Simulation of IoT-based Smart City of Darwin: Leading Cyber Attacks and Prevention Techniques

Shujahat Ali Khan, Jawahar Sundaram, Mario Palendeng, Sami Azam, Bharanidharan Shanmugam

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedingspeer-review

Abstract

The Rise of the Internet of Things (IoT) technology made the world smarter as it has embedded deeply in several application areas such as manufacturing, homes, cities, and health etc. In the developed cities, millions of IoT devices are deployed to enhance the lifestyle of citizens. IoT devices increases the efficiency and productivity with time and cost efficiency in smart cities, on the other hand, also set an attractive often easy targets for cybercriminals by exposing a wide variety of vulnerabilities. Cybersecurity risks, if ignored can results as very high cost to the citizens and management as well. In this research, simulated IoT network of Darwin CBD has been used with different IoT simulation tools. The treacherous effects of vulnerable IoT environment are demonstrated in this research followed by implementation of security measures to avoid the illustrated threats.

Original languageEnglish
Title of host publication2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
Place of PublicationNew Jersey, USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1-9
Number of pages9
Edition1
ISBN (Electronic)9798350335095
DOIs
Publication statusPublished - Nov 2023
Event14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023 - Delhi, India
Duration: 6 Jul 20238 Jul 2023

Publication series

Name2023 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023

Conference

Conference14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
Country/TerritoryIndia
CityDelhi
Period6/07/238/07/23

Fingerprint

Dive into the research topics of 'Simulation of IoT-based Smart City of Darwin: Leading Cyber Attacks and Prevention Techniques'. Together they form a unique fingerprint.

Cite this