Survey Paper on Internet Thing of Smart Cities
DOI:
https://doi.org/10.53555/cse.v2i3.541Keywords:
Internet,, www, LAN, MAN, WAN,, Smart CityAbstract
As this world we can assume that ,what could be the meaning of “smart” so ,it’s have lots of meaning like ,knowledgeable, a smarty, which can be perfect in all field. In general term we can define smart city as smartness of city. Internet content of infinity of things many of them are useful and many of they were of no use generally i.e. internet are designed to support smart city, by solving the problem of communication system of every technologies used by citizens and by city’s requirement .This paper present the internet things of make smart cities, we know smart cities I things “smart” means intelligent cities, sustainable cities, digital cities and so on. The concept of “smart cities” is response to this challenge. This paper explores smart cities as nvironment of open and userdriven innovation for experimenting and validating Future internet enabled services and future internet experimentally driven research and projects in the domain of living labs that the smart cities project developed in urban area a performed in collaboration with the cities municipality.
Downloads
References
Ravi k. chough, bhawana puri, Joel gill Deglitch information technology.
P. Bella vista, G. Cardone, A. Corradi, and L. Foschini,“Convergence of MANET and WSN in It urban scenarios,
A. Lays, V. I. Bratu, and J. Markendahl, “Who is investing in machine-to-Machine communications?
H. Schaffer’s, N. Koninis, M. Pallot, B. Trousse, M. Nilsson, and A. Oliveira,“Smart cities and the future internet: Towards cooperation.
A. S. Elmaghraby and M. M. Losavio, “Cyber security challenges in Smart Cities: Safety, security and privacy,” J. Adv. Res., vol. 5, no. 4, pp. 491–497, Jul. 2014.
S. Raza, L.Wallgren, and T. Voigt, “SVELTE: Real-Time Intrusion Detection in the InternetofThings”, Ad Hoc Networks, Elsevier, pp 2661–2674, May 2013.
S. Sicari, A. Rizzardi, L.A Grieco and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead”, Comput. Netw. 76, 146–164, 2015,
A. Alcaide, E. Palomar, J. Montero-Castillo and A. Ribagorda, “Anonymous authentication for privacy-preserving iot targetdriven applications”, Comput. Secur. 37, 111–123, 2013.
C. Hu, J. Zhan and, Q. Wen “An identity-based personal location system with protected privacy” in IoT, in: Proceedings -2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011, Shenzhen, China, 2011, pp. 192–195.
S. Papadopoulos, Y. Yang and D. Papadias, “Cads: continuous authentication on data streams”, in: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB ‟07,Vienna, Austria, 2007, pp. 135–146.
B. Carminati, E. Ferrari and K.L. Tan, “Specifying access control policies on data streams”, in: Proceedings of the Database System for Advanced Applications Conference, DASFAA 2007, Bangkok, Thailand, 2007, pp. 410–421.
D. Evans and D. Eyers, “Efficient data tagging for managing privacy in the internet of things”, in: Proceedings –2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012, Besancon, France, 2012, pp. 244–248.
X. Huang, R. Fu, B. Chen, T. Zhang and A. Roscoe, “User interactive internet of things privacy preserved access control”, in: 7th International Conferencefor Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, 2012, pp.597–602.
J. Cao, B. Carminati, E. Ferrari and K.L. Tan, “CASTLE: continuously anonymizing data streams”, IEEE Trans. Dependable Secure Comput. 8 (3) (2011) 337–352.
Y. Wang andQ. Wen, “A privacy enhanced dns scheme for the internet of things”, in: IET International Conference on Communication Technology and Application, ICCTA 2011, Beijing, China, 2011, pp.699–702
R. Neisse, G. Steri and G. Baldini, “Enforcement of security policy rules for the internet of things”, in: Proc. of IEEE WiMob, Larnaca, Cyprus, pp. 120–127, 2014.
J. Mao and L. Wang, “Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection”, J. Networks 7 (7), 1099–1105, 2012.
M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia and M. Dohler, “Standardized protocol stack for the internet of (important) things”, IEEE Commun. Surv. Tutorials 15(3), pp. 1389–1406, 2013.
I. Bagci, S. Raza, T. Chung , U. Roedig and T. Voigt, “Combined secure storage and communication for the internet of things”, in: 2013 IEEE International Conference on Sensing, Communications and Networking, SECON 2013, New Orleans, LA, United States, pp. 523–631, 2013.
D. Boswarthick, O. Elloumi and O. Hersent, “M2M Communications: A Systems Approach”, first ed., Wiley Publishing, 2012.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 gnpublication@
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
In consideration of the journal, Green Publication taking action in reviewing and editing our manuscript, the authors undersigned hereby transfer, assign, or otherwise convey all copyright ownership to the Editorial Office of the Green Publication in the event that such work is published in the journal. Such conveyance covers any product that may derive from the published journal, whether print or electronic. Green Publication shall have the right to register copyright to the Article in its name as claimant, whether separately
or as part of the journal issue or other medium in which the Article is included.
By signing this Agreement, the author(s), and in the case of a Work Made For Hire, the employer, jointly and severally represent and warrant that the Article is original with the author(s) and does not infringe any copyright or violate any other right of any third parties, and that the Article has not been published elsewhere, and is not being considered for publication elsewhere in any form, except as provided herein. Each author’s signature should appear below. The signing author(s) (and, in