Future challenges for smart cities: Cyber-security and digital forensics

Digital Investigation - Tập 22 - Trang 3-13 - 2017
Zubair A. Baig1, Patryk Szewczyk1, Craig Valli1, Priya Rabadia1, Peter Hannay1, Maxim Chernyshev1, Mike Johnstone1, Paresh Kerai1, Ahmed Ibrahim1, Krishnun Sansurooah1, Naeem Syed1, Matthew Peacock1
1Security Research Institute & School of Science, Edith Cowan University, Perth 6027, Australia

Tài liệu tham khảo

Antonini, 2014, Security challenges in building automation and scada, 1 Ashktorab, 2012, Security threats and countermeasures in cloud computing, Int. J. Appl. Innovat. Eng. Manag. (IJAIEM), 1, 234 Anon, 2016 Baig, 2014, Securing the internet of things infrastructure standards and techniques Baldwin, 2016 Behl, 2011, Emerging security challenges in cloud computing: an insight to cloud security challenges and their mitigation, 217 Bera, 2015, Cloud computing applications for smart grid: a survey, IEEE Trans. Parallel Distr. Syst., 26, 1477, 10.1109/TPDS.2014.2321378 Byun, 2014, Internet of things for smart crime detection, Contemp. Eng. Sci., 7, 749, 10.12988/ces.2014.4685 Canis, 2014 Casey, 2009 Casey, 2008, The impact of full disk encryption on digital forensics, ACM SIGOPS Oper. Syst. Rev., 42, 93, 10.1145/1368506.1368519 Cisco, 2015 Colak, 2016, A survey on the critical issues in smart grid technologies, Renew. Sustain. Energy Rev., 54, 396, 10.1016/j.rser.2015.10.036 Cusack, 2015, Up-dating Investigation Models for Smart Phone Procedures 2017 Depuru, 2011, Electricity theft: overview, issues, prevention and a smart meter based approach to control theft, Energy Policy, 39, 1007, 10.1016/j.enpol.2010.11.037 Gambs, 2010, Show me how you move and i will tell you who you are, 34 Granzer, 2010, Security in building automation systems, Ind. Electron. IEEE Trans., 57, 3622, 10.1109/TIE.2009.2036033 Greenberg, 2016 Holmberg, 2003 Jin, 2014, An information framework for creating a smart city through internet of things, IEEE Internet Things J., 1, 112, 10.1109/JIOT.2013.2296516 Johnstone, 2015, Timing attack detection on bacnet via a machine learning approach, 57 Jokar, 2016, A survey on security issues in smart grids, Secur. Commun. Netw., 9, 262, 10.1002/sec.559 Kantarci, 2014, Trustworthy sensing for public safety in cloud-centric internet of things, IEEE Internet Things J., 1, 360, 10.1109/JIOT.2014.2337886 Kastner, 2005, Communication systems for building automation and control, Proc. IEEE, 93, 1178, 10.1109/JPROC.2005.849726 Kechadi, 2015, The state of the art forensic techniques in mobile cloud environment: a survey, challenges and current trends, Int. J. Digit. Crime Forensics, 7, 1, 10.4018/ijdcf.2015040101 Khan, 2016, Scalable and secure network storage in cloud computing, Int. J. Comput. Sci. Inf. Secur., 14, 545 Khatoun, 2016, Smart cities: concepts, architectures, research opportunities, Commun. ACM, 59, 46, 10.1145/2858789 Libelium, 50 Sensor Applications for a Smarter World. Available. URL: http://www.libelium.com/resources/top∖_50∖_iot∖_sensor∖_applications∖_ranking/. Lilis, 2015, Integrating building automation technologies with smart cities: an assessment study of past, current and future interroperable technologies, 1 Lin, 2012, Cyber-security for the controller area network (can) communication protocol, 1 Lopes, 2015, Detection of dangerous situa- tions using a smart internet of things system, 387 Lu, 2010, Review and evaluation of security threats on the communication networks in the smart grid, 1830 Mansor, 2016, Log your car: The non-invasive vehicle forensics, 974 Mantelero, 2015, Data protection in a big data society. Ideas for a future regulation, Digit. Investig., 15, 104, 10.1016/j.diin.2015.09.006 McDaniel, 2009, Security and privacy challenges in the smart grid, IEEE Secur. Priv., 7, 75, 10.1109/MSP.2009.76 Mishra, 2015, A cognitive adopted framework for IoT big-data management and knowledge discovery prospective, Int. J. Distr. Sens. Netw., 2015, 1, 10.1155/2015/718390 Mukundan, 2014, Efficient integrity verification of replicated data in cloud using homomorphic encryption, Distr. Parallel Databases, 32, 507, 10.1007/s10619-014-7151-0 Mundt, 2016, Security in building automation systems – a first analysis, 1 Nakamura, 2016, Design and implementation of middleware for iot devices toward real-time flow processing Nolan, 2005 Novák, 2012, Unobtrusive anomaly detection in presence of elderly in a smart-home environment, 341 Olson, 2014 Oriwoh, 2016, Presence detection from smart home motion sensor datasets: a model, 1243 Oriwoh, 2013, Internet of things forensics: challenges and approaches, 608 Ouerhani, 2016, Iot-based dynamic street light control for smart cities use cases Pardeshi, 2015, Improving data integrity for data storage security in cloud computing, Int. J. Comput. Sci. Netw. Secur. (IJCSNS), 15, 75 Patti, 2016, Iot platform for smart cities: requirements and implementation case studies Peacock, 2014 Peacock, 2014, An analysis of security issues in building automation systems, 100 Plachkinova, 2016, Emerging trends in smart home security, privacy, and digital forensics Pleban, 2014, Hacking and securing the ar. drone 2.0 Quadcopter: investigations for improving the security of a toy Quick, 2014, Impacts of increasing volume of digital forensic data: a survey and future research challenges, Digit. Investig., 11, 273, 10.1016/j.diin.2014.09.002 Ravenscraft, 2014 Razzaque, 2016, Middleware for internet of things: a survey, IEEE Internet Things J., 3, 70, 10.1109/JIOT.2015.2498900 Roussev, 2016, Forensic analysis of cloud-native artifacts, Digit. Investig., vol. 16, S104, 10.1016/j.diin.2016.01.013 Sabahi, 2011, Cloud computing security threats and responses, 245 Sachowski, 2016 Samie, 2016, Iot technologies for embedded computing: a survey M. Schellevis, B. Jacobs, C. Meijer, J. de Ruiter, Getting Access to Your Own Fitbit Data. Snyder, 2015 Valasek, 2014 Webb, 2016 Ziegeldorf, 2014, Privacy in the internet of things: threats and challenges, Secur. Commun. Netw., 7, 2728, 10.1002/sec.795