Securing the Smart City

Access Full Text

Securing the Smart City

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Engineering & Technology — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

A smart city uses technology to automate and improve city services, ultimately making citizens' lives better. It describes a city full of connections, where information technology and the Internet of Things (IOT) is embedded into everyday life. The problem is, for each connection, there's a risk. Data is shared across networks that, if poorly encrypted, can be accessed. Each connection, however remote or seemingly innocuous, could provide an entry point for a hacker who could potentially manipulate that system for their own devices. Digital security experts like Cesar Cerrudo, CTO for IOActive Labs, have concerns about how robust this encryption is. Cerrudo points out that many use weak encryption algorithms, and others have poor key encryption generation or fixed keys that hackers can gain access to. It's not just fragile encryption or weak connection security - citizens in a smart city havea part to play too. Simple or shared passwords and lost memory sticks could potentially offer hackers the opportunity to access personal and business information that we hold. Malware can be stored within apps we freely download.

Inspec keywords: invasive software; smart cities; cryptography; Internet of Things

Other keywords: information technology; IOT; malware; encryption generation; encryption algorithms; Internet of Things; smart city security

Subjects: Data security

http://iet.metastore.ingenta.com/content/journals/10.1049/et.2016.0501
Loading

Related content

content/journals/10.1049/et.2016.0501
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading