IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Artificial Intelligence-Enabled Cybersecurity and Internet of Things Applications in Smart Cities

Artificial Intelligence-Enabled Cybersecurity and Internet of Things Applications in Smart Cities
View Sample PDF
Author(s): Wasswa Shafik (Dig Connectivity Research Laboratory (DCRLab), Kampala, Uganda & School of Digital Science, Universiti Brunei Darussalam, Brunei)
Copyright: 2025
Pages: 34
Source title: Building Tomorrow's Smart Cities With 6G Infrastructure Technology
Source Author(s)/Editor(s): Sushil Kumar Singh (Marwadi University, India), Bal Virdee (London Metropolitan University, UK), Rajendrasinh Jadeja (Marwadi University, India), Sudeep Tanwar (Nirma University, India)and Ashish Khanna (Maharaja Agrasen Institute of Technology, India)
DOI: 10.4018/979-8-3693-8029-1.ch011

Purchase

View Artificial Intelligence-Enabled Cybersecurity and Internet of Things Applications in Smart Cities on the publisher's website for pricing and purchasing information.

Abstract

The rapid adoption of Smart Cities (SCs) has increased reliance on AI-based IoT technologies to enhance smart infrastructure and services, contributing to the UN's sustainable development goals. However, this integration brings significant cybersecurity (CS) challenges, such as DDoS, MITM, phishing, and ransomware attacks. This chapter underscores the importance of CS in SCs, highlighting vulnerabilities and risks. It examines IoT's role in SC infrastructure and services, AI's impact on SC efficiency, and various AI techniques used in SC applications. The chapter analyzes cyberattacks on SC infrastructure, suggesting CS measures like protocols, encryption, authentication techniques, access control, and incident response. AI and IoT integration enhances CS, reducing cyber threats through anomaly detection and real-time data collection for AI-based security solutions. The chapter also presents SC application case studies demonstrating the integration's effectiveness and best practices. It concludes by emphasizing the need for continued research and innovation in SC cybersecurity.

Related Content

Aditi Nag. © 2025. 38 pages.
Kapil Sharma, Nikhil Singh. © 2025. 26 pages.
Kapil Sharma, Rachna Kathuria. © 2025. 14 pages.
Sorabh Gupta, Mitu Sehgal, Rashmi Makkar, Alla Poorna Chandra Reddy, Habib Khan. © 2025. 34 pages.
Yogeshwar Prajapati, Krupali Gosai, Omprakash Suthar, Sushil Kumar Singh, Muhammad Talha Usman, Habib Khan. © 2025. 24 pages.
Aditi Nag, Anurag Singh Rathore. © 2025. 38 pages.
Vishal Jain, Archan Mitra. © 2025. 24 pages.
Body Bottom