Standardization in the Transformation of Civic Systems Using Safe and Secure Internet of Things Systems

  • Chapter
  • First Online:
Internet of Everything for Smart City and Smart Healthcare Applications

Part of the book series: Signals and Communication Technology ((SCT))

  • 219 Accesses

Abstract

The economic value of the industrial, smart city, home, and many more transformations by Internet of Things (IoT) across all industries is estimated to be trillions of dollars, and the societal impact on energy efficiency, health, and productivity is enormous. When sensing and intelligence are built into every smart gadget, there is a heightened risk of misuse in addition to any potential benefits. The increased complexity needed to manage IoT devices safely and securely is one of the main issues with their growing quantity. This increased complexity creates new safety, security, privacy, and usability challenges far beyond the difficult challenges individuals face just securing a single device. Herewith, researchers are trying to point out some of the bad trends that smart devices and collections of devices bring about and make the case that problems with security, physical safety, privacy, and usability are intricately intertwined and require simultaneous answers. Tight safety and security standards for individual devices based on existing technology are needed. Likewise, research that identifies the most effective method for people to reliably manage collections of devices must direct the development of such systems in the future.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Thailand)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 139.09
Price includes VAT (Thailand)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
EUR 169.99
Price excludes VAT (Thailand)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Fu, K., Kohno, T., Lopresti, D., Mynatt, E., Nahrstedt, K., Patel, S., Richardson, D., & Zorn, B. (2017). Safety, security, and privacy threats posed by accelerating trends in the internet of things. http://cra.org/ccc/resources/ccc-led-whitepapers/.

  2. Mohammed, H., & Qayyum, M. (2017). Internet of things: A study on security and privacy threats. https://doi.org/10.1109/Anti-Cybercrime.2017.7905270

  3. Kumar, J. S., & Patel, D. R. (2014). A survey on internet of things: Security and privacy issues. International Journal of Computer Applications, 90(11).

    Google Scholar 

  4. Abdur Razzaq, M., Sheikh, R. A., Baig, A., & Ahmad, A. (2017). Digital image security: Fusion of encryption, steganography and watermarking. International Journal of Advanced Computer Science and Applications (IJACSA), 8(5).

    Google Scholar 

  5. GeekPwn. (2017). IoT devices have a large number of low-level loopholes. [Online]. Available: http://www.sohu.com/a/129188339_198147

  6. Lin, J., et al. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 99, 1.

    Google Scholar 

  7. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed Internet of Things. Computer Networks, 57(10), 2266–2279.

    Article  Google Scholar 

  8. Yang, Y., et al. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.

    Article  Google Scholar 

  9. Jia, Y. J., et al. (2017). ContexIoT: Towards providing contextual integrity to Appified IoT platforms. In Network and distributed system security symposium (pp. 1–15).

    Google Scholar 

  10. Mavrogiorgou, A., Kiourtis, A., Perakis, K., Pitsios, S., & Kyriazis, D. (2019). IoT in healthcare: Achieving interoperability of high-quality data acquired by IoT medical devices. Sensors, 19(9), 1978.

    Article  Google Scholar 

  11. Lemayian, J. P., & Al-Turjman, F. (2019). Intelligent IoT communication in smart environments: An overview. In Artificial intelligence in IoT (pp. 207–221). Springer.

    Chapter  Google Scholar 

  12. Mukhandi, M., David, P., Pereira, S., & Couceiro, M. S. (2019). A novel solution for securing robot communications based on the MQTT protocol and ROS. In IEEE/SICE international symposium on system integration (SII) (pp. 608–613).

    Google Scholar 

  13. Coman, F. L., Malarski, K. M., Petersen, M. N., & Ruepp, S. (2019). Security issues in internet of things: Vulnerability analysis of LoRaWAN, sigfox and NB-IoT. In 2019 global IoT summit (GIoTS) (pp. 1–6). IEEE.

    Google Scholar 

  14. Alam, S., Siddiqui, S. T., Ahmad, A., Ahmad, R., & Shuaib, M. (2020). Internet of Things (IoT) enabling technologies, requirements, and security challenges. In Advances in data and information sciences (pp. 119–126). Springer.

    Chapter  Google Scholar 

  15. Li, W., & Wu, D. (2019). Bridging the gap between security tools and SDN controllers. ICST Transaction on Security and Safety, 5(17), 156242.

    Article  Google Scholar 

  16. Almiani, M., Abu Ghazleh, A., Al-Rahayfeh, A., Atiewi, S., & Razaque, A. (2020). Deep recurrent neural network for IoT intrusion detection system. Simulation Modelling Practice and Theory, 101, –102031.

    Google Scholar 

  17. Sarwar, M. I., Iqbal, M. W., Alyas, T., et al. (2021). Data vaults for blockchain-empowered accounting information systems. IEEE Access, 9(2021), 117306–117324.

    Article  Google Scholar 

  18. Naqvi, M. R., Iqbal, M. W., Ashraf, M. U., et al. (2022). Ontology driven testing strategies for IoT applications. Computers, Materials & Continua, 70(3), 5855–5869.

    Article  Google Scholar 

  19. Gondal, F. K., Shahzad, S. K., Iqbal, M. W., Aqeel, M., & Naqvi, M. R. (2021). Business process model for IoT based systems operations. LGU, Research Journal for Computer Science and IT, 5(4), 1–10.

    Google Scholar 

  20. Kabir, S. (2021). Internet of Things and safety assurance of cooperative cyber-physical systems: Opportunities and challenges. IEEE Internet of Things Magazine, 4(2), 74–78.

    Article  Google Scholar 

  21. Gope, P., & Sikdar, B. (2021). A comparative study of design paradigms for PUF-based security protocols for IoT devices: Current progress challenges and future expectation. Computer, 54(11), 36–46.

    Article  Google Scholar 

  22. Zhang, Y., He, D., Obaidat, M. S., Vijayakumar, P., & Hsiao, K.-F. (2021). Efficient identity-based distributed decryption scheme for electronic personal health record sharing system. IEEE Journal on Selected Areas in Communications, 39(2), 384–395.

    Article  Google Scholar 

  23. Alazab, M., Reddy Maddikunta, S. P. R. M. P. M. P. K., Gadekallu, T. R., & Pham, Q.-V. (2022). Federated learning for cybersecurity: Concepts, challenges and future directions. IEEE Transactions on Industrial Informatics, 18(5), 3501–3509.

    Article  Google Scholar 

  24. Eisele, M., Maugeri, M., Shriwas, R., Huth, C., & Bella, G. (2022). Embedded fuzzing: A review of challenges tools and solutions. Cybersecurity, 5(1), 18.

    Article  Google Scholar 

  25. Aldahmani, A., Ouni, B., Lestable, T., & Debbah, M. Cyber-security of embedded IoTs in smart homes: Challenges, requirements, countermeasures, and trends. IEEE Open Journal of Vehicular Technology. https://doi.org/10.1109/OJVT.2023.3234069

  26. Anagnostopoulos, T. (2023). Smart campus safety systems survey. In IoT-enabled unobtrusive surveillance systems for smart campus safety (pp. 39–95). IEEE. https://doi.org/10.1002/9781119903932.ch5

    Chapter  Google Scholar 

  27. Padmanaban, S., Nasab, M. A., Shiri, M. E., Javadi, H. H. S., Nasab, M. A., Zand, M., & Samavat, T. (2023). The role of internet of things in smart homes. In Artificial intelligence-based smart power systems (pp. 259–271). IEEE. https://doi.org/10.1002/9781119893998.ch13

    Chapter  Google Scholar 

  28. Jeribi, F., Amin, R., Alhameed, M., & Tahir, A. (2023). An efficient trust management technique using ID3 algorithm with blockchain in smart buildings IoT. IEEE Access, 11, 8136–8149. https://doi.org/10.1109/ACCESS.2022.3230944

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Jadhav, A.D. (2024). Standardization in the Transformation of Civic Systems Using Safe and Secure Internet of Things Systems. In: Gupta, N., Mishra, S. (eds) Internet of Everything for Smart City and Smart Healthcare Applications. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-34601-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34601-9_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34600-2

  • Online ISBN: 978-3-031-34601-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation