ISTAfrica2020 Paper Ref 137

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

IST-Africa 2020 Conference Proceedings

Miriam Cunningham and Paul Cunningham (Eds)


IST-Africa Institute and IIMC, 2020
ISBN: 978-1-905824-64-9

Secure Information Infrastructure


Framework Components for a Smart City:
A Case Study of Windhoek
Licky ERASTUS1, Nobert JERE 2, Fungai BHUNU SHAVA1
1
Namibia University of Science and Technology,13 Jackson Kaujeua Street,Windhoek,
9000, Namibia,
Tel: +264 811 28 1015, Email: licky001@gmail.com, fbshava@nust.na
2
Walter Sisulu University, 19 Manchester Road, Chiselhurst, East London, South Africa
Tel: +264 61 207 2746, Email: njere@wsu.ac.za
Abstract: African city planners are making efforts to improve and develop ICT
infrastructure towards smart cities. This is enabled by fast broadband and better
supporting infrastructure. As these developments are witnessed, information
sharing, infrastructure requirements and security issues become very common.
There is evidence of limited research on Information Infrastructure security
frameworks in Namibia and across the world. The study presents the main
components of a secure Information Infrastructure that could guide stakeholders to
introduce smart cities. A qualitative research approach within a case study was
considered. The City of Windhoek was considered as the interesting case. An
engagement with participants through an online survey and interviews was
conducted. Results show that participants had different views on the main
components but agree that secure infrastructure is vital. We present the main
Security Information Infrastructure Framework (SIIF) components critical for secure
smart services within African cities.
Keywords: Information Infrastructure, Security, smart cities, Security Information
Infrastructure Framework

1. Introduction
The projections by the United Nations show that by 2050 almost 70% of the population in
the world will be living in urban areas with only 30% or less in rural areas [1]. This view is
also shared by Escher Research Group who mentioned that cities will continue to grow as
rural population migrates to urban centres for better service [2].
Urban growth presents new challenges as a result of pressure from the ever-increasing
population. Some of the notable challenges as population increase in urban areas as
mentioned by [3] include air pollution, traffic congestion and competition for resources.
There is need for proper planning for many cities in the world to cope with noted
population increases. [4] noted that “central and local governments from around the world
have devised plans for existing and emerging cities to become both smarter and greener”.
Smart city adoption has been slow in Africa and yet very popular within the developed
nations [5]. However, there have been initiatives in place in other developing nations such
as India and South Africa to have smart cities in their respective countries. Current
literature shows that the pressure in cities requires innovative ways that enable cities to
efficiently serve the citizens [6]. These innovative services are some of the elements of
smart cities. There is evidence of limited research on Information security frameworks in
Namibia and some African cities [7].

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 1 of 10


Namibia is one of the most commonly targeted countries on cyberattacks, which means
there is need to have properly secured environment for citizens to trust the city services [8].
What is lacking is a standard model that could be used to assist in introducing security
measures within smart cities. Additionally, there is no guiding model and process that
shows the key components to consider for a secure smart city. The paper is structured as
follows: study background, current literature, study approach, key findings and the
proposed smart city framework.
1.1 Study Background
[9] mentions that within a smart city, ICT infrastructure is very important. The City of
Windhoek is planning to be a Smart City by 2022 according to the current City of
Windhoek strategic plan [10]. Namibia’s projected population for 2018 is approximately
2,413,600 with Windhoek as the main city that has a total population estimate to be roughly
447,600 which is 15% of the total population based on 2011 census data [11]. This coupled
with the current ICT developments in Namibia has motivated this study. ICT developments
have been supported by initiatives from the current ICT service providers such as Telecom,
Mobile Telecommunications Limited, Non-Governmental Organisations and the Namibian
Government. The Government has policies such as the broadband policy, cybercrime bill
and most recently the inclusion of the Infrastructure development in the Harambe
Prosperity Plan. These initiatives are in line with the processes that are necessary for a
smart city development. As such, the study considers Namibia and shall focus on
Windhoek.
According to the Namibian Statistics Agency an urbanisation growth of 42% was
witnessed in 2015, with an estimate of 23 000 people moving to cities annually [11]. In
addition to this the City of Windhoek population is currently increasing by almost 5% each
year [11]. Subsequently, social challenges in the cities have increased, putting pressure on
the city’s service delivery. Since 2003, there have been provisions of relevant ideas that
helped in the advancement of technological elements in Namibia. As such, some of the
technologies used in the city of Windhoek have helped even with more economic, political
and social developments in the country [12]. There have been a number of initiatives and
ICT infrastructure developments that are enabling a smart City of Windhoek [13]. As the
paper is based on proposed smart Windhoek, the issue of having secure services is very
critical. This is supported by that fact that one of the IT security reports (2016) indicates
that Namibia is one of the most targeted countries on cyber-attacks.
Based on the current developments in Namibia, there is no doubt that Windhoek has
potential to become a smart city. The proposed SIIF main components are meant to prepare
and ensure that the citizens and all other stakeholders have confidence in engaging with the
city services.
1.2 Objective
The purpose of this paper is to propose the main components of a Secure Information
Infrastructure Framework (SIIF) that enable efficient services within an African city. The
city of Windhoek, Namibia was used as the test bed.

2. Literature Review
This section presents a brief literature review of the study. It outlays an overview of smart
cities, features of smart cities, ICT services in smart cities, secure framework design
guidelines, approaches for service design in smart cities and information security models.

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 2 of 10


2.1 Overview of Smart Cities
The literature shows that there is not one general definition of a smart city [5;14]. [16] goes
further to state that there are no templates for framing a smart city. The lack of a one-size-
fit all definition can be attributed to the fact that what constitutes a smart city is mainly
influenced by contextual factors and drivers to smart cities that differ from one context to
the other. Despite the lack of a one-size fit all definition, smart cities utilise ICTs to enable
service delivery and make it easier for communication among citizen [5]. Similarly, [15]
conclude that smart cities are characterised by a wide use of Information and
Communication Technologies (ICT) with the aims of helping Cities “make better use of
their resources.”
It can be concluded that cities in developing and developed countries are moving
towards the adoption of smart cities with the aims of improving service management,
delivery to address the ever increasing social and economic problems facing the ever-
growing cities. [16] noted various examples of Smart City initiatives across the globe with
some of them in Asia, Africa, Europe, North America, Middle/South America and Oceania.
Asia, Europe and North America are the dominant adopters of Smart City projects. The
main characteristics and challenges within smart cities as summarised by [17] which
contribute to the research problem are:
• Lack of awareness on smart cities among stakeholders and citizens;
• Fast, efficient communication channels posing a challenge on ICT infrastructure;
• Privacy, security and personal identity challenges;
• Open data issues
These characteristics are important in ensuring that the smart city solutions are
sustainable. One of the other motivating factors coming from current literature is that, most
of the research on smart cities focuses on the services and models used in those respective
cities, with less focus on internet of things, data analytics, secure date centric information,
private concerns, and new economic models [16, 17]. The study addresses security issues,
which is one of the current gaps on smart cities.
[16] propose that smart cities’ core components are characterised by technology factors
that includes a well connected with state-of-the-art ICT infrastructure. These suggestions of
features of Smart Cities concurs with view of the Barcelona Smart City model foundations
that are based on three factors namely the availability of infrastructures, information and
human capital [5]. Smart cities require good governance, proper planning and these require
a supporting ICT infrastructure deployment [18]. With ICTs being influential in enabling
citizen centric, efficient service delivery and transparency this means that any smart city has
to invest in having supporting infrastructure [10]. In summary, smart cities are characterised
by high Internet speed, efficient energy systems, water systems, sewage systems, waste
management systems and transport systems [19]. It should be noted that from the
mentioned essentials of smart cities, there is a high security risk, if no action is taken. Many
smart city projects are likely to fail. The other challenge to manage is once the services are
always available and accessible, it will expose the city to security challenges due to the
number of users connected.
2.2 Information Security in Smart cities
The previous section deliberated on components and essentials of a smart city according to
the reviewed literature. It should be noted that ICTs, the populace and public organisations
interact during the delivery of services within a Smart City context. The reliance and use of
pervasive ICTs to implement smart cities calls for laid down security structures. [20]
support this view by suggesting that the preservation of privacy is of prime importance if
Smart Cities are to be a reality. [21] expressed concern over the smart city systems’ security

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 3 of 10


vulnerabilities at the expense of unknowing users. This is attributed to the lack of clear
theory on law and rights that defines the capabilities and scopes of smart cities systems.
This calls for security architecture for smart city systems that participants and the shared
data is protected. Security is the largely ignored element in current smart city models as
researchers put more focus on defining components that define a smart city environment.
The security issues are explained in literature based on possible threats that may happen
within the city [22]. The threat categories considered may include availability, integrity and
accountability threats. The basic elements of the security information infrastructure of smart
cities may have the following layers to provide the city with ICT security [23] data
transmission network, data processing, data aggregation connectivity and smart processing.
It is not easy to ensure that all the services and the data accessed within a smart city are
secure. The main security challenges as explained by several authors including [7 & 22]
include: Data Privacy and Protection Concerns. Personal data is very sensitive and should
always be protected. This may include information to identify, contact, or locate a single
person, or to identify an individual in context. The final major security challenge is that in
some cases there are weak security and encryption issues, poor system maintenance and
lack of guiding ICT security frameworks. This creates challenges within cities as it is
difficult at times to know the best security practices and implement these without any
guiding security framework [23].
The importance of understanding the common security challenges for this paper is to be
able to propose a framework that considers such challenges and provides a solution to
these.
There is no doubt that security issues are one of the biggest challenges that many
institutions face. These challenges become worse in situations where everyone is
connected. With the increase in hackers and Internet attackers, it makes it difficult to ensure
that a smart city is secure [22]. Therefore, it is not a one man’s duty to ensure security is
maintained by making sure that the citizens are aware of cyber security threats and also
well-trained to act properly.
The study creates an understanding for the main components of a SIIF and shall refer to
these components as the paper continues.

3. Study Approach
A qualitative approach within a case study was selected for the study. This methodology is
suitable for this research as it gives the researcher numerous options of sourcing data that
enhance the understanding of the phenomenon under study. The case study strategy is used.
Qualitative approach was suitable as it allows the authors to apply and use own ideas to
formulate framework components. In this case, the City of Windhoek that intends to be a
smart city by 2022 is considered. We have used semi-structured interviews to propose the
key SIIF components and designed the framework based on smart cities experiences. The
qualitative approach to design a security framework is selected as this has been used in
developing other related cyber security frameworks by professional organisations and other
established researchers [23]. The selection of the participants was based on their roles and
participations in smart city involvement. For example, some participants were
representatives from government, academics, private sector and international organisations.
Participants for the interview were purposively selected and should have the required
information to assist the authors to have deep understanding on the study. From each of the
stakeholders, one would be randomly picked to give a total of seven (7) participants for the
interviews.

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 4 of 10


Research Process
This study is divided into three phases, which helped the authors understand smart cities
trends and propose a secure ICT framework. The main study processes that are supported
by the chosen methods are:
● Process 1: Current state of Smart Cities – this was through desktop survey and
interviews.
● Process 2: Future of Smart Cities and Technologies – mainly through the current
literature on future projections.
● Process 3: Framework components identification and Evaluation – through interviews.
We then considered a case and cross-variables data analysis approach for all the
participants engaged during data analysis. The study uses coding to extract meaning from
collected data for within case analysis. In this case, open coding was used first. The
process of open coding begins with content analysis to verify factors identified from the
literature. The following steps were followed during the case analysis: Transcribing of
tape-recorded data - considering that interviews were tape recorded, data analysis for
interviews involved the transcribing of the recorded data to obtain a full record of the
conversation. Transcribing was done for each participant or case (category) separately.
Coding of data - considering that interviews were based on structured questions, all
responses for each question were analysed within the respective question. Data was
analysed within the proposed security model aspects.
Cross-case analysis - Once all data for each case is separately analysed, cross-case
analysis began. Cross-case analysis was conducted, identifying matching and contrasting
responses from participants. The aim of the cross-case analysis is to ensure that findings
from data collection are better grounded and are well informed. Information from the cross-
case analysis was used for developing a framework for smart city adoption.

4. Results
The data for this study was collected through one-on-one interviews. Seven (7) ICT experts
involved in Smart Windhoek planning were targeted. Interviews were 1-2 hours long.
However, for the purpose of this paper, only the responses to the question related to the
Information infrastructure is presented. The results were shared in a workshop that involved
selected key stakeholders responsible for smart city planning. However, since the
framework is mainly from an academic point of view, more engagements with other key
stakeholders are required. An implementation plan should be formulated including all the
parties involved in city planning.
Findings from Interviews
The results were obtained from the ICT stakeholders in Namibia, these represented various
entities such as government, private companies, ICT service providers and Mobile
operators. The results are reported as per the respondents (R1…, R8). These were coded as
follows:
R1- Steve, R2 -Wesley, R3 - Ester, R4 - Belinda, R5 - Collin, R6- Angeline, R7 - Abbie
and R8 -Kendrick. All the participants interviewed mentioned the following terms in
describing the smart city:
 Service delivery
 Infrastructure
 Governance
 Access to information
 Security of services and infrastructure

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 5 of 10


Participants were asked whether there is need for standard information security
infrastructure for Smart City adoption. Comments on this statement include:
Steve... Yes, the secure infrastructure, securing infrastructure is needed to, in all
aspects for digitization. The full, the whole ICT ecosystem as it, ah hmm as dependent on its
ability to keep its information secure to keep communications secure. Its internal processes
should be, should be secured so hmm, this need is paramount to any to any digital process
or to any technology adoption.
Wesley… There are some issues shall be duplicity in order to illustrate the impact on
security and make residency trust on using the facilities of smart city. First point, obsessed
to information for obligations prevent illegal users or devices to access the system. Second
point, information tracking and the season tracking identity the general and the sensitive
information. The third point, I think its user or the season's data lose storage, backup and
recovery of the user data. Last point is the closed the access information in data center.
Multilevel obsessed are also right to the data.
Ester… So not having a standard information security infrastructure in place to curd
against challenges and to mitigate against possibilities of unauthorized access will actually
be something that cannot be recommended on.
So, you agree that there is a need for such standard It is imperative it's not a need, I would
suggest that even before you even consider implementing the physical infrastructure for the
Smart City that the security infrastructure must be considered first.
Belinda… Ok smart city users worry that the city managers will not keep data privacy
and security at the top of their minds. Fearing the exposure of data that citizens produce on
a daily basis to risk hacking or misuse. So additionally, the presence of sensors and
cameras might be perceived as an invasion of privacy of government or civilians and to
Collin… will tend to agree to that simply because aarh statistics, data is a very
important aspect and whoever has data controls the system. Whoever has data controls the
government. Whoever has data can do a lot to any institution.
Angeline… I think the answer will be yes and if one has to elaborate a bit further is the
infrastructure should be secure. This one way we trust the system and the infrastructure are
not secured then it will be open for abuse, manipulation and you know the trust from the
public. So let's say for example if we put up the speed meters here and if that meter is
always malfunctional or is not secure there is not even a backup when someone disputes it
like it was not my car.
Abbie… That one is a, as standard I can comment that yes its of importance because
the information is also what leads to the grooming of other towns towards smart city so
once they is aaah standard information security it also guides the citizens, everyone
knowing directly when you need water where do you go, electricity you know where do you
go and this will also causing calmness within the citizens within the citizens because they is
no frustration …… but once its standardized its inform because information is basically to
inform your citizens and then you as leaders, or administers you are also being informed by
your citizens so their needs are then addressed according to the information they have.
Kendrick… Generally, when you have a right city infrastructure of which on top of it
you need to build a Smart City, there is an ecosystem. That ecosystem will be comprised of
different types of equipment from different vendors. Now from my perspective I believe that
the systems that can be adopted to create a Smart City it must conform to certain standards
while the last thing you want is to adopt standards sorry equipment that cannot
interconnect with third part equipment for you to be able to provide those type of services.
Participants pointed out the main aspects that should be available and considered for the
smart city secure infrastructure as presented in Figure 1. The components are informed by
the interview findings.

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 6 of 10


needs to be a relative framework in terms of
policy
The process to get their laws, regulations
Legal framework/Policy and policies
security lies better with policy  
 
common vision everyone can get behind and get
the accordance business stakeholders who
involved  
Stakeholder support the relevance stakeholders and you happen to
leave one stakeholder the process might not be
complete 
they need to engage with the government because
this this project
have a stakeholder engagement whereby all the
stakeholders
introduce the leaders to provide the consultants
Literacy/ Competency and make clear target for achieving smart
city.
information needs to be secured at a source
and as much as possible it must be
standardized and again
they analyze it properly and then build a
process of standardized information which
is secure in terms of reliability
Security security infrastructure grow organically as
if too much security introduced

Start simple and try to have the


Infrastructure infrastructure
based on the existing conditions and the
facilities work out that what problems need
to be fixed
help us have a city that is full of technology
but that is white
Figure 1: SIIF Components for considerations

5. SIIF Design Process


In order to have a proposed SIIF, a series of steps were considered. These steps were
derived from some tried and tested theories, strategies and techniques for designing
security framework. The main phases that were borrowed were as outlined by [31]. Of
course, not all of the phases were considered, but the main ones that were borrowed were
the following:
 Detailed reading and classification of related data;
 Key concepts naming and identification;
 Integration of the concepts;
 Classification and categorisation and making sense of the concepts;
 Validation of the framework
The phases enabled the researcher to consider all the relevant information that is
available on smart cities and security within these cities. It was important to unpack the
different services, infrastructure and all information available on smart cities. This
information was obtained through the research methods mentioned earlier in the thesis.
Both secondary and primary data was necessary to assist in enabling the framework
development. It is worth mentioning that, once a city becomes smart, there are a lot of
complexities involved in terms of services, infrastructure and data. This exposes the city to
security challenges, making it difficult to plan to secure such an environment. Additionally,
Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 7 of 10
Information Infrastructure also brings a number of dynamics such as physical, social,
economic and societal aspects, which makes it difficult to have a comprehensive
framework. Such challenges were considered and the researcher had to consider certain
aspects to focus on, without covering everything on the research. The mentioned ones were
appropriate for this study and were therefore considered. The mentioned phases helped the
researcher in formulating a series of steps that were important to derive the SIIF proposed.
It was critical to pick those phases that guided in the framework design and which were also
align and matching with other considered models. The major components of the proposed
framework as per the paper’s objectives are as follows:
Secure Information Infrastructure Components - The proposed framework was
designed following the outlined phases, guided by the findings as explained. The
framework could be termed a 3-in-1 generic framework. This is so, as it accommodates the
views of three categories of research fields and hence is based on ideas from those different
experts. For example, the framework accommodates the views of experts from ICT,
security and Information Infrastructure fields. The main components of the framework
could also be explained as key steps that one could follow in designing such a framework.
In this case, the framework components are explained as follows:
Setting the basis, priorities, stakeholders, governance and citizen engagement –
this means that for any researcher in the field or anyone to consider this framework, there is
need to engage all key stakeholders.
Developing Smart Infrastructure and integrated platform - this aspect was
important, as the second step. After getting the input from different stakeholders, the
research had to consider other possible smart ideas that would work in the context. This
was done through engaging key smart city experts in Namibia. The focus here is on the
infrastructure. The researcher argues that to have smart services, start by having well-
thought out and smart infrastructure that is secure. This makes it easy for deploying
required services. The input at this stage is mainly from expert and ICT service providers.
Identifying and developing smart services – once the infrastructure is available, the
next step is to engage all the key stakeholders to draw up the intended smart services. As
indicated from the findings and also summarised in the framework, the services needed
were outlined. These services are also common in other smart cities and from literature on
smart city services. It is at this stage where the stakeholders must be aware and alerted of
the need to ensure and have all the intended services secure. For the purpose of this
research, smart security is considered as a critical aspect that could be considered first.
Defining key performance indicators, standards and monitoring - when the
stakeholders have been engaged, the integrated platform is set up, smart services are
defined, the next step is to outline the KIPs. This defines the supporting policies on how to
manage, maintain and measure the success. This is important as it shows areas to improve
and changes required. Normally once services are rolled out almost everyone celebrates
and enjoys and no one thinks about maintaining, updating and monitoring. From this study,
a separate team of experts is proposed for monitoring and updating the infrastructure to
maintain a secure environment.
Ensuring accountability and responsibility including data security – For this
framework to be adopted, someone somewhere has to be in charge. There is need to draw
up reporting and related policies on who does what and who is responsible for what? This
is necessary to avoid the blame game. For the citizens to trust and feel secure to use
services, there should be reporting mechanisms and backup strategies in place. Those
responsible for service provision and maintenance should always be alert and aware. This
enables those in charge to respond and react accordingly in case of an emergency.
Having considered all the results, and key components were applied, Figure 2 presents
the proposed SIIF.

