Cybersecurity challenges in IoT-connected smart city infrastructure

T. Saritha 1 and Bhagyalaxmi B S 2, *

1 Department of Computer Science and Engineering, Government Polytechnic Channasandra -560067, Karnataka, India.
2 Department of Computer Science and Engineering, Government Polytechnic for Women Ramanagara, Karnataka, India.
 
Research Article
World Journal of Advanced Research and Reviews, 2021, 09(03), 391-397
Article DOI: 10.30574/wjarr.2021.9.3.0048
 
Publication history: 
Received on 13 March 2021; Revised 25 March 2021; accepted on 29 March 2021
 
Abstract: 
The increasing deployment of Internet of Things (IoT) devices in smart cities has revolutionized urban management by enhancing efficiency, optimizing resource allocation, and improving overall quality of life. These interconnected systems facilitate real-time data collection and analysis, enabling smart transportation, energy management, and public safety improvements. However, the rapid proliferation of IoT devices has also introduced critical cybersecurity vulnerabilities that threaten the integrity, confidentiality, and availability of smart city infrastructure. This paper explores the primary security risks associated with IoT-connected smart cities, including data breaches, unauthorized access, denial-of-service (DoS) attacks, and cyber-physical threats that can disrupt essential urban services. Additionally, this study reviews existing security frameworks and strategies, such as encryption protocols, network segmentation, intrusion detection systems, and blockchain-based security mechanisms. Furthermore, it proposes advanced solutions, including artificial intelligence-driven threat detection, zero-trust security models, and robust authentication mechanisms, to mitigate these risks. By addressing these cybersecurity challenges, this research aims to contribute to the development of a more secure and resilient IoT ecosystem for smart cities.
 
Keywords: 
Smart Cities; Internet of Things (IoT); Cybersecurity; Data Breaches; Unauthorized Access; Cyber-Physical Attacks; Intrusion Detection
 
Full text article in PDF: 
Share this