International Journal of Computer Technology and Science
Vol. 1 No. 2 (2024): April : International Journal of Computer Technology and Science

Enhancing Cybersecurity In Smart Cities Through IoT Device Management

Siti Aminah Binti Ismail (Unknown)
Ahmad Faizal Bin Mohd Ali (Unknown)



Article Info

Publish Date
30 Apr 2024

Abstract

The rapid development of smart city initiatives has significantly increased the adoption of Internet of Things (IoT) technologies to enhance urban services, infrastructure efficiency, and quality of life. However, the large-scale deployment of interconnected IoT devices also introduces critical cybersecurity challenges, including unauthorized access, data breaches, and system vulnerabilities. This study aims to develop an integrated IoT security management model to improve cybersecurity resilience in smart city environments. The research adopts a Design Science Research (DSR) approach, which involves problem identification, literature analysis, model design, implementation, and evaluation. The proposed model incorporates key security components such as Identity and Access Management (IAM), device authentication, secure communication through encryption, firmware and patch management, and continuous monitoring with intrusion detection mechanisms. The model is evaluated through simulation in smart city scenarios, including transportation systems, environmental monitoring, and energy management. The results demonstrate significant improvements in security performance, with increases in threat detection rate, vulnerability reduction, access control effectiveness, and system stability under attack conditions. Quantitative analysis shows improvements of up to 37% compared to conventional approaches, indicating the effectiveness of the proposed model in mitigating IoT-related cybersecurity risks. This study contributes by providing a comprehensive and scalable framework for IoT device security management, which can be applied to enhance the reliability and sustainability of smart city systems. Future research is recommended to validate the model in real-world implementations and integrate advanced technologies such as artificial intelligence for predictive threat detection.

Copyrights © 2024






Journal Info

Abbrev

IJCTS

Publisher

Subject

Computer Science & IT

Description

This Journal accepts manuscripts based on empirical research, both quantitative and qualitative. The scope of the this Journal covers the fields of Computer Technology and Science. This journal is a means of publication and a place to share research and development work in the field of ...