SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Security and Privacy in Smart City
Applications
VJTI-ELECTRICAL DEPT. ELECTRONICS BRANCH PRESENTATION FOR NON-TECHNICAL SEMINAR
BY :
DHANASHRI NANDRE 202081011
dhnandre_m20@el.vjti.ac.in
1
Content :
Introduction
Literature Survey
Observations and Results
Summary
Conclusion
2
Introduction :
◦ Applying all available technology & resources [1]
◦ Half of the world’s population lives in urban areas,66% [2]
◦ It results in burdens to the climate, energy, environment [2]
Fig. - Pillars of Smart-City [1] 3
Literature Survey
4
Sr.No. Title of Paper Publication Description
01 Security and Privacy of
Smart Cities: Issues and
Challenges
IEEE 16th International
Conference on Smart City;
IEEE 4th Intl. Conference
on Data Science and
Systems
Author characterized and categorized
wide-range areas of research related
to the smart city, with the aim of
focusing on security and privacy
issues and the ways to address them.
02 Security and Privacy in
Smart Cities:
Challenges and
Opportunities
2018 IEEE. Translations
and content
Author explains mainly the
widespread use of smart applications
has caused many security and
privacy issues.
03 Security and Privacy in
Smart City
Applications:
Challenges and
Solutions
Enabling Mobile and
Wireless Technologies for
Smart Cities: Part 1
2017,IEEE
In this article, author investigated the
smart city, and discussed the security
and privacy challenges in emerging
smart city applications
Applications [1]
5
Summary [1][3]
◦ Discussed the security and privacy challenges in emerging smart
city applications
◦ First introduced smart city applications in different aspects
◦ Presented the general security and privacy requirements
◦ Identified several security challenges for the smart city
◦ Reviewed and examined the potential solutions for addressing the
security and privacy issues of the smart cities
6
Conclusion
To conclude, In this presentation I have introduced smart city
applications in different aspects and discussed the widespread use of
smart applications that can be caused many security and privacy issues
7
References
[1]Mehdi Sookhak∗, Helen Tang†, and F. Richard Yu∗,IEEE 16th
International Conference on Smart City; IEEE 4th Intl. Conference on Data
Science and Systems,”Security and Privacy of Smart Cities: Issues and
Challenges”
[2]LEI CUI1, 2, (Student Member, IEEE), GANG XIE3, 1, YOUYANG
QU2 , (Student Member, IEEE), LONGXIANG GAO2 , (Senior Member,
IEEE) and YUNYUN YANG1 , 2018 IEEE. Translations and content
,”Security and Privacy in Smart Cities: Challenges and Opportunities”
[3]Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, and Xuemin
(Sherman) Shen,Enabling Mobile and Wireless Technologies for Smart
Cities: Part 1
2017,IEEE,”Security and Privacy in Smart City Applications: Challenges
and Solutions”
8
Thank You ..!!
9

Weitere ähnliche Inhalte

Was ist angesagt?

Smart Cities Day 2 Urban Innovation
Smart Cities Day 2 Urban InnovationSmart Cities Day 2 Urban Innovation
Smart Cities Day 2 Urban Innovation
4 All of Us
 

Was ist angesagt? (20)

Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016Privacy & cyber-physical security in eu cities 2016
Privacy & cyber-physical security in eu cities 2016
 
Smart Cities Day 2 Urban Innovation
Smart Cities Day 2 Urban InnovationSmart Cities Day 2 Urban Innovation
Smart Cities Day 2 Urban Innovation
 
Cyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transportCyber security and resilience of intelligent public transport
Cyber security and resilience of intelligent public transport
 
Secure and Smart IoT in Energy Sector
Secure and Smart IoT in Energy Sector Secure and Smart IoT in Energy Sector
Secure and Smart IoT in Energy Sector
 
Internet of Things and Security challenges
Internet of Things and Security challengesInternet of Things and Security challenges
Internet of Things and Security challenges
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Cost of Convenience: Pros and Cons of IoT
Cost of Convenience: Pros and Cons of IoTCost of Convenience: Pros and Cons of IoT
Cost of Convenience: Pros and Cons of IoT
 
Internet of Things(IOT)
Internet of Things(IOT)Internet of Things(IOT)
Internet of Things(IOT)
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
IoT
IoTIoT
IoT
 
Security and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT EnvironmentSecurity and Privacy Issues in IoT Environment
Security and Privacy Issues in IoT Environment
 
Internet of everything #IoE
Internet of everything #IoEInternet of everything #IoE
Internet of everything #IoE
 
M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.
 
IoT Masterclass ESGT Santarem - Connecting The Dots
IoT Masterclass ESGT Santarem -  Connecting The DotsIoT Masterclass ESGT Santarem -  Connecting The Dots
IoT Masterclass ESGT Santarem - Connecting The Dots
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
Teradata and Cisco integrated journey to IoT and Smart city
Teradata and Cisco integrated journey to IoT and Smart cityTeradata and Cisco integrated journey to IoT and Smart city
Teradata and Cisco integrated journey to IoT and Smart city
 
IoT
IoTIoT
IoT
 
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
Iot–a unique combination of biz ux-tech-sandhi bhide oct29-2014- semi pnw bre...
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
The Internet of Things Conference at E4
The Internet of Things Conference at E4The Internet of Things Conference at E4
The Internet of Things Conference at E4
 

Ähnlich wie Security and privacy in Smart City Application

A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
BRNSSPublicationHubI
 
A Brief Study on IoT Applications
A Brief Study on IoT ApplicationsA Brief Study on IoT Applications
A Brief Study on IoT Applications
ijtsrd
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
Shyam Goyal
 

Ähnlich wie Security and privacy in Smart City Application (20)

A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 
IRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human LifeIRJET- Applications of Internet of Things in Human Life
IRJET- Applications of Internet of Things in Human Life
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
A Brief Study on IoT Applications
A Brief Study on IoT ApplicationsA Brief Study on IoT Applications
A Brief Study on IoT Applications
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
November 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2021 - Top 10 Read Articles in Network Security & Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its Applications
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Security and privacy in Smart City Application

  • 1. Security and Privacy in Smart City Applications VJTI-ELECTRICAL DEPT. ELECTRONICS BRANCH PRESENTATION FOR NON-TECHNICAL SEMINAR BY : DHANASHRI NANDRE 202081011 dhnandre_m20@el.vjti.ac.in 1
  • 2. Content : Introduction Literature Survey Observations and Results Summary Conclusion 2
  • 3. Introduction : ◦ Applying all available technology & resources [1] ◦ Half of the world’s population lives in urban areas,66% [2] ◦ It results in burdens to the climate, energy, environment [2] Fig. - Pillars of Smart-City [1] 3
  • 4. Literature Survey 4 Sr.No. Title of Paper Publication Description 01 Security and Privacy of Smart Cities: Issues and Challenges IEEE 16th International Conference on Smart City; IEEE 4th Intl. Conference on Data Science and Systems Author characterized and categorized wide-range areas of research related to the smart city, with the aim of focusing on security and privacy issues and the ways to address them. 02 Security and Privacy in Smart Cities: Challenges and Opportunities 2018 IEEE. Translations and content Author explains mainly the widespread use of smart applications has caused many security and privacy issues. 03 Security and Privacy in Smart City Applications: Challenges and Solutions Enabling Mobile and Wireless Technologies for Smart Cities: Part 1 2017,IEEE In this article, author investigated the smart city, and discussed the security and privacy challenges in emerging smart city applications
  • 6. Summary [1][3] ◦ Discussed the security and privacy challenges in emerging smart city applications ◦ First introduced smart city applications in different aspects ◦ Presented the general security and privacy requirements ◦ Identified several security challenges for the smart city ◦ Reviewed and examined the potential solutions for addressing the security and privacy issues of the smart cities 6
  • 7. Conclusion To conclude, In this presentation I have introduced smart city applications in different aspects and discussed the widespread use of smart applications that can be caused many security and privacy issues 7
  • 8. References [1]Mehdi Sookhak∗, Helen Tang†, and F. Richard Yu∗,IEEE 16th International Conference on Smart City; IEEE 4th Intl. Conference on Data Science and Systems,”Security and Privacy of Smart Cities: Issues and Challenges” [2]LEI CUI1, 2, (Student Member, IEEE), GANG XIE3, 1, YOUYANG QU2 , (Student Member, IEEE), LONGXIANG GAO2 , (Senior Member, IEEE) and YUNYUN YANG1 , 2018 IEEE. Translations and content ,”Security and Privacy in Smart Cities: Challenges and Opportunities” [3]Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, and Xuemin (Sherman) Shen,Enabling Mobile and Wireless Technologies for Smart Cities: Part 1 2017,IEEE,”Security and Privacy in Smart City Applications: Challenges and Solutions” 8