End Node Security and Trust vulnerabilities in the Smart City Infrastructure
As cities gradually introduce intelligence in their core services and infrastructure thus becoming “smart cities”, they are deploying new Information Technology devices in the urban grid that are interconnected to a broad network. The main focus of widely implemented smart cities' services was...
Main Authors: | Fournaris Apostolos P., Lampropoulos Konstantinos, Koufopavlou Odysseas |
---|---|
Format: | Article |
Language: | English |
Published: |
EDP Sciences
2018-01-01
|
Series: | MATEC Web of Conferences |
Online Access: | https://doi.org/10.1051/matecconf/201818805005 |
Similar Items
-
Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices
by: Apostolos P. Fournaris, et al.
Published: (2020-05-01) -
Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks
by: Apostolos P. Fournaris, et al.
Published: (2017-07-01) -
Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers
by: Charis Dimopoulos, et al.
Published: (2021-08-01) -
Mobile Communications World: Security Implementations Aspects - A State of the Art
by: Nicolas Sklavos, et al.
Published: (2003-10-01) -
Security of smart city network infrastructures : design and implementation : application to “Sunrise – Smart City” Demonstrator
by: Semaan Nasr, Elie
Published: (2017)