Skip to main content

Future Smart Societies’ Infrastructures and Services in the Cyber Environments

  • Chapter
  • First Online:
Cyber Security

Part of the book series: Computational Methods in Applied Sciences ((COMPUTMETHODS,volume 56))

  • 2042 Accesses

Abstract

We hear every day about new services and applications that citizens can use for different purposes and needs around the world in real time every day. Digital innovations in the software and applications of information systems used by the information society have contributed to this rapid development. At the same time, the rapid technological development of new terminals as well as new smart devices and sensors has made it possible to develop and offer completely new services to citizens. In the digitalising intelligent society of the future, there is also a need for various services that can be used by service developers, administrators, responsible organizations, and stakeholders to maintain and develop the infrastructures of the intelligent society and related services. Although the development of the digital world is a positive thing, there is another side to the story. There are many security threats in this kind of environments. The latest challenges for the operating environment are heterogeneous tele-communication networks where new devices and systems are seamlessly interconnected. These systems are now coming into smart homes, smart buildings and into marketplaces, into smart hospitals, ships terminals, airports, train stations, open areas, cars, trains and various control and energy systems. This paper describes a society where all important functions interact with each other through digital networks. The paper provides a technical outlook and enterprise architecture level pictures of smart cities infrastructures for the developers and to the designers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Hummelholm A (2018) Cyber threat analysis in smart city environments. In: ECCWS 2018: proceedings of the 17th European conference on cyber warfare and security. Academic Conferences International, pp 523–532

    Google Scholar 

  2. IEC (2014) Orchestrating infrastructure for sustainable smart cities. White paper, international electrotechnical commission (IEC), Geneva

    Google Scholar 

  3. SmartCitiesCouncil (2014) Smart cities readiness guide: the planning manual for building tomorrow’s cities today. Smart cities council

    Google Scholar 

  4. Beecham (2021) M2M sector map. Beecham research limited, http://www.beechamresearch.com/download.aspx?id=18

  5. Dragon1-open (2021) Dragon1: enterprise architecture for business & AI strategy operations. Dragon1. https://www.dragon1.com/

  6. QFD (2021) What is QFD? QFD institute. http://www.qfdi.org/what_is_qfd/what_is_qfd.htm

  7. Limnéll J, Majewski K, Salminen M (2014) Kyberturvallisuus. Docendo, Jyväskylä

    Google Scholar 

  8. Hummelholm A (2019a) E-health systems in digital environments. In ECCWS 2019: proceedings of the 18th European conference on cyber warfare and security. Academic Conferences International, pp 641–649

    Google Scholar 

  9. CBS (2021) The threats arising from the massive SolarWinds hack. CBS News. https://www.cbsnews.com/news/the-threats-arising-from-the-massive-solarwinds-hack/

  10. Gewirtz D (2021) Capitol attack’s cybersecurity fallout: Stolen laptops, lost data, and possible espionage. ZDNet. https://www.zdnet.com/article/capitol-attacks-cybersecurity-fallout-stolen-laptops-lost-data-and-possible-espionage/?ftag=TRE49e8aa0&bhid=28833051404489225364079286182842&mid=13233595&cid=2176286718

  11. 3GPP (2019) Release 15. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/release-15

  12. 5G-PPP (2016) View on 5G architecture. Version 1.0, 5G PPP Architecture Working Group

    Google Scholar 

  13. Hummelholm A (2020) Threat characterization for various layers of infrastructure. In: Cyberse-security and resilience in the Arctic. IOS Press, pp 150–182

    Google Scholar 

  14. EC (2012). Directive 2012/27/EU of the European Parliament and of the Council of 25 October 2012 on energy efficiency, amending Directives 2009/125/EC and 2010/30/EU and repealing Directives 2004/8/EC and 2006/32/EC

    Google Scholar 

  15. EU (2016a) NIS, directive concerning measures for a high common level of security of network and information systems across the Union. Directive (EU) 2016/1148, European Parliament and Council

    Google Scholar 

  16. EU (2016b) GDPR, regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Regulation (EU) 2016/679, European parliament and council

    Google Scholar 

  17. Hummelholm A (2019c) Cyber security and energy efficiency in the infrastructures of smart societies. JYU dissertations, 173. University of Jyväskylä, Jyväskylä

    Google Scholar 

  18. EPA (2020) Greenhouse gas equivalencies calculator. U.S. environmental protection agency. https://www.epa.gov/energy/greenhouse-gas-equivalencies-calculator

  19. RF-WW (2021) IoT wireless technologies or IoT wireless standards. RF wireless world. https://www.rfwireless-world.com/Terminology/IoT-wireless-technologies.html

  20. EU (2017) Regulation on medical devices. European parliament and council of the European union

    Google Scholar 

  21. 5G-IA (2015) 5G and e-health. 5G infrastructure association (5G IA). https://5g-ppp.eu/wp-content/uploads/2016/02/5G-PPP-White-Paper-on-eHealth-vertical-Sector.pdf

  22. Klosowski T, Murphy D (2020) What is tor and why should i use it? Lifehacker. https://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029

  23. Tanase S (2015) Satellite Turla: APT command and control in the sky. Kaspersky. https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/

  24. Cann A, Dimitriou K, Hooley T (2011) Social media: a guide for researchers. Research Information Network, London

    Google Scholar 

  25. Mohney G (2017) Hospitals remain key targets as ransomware attacks expected to increase. ABC News. https://abcnews.go.com/Health/hospitals-remain-key-targets-ransomware-attacks-expected-increase/story?id=47416989

  26. Palmer D (2018) IoT security warning: Cyber-attacks on medical devices could put patients at risk. ZDNet. https://www.zdnet.com/article/iot-security-warning-cyber-attacks-on-medical-devices-could-put-patients-at-risk/

  27. Davis J (2019) Hackers targeting healthcare with financially motivated cyberattacks. Xtelligent healthcare media. https://healthitsecurity.com/news/hackers-targeting-healthcare-with-finan-cially-motivated-cyberattacks

  28. Piggin R (2017) Cybersecurity of medical devices: addressing patient safety and the security of patient health information. BSI, London

    Google Scholar 

  29. Lehto M (2015) Phenomena in the cyber world. In: Lehto M, Neittaanmäki P (eds) Cyber security: analytics, technology and automation. Springer, Cham, pp 3–29

    Chapter  Google Scholar 

  30. METIS (2020) The METIS 2020 project. https://metis2020.com/

  31. Santos JF, Liu W, Jiao X, Neto NV, Pollin S, Marquez-Barja JM, Moerman I, DaSilva LA (2020) Breaking down network slicing: hierarchical orchestration of end-to-end networks. IEEE Commun Mag 58(10):16–22

    Article  Google Scholar 

  32. Zhou Y, Tian L, Liu L, Qi Y (2019) Fog computing enabled future mobile communication networks: a convergence of communication and computing. IEEE Commun Mag 57(5):20–27

    Article  Google Scholar 

  33. Yao M, Sohul M, Marojevic V, Reed JH (2019) Artificial intelligence defined 5G radio access networks. IEEE Commun Mag 57(3):14–20

    Article  Google Scholar 

  34. Wang P, Liu JC (2014) Threat analysis of cyber-attacks with attack tree+. J Inf Hiding Multimedia Signal Process 5(4):778–788

    Google Scholar 

  35. Hummelholm A (2019b) Undersea optical cable network and cyber threats. In: ECCWS 2019: proceedings of the 18th European conference on cyber warfare and security. Academic conferences international, pp 650–659

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aarne Hummelholm .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hummelholm, A. (2022). Future Smart Societies’ Infrastructures and Services in the Cyber Environments. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security. Computational Methods in Applied Sciences, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-030-91293-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91293-2_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-91292-5

  • Online ISBN: 978-3-030-91293-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics