An overview of security and privacy in smart cities' IoT communications

F Al‐Turjman, H Zahmatkesh… - Transactions on …, 2022 - Wiley Online Library
Smart cities have brought significant improvements in quality of life and services to citizens
and urban environments. They are fully enabled to control the physical objects in real time …

Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

Privacy and security concerns in the smart city

BFG Fabrègue, A Bogoni - Smart Cities, 2023 - mdpi.com
This article will highlight negative personal privacy and informational security outcomes that
may arise from development programs currently pursued in smart cities. It aims to illustrate …

Security and privacy issues in intelligent transportation systems: Classification and challenges

D Hahn, A Munir, V Behzadan - IEEE Intelligent Transportation …, 2019 - ieeexplore.ieee.org
Intelligent Transportation Systems (ITS) aim at integrating sensing, control, analysis, and
communication technologies into travel infrastructure and transportation to improve mobility …

SMT-based observer design for cyber-physical systems under sensor attacks

Y Shoukry, M Chong, M Wakaiki, P Nuzzo… - ACM Transactions on …, 2018 - dl.acm.org
We introduce a scalable observer architecture, which can efficiently estimate the states of a
discrete-time linear-time-invariant system whose sensors are manipulated by an attacker …

A survey of security and privacy in connected vehicles

LB Othmane, H Weffers, MM Mohamad… - Wireless sensor and …, 2015 - Springer
Electronic control units (ECUs) of a vehicle control the behavior of its devices—eg, break
and engine. They communicate through the in-vehicle network. Vehicles communicate with …

[PDF][PDF] Privacy by design to comply with GDPR: a review on third-party data processors

C Kurtz, M Semmann, T Böhmann - 2018 - scholar.archive.org
Abstract As the General Data Protection Regulation (GDPR) within the European Union
comes into effect, organizations need to cope with novel legal requirements regarding the …

Privacy is a process, not a PET: A theory for effective privacy practice

A Morton, MA Sasse - Proceedings of the 2012 New Security Paradigms …, 2012 - dl.acm.org
Privacy research has not helped practitioners--who struggle to reconcile users' demands for
information privacy with information security, legislation, information management and use …

Privacy by Design and Software Engineering: a systematic literature review

VC Andrade, RD Gomes, S Reinehr… - Proceedings of the XXI …, 2022 - dl.acm.org
Service providers increasingly collect, process, store, and share data from their users to
understand their preferences to make better decisions and make accurate estimates for the …

Comparing privacy requirements engineering approaches

K Beckers - … Conference on Availability, Reliability and Security, 2012 - ieeexplore.ieee.org
Several privacy requirements engineering approaches exist, which differ in notions and
terminology. We extended a conceptual framework originally designed to compare security …