dc.contributor.author |
Mohamed Nafrees, Abdul Cader |
|
dc.contributor.author |
Aslam Sujah, Ameer Mohamed |
|
dc.contributor.author |
Mansoor, C. M. M |
|
dc.date.accessioned |
2022-02-18T09:00:22Z |
|
dc.date.available |
2022-02-18T09:00:22Z |
|
dc.date.issued |
2022-02-17 |
|
dc.identifier.citation |
5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT) 10-11, December 2021 p. 220 -228. |
en_US |
dc.identifier.isbn |
978-1-6654-3272-6 |
|
dc.identifier.uri |
https://doi.org/10.1109/ICEECCOT52851.2021.9707994 |
|
dc.identifier.uri |
http://ir.lib.seu.ac.lk/handle/123456789/5990 |
|
dc.description.abstract |
Smart city development with proper use of
emerging technologies greatly reduces security issues, reduces
energy waste, saves time, and increases human safety in urban
areas during urbanization. But, vulnerabilities in those
technologies questioning the smart city's security. This study
explored the cyber security issues in smart city technologies
and find potential solutions. There are various technologies
engaged with smart city development but the Internet of
Things, sensor technologies, and cloud computing are the most
use by the smart industries. Cyber adversaries targeting to
weakening the organization's database breach, which increases
financial losses and reduces human safety; Daniel of service
attack was the major cyber-attack face by the smart cities. It is
strongly suggested to implement Blockchain technologies while
developing smart city developments. In addition to that, it is
also suggested to implement strong cyber security policies in
terms of confidentiality, integrity, and authentication within
the organization. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
IEEE |
en_US |
dc.subject |
Cyber-attack |
en_US |
dc.subject |
Cyber security |
en_US |
dc.subject |
Things |
en_US |
dc.subject |
Smart city |
en_US |
dc.subject |
Emerging Technology |
en_US |
dc.title |
Smart cities: emerging technologies and potential solutions to the cyber security threads |
en_US |
dc.type |
Other |
en_US |