=Paper= {{Paper |id=Vol-2623/paper27 |storemode=property |title=Building Secure Urban Information Systems Based on IoT Technologies |pdfUrl=https://ceur-ws.org/Vol-2623/paper27.pdf |volume=Vol-2623 |authors=Oleksii Duda,Nataliia Kunanets,Serhii Martsenko,Oleksandr Matsiuk,Volodymyr Pasichnyk |dblpUrl=https://dblp.org/rec/conf/intelitsis/DudaKMMP20 }} ==Building Secure Urban Information Systems Based on IoT Technologies== https://ceur-ws.org/Vol-2623/paper27.pdf
    Building Secure Urban Information Systems Based on
                     IoT Technologies

         Oleksii Duda1[0000-0003-2007-1271], Nataliia Kunanets2[0000-0003-3007-2462],
       Serhii Martsenko1[0000-0003-2205-0204], Oleksandr Matsiuk1[0000-0003-0204-3971]
                    and Volodymyr Pasichnyk2[0000-0002-5231-6395]
           1 Ternopil Ivan Puluj National Technical University, Ternopil, Ukraine,
                  2 Lviv Polytechnic National University, Lviv, Ukraine

              oleksij.duda@gmail.com, marcenko@cei.net.ua,
                         oleksandr.matsiuk@gmail.com
                nek.lviv@gmail.com, vpasichnyk@gmail.com



       Abstract. An analysis of the state-of-the-art research on methods and tools for
       building secure urban information systems based on IoT technology reveals the
       increased interest of a wide range of researchers, the wide range of methods and
       means they offer to increase the level of security in such systems, and the high
       fragmentation and fragility of the proposed solutions. Analyzing and improving
       approaches to addressing security issues when building urban information sys-
       tems based on IoT devices should be undertaken in the context of all levels of
       relevant security architecture, the mandatory and systematic implementation of
       generally accepted requirements that currently in place to build reliable and se-
       cure information systems. It is important to implement complex, systemic and
       architectural solutions with the aim of their complete and comprehensive im-
       plementation. Analyzing and improving approaches to addressing security is-
       sues when building urban infor-mation systems based on IoT devices should be
       undertaken in the context of all levels of relevant security architecture, the
       mandatory and systematic imple-mentation of generally accepted requirements
       that currently in place to build re-liable and secure information systems. A new
       formal model of security subsystem of information technology platform for
       process support in urban resource networks formed on the basis of analysis of
       basic security characteristics of IoT-devices, built on their information systems
       and proposed by the authors information technology platform architecture is
       presented in this paper.

       Keywords: Urban information system, IoT devices security, Security algo-
       rithms and protocols, Urban information system security approaches, Security
       attacks, Authentication and authorization procedures.


1      Introduction

Despite the prevalence and increasing popularity of integrated in different information
systems sensors and meters that function as constituents of urban environments, im-

Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons
License Attribution 4.0 International (CC BY 4.0). IntelITSIS-2020
plemented as concept-oriented IoT devices, many of them have insufficiently imple-
mented security mechanisms [1]. Due to the scarcity of computing resources and
power consumption of IoT devices, their long life service and the unreliability of
communication channels, classical security approaches of such profile systems are
difficult to implement. Currently, many urban-integrated IoT devices operate under
different operating systems and are implemented in a wide range of hardware config-
urations. This, in turn, complicates the formation of common standard communication
and data exchange protocols. The lack of unified standards of communication and
various hardware and software platforms of IoT-devices manufacturers complicate the
processes of building secure municipal systems, which raises additional concerns
about the security and protection of software-hardware complexes and information
networks formed on their basis.
   As the concept of IoT is relatively new, addressing the issue of organizing and
building security systems in smart cities IT projects is highly important area of re-
search and pioneering innovation. Building high-tech and high-performance systems
based on IoT technologies generates a number of specific original scientific tasks and
problems that need to be solved and their results practically embodied. Such problems
include the lack of communication reliability, the security of their respective envi-
ronments, and the lack of security in data and privilege systems.
   A group of researchers from Ternopil Ivan Puluj National Technical University
and National University "Lviv Polytechnic" is working on the development and
practical implementation of information technology platform for process support in
urban resource networks. The given platform is designed using sensors integrated on
the basis of IoT-devices in urban resource networks. The construction of such type of
information systems should be followed by the development, implementation and
use of a wide range of different and diverse means and security measures. In this
context, it is important to solve the problem concerning analysis of the basic security
characteristics of IoT devices, built on their information systems and to construct the
formal model of security subsystem of information technology platform to support
the processes taking place in urban resource networks.


2      Analysis of the modern research state

The implementation of the concept of urban integrated IoT devices usually involves
its presentation as a complex, distributed and heterogeneous system, generating a
number of specific requirements to achieve the required level of security and privacy.
The currently proposed Internet of Things security methods are essentially based on
traditional known network security techniques. At the same time, we should aware
that applying security mechanisms to IoT systems is much more complicated than in
the case with traditional networks. In this case, the main factors of differences are the
heterogeneity of devices, protocols, their scalability and the rapidly growing number
of nodes. Application security issues implemented for processing and using data ob-
tained from the urban environment using IoT devices, related in particular to the tech-
nical flaws of physical communication, heterogeneity of systems and datasets, limita-
tions on computing resources, the need for data privacy, large-scale of the systems,
the feasibility of access rights demarcation and, in general, the lack of urban commu-
nities preparedness for security measures.
   The consequences of IoT devices failure can be quite serious, particularly it can re-
sult in man-made disasters, pollution and destruction of ecosystems, etc. In paper [2],
the authors provide a comprehensive analysis of current research in the field of IoT
devices security, the analysis of trends and open questions. The state of research con-
cerning the IoT devices security in smart cities and smart manufacturing projects has
been analyzed by Jurcut, Pasika and Xu [3]. At the same time, the authors emphasize
the importance of research, development and implementation of security technologies
as the components of smart cities information systems. In paper [4] the authors pre-
sented a comprehensive analysis of IoT devices security threats and the formation of
systematic measures for their elimination in smart cities. Hassija and others [5] pro-
vide a detailed analysis of security-related issues and highlight the set of threats
sources in IoT applications. Information on security and privacy issues in relevant
systems based on IoT technologies is provided in collective monograph [6]. While
carrying out the investigations, the authors have analyzed each type of threat and
reported it as a percentage for possible use of the Internet of Things technology. Cur-
rently developed and implemented security solutions for IoT devices are usually
fragmented and partial, which in turn leads to the practical implementation of rather
"dangerous" systems. One approach to this is to use the methods, tools, and security
features used in building traditional security systems, but it is still unclear whether
such "traditional" approach completely meets the needs and implements high level of
security for IoT devices, since these systems have quite diverse and quite differentiat-
ed characteristics [7]. Nizzi in paper [8] proposed the method of performing the pro-
cedure of IoT devices addresses general shift.
   In paper [1], the authors emphasize the need to develop secure communication pro-
tocols by proposing the use of Ethereum Blockchain concept. In paper [9] Rahman
describes the use of Blockchain and IoT devices in providing financial and economic
services in the smart city environment, and Sharifinejad in paper[10] proposes to use
the Blockchain concept in the field of insurance services in smart cities. In mono-
graph [11], the authors provide the systematic analysis of publications on improving
the systems security based on IoT devices, particularly in information systems pro-
jects for smart cities. Sabrina in paper [12] proposed the architecture that uses "smart"
contracts and public Blockchain to control information resources access of organiza-
tions and structural units of municipal government in the smart city.
   A number of publications highlight the development of software-algorithmic com-
plexes using IoT-platforms in smart cities information systems. Particularly, Badii
[13] provides information about the framework that integrates different sources of
information, consolidating data flows in innovative services and providing an ade-
quate level of security based on the European Commission GDPR [14]. In paper [15],
the authors present and analyze the architecture of the information technology plat-
form formed using GDPR guidelines, and in [16] Waheed and Shafi consider the use
of effective security framework to implement information systems projects in the
smart cities. In paper [17], Waraga analyzes the processes of the open source IT plat-
form implementation to identify the vulnerabilities of networks and communications
of integrated IoT devices in the urban environment.


3      Basic properties and characteristics of IoT devices and
       information systems based on them

IoT (Internet of Things) is a promising information technology aimed at building
innovative information systems with high-tech features and parameters [18], which
are used particularly to improve the quality of urban communities life by creating new
software-algorithmic applications that make it more comfortable and facilitate their
daily activities [4]. In this case, IoT devices have a number of the following general-
ized characteristics and properties:

• Limited energy and resources. The vast majority of IoTs are endowed with limited
  computing resources to minimize energy consumption and reduce the cost of
  equipment.
• Sensors. Sensors are one of the IoT device key elements, that are used to track
  changes in the environment and capture relevant datasets.
• Adaptability and self-configuration. Purpose-based IoT devices are typically con-
  figured to perform a number of operations to minimize human intervention, and as
  a consequence, can use automatic configuration algorithms and software update
  procedures.
• Unique device identity. In networks built on IoT-based devices, each object is
  identified using a unique identifier, which is typically the use of unique IP address.
• Integrated interfaces. Most of IoT devices have interfaces that allow users to per-
  form setup, information retrieval, and remote control operations.
• Smartness. The implementation of complex software algorithmic applications in
  IoT devices confers them to some extent with the features of "smartness". These
  smart tools allow you to integrate IoT devices with other communications equip-
  ment and to implement effective "smart" decision-making procedures.
By implementing IoT information technology into urban information systems, the
corresponding generalized cloud computing model and corporate concept for using
IoT devices should be pre-formed [19]. When building urban information systems
based on them, a number of their specific characteristics should be considered, partic-
ularly:

• Dynamic environment. IoT devices allow the dynamic integration of a wide range
  of urban assets without the need to define the boundaries of relevant IoT networks.
• Heterogeneity. One of the main features of urban information systems built using
  the Internet of Things technology is the ability to connect multiple types of devices
  with different sets of characteristics, such as operating systems, platforms, com-
  munication protocols and the corresponding range of functionality.
• Large amounts of data. Currently, the total number of IoT devices installed in the
  information systems is estimated as billions of pieces. In the process of their opera-
  tion, these devices generate data collections, which in many cases can be attributed
  to the Big Data concept. This raises the need for resources and effective means of
  implementing the device interaction processes, control, storage of generated data
  large volumes, their interpretation and analytical processing.
• Context dependency: On the IoT platform, a large number of sensors integrated
  into the urban environment that implement the processes of selecting, storing and
  transmitting information that needs to be processed depending on the context.
System complexity. Information systems construction using IoT devices typically
contain a large number of heterogeneous objects with a variety of hardware and soft-
ware characteristics, which significantly complicate the implementation of manage-
ment processes under severe constraints on computing resources, power consumption,
and response time.


4      Security of urban information systems based on IoT devices

The given diversity of IoT devices and the wide range of communication protocols,
interfaces and services used in urban information systems, makes it difficult to im-
plement traditional security solutions and methods of well-known networked infor-
mation technologies effectively [20]. Typically, traditional network security measures
may not be sufficient in such cases. In order to confirm and to support the reasoning
of the approach proposed by the authors, the features of one IT project implementa-
tion to ensure the efficient management of urban resource networks are considered by
the team of researchers from the Ternopil Ivan Puluj National Technical University
and Lviv Polytechnic National University. As a prototype, the methodology proposed
by the open-source software development community known as the Open Web Appli-
cation Security Project (OWASP) [21] was chosen for the creation of specifications
and the construction of the conceptual secure information technology platform
framework to support processes occurring in urban resource networks. Attacks listed
in OWASP can be targeted on three layers of IoT systems, in particular, layers of
hardware, communications and interfaces or services. Therefore, the implementation
of measures to improve the IoT devices security and systems should cover the securi-
ty architecture in all these layers comprehensively (see Fig. 1).
   The solution of security problems in information systems built on IoT devices is
relevant in the context of all three layers presented in the architecture in Fig. 1. For
example, the absence of encryption algorithms for transport protocols causes the
communication processes between the IoT device and cloud services, IoT device and
gateway, IoT device and mobile applications, various IoT devices, etc. to be unsafe.
   Much of the threats are due to IoT devices access through inadequate or ineffective
authentication and authorization procedures. Modern IoT systems use protocols that
support authentication, including MQTT, DDS, Zigbee, and Zwave. However, in
many cases, the means of authentication offered by manufacturers are not sufficient to
avoid the precedents of data hijacking at the communications level.
   Unsecured network services do not allow the detection of malicious activities, or
the threats of unauthorized intervention into IoT network and the dissemination of
"harmful" data. Currently, authentication is one of the popular methods of implement-
ing secure communications at the network level. Despite the limitations of individual
IoT devices computing capabilities, some researchers propose to implement IPSec in
the IoT environment using a separate adaptation layer [22]. There is also ongoing
research aimed at creating an easy authentication system based on public key man-
agement methods [23].




                         Fig. 1. IoT systems Security architecture

Security threats are caused by the rigid configuration of the same access codes for
many IoT devices, which makes the credentials easy to change. It should be noted that
the low level of IoT devices physical security results in the high vulnerability of
hardware to malicious interventions and influences. The main difficulties in encryping
IoT devices are their relative simplicity, limited availability of computing resources,
and reduced usability. Therefore, it is necessary to develop "light" and efficient en-
cryption algorithms for IoT devices in order to ensure privacy and security while us-
ing them. A separate object of cyber attacks in urban IoT systems is the software-
algorithmic layer, which elements are implemented using cloud interfaces and ser-
vices. Cloud gateways must be equipped with security controls to avoid malicious
influences on their configurations change. Biometric and multi-level authentication
tools can be effectively used to control access to cloud systems.
   In addition to implementing the security policy for individual IoT devices, the gen-
eral requirements applied in the context of arbitrary information systems built with
their use [15] should be considered, particularly:

• Consideration of heterogeneity of characteristics of sensors, actuators and compu-
  ting means of IoT devices.
• “Shading” of data storage and management of IoT devices.
• Routing and data transfer security when performing fog computing based on IoT
  devices.
• Abstractness of applications and IoT devices when interacting with IoT directories,
  data and knowledge bases.
• Scalability of cloud services for IoT devices, Context Brokers, Container, IoT ap-
  plications.
• Abstracting of software-algorithmic tools for data analytical processing from per-
  sonalization of datasets and minimization of personalized analytical results presen-
  tation.
• Abstract procedures for using contextual filtering of data from personalizing da-
  tasets.
• Providing security of dashboards, software-algorithmic means for presentation,
  visualization, and data analytical processing with Web-Socket support.


5      Increasing the security level of the information technology
       platform that support processes occurring in smart city
       resource networks

Urban resource networks are categorized as critical infrastructure systems and there-
fore require improved reliability and security characteristics [24]. The architecture of
the information technology platform for supporting processes occurring in urban re-
source networks based on integrated IoT devicesuse, is presented in paper [25]. The
group of researchers from Ternopil Ivan Puluj National Technical University and
National University "Lviv Polytechnic" is working on the design and practical im-
plementation of the given information technology platform.Work on the practical
testing of the specified information technology platform that support processes occur-
ring in the smart city resource networks [26] is carried out on the basis of six-layer
architecture (see Fig. 2), which includes: sensor layer, network layer, acquisition lay-
er, storage, processing and visualization layers. The sensorics layer, in turn, is con-
ventionally divided into three sublayers. The sublayer of sensors contains water, gas,
electricity and heat meters integrated into relevant smart city resource networks.
   The next three layers are constructed on the cloud-based concept of building the
smart city IT environment. The data sets generated at this layer are taken to the next
level and stored in a distributed scalable data storage, which generates for each IoT
device the corresponding set of information entities that are grouped in thematic data-
bases.
   At the data processing layer the appropriate analytical and data processing tools
used to interact with the billing systems, mobile and web applications, and interfaces
placed at the data visualization level are grouped. Currently, the authors are working
on specification and development of security methods and tools for all levels of in-
formation technology platform presented in Fig. 2. Especially, security solutions
according to the levels presented in Fig. 1, are divided into three layers: perseption
security, network security and application security. Security tools used for the smart
city cloud platform are distinguished as a separate element.
  Fig. 2. Architecture of information technology platform that support processes occurring in
                                 smart city resource networks

In the process of the modern smart city IT projects implementation, a wide variety of
vulnerable situations used by attackers to harm physical devices objects, peoples,
urban groups or communities is formed. Possible security threats to smart city infor-
mation systems require detailed analysis and elaboration, as they can significantly
affect both the productivity and efficiency of urban services and the overall viability
of the city as the center of human civilization space [4]. In such projects, particular
attention should be paid to distiguishing such security factors and situations, such as:

• Equipment safety. Sensors integrated with physical objects based on IoT devices
  are the starting point of any cyber attack. Therefore, checking and ensuring the
  physical security of equipment can prevent many of these threats. The solution to
  this problem is somewhat complicated by the lack of IoT devices hardware stand-
  ardization. Insufficient physical security can lead to theft, damage, or manipulation
  of IoT devices without altering basic functionality for the purpose of transmitting
  false data or runing relevant applications on critical systems that are urban resource
  delivery networks.
• MITM Attack. In the critical infrastructure systems, an attacker can artificially
  introduce additional "harmful" nodes between communication elements in order to
  steal transmitted data. MITM attack is used to replace key elements by using DoS
  attack on node elements in order to deny servicing of connected IoT devices and
  their further replacing by an artificially created "malicious" node.
• Datasets theft. Data created in smart city infrastructure complexes, in case of insuf-
  ficient security, can be used to gain by the intruder a variety of personal infor-
  mation, which can be used for fraudulent transactions and thefts or interference in
  the privacy of citizens and visitors of the city.
• Great field attack. The scale of ubiquitous smart city networks creates a vast field
  for a wide range of cyberattacks. As smart city projects are implemented on the ba-
  sis of many information systems and numerous integrated IoT devices used to
  manage a variety of services, any of the elements is potentially vulnerable and can
  be subject to cyberattack. Attacking only one element can pose a significant threat
  to the entire network or to information system at whole.
• Software-algorithmic errors. These kinds of errors can have a critical and unpre-
  dictable impact on individual devices as well as on software-algorithmic complex-
  es or urban systems at whole, and their cost can be prohibitively expensive.
The development and effective implementation of a wide range of multi-type security
mechanisms for smart city information systems is a prerequisite for the implementa-
tion of innovative services using modern IT and, in particular, those IoT concept
based that focused on improving the quality of individual townspeople life and urban
communities [4]. Information technology security solutions, methods and tools used
in the processes of modern safe smart cities formation include:

• Developing means to improve the physical security of the equipment. These in-
  clude methods for detecting, monitoring, and fast responding to physical damage
  or intrusion in both urban-integrated IoT devices and communications equipment
  of urban communications networks.
• Mutual authentication. Effective authentication mechanisms and procedures must
  be implemented for the various types of IoT devices connected to ubiquitous urban
  networks at all stages of data exchange. This, in turn, will confirm the identity of
  IoT devices and communications equipment and provide an adequate level of pro-
  tection for the data transmission and reception against malicious cyber attacks.
• Operational monitoring and analysis of information systems security elements.
  This information should be promptly collected and processed to effectively identify
  potential security breaches and respond promptly to potential threats. Once the
  threats have been identified, appropriate operational response procedures based on
  a systemic security policy should be implemented.
• Data integrity and confidentiality. Smart city information systems projects use IoT-
  collected data to improve the quality of provided services and the living standards
  for the locals. The data collections must have a high level of accuracy and reliabil-
  ity. For this purpose, comprehensive data integrity measures should be applied to
  prevent manipulation during the transmission, storage, analytical processing and
  submission processes. Security measures, methods and tools should be used com-
  prehensively and systematically in the process of building and operating urban in-
  formation systems, in order to avoid the disclosure of sensitive or critical infor-
  mation.
6      The model of security subsystem of the information
       technology platform for process support in urban resource
       networks

Us provide the generalized information concerning the architecture of the information
technology platform, security factors and information security solutions as the formal
description of the security subsystem model of the information technology platform
for process support in urban resource networks in the form of a tuple:

                                 (
                        S res = T , P, FS iIoT , MZ IA , Z MA , R .     )                (1)

Components S res are:
   T – the set of threads identified for each of the security factors listed in the previ-
ous paragraph, particularly:

           T = {THardware , TMITM _ Attak , TData _ Theft , TBig _ Scale , TPr ogram }   (2)

In turn, each of these listed elements is also a set, for example, THardware is a set of
threats for physical equipment, which includes:
                                       1
                                         {
                          THardware = THardware         N
                                                ,..., THardware       }                  (3)

P is a set of protocols, rapid response for each element from the threats set T .
  FK IoT is plurality of sets of functional security components integrated for each
from the plurality of IoT devices types

                                IoT = {IoT1 ,..., IoTM }                                 (4)

For particular I = 1, M type of IoT device:

FK IoTI = {deviceI , serviceI , network I , cloud I , storageI , dataset I , useI } (5)

MZ IA is a set of methods, mechanisms and means for entities identification:

                            {
                MZ IA = MZ IoT
                           IA       IA
                               , MZ Services      IA
                                             , MZ Servers     IA
                                                          , MZUsers             }        (6)

Z MA are security monitoring and auditing tools, which include a set of tools for each
of the levels of the of the information technology platform architecture (see Fig. 2)
and integrated monitoring and auditing tools:

                        {
               Z MA = Z Perseption
                        MA             MA
                                   , Z Network     MA
                                               , Z Applicatio       MA
                                                              n , Z Security_tools   }   (7)
 R is a set of access rights and user privileges, which includes group policies, person-
al and calculated sets of access rights and privileges:

            R = {RGroup _ policy , RPersonal _ user _ right , RCalculated _ user _ right }   (8)


7      Conclusions and future investigation

At present the information technologies formed with the use of IoT-devices are being
dynamically developed, making it possible to implement new software-algorithmic
complexes and urban services constructed on their basis. However, there is no system
basis and comprehensive vision of the conceptual problem solution concerning the
development of safe urban systems with increased complexity among the manufactur-
ers and suppliers of IoT devices In this paper the authors proposed a new formal mod-
el of the security subsystem of information technology platform to support the pro-
cesses occurring in urban resource networks. This model can be used by municipal
authorities, developers of relevant information systems and services, resource provid-
ers and manufacturers in order to plan the security strategy while using IoT devices.
The proposed model is constructed on the basis of the analysis of a wide range of
known solutions and on the basis of information obtained during development and
practical implementation of the relevant information technology platform.
   In the future, we are going to develop the conceptual framework which can be used
for formal analysis, description and determination of the general security state and
knowledge level concerning the creation of appropriate information technology plat-
forms focused on the smart city concept.


