Abstract
We hear every day about new services and applications that citizens can use for different purposes and needs around the world in real time every day. Digital innovations in the software and applications of information systems used by the information society have contributed to this rapid development. At the same time, the rapid technological development of new terminals as well as new smart devices and sensors has made it possible to develop and offer completely new services to citizens. In the digitalising intelligent society of the future, there is also a need for various services that can be used by service developers, administrators, responsible organizations, and stakeholders to maintain and develop the infrastructures of the intelligent society and related services. Although the development of the digital world is a positive thing, there is another side to the story. There are many security threats in this kind of environments. The latest challenges for the operating environment are heterogeneous tele-communication networks where new devices and systems are seamlessly interconnected. These systems are now coming into smart homes, smart buildings and into marketplaces, into smart hospitals, ships terminals, airports, train stations, open areas, cars, trains and various control and energy systems. This paper describes a society where all important functions interact with each other through digital networks. The paper provides a technical outlook and enterprise architecture level pictures of smart cities infrastructures for the developers and to the designers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hummelholm A (2018) Cyber threat analysis in smart city environments. In: ECCWS 2018: proceedings of the 17th European conference on cyber warfare and security. Academic Conferences International, pp 523–532
IEC (2014) Orchestrating infrastructure for sustainable smart cities. White paper, international electrotechnical commission (IEC), Geneva
SmartCitiesCouncil (2014) Smart cities readiness guide: the planning manual for building tomorrow’s cities today. Smart cities council
Beecham (2021) M2M sector map. Beecham research limited, http://www.beechamresearch.com/download.aspx?id=18
Dragon1-open (2021) Dragon1: enterprise architecture for business & AI strategy operations. Dragon1. https://www.dragon1.com/
QFD (2021) What is QFD? QFD institute. http://www.qfdi.org/what_is_qfd/what_is_qfd.htm
Limnéll J, Majewski K, Salminen M (2014) Kyberturvallisuus. Docendo, Jyväskylä
Hummelholm A (2019a) E-health systems in digital environments. In ECCWS 2019: proceedings of the 18th European conference on cyber warfare and security. Academic Conferences International, pp 641–649
CBS (2021) The threats arising from the massive SolarWinds hack. CBS News. https://www.cbsnews.com/news/the-threats-arising-from-the-massive-solarwinds-hack/
Gewirtz D (2021) Capitol attack’s cybersecurity fallout: Stolen laptops, lost data, and possible espionage. ZDNet. https://www.zdnet.com/article/capitol-attacks-cybersecurity-fallout-stolen-laptops-lost-data-and-possible-espionage/?ftag=TRE49e8aa0&bhid=28833051404489225364079286182842&mid=13233595&cid=2176286718
3GPP (2019) Release 15. 3rd Generation Partnership Project (3GPP). https://www.3gpp.org/release-15
5G-PPP (2016) View on 5G architecture. Version 1.0, 5G PPP Architecture Working Group
Hummelholm A (2020) Threat characterization for various layers of infrastructure. In: Cyberse-security and resilience in the Arctic. IOS Press, pp 150–182
EC (2012). Directive 2012/27/EU of the European Parliament and of the Council of 25 October 2012 on energy efficiency, amending Directives 2009/125/EC and 2010/30/EU and repealing Directives 2004/8/EC and 2006/32/EC
EU (2016a) NIS, directive concerning measures for a high common level of security of network and information systems across the Union. Directive (EU) 2016/1148, European Parliament and Council
EU (2016b) GDPR, regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. Regulation (EU) 2016/679, European parliament and council
Hummelholm A (2019c) Cyber security and energy efficiency in the infrastructures of smart societies. JYU dissertations, 173. University of Jyväskylä, Jyväskylä
EPA (2020) Greenhouse gas equivalencies calculator. U.S. environmental protection agency. https://www.epa.gov/energy/greenhouse-gas-equivalencies-calculator
RF-WW (2021) IoT wireless technologies or IoT wireless standards. RF wireless world. https://www.rfwireless-world.com/Terminology/IoT-wireless-technologies.html
EU (2017) Regulation on medical devices. European parliament and council of the European union
5G-IA (2015) 5G and e-health. 5G infrastructure association (5G IA). https://5g-ppp.eu/wp-content/uploads/2016/02/5G-PPP-White-Paper-on-eHealth-vertical-Sector.pdf
Klosowski T, Murphy D (2020) What is tor and why should i use it? Lifehacker. https://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029
Tanase S (2015) Satellite Turla: APT command and control in the sky. Kaspersky. https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/
Cann A, Dimitriou K, Hooley T (2011) Social media: a guide for researchers. Research Information Network, London
Mohney G (2017) Hospitals remain key targets as ransomware attacks expected to increase. ABC News. https://abcnews.go.com/Health/hospitals-remain-key-targets-ransomware-attacks-expected-increase/story?id=47416989
Palmer D (2018) IoT security warning: Cyber-attacks on medical devices could put patients at risk. ZDNet. https://www.zdnet.com/article/iot-security-warning-cyber-attacks-on-medical-devices-could-put-patients-at-risk/
Davis J (2019) Hackers targeting healthcare with financially motivated cyberattacks. Xtelligent healthcare media. https://healthitsecurity.com/news/hackers-targeting-healthcare-with-finan-cially-motivated-cyberattacks
Piggin R (2017) Cybersecurity of medical devices: addressing patient safety and the security of patient health information. BSI, London
Lehto M (2015) Phenomena in the cyber world. In: Lehto M, Neittaanmäki P (eds) Cyber security: analytics, technology and automation. Springer, Cham, pp 3–29
METIS (2020) The METIS 2020 project. https://metis2020.com/
Santos JF, Liu W, Jiao X, Neto NV, Pollin S, Marquez-Barja JM, Moerman I, DaSilva LA (2020) Breaking down network slicing: hierarchical orchestration of end-to-end networks. IEEE Commun Mag 58(10):16–22
Zhou Y, Tian L, Liu L, Qi Y (2019) Fog computing enabled future mobile communication networks: a convergence of communication and computing. IEEE Commun Mag 57(5):20–27
Yao M, Sohul M, Marojevic V, Reed JH (2019) Artificial intelligence defined 5G radio access networks. IEEE Commun Mag 57(3):14–20
Wang P, Liu JC (2014) Threat analysis of cyber-attacks with attack tree+. J Inf Hiding Multimedia Signal Process 5(4):778–788
Hummelholm A (2019b) Undersea optical cable network and cyber threats. In: ECCWS 2019: proceedings of the 18th European conference on cyber warfare and security. Academic conferences international, pp 650–659
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Hummelholm, A. (2022). Future Smart Societies’ Infrastructures and Services in the Cyber Environments. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security. Computational Methods in Applied Sciences, vol 56. Springer, Cham. https://doi.org/10.1007/978-3-030-91293-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-91293-2_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-91292-5
Online ISBN: 978-3-030-91293-2
eBook Packages: Computer ScienceComputer Science (R0)