- Version
- Download 30
- File Size 292.69 KB
- File Count 1
- Create Date June 16, 2023
- Last Updated June 16, 2023
The role of IoT in Smart Cities: Security and Privacy in Smart World
Abstract
Smart devices, or Internet of Things in other world, are a concept that applies to the electronic objects around us, that is, devices that use built-in sensors to collect data and take action on it within a network. As smart devices collect data about its users, smart cities, they are primary targets for hackers. There are several reports on the web about how vulnerable smart devices are to intrusion and loss of privacy, those online reports also provides details on how routers can be hacked. If the router that connects a smart device is hacked, all smart systems and devices connected to it can be controlled remotely. Hackers will attack anything, from routers, webcams, security systems, sensors, actuators, data storage places and databases, to try to do things like locate their users, and monitor their conversations as much as possible. It is clear that today we know better. But, how long will it be before we see a smart city locked by hackers in demand for ransom? It is not far from happening, it is a matter of time before it happens. Most of smart devices are heavily dependent on Wi-Fi, which remains directly compromised by a person with average hacker skills. This means, that a smart device could easily be compromised through this point, so that someone could enter the internal computer system, could enter at smart device management console, have access to personal data, and application management system. Smart users should ask if smart devices provide authentication ad what kind of authentication, if the username and password can be changed, if customer support is provided, if the device collects their personal data and if yes in what level, if the manufacturer has compromised data and if encrypts stored data and automatically updates software. In the U.S, some smart devices sold with the promise of a subscription became useless after the company’s decision to shut down the central servers used by the devices to operate, therefore, Before a city can be transformed from a classic to a smart one, all the parameters must be taken into account
Christos Beretas1* 1PhD Candidate (full scholarship) in Cyber Security at Innovative Knowledge Institute, Paris, France. *Corresponding author: Christos Beretas. PhD Candidate (full scholarship) in Cyber Security at Innovative Knowledge Institute, Paris, France. (+30) 693-890-9477 | e-mail: [email protected] Received: 1st August 2020 Accepted: 17th August 2020 Published: 24th August 2020 Copyright: © 2020 Christos Beretas