomputing, vol. 149, pp. 752-766, 2015/02/03/ 2015, doi: https://doi.org/10.1016/j.neucom.2014.08.002.
[20] E. Zeng, S. Mare, and F. Roesner, "End user security & privacy concerns with smart homes," presented at the Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security, Santa Clara, CA, USA, 2017.
[21] R. Batayneh, N. Taleb, R. Said, M. Alshurideh, T. Ghazal, and H. Alzoubi, IT Governance Framework and Smart Services Integration for Future Development of Dubai Infrastructure Utilizing AI and Big Data, Its Reflection on the Citizens Standard of Living. 2021, pp. 235-247.
[22] Q. Hu and Y. Zheng, "Smart city initiatives: A comparative study of American and Chinese cities," Journal of Urban Affairs, vol. 43, pp. 1-22, 01/08 2020, doi: 10.1080/07352166.2019.1694413.
[23] K. Löfgren and C. W. R. Webster, "The value of Big Data in government: The case of ‘smart cities’," Big Data & Society, vol. 7, no. 1, p. 2053951720912775, 2020, doi: 10.1177/2053951720912775.
[24] F. T. Hartanti, J. H. Abawajy, M. Chowdhury, and W. Shalannanda, "Citizens’ Trust Measurement in Smart Government Services," IEEE Access, vol. 9, pp. 150663-150676, 2021, doi: 10.1109/ACCESS.2021.3124206.
[25] j. zare and R. Hendijani, "E-Government Service Supply Chain: Identifying Performance Evaluation Indicators (Case Study of e-Customs System in Iran)," (in Fa), Journal of Information and Communication Technology, vol. 14, no. 53, pp. 111-139, 2023. [Online]. Available: https://www.magiran.com/paper/2551823.
[26] K. Ahmad et al., Artificial Intelligence in Education: A Panoramic Review. 2020.
[27] Y. Kim, T. Soyata, and R. F. Behnagh, "Towards Emotionally Aware AI Smart Classroom: Current Issues and Directions for Engineering and Education," IEEE Access, vol. 6, pp. 5308-5331, 2018, doi: 10.1109/ACCESS.2018.2791861.
[28] Z. Asadi, M. Abdekhoda, and H. Nadrian, "Understanding and predicting teachers’ intention to use cloud computing in smart education," Interactive Technology and Smart Education, vol. ahead-of-print, 09/11 2019, doi: 10.1108/ITSE-05-2019-0019.
[29] O. Díaz-Parra et al., "Smart Education and future trends," International Journal of Combinatorial Optimization Problems and Informatics, vol. 13, no. 1, pp. 65-74, 01/27 2022. [Online]. Available: https://ijcopi.org/ojs/article/view/294.
[30] S. Ar, S. Panda, and S. Hanumanthakari, "Enabling Smart Education System Using Blockchain Technology," 2021, pp. 169-177.
[31] R. J. H. Vladimir L. Uskov, Lakhmi C. Jain, Smart Education and e-Learning - Smart Pedagogy Springer.
[32] A. Qayyum, J. Qadir, M. Bilal, and A. Al-Fuqaha, "Secure and Robust Machine Learning for Healthcare: A Survey," (in eng), IEEE Rev Biomed Eng, vol. 14, pp. 156-180, 2021, doi: 10.1109/rbme.2020.3013489.
[33] S. Alromaihi, W. Elmedany, and C. Balakrishna, "Cyber Security Challenges of Deploying IoT in Smart Cities for Healthcare Applications," in 2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 6-8 Aug. 2018 2018, pp. 140-145, doi: 10.1109/W-FiCloud.2018.00028.
[34] L. Catarinucci et al., "An IoT-Aware Architecture for Smart Healthcare Systems," IEEE Internet of Things Journal, vol. 2, no. 6, pp. 515-526, 2015, doi: 10.1109/JIOT.2015.2417684.
[35] Y. Ren, R. Werner, N. Pazzi, and A. Boukerche, "Monitoring patients via a secure and mobile healthcare system," IEEE Wireless Communications, vol. 17, no. 1, pp. 59-65, 2010, doi: 10.1109/MWC.2010.5416351.
[36] A. Page, M. Hassanalieragh, T. Soyata, M. K. Aktas, B. Kantarci, and S. Andreescu, "Conceptualizing a Real-Time Remote Cardiac Health Monitoring System," in Enabling Real-Time Mobile Cloud Computing through Emerging Technologies, T. Soyata Ed. Hershey, PA, USA: IGI Global, 2015, pp. 1-34.
[37] O. Kocabas, T. Soyata, J. P. Couderc, M. Aktas, J. Xia, and M. Huang, "Assessment of cloud-based health monitoring using Homomorphic Encryption," in 2013 IEEE 31st International Conference on Computer Design (ICCD), 6-9 Oct. 2013 2013, pp. 443-446, doi: 10.1109/ICCD.2013.6657078.
[38] A. Page, S. Hijazi, D. Askan, B. Kantarci, and T. Soyata, "Research Directions in Cloud-Based Decision Support Systems for Health Monitoring Using Internet-of-Things Driven Data Acquisition," International Journal of Services Computing, vol. 4, pp. 18-34, 04/01 2016.
[39] A. Leszkiewicz, T. Hormann, and M. Krafft, "Smart Business and the Social Value of AI," in Smart Industry – Better Management, vol. 28, T. Bondarouk and M. R. Olivas-Luján Eds., (Advanced Series in Management: Emerald Publishing Limited, 2022, pp. 19-34.
[40] J. Mendling, B. Baesens, A. Bernstein, and M. Fellmann, "Challenges of smart business process management: An introduction to the special issue," Decision Support Systems, vol. 100, pp. 1-5, 2017/08/01/ 2017, doi: https://doi.org/10.1016/j.dss.2017.06.009.
[41] B. Leavy, "Alibaba strategist Ming Zeng: “Smart business” in the era of business ecosystems," Strategy & Leadership, vol. 47, no. 2, pp. 11-18, 2019, doi: 10.1108/SL-01-2019-0006.
[42] K. Ćurko, T. Ćurić, and V. Vuksic, "Perspective of smart enterprises development in the Republic of Croatia," WSEAS Transactions on Business and Economics, vol. 14, pp. 378-390, 01/01 2017.
[43] M. Veres and M. Moussa, "Deep Learning for Intelligent Transportation Systems: A Survey of Emerging Trends," IEEE Transactions on Intelligent Transportation Systems, vol. 21, no. 8, pp. 3152-3168, 2020, doi: 10.1109/TITS.2019.2929020.
[44] C. Kaptan, B. Kantarci, T. Soyata, and A. Boukerche, "Emulating Smart City Sensors Using Soft Sensing and Machine Intelligence: A Case Study in Public Transportation," in 2018 IEEE International Conference on Communications (ICC), 20-24 May 2018 2018, pp. 1-7, doi: 10.1109/ICC.2018.8422969.
[45] S. Munder, C. Schnorr, and D. M. Gavrila, "Pedestrian Detection and Tracking Using a Mixture of View-Based Shape–Texture Models," IEEE Transactions on Intelligent Transportation Systems, vol. 9, no. 2, pp. 333-343, 2008, doi: 10.1109/TITS.2008.922943.
[46] Z. Karami and R. Kashef, "Smart transportation planning: Data, models, and algorithms," Transportation Engineering, vol. 2, p. 100013, 2020/12/01/ 2020, doi: https://doi.org/10.1016/j.treng.2020.100013.
[47] R. Sahal, S. H. Alsamhi, K. N. Brown, D. O’Shea, C. McCarthy, and M. Guizani, "Blockchain-Empowered Digital Twins Collaboration: Smart Transportation Use Case," Machines, vol. 9, no. 9, p. 193, 2021. [Online]. Available: https://www.mdpi.com/2075-1702/9/9/193.
[48] C. Zhao, K. Wang, X. Dong, and K. Dong, "Is smart transportation associated with reduced carbon emissions? The case of China," Energy Economics, vol. 105, p. 105715, 2022/01/01/ 2022, doi: https://doi.org/10.1016/j.eneco.2021.105715.
[49] R. A. Gonzalez, R. E. Ferro, and D. Liberona, "Government and governance in intelligent cities, smart transportation study case in Bogotá Colombia," Ain Shams Engineering Journal, vol. 11, no. 1, pp. 25-34, 2020/03/01/ 2020, doi: https://doi.org/10.1016/j.asej.2019.05.002.
[50] M. Ehteshami, M. Cheraghali, B. Tabrizian, and M. Teimourian, "Identifying and ranking factors affecting the digital transformation strategy in Iran's road freight transportation industry focusing on the Internet of Things and data analytics," Journal of Information and Communication Technology, vol. 15, pp. 1-20, 09/26 2022, doi: 10.61186/jict.42076.16.59.1.
[51] R. Bahri and s. zeynali, "Energy procurement of a cellular base station in independent microgrids with electric vehicles and renewable energy sources: Mixed-integer nonlinear programming model," (in Fa), Journal of Information and Communication Technology, vol. 15, no. 57, pp. 266-282, 2023. [Online]. Available: https://www.magiran.com/paper/2640169.
[52] S. L. Ullo and G. R. Sinha, "Advances in Smart Environment Monitoring Systems Using IoT and Sensors," Sensors, vol. 20, no. 11, p. 3113, 2020. [Online]. Available: https://www.mdpi.com/1424-8220/20/11/3113.
[53] H. Nandanwar and A. Chauhan, "IOT based Smart Environment Monitoring Systems: A Key To Smart and Clean Urban Living Spaces," in 2021 Asian Conference on Innovation in Technology (ASIANCON), 27-29 Aug. 2021 2021, pp. 1-9, doi: 10.1109/ASIANCON51346.2021.9544596.
[54] A. Razmjoo, A. Gandomi, M. Pazhoohesh, S. Mirjalili, and M. Rezaei, "The key role of clean energy and technology in smart cities development," Energy Strategy Reviews, vol. 44, 08/20 2022, doi: 10.1016/j.esr.2022.100943.
[55] K. Sujatha et al., "Smart Vision-Based Sensing and Monitoring of Power Plants for a Clean Environment," in Intelligent Manufacturing Management Systems, 2023, pp. 195-222.
[56] M. Vijarania, V. Jaglan, and A. Sanjay, "Security Surveillance and Home Automation System using IoT," EAI Endorsed Transactions on Smart Cities, vol. 5, p. 165963, 08/06 2020, doi: 10.4108/eai.21-7-2020.165963. [57] "IBM Corp., IBM Db2 Database, Database Software, IBM Analytics,." https://www.ibm.com/analytics/us/en/db2/ (accessed 09 March 2018, 2018).
[58] A. Page, O. Kocabas, T. Soyata, M. Aktas, and J.-P. Couderc, "Cloud-Based Privacy-Preserving Remote ECG Monitoring and Surveillance," Annals of Noninvasive Electrocardiology, vol. 20, pp. 328-337, 12/01 2014, doi: 10.1111/anec.12204.
[59] a. dolatkhah, B. D. Yaghouti, and r. hashempour, "Face recognition and Liveness Detection Based on Speech Recognition for Electronical Authentication," (in Fa), Journal of Information and Communication Technology, vol. 15, no. 57, pp. 94-110, 2023. [Online]. Available: https://www.magiran.com/paper/2640158.
[60] J. Henius and J. L. McDonald, Smart Defense: A critical appraisal. NATO defense College, Research division= Collège de défense de l'Otan …, 2012.
[61] B. B. Gupta, P. Chaudhary, X. Chang, and N. Nedjah, "Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers," Computers & Electrical Engineering, vol. 98, 02/02 2022, doi: 10.1016/j.compeleceng.2022.107726.
[62] I. Karatas, "Cyber Warfare and NATO's New Security Concept: Smart Defense," 2021, pp. 273-285.
[63] T. FRUNZETI, "THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING," Journal of Defense Resources Management, vol. Vol. 3, no. 2, pp. pp. 3 – 18 2012.
[64] H. Azadi et al., "Rethinking resilient agriculture: From Climate-Smart Agriculture to Vulnerable-Smart Agriculture," Journal of Cleaner Production, vol. 319, p. 128602, 08/01 2021, doi: 10.1016/j.jclepro.2021.128602.
[65] O. Friha, M. A. Ferrag, L. Shu, L. Maglaras, and X. Wang, "Internet of Things for the Future of Smart Agriculture: A Comprehensive Survey of Emerging Technologies," IEEE/CAA Journal of Automatica Sinica, vol. 8, no. 4, pp. 718-752, 2021, doi: 10.1109/JAS.2021.1003925.
[66] B. Sinha and R. Dhanalakshmi, "Recent advancements and challenges of Internet of Things in smart agriculture: A survey," Future Generation Computer Systems, vol. 126, 08/14 2021, doi: 10.1016/j.future.2021.08.006.
[67] V. K. Quy et al., "IoT-Enabled Smart Agriculture: Architecture, Applications, and Challenges," Applied Sciences, vol. 12, no. 7, p. 3396, 2022. [Online]. Available: https://www.mdpi.com/2076-3417/12/7/3396.
[68] R. Stewart, R. Willis, D. Giurco, K. Panuwatwanich, and G. Capati, "Web-based knowledge management system: Linking smart metering to the future of urban water planning," Australian Planner, vol. 47, 06/01 2010, doi: 10.1080/07293681003767769.
[69] M. Phadke. "Smart Water Management – Need of the hour for utility sector." https://www.einfochips.com/blog/smart-water-management-need-of-the-hour-for-utility-sector/ (accessed.
[70] F. Adesola, S. Misra, N. Omoregbe, R. Damaševičius, and R. Maskeliunas, "An IOT-Based Architecture for Crime Management in Nigeria," 2019, pp. 245-254.
[71] S. Jain and N. Kesswani, "Smart Judiciary System: A Smart Dust Based IoT Application," 2019, pp. 128-140.
[72] J. Laufs, H. Borrion, and B. Bradford, "Security and the smart city: A systematic review," Sustainable Cities and Society, vol. 55, p. 102023, 2020/04/01/ 2020, doi: https://doi.org/10.1016/j.scs.2020.102023.
[73] A. Tundis, H. Kaleem, and M. Mühlhäuser, "Detecting and Tracking Criminals in the Real World through an IoT-Based System," Sensors, vol. 20, p. 3795, 07/07 2020, doi: 10.3390/s20133795.
[74] M. S. Khan, M. Woo, K. Nam, and P. K. Chathoth, "Smart City and Smart Tourism: A Case of Dubai," Sustainability, vol. 9, no. 12, p. 2279, 2017. [Online]. Available: https://www.mdpi.com/2071-1050/9/12/2279.
[75] P. Lee, W. C. Hunter, and N. Chung, "Smart Tourism City: Developments and Transformations," Sustainability, vol. 12, no. 10, p. 3958, 2020. [Online]. Available: https://www.mdpi.com/2071-1050/12/10/3958.
[76] N. Habeeb and S. Talib, "HighTech and Innovation Journal Relationship of Smart Cities and Smart Tourism: An Overview," HighTech and Innovation Journal, vol. 1, 12/01 2020, doi: 10.28991/HIJ-2020-01-04-07.
[77] N. Chung, H. Lee, J. Ham, and C. Koo, "Smart Tourism Cities’ Competitiveness Index: A Conceptual Model," 2021, pp. 433-438.
[78] A. Gohar and G. Nencioni, "The Role of 5G Technologies in a Smart City: The Case for Intelligent Transportation System," Sustainability, vol. 13, no. 9, p. 5188, 2021. [Online]. Available: https://www.mdpi.com/2071-1050/13/9/5188.
[79] A. Garcia Crespo, I. Gonzalez-Carrasco, J. Cuadrado, D. Villanueva, and Á. González, "CESARSC: Framework for creating Cultural Entertainment Systems with Augmented Reality in Smart Cities," Computer Science and Information Systems, vol. 13, pp. 6-6, 06/01 2016, doi: 10.2298/CSIS150620006G.
[80] D. Cook, G. Youngblood, and S. Das, A Multi-agent Approach to Controlling a Smart Environment. 2006, pp. 165-182.
[81] P. Pitchai, S. Subramani, K. Usa, K. Raju, M. Alsharif, and M. K. Kim, "Technological Advancements Toward Smart Energy Management in Smart Cities," Energy Reports, vol. 10, pp. 648-677, 06/24 2023, doi: 10.1016/j.egyr.2023.07.021.
[82] A. Braicov et al., "Smart Surveillance Systems and Their Applications," 2020, pp. 179-187.
[83] A. Medjdoubi, M. Meddeber, and K. Yahyaoui, "Smart City Surveillance: Edge Technology Face Recognition Robot Deep Learning Based," International Journal of Engineering, vol. 37, no. 1, pp. 25-36, 2024, doi: 10.5829/ije.2024.37.01a.03.
[84] K. Liao, Z. Zhao, A. Doupe, and G. J. Ahn, "Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin," in 2016 APWG Symposium on Electronic Crime Research (eCrime), 1-3 June 2016 2016, pp. 1-13, doi: 10.1109/ECRIME.2016.7487938.
[85] J. M. Alonso and C. Mencar, "Building cognitive cities with explainable artificial intelligent systems," in CEx@ AI* IA, 2017.
[86] A. Adadi and M. Berrada, "Peeking Inside the Black-Box: A Survey on Explainable Artificial Intelligence (XAI)," IEEE Access, vol. 6, pp. 52138-52160, 2018, doi: 10.1109/ACCESS.2018.2870052.
[87] R. K. E. Bellamy et al., "AI Fairness 360: An Extensible Toolkit for Detecting, Understanding, and Mitigating Unwanted Algorithmic Bias," ArXiv, vol. abs/1810.01943, 2018.
[88] M. Roy, "Cathy O’Neil. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy . New York: Crown Publishers, 2016. 272p. Hardcover, $26 (ISBN 978-0553418811)," College & Research Libraries, vol. 78, pp. 403-404, 03/01 2017, doi: 10.5860/crl.78.3.403.
[89] A. K. M. B. Haque, B. Bhushan, and G. Dhiman, "Conceptualizing smart city applications: Requirements, architecture, security issues, and emerging trends," Expert Systems, vol. 39, 2021.
[90] B. Tekinerdogan, Ö. Köksal, and T. Çelik, "System Architecture Design of IoT-Based Smart Cities," Applied Sciences, vol. 13, no. 7, p. 4173, 2023. [Online]. Available: https://www.mdpi.com/2076-3417/13/7/4173.
[91] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Micro-Sensor Networks," Wireless Communications, IEEE Transactions on, vol. 1, pp. 660-670, 11/01 2002, doi: 10.1109/TWC.2002.804190.
[92] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, "Edge Computing: Vision and Challenges," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637-646, 2016, doi: 10.1109/JIOT.2016.2579198.
[93] "Google Science Journal." https://makingscience.withgoogle.com/science-journal (accessed.
[94] Y. Geng, J. Chen, R. Fu, G. Bao, and K. Pahlavan, "Enlighten Wearable Physiological Monitoring Systems: On-Body RF Characteristics Based Human Motion Classification Using a Support Vector Machine," IEEE Transactions on Mobile Computing, vol. 15, pp. 1-1, 01/01 2015, doi: 10.1109/TMC.2015.2416186.
[95] J. Yin, I. Gorton, and S. Poorva, Toward Real Time Data Analysis for Smart Grids. 2012, pp. 827-832.
[96] D. Neumann, C. Bodenstein, O. Rana, and R. Krishnaswamy, "STACEE: Enhancing storage clouds using edge devices," 06/14 2011, doi: 10.1145/1998561.1998567.
[97] "the International Society for Urban Informatics, The ISUI Smart City " https://www.isocui.org/smart_city_index (accessed.
[98] A. Elmaghraby and M. Losavio, "Cyber Security Challenges in Smart Cities: Safety, security and privacy," Journal of Advanced Research, vol. 5, 07/01 2014, doi: 10.1016/j.jare.2014.02.006.
[99] Y. Zhao, "Research on Data Security Technology in Internet of Things," Applied Mechanics and Materials, vol. 433-435, pp. 1752-1755, 10/01 2013, doi: 10.4028/www.scientific.net/AMM.433-435.1752.
[100] A. Page, M. Hassanalieragh, T. Soyata, M. Aktas, B. Kantarci, and S. Andreescu, "Conceptualizing a Real-Time Remote Cardiac Health Monitoring System," 2015, pp. 1-34.
[101] T. Soyata, Enabling Real-Time Mobile Cloud Computing through Emerging Technologies. 2015.
[102] G. Honan, A. Page, O. Kocabas, T. Soyata, and B. Kantarci, Internet-of-everything oriented implementation of secure Digital Health (D-Health) systems. 2016, pp. 718-725.
[103] A. Page, S. Hijazi, D. Askan, B. Kantarci, and T. Soyata, "SUPPORT SYSTEMS FOR HEALTH MONITORING USING INTERNET-OF-THINGS DRIVEN DATA ACQUISITION," Services Transactions on Services Computing, vol. 4, pp. 18-34, 10/01 2016, doi: 10.29268/stsc.2016.4.4.2.
[104] K. Cabaj and W. Mazurczyk, "Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall," IEEE Network, vol. 30, 08/23 2016, doi: 10.1109/MNET.2016.1600110NM.
[105] S. Mohurle and M. Patil, "A brief study of Wannacry Threat: Ransomware Attack 2017," INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING & TECHNOLOGY, vol. 8, 06/11 2022.
[106] S. Latif, A. Qayyum, M. Usama, J. Qadir, A. Zwitter, and M. Shahzad, "Caveat Emptor: The Risks of Using Big Data for Human Development," IEEE Technology and Society Magazine, vol. 38, no. 3, pp. 82-90, 2019, doi: 10.1109/MTS.2019.2930273.
[107] K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen, "Security and Privacy in Smart City Applications: Challenges and Solutions," IEEE Communications Magazine, vol. 55, no. 1, pp. 122-129, 2017, doi: 10.1109/MCOM.2017.1600267CM.
[108] H. Ekbia et al., "Big Data, Bigger Dilemmas: A Critical Review," Journal of the Association for Information Science and Technology, vol. 66, 08/01 2015, doi: 10.1002/asi.23294.
[109] K. Crawford and R. Calo, "There is a blind spot in AI research," Nature, vol. 538, pp. 311-313, 10/13 2016, doi: 10.1038/538311a.
[110] L. Holmquist, F. Mattern, B. Schiele, P. Alahuhta, M. Beigl, and H. Gellersen, Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts. 2001, pp. 116-122.
[111] S. Mallapuram, N. Ngwum, F. Yuan, C. Lu, and W. Yu, Smart City: The State of the Art, Datasets, and Evaluation Platforms. 2017.
[112] A. Ali, J. Qadir, R. Rasool, A. Sathiaseelan, and A. Zwitter, "Big Data For Development: Applications and Techniques," Big Data Analytics, vol. 1, 07/01 2016, doi: 10.1186/s41044-016-0002-4.
[113] H. Yu, Z. Yang, and R. Sinnott, "Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology," IEEE Access, vol. PP, pp. 1-1, 12/20 2018, doi: 10.1109/ACCESS.2018.2888940.
[114] A. W Flores, K. Bechtel, and C. Lowenkamp, "False Positives, False Negatives, and False Analyses: A Rejoinder to “Machine Bias: There’s Software Used Across the Country to Predict Future Criminals. And it’s Biased Against Blacks.”," Federal probation, vol. 80, 09/30 2016.
[115] K. Crawford, "Artificial Intelligence's White Guy Problem," 2016.
[116] S. M. Lundberg et al., "Explainable machine-learning predictions for the prevention of hypoxaemia during surgery," (in eng), Nat Biomed Eng, vol. 2, no. 10, pp. 749-760, Oct 2018, doi: 10.1038/s41551-018-0304-0.
[117] R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh, and D. Batra, "Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization," in 2017 IEEE International Conference on Computer Vision (ICCV), 22-29 Oct. 2017 2017, pp. 618-626, doi: 10.1109/ICCV.2017.74.
[118] C. Drew, "Data science ethics in government," Philosophical Transactions of The Royal Society A Mathematical Physical and Engineering Sciences, vol. 374, p. 20160119, 12/28 2016, doi: 10.1098/rsta.2016.0119.
[119] F. Samie, L. Bauer, and J. Henkel, "Hierarchical Classification for Constrained IoT Devices: A Case Study on Human Activity Recognition," IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8287-8295, 2020, doi: 10.1109/JIOT.2020.2989053.
[120] C. R. Gregersen. "3 IoT Latency Issues and How to Fix Them." https://builtin.com/articles/how-to-fix-iot-latency (accessed.
[121] R. S. Rajeshwari Adrakatti "Approaches for Managing the Smart Phone Battery Efficiently," International Journal of Engineering Research & Technology (IJERT), vol. 3, no. 27, 2018, doi: 10.17577/IJERTCONV3IS27006.
[122] M. Ali, J. M. Zain, M. F. Zolkipli, and G. Badshah, "Battery efficiency of mobile devices through computational offloading: A review," in 2015 IEEE Student Conference on Research and Development (SCOReD), 13-14 Dec. 2015 2015, pp. 317-322, doi: 10.1109/SCORED.2015.7449347.
[123] A. Qayyum et al., "Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security," Frontiers in Big Data, vol. 3, 12/02 2020, doi: 10.3389/fdata.2020.587139.
[124] A. Qayyum, M. Usama, J. Qadir, and A. Al-Fuqaha, "Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and the Way Forward," IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 998-1026, 2020, doi: 10.1109/COMST.2020.2975048.
[125] "a guide to anticipating the future impact of today’s technology." https://mediaethics.ca/wp-content/uploads/2019/11/Ethical-OS-Toolkit-2.pdf (accessed.
[126] J. Krimmling and S. Peter, "Integration and evaluation of intrusion detection for CoAP in smart city applications," in 2014 IEEE Conference on Communications and Network Security, 29-31 Oct. 2014 2014, pp. 73-78, doi: 10.1109/CNS.2014.6997468.
[127] H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the Internet of Things: A Review," Proceedings - 2012 International Conference on Computer Science and Electronics Engineering, ICCSEE 2012, vol. 3, 03/01 2012, doi: 10.1109/ICCSEE.2012.373.
[128] M. J. Covington and R. Carskadden, Threat implications of the Internet of Things. 2013, pp. 1-12.
[129] A. Barua, M. A. A. Alamin, M. Hossain, and E. Hossain, "Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey," IEEE Open Journal of the Communications Society, vol. 3, pp. 1-1, 01/01 2022, doi: 10.1109/OJCOMS.2022.3149732.
[130] N. Ye, Y. Zhu, R.-c. Wang, R. Malekian, and L. Qiao-min, "An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things," Applied Mathematics & Information Sciences, vol. 8, 07/01 2014, doi: 10.12785/amis/080416.
[131] D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "Threats to Networking Cloud and Edge Datacenters in the Internet of Things," IEEE Cloud Computing, vol. 3, pp. 64-71, 05/01 2016, doi: 10.1109/MCC.2016.63. [132] M. Aljanabi et al., Data poisoning: issues, challenges, and needs. 2024, pp. 359-363.
[133] W. Li, R. Zhao, T. Xiao, and X. Wang, "DeepReID: Deep Filter Pairing Neural Network for Person Re-identification," in 2014 IEEE Conference on Computer Vision and Pattern Recognition, 23-28 June 2014 2014, pp. 152-159, doi: 10.1109/CVPR.2014.27.
[134] F. Wang, X. Wang, and X. Ban, "Data poisoning attacks in intelligent transportation systems: A survey," Transportation Research Part C Emerging Technologies, vol. 165, p. 104750, 08/01 2024, doi: 10.1016/j.trc.2024.104750.
[135] M. Billah, A. Anwar, Z. Rahman, and S. M. Galib, "Bi-Level Poisoning Attack Model and Countermeasure for Appliance Consumption Data of Smart Homes," Energies, vol. 14, no. 13, p. 3887, 2021. [Online]. Available: https://www.mdpi.com/1996-1073/14/13/3887.
[136] M. A. Ayub, W. A. Johnson, D. A. Talbert, and A. Siraj, "Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning," in 2020 54th Annual Conference on Information Sciences and Systems (CISS), 18-20 March 2020 2020, pp. 1-6, doi: 10.1109/CISS48834.2020.1570617116.
[137] M. Sato, J. Suzuki, H. Shindo, and Y. Matsumoto, Interpretable Adversarial Perturbation in Input Embedding Space for Text. 2018.
[138] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, The Limitations of Deep Learning in Adversarial Settings. 2016, pp. 372-387.
[139] N. Carlini and D. Wagner, Audio Adversarial Examples: Targeted Attacks on Speech-to-Text. 2018, pp. 1-7.
[140] I. Corona, G. Giacinto, and F. Roli, "Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues," Information Sciences, vol. 239, pp. 201–225, 08/01 2013, doi: 10.1016/j.ins.2013.03.022.
[141] N. Carlini et al., On Evaluating Adversarial Robustness. 2019.
[142] S. Utomo, A. Rouniyar, H.-C. Hsu, and P.-A. Hsiung, "Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications," Future Internet, vol. 15, p. 371, 11/20 2023, doi: 10.3390/fi15110371.
[143] Y. Liu et al., A Survey on Neural Trojans. 2020, pp. 33-39.
[144] Y. Gao, C. Xu, D. Wang, S. Chen, D. Ranasinghe, and S. Nepal, STRIP: a defence against trojan attacks on deep neural networks. 2019, pp. 113-125.
[145] "Trojan Horse Virus." https://www.fortinet.com/resources/cyberglossary/trojan-horse-virus (accessed.
[146] C. Dong, Y. Xu, X. Liu, F. Zhang, G. He, and Y. Chen, "Hardware Trojans in Chips: A Survey for Detection and Prevention," Sensors, vol. 20, no. 18, p. 5165, 2020. [Online]. Available: https://www.mdpi.com/1424-8220/20/18/5165.
[147] M. Juuti, S. Szyller, S. Marchal, and N. Asokan, PRADA: Protecting Against DNN Model Stealing Attacks. 2019, pp. 512-527.
[148] X. W. Minxue Tang, Yitu Wang. "Model Stealing Attacks." https://people.duke.edu/~zg70/courses/AML/Lecture14.pdf (accessed.
[149] https://owasp.org/www-project-machine-learning-security-top-10/docs/ML05_2023-Model_Theft (accessed.
[150] P. Irolla. "What is model stealing and why it matters." https://www.mlsecurity.ai/post/what-is-model-stealing-and-why-it-matters (accessed.
[151] N. Carlini, S. Chien, M. Nasr, S. Song, A. Terzis, and F. Tramèr, "Membership Inference Attacks From First Principles," in 2022 IEEE Symposium on Security and Privacy (SP), 22-26 May 2022 2022, pp. 1897-1914, doi: 10.1109/SP46214.2022.9833649.
[152] "Membership inference attacks | A new AI security risk." https://www.michalsons.com/blog/membership-inference-attacks-a-new-ai-security-risk/64440 (accessed.
[153] A. Famili and Y. Lao, "Deep Neural Network Quantization Framework for Effective Defense against Membership Inference Attacks," Sensors, vol. 23, no. 18, p. 7722, 2023. [Online]. Available: https://www.mdpi.com/1424-8220/23/18/7722.
[154] M. Abdullahi et al., "Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review," Electronics, vol. 11, no. 2, p. 198, 2022. [Online]. Available: https://www.mdpi.com/2079-9292/11/2/198.
[155] Y. Jia et al., "Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model," Knowledge-Based Systems, vol. 276, p. 110781, 07/01 2023, doi: 10.1016/j.knosys.2023.110781.
[156] M. Chohan, U. Haider, M. Y. Ayub, H. Shoukat, T. Bhatia, and M. Hassan, "Detection of Cyber Attacks using Machine Learning based Intrusion Detection System for IoT Based Smart Cities," EAI Endorsed Transactions on Smart Cities, vol. 7, 06/28 2023, doi: 10.4108/eetsc.3222.
[157] A. Nunn and P. W. C. Prasad, "Using Artificial Intelligence to Defend Internet of Things for Smart City Networks," in Innovative Technologies in Intelligent Systems and Industrial Applications, Cham, S. C. Mukhopadhyay, S. M. N. A. Senanayake, and P. W. C. Prasad, Eds., 2024// 2024: Springer Nature Switzerland, pp. 345-367.
[158] B. J. Ospina Cifuentes, Á. Suárez, V. García Pineda, R. Alvarado Jaimes, A. O. Montoya Benitez, and J. D. Grajales Bustamante, "Analysis of the Use of Artificial Intelligence in Software-Defined Intelligent Networks: A Survey," Technologies, vol. 12, no. 7, p. 99, 2024. [Online]. Available: https://www.mdpi.com/2227-7080/12/7/99.
[159] M. Songhorabadi, M. Rahimi, A. M. Moghadam Farid, and M. Haghi Kashani, "Fog computing approaches in IoT-enabled smart cities," Journal of Network and Computer Applications, vol. 211, p. 103557, 12/01 2022, doi: 10.1016/j.jnca.2022.103557.
[160] "Introduction to "Discover Emerging Technologies in Trends in 2024"." [Online]. Available: https://www.linkedin.com/pulse/part-1-navigating-future-technology-smart-worlds-lennart-kalwa-qh68e/
[161] C. Bernard Marr. "8 Critical Smart City Trends Reshaping Urban Life In 2025." https://www.forbes.com/sites/bernardmarr/2025/01/09/8-critical-smart-city-trends-reshaping-urban-life-in-2 (accessed.
[162] J. G. B. Miguel Eiras Antunes, Daniela Guerreiro de Oliveira. "Urban Future With a Purpose 12 trends shaping the future of cities by 2030." https://www.deloitte.com/global/en/Industries/government-public/perspectives/urban-future-with-a-purpose.html (accessed.