References
1. Reilly E, et al (2019) A smart city iot integrity-first communication protocol via an ethere-
   um blockchain light client. Proceedings of the International Workshop on Software Engi-
   neering Research and Practices for the Internet of Things (SERP4IoT 2019). Marrakech,
   Morocco
2. Hassan WH (2019) Current research on Internet of Things (IoT) security: A survey. Com-
   puter Networks 148, pp 283–294
3. Jurcut AD, Pasika R, Xu L (2020) Introduction to IoT Security. IoT Security: Advances in
   Authentication, pp 27–64
4. Atlam H, Wills G (2020) IoT Security, privacy, safety and ethics. Digital Twin Technolo-
   gies and Smart Cities. Springer, Cham, pp 123–149
5. Hassija V, et al (2019) A survey on IoT security: application areas, security threats, and so-
   lution architectures. IEEE Access 7: 82721-82743
6. Devarakonda S, Malka N, Azeem M (2019) Critical issues in the invasion of the Internet of
   Things (IoT): Security, privacy, and other vulnerabilities. Handbook of Research on Big
   Data and the IoT. IGI Global, pp 174–196
7. Oliveira A (2019) IoT SECURITY ASSESSMENT. Diss. Universidade de Coimbra
8. Nizzi F, et al (2019) IoT security via address shuffling: the easy way. IEEE Internet of
   Things Journal 6.2: 3764-3774
 9. Rahman Md A, et al (2019) Blockchain and IoT-based cognitive edge framework for shar-
    ing economy services in a smart city. IEEE Access 7: 18611-18621
10. Sharifinejad M, Ali D, Javad R (2020) BIS-A Blockchain-based Solution for the Insurance
    Industry in Smart Cities. arXiv preprint arXiv: 2001.05273
11. Ekramifard A, Amintoosi H, Hosseini Seno A (2019) A Systematic Literature Review on
    Blockchain-Based Solutions for IoT Security. The 7th International Conference on Con-
    temporary Issues in Data Science. Springer, Cham
12. Sabrina F (2019) Blockchain and Structural Relationship Based Access Control for IoT: A
    Smart City Use Case. 2019 IEEE 44th Conference on Local Computer Networks. IEEE
13. Badii C, et al (2020) Smart City IoT Platform Respecting GDPR Privacy and Security As-
    pects. IEEE Access 8: 23601-23623
14. General Data Protection Regulation. GDPR, https://gdpr-info.eu/
15. Badii C, et al (2019) Privacy and security aspects on a Smart City IoT Platform. Proceed-
    ings of the 16th IEEE International Conference on Advanced and Trusted Computing, ATC
    Leicester, UK
16. Waheed A, Shafi J (2019) Efficient Cyber Security Framework for Smart Cities. Secure
    Cyber-Physical Systems for Smart Cities. IGI Global, pp 130–157
17. Waraga OA, et al (2020) Design and implementation of automated IoT security testbed.
    Computers & Security 88: 101648
18. Duda O, Kunanets N, Matsiuk O, Pasichnyk V (2018) Information-Communication Tech-
    nologies of IoT in the "Smart Cities" Projects. CEUR Workshop Proceedings, vol. 2105, pp
    317–330
19. Arun A (2020) Architecting IOT for Smart Cities. Smart Cities in Application. Springer,
    Cham, pp 141–152
20. Pasichnyk V, et al (2018) Telecommunication Infrastructures for Telemedicine in Smart
    Cities. IDDM 2018 Informatics & Data-Driven Medicine, vol. 2255, pp 256–266
21. Open Web Application Security Project, OWASP, https://owasp.org/
22. Bhattacharjya A, et al (2020) CoAP – application layer connection-less lightweight proto-
    col for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting
    CoAP. Digital Twin Technologies and Smart Cities. Springer, Cham, pp 151–175
23. Alkatheiri MS, Abdur RS, Satish A (2020) Physical Unclonable Function (PUF)-Based Se-
    curity in Internet of Things (IoT): Key Challenges and Solutions. Handbook of Computer
    Networks and Cyber Security. Springer, Cham, pp 461–473
24. Little R, et al (2020) CLARC: An Artificial Community for Modeling the Effects of Ex-
    treme Hazard Events on Interdependent Civil and Social Infrastructure Systems. Journal of
    Infrastructure Systems 26.1: 04019041
25. Duda O, Kochan V, Kunanets N, Matsiuk O, Pasichnyk V, Sachenko A (2019) Data Pro-
    cessing in IoT for Smart City Systems. In: Proc. 10th IEEE Intern. Conf. on. Intelligent Da-
    ta Acquisition and Advanced Computing Systems: Technology and Applications
    (IDAACS'2019), Metz, pp 96–99
26. Duda O, Kunanets N, Matsiuk O, Pasichnyk V (2018) Cloud-based IT Infrastructure for
    “Smart City” Projects. In: Dependable IoT for Human and Industry: Modeling, Architect-
    ing, Implementation. River Publishers, pp 389–410