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 8 of 10


Figure 2: Proposed secure Information Infrastructure for a smart City

6. Conclusion
The paper has presented the main components of a secure Information Infrastructure
Framework for a smart Windhoek. The results from the participants were very broad and
show the complexity of smart cities. The findings were shared with the key ICT
participants. The recommendations were to propose this framework to be further discussed
with more stakeholders and be implemented in Namibia. We argue that as cities improve
and bring in technologies, an understanding of the security and having the guiding
framework presented will assist. The paper outlines the importance of security within smart
cities. As the City of Windhoek intends to be a smart city by 2022, there is no doubt that
this framework will be referred to and be of use in the Namibian environment. The
presented key components are meant to assist city fathers and smart city stakeholders to
plan and implement sustainable solutions for developing cities. Though the paper focused
on Namibia, it is clear that the finding and proposed framework could be applied in other
countries. We learnt that there has been efforts in developing nations to implement smart
secure solutions. However, numerous ICT challenges are available mainly in the
infrastructure to enable secure smart city development. We have presented a guiding ICT
information Secure infrastructure that could assist developing nations to improve the
security of services.

References
[1]. United Nations. World Urbanization Prospects.2014.
[2]. Group E. Five ICT Essentials for Smart City. 2012.
[3]. L.M Amugongo. Smart Cities: Namibia should not be left out. 2016.

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 9 of 10


[4]. J.H. Lee, M.G. Hancock & M.C. Hu. Towards an effective framework for building smart cities:
Lessons from Seoul and San Francisco. Technol Forecast Soc Change. 2014.
doi:10.1016/j.techfore.2013.08.033
[5]. T. Bakici, E. Almirall, J.A. Wareham. Smart City Initiative: The Case of Barcelona. J Knowl Econ.
2013. doi:10.1007/s13132-012-0084-9
[6]. ITU Report. Setting the stage for Stakeholders engagement in smart sustainable cities. 2012.
[7]. A. Bartoli, J. Hernanádez-Serrano, M. Soriano, M. Dohler, A. Kountouris, & D. Barthel. Secure
lossless aggregation over fading and shadowing channels for smart grid M2M networks. IEEE Trans
Smart Grid. 2011. doi:10.1109/TSG.2011.2162431
[8]. IT Security Report. Namibia Still tops cyber security target attack. 2016.
[9]. S. Zhang S. The role of information and communication technology for smart city Development in
China. 2017.
[10]. City of Windhoek Transformational Strategic Plan 2017-2022. Available at:
http://www.windhoekcc.org.na/documents/066_strategic_plan_final.pdf
[11]. Agency NS. Statistic Report. https://nsa.org.na/. Published 2018.
[12]. Telecom Namibia. Telecom Namibia Annual report. 2014.
[13]. Organisation WH. Digital Solutions for a more viable future. In: Mcknsey Global Institute. ; 2018.
[14]. MITSMED. International Investment Conference in Windhoek, Namibia on November 8-9,. In: ;
2016.
[15]. K. Neirotti, H. De Marco, F. Cagliano, D. Mangano, & J. Scorrano. Introduction: Innovation in the
city and innovative cities. Innov Manag Policy Pract , 10 (2-3), 136-145. 2014.
[16]. T. Nam & T.A. Pardo. Conceptualizing smart city with dimensions of technology, people, and
institutions. In: ACM International Conference Proceeding Series. 2011.
doi:10.1145/2037556.2037602
[17]. V. Landegem. ICT Infrastructure a key enabler for Smart Cities. Alcatel-Lucent . 2012.
[18]. C. Harrison, B. Eckman, R. Hamilton R. Foundations for Smarter Cities. IBM J Res Dev. 2010.
doi:10.1147/JRD.2010.2048257
[19]. N. Komninos, M. Pallot & H. Schaffers. Special Issue on Smart Cities and the Future Internet in
Europe. J Knowl Econ. 2013. doi:10.1007/s13132-012-0083-x
[20]. A. Martinez-Balleste, P.Perez-Martinez, A. Solanas. The pursuit of citizens’ privacy: A privacy-aware
smart city is possible. IEEE Commun Mag. 2013. doi:10.1109/MCOM.2013.6525606
[21]. A.S. Elmaghraby, M.M. Losavio. Cyber security challenges in smart cities: Safety, security and
privacy. J Adv Res. 2014. doi:10.1016/j.jare.2014.02.006
[22]. Symantec Report. Internet Security Threat Report-Symantec. 2016.
[23]. H. Levy-Bencheton & E. Darra. Cyber security for Smart Cities. 2015.

Copyright © 2020 The authors www.IST-Africa.org/Conference2020 Page 10 of 10

You might also like