Modeling User-Centric Threats in Smart City: A Hybrid Threat Modeling Method

被引:0
|
作者
Koban, Coco [1 ]
Falaleyeva, Maryia [1 ]
Spravtseva, Maria [1 ]
Moiseev, Roman [1 ]
Khan, Sajjad [2 ]
机构
[1] Vienna Univ Econ & Business, Inst Distributed Ledgers & Token Econ, Vienna, Austria
[2] Vienna Univ Econ & Business, Res Inst Cryptoecon, Vienna, Austria
关键词
Blockchain; IoT; Security; Privacy; Hybrid threat modeling; Smart city; SECURITY; ARCHITECTURE; BLOCKCHAINS; SYSTEMS;
D O I
10.1109/AICCSA56895.2022.10017885
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The ever-changing technological trends form the basis of smart cities. The integration of blockchain in a smart city architecture can solve the increasing economic and social problems that negatively impact human life. On one hand, the smart cities are effectively improving the living standards of the citizens. On the other hand, the data gathering, processing and storing requirements of such technologies raise various security and privacy issues. Therefore, we aim to investigate the threats related to the privacy and security of users in a blockchain-based smart city. We use a hybrid threat modeling technique to investigate user-centric threats in a smart city architecture. For the threat analysis, we leverage NetObjex as our smart city use case. Our threat assessment unveils six different types of threats that are critical to the safety and well-being of residents in a smart city.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] A Smart User-Centric Visible Light Communication system
    Gupta, Yash
    Bansal, Ashutosh
    Singh, Anand
    Bohara, Vivek Ashok
    Srivastava, Anand
    Joshi, Khagendra
    13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS), 2019,
  • [22] A Smart User-Centric Visible Light Communication System
    Singh, Anand
    Gupta, Yash
    Bansal, Ashutosh
    Srivastava, Anand
    Bohara, Vivek Ashok
    Jagadeesan, Anand Kumar
    2020 22ND INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON 2020), 2020,
  • [23] User-Centric View of Smart Attacks in Wireless Networks
    Xie, Caixia
    Xiao, Liang
    2016 IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS WIRELESS BROADBAND (ICUWB2016), 2016,
  • [24] User-Centric Protection and Privacy in Smart Surveillance Systems
    Vagts, Hauke
    Krempel, Erik
    Beyerer, Juergen
    FUTURE SECURITY, 2012, 318 : 237 - +
  • [25] An Argument for More User-Centric Analysis of Modeling Languages' Visual Notation Quality
    van der Linden, Dirk
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2015, 2015, 215 : 114 - 120
  • [26] An Envisioned Approach for Modeling and Supporting User-Centric Query Activities on Data Warehouses
    Aufaure, Marie-Aude
    Cuzzocrea, Alfredo
    Favre, Cecile
    Marcel, Patrick
    Missaoui, Rokia
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2013, 9 (02) : 89 - 109
  • [27] Modeling user-generated contents: an intelligent state machine for user-centric search support
    Neil Y. Yen
    James J. (Jong Hyuk) Park
    Qun Jin
    Timothy K. Shih
    Personal and Ubiquitous Computing, 2013, 17 : 1731 - 1739
  • [28] Data Security and Threat Modeling for Smart City Infrastructure
    Wang, Paul
    Ali, Amjad
    Kelly, William
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [29] Modeling and Analysis of User-Centric Collaborative Millimeter-Wave Cellular Networks
    Yang, Lihua
    Zhao, Junhui
    Gong, Yi
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [30] Modeling user-generated contents: an intelligent state machine for user-centric search support
    Yen, Neil Y.
    Park, James J.
    Jin, Qun
    Shih, Timothy K.
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (08) : 1731 - 1739