Cybersecurity Implementation on Smart Government in Smart City: A Systematic Review

Muhammad Rakha Rafi Baihaqi (1), Sutia Handayani (2), Dana Indra Sensuse (3), Sofian Lusa (4), Prasetyo Adi Wibowo Putro (5), Sofiyanti Indriasari (6)
(1) Faculty of Computer Science, Universitas Indonesia, Depok, Indonesia
(2) Faculty of Computer Science, Universitas Indonesia, Depok, Indonesia
(3) Faculty of Computer Science, Universitas Indonesia, Depok, Indonesia
(4) Master’s degree of Tourism Department, Institut Pariwisata Trisakti, Indonesia
(5) Faculty of Computer Science, Universitas Indonesia, Depok, Indonesia
(6) Faculty of Computer Science, Universitas Indonesia, Depok, Indonesia
Fulltext View | Download
How to cite (IJASEIT) :
Baihaqi, Muhammad Rakha Rafi, et al. “Cybersecurity Implementation on Smart Government in Smart City: A Systematic Review”. International Journal on Advanced Science, Engineering and Information Technology, vol. 14, no. 6, Dec. 2024, pp. 1936-43, doi:10.18517/ijaseit.14.6.19874.
Rapid advances in ICT have now developed in various ways. One of the developments is in Smart Government, which has become a Smart City implementation domain. However, the implementation of a smart government must walk from a cybersecurity point of view to ensure its implementation. This study aims to understand how the implementation of cybersecurity in smart government, especially in smart cities, uses the PRISMA protocol and addresses obstacles and related issues. This approach of PRISMA specifies the implementation of cybersecurity in smart government or cybersecurity in government, smart city, governance, and public service and excludes the duplicate papers that are found in databases. Databases used in this study are Scopus, IEEE Xplore, ACM Digital Library, and ScienceDirect. We found 21 publications that met the criteria and classified the implementation based on the technologies obstacles and issues found in the publications. Based on the classification, the most cybersecurity implementation topic in the smart city was the implementation of an Intrusion Detection System (IDS) in every aspect of the smart city, such as the Fog Layer in Smart city, Smart City Hospital, Internet of Things (IoT), etc. with most publication in 2020 and having incremental from 2022 to 2023. The most concerning obstacle and issue was how to make the availability of the smart city service at a tolerable level when the cybersecurity implementation is implemented. The limitation that occurs in this research is how to address the solution to obstacles and issues from the analysis.

J. S. Gracias, G. S. Parnell, E. Specking, E. A. Pohl, and R. Buchanan, “Smart Cities—A Structured Literature Review,” Smart Cities, vol. 6, no. 4, pp. 1719–1743, Jul. 2023, doi: 10.3390/smartcities6040080.

M. Alamer and M. A. Almaiah, “Cybersecurity in Smart City: A Systematic Mapping Study,” 2021 International Conference on Information Technology (ICIT), pp. 719–724, Jul. 2021, doi:10.1109/icit52682.2021.9491123.

L. Anthopoulos, K. Sirakoulis, and C. G. Reddick, “Conceptualizing Smart Government: Interrelations and Reciprocities with Smart City,” Digital Government: Research and Practice, vol. 2, no. 4, pp. 1–28, Oct. 2021, doi: 10.1145/3465061.

D. K. Fu’adi, A. Arief, D. I. Sensuse, and A. Syahrizal, “Conceptualizing Smart Government Implementation in Smart City Context: A Systematic Review,” 2020 Fifth International Conference on Informatics and Computing (ICIC), pp. 1–7, Nov. 2020, doi:10.1109/icic50835.2020.9288656.

D. Bastos, A. Fernández-Caballero, A. Pereira, and N. P. Rocha, “Smart City Applications to Promote Citizen Participation in City Management and Governance: A Systematic Review,” Informatics, vol. 9, no. 4, p. 89, Oct. 2022, doi: 10.3390/informatics9040089.

A. I. Niculescu, B. Wadhwa, and E. Quek, “Smart City Technologies: Design and Evaluation of An Intelligent Driving Assistant for Smart Parking,” International Journal on Advanced Science, Engineering and Information Technology, vol. 6, no. 6, p. 1096, Dec. 2016, doi:10.18517/ijaseit.6.6.1473.

C. Ma, “Smart city and cyber-security; technologies used, leading challenges and future recommendations,” Energy Reports, vol. 7, pp. 7999–8012, Nov. 2021, doi: 10.1016/j.egyr.2021.08.124.

M. Y. Habib, H. A. Qureshi, S. A. Khan, Z. Mansoor, and A. R. Chishti, “Cybersecurity and Smart Cities: Current Status and Future,” 2023 IEEE International Conference on Emerging Trends in Engineering, Sciences and Technology (ICES&T), pp. 1–7, Jan. 2023, doi: 10.1109/icest56843.2023.10138843.

N. M. Alzahrani and F. A. Alfouzan, “Augmented Reality (AR) and Cyber-Security for Smart Cities—A Systematic Literature Review,” Sensors, vol. 22, no. 7, p. 2792, Apr. 2022, doi: 10.3390/s22072792.

M. J. Page et al., “The PRISMA 2020 statement: an updated guideline for reporting systematic reviews,” BMJ, p. n71, Mar. 2021, doi:10.1136/bmj.n71.

D. Byrne, “A worked example of Braun and Clarke’s approach to reflexive thematic analysis,” Quality & Quantity, vol. 56, no. 3, pp. 1391–1412, Jun. 2021, doi: 10.1007/s11135-021-01182-y.

C.-F. Chiang, S. Sengupta, A. Tekeoglu, J. Novillo, and B. Andriamanalimanana, “A Quantum Assisted Secure Client-Centric Polyvalent Blockchain Architecture for Smart Cities,” 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), pp. 1–6, Jan. 2020, doi: 10.1109/ccnc46108.2020.9045188.

I. Alrashdi, A. Alqazzaz, E. Aloufi, R. Alharthi, M. Zohdy, and H. Ming, “AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning,” 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), pp. 0305–0310, Jan. 2019, doi: 10.1109/ccwc.2019.8666450.

R. I. Minu, G. Nagarajan, A. Munshi, K. Venkatachalam, W. Almukadi, and M. Abouhawwash, “An Edge Based Attack Detection Model (EBAD) for Increasing the Trustworthiness in IoT Enabled Smart City Environment,” IEEE Access, vol. 10, pp. 89499–89508, 2022, doi: 10.1109/access.2022.3200703.

M. Hamdan et al., “A Two-Tier Anomaly-based Intrusion Detection Approach for IoT-Enabled Smart Cities,” IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 1–7, May 2023, doi:10.1109/infocomwkshps57453.2023.10225834.

R. Patan, R. Manikandan, R. Parameshwaran, S. Perumal, M. Daneshmand, and A. H. Gandomi, “Blockchain Security Using Merkle Hash Zero Correlation Distinguisher for the IoT in Smart Cities,” IEEE Internet of Things Journal, vol. 9, no. 19, pp. 19296–19306, Oct. 2022, doi: 10.1109/jiot.2022.3171237.

A. Sharma and H. Babbar, “BoT-IoT: Detection of Attacks in IoT-Cybersecurity for Smart Transportation,” 2023 8th International Conference on Communication and Electronics Systems (ICCES), pp. 522–527, Jun. 2023, doi: 10.1109/icces57224.2023.10192814.

Md. M. Rashid, J. Kamruzzaman, T. Imam, S. Kaisar, and M. J. Alam, “Cyber Attacks Detection from Smart City Applications Using Artificial Neural Network,” 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), pp. 1–6, Dec. 2020, doi: 10.1109/csde50874.2020.9411606.

A. Sinaeepourfard, S. Sengupta, J. Krogstie, and R. R. Delgado, “Cybersecurity in Large-Scale Smart Cities: Novel Proposals for Anomaly Detection from Edge to Cloud,” 2019 International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), pp. 130–135, Dec. 2019, doi:10.1109/iintec48298.2019.9112114.

N. Mohamed, J. Al-Jaroodi, I. Jawhar, and N. Kesserwan, “Data-Driven Security for Smart City Systems: Carving a Trail,” IEEE Access, vol. 8, pp. 147211–147230, 2020, doi:10.1109/access.2020.3015510.

M. S. Tahsin, Md. Y. Aziz, T. A. Kabbo, T. Tahsin, N. haque Zumme, and M. I. Hossain, “Data Security Model Using Deep Learning and Edge Computing for Internet of Things (IoT) in Smart City,” 2021 19th OITS International Conference on Information Technology (OCIT), pp. 381–386, Dec. 2021, doi: 10.1109/ocit53463.2021.00081.

N. Gokul and S. Sankaran, “Identity Based Security Framework For Smart Cities,” 2020 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–4, Dec. 2020, doi: 10.1109/ants50601.2020.9342747.

T. Saba, “Intrusion Detection in Smart City Hospitals using Ensemble Classifiers,” 2020 13th International Conference on Developments in eSystems Engineering (DeSE), pp. 418–422, Dec. 2020, doi:10.1109/dese51703.2020.9450247.

S. Safavat and D. B. Rawat, “On the Elliptic Curve Cryptography for Privacy-Aware Secure ACO-AODV Routing in Intent-Based Internet of Vehicles for Smart Cities,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 8, pp. 5050–5059, Aug. 2021, doi:10.1109/tits.2020.3008361.

V. Mishra, S. S. Yau, and C. Yenugunti, “Recovering Decentralized Critical Archival Data From Tampering in Smart City Environment Using Blockchain,” 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 1972–1977, Aug. 2019, doi: 10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00344.

S. Chakrabarty and D. W. Engels, “Secure Smart Cities Framework Using IoT and AI,” 2020 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), pp. 1–6, Dec. 2020, doi:10.1109/gcaiot51063.2020.9345912.

A. M. Aldabbagh and M. Ilyas, “Smart City GIS Mapping and Analysis of Intrusion Detection,” 2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–4, Sep. 2021, doi:10.1109/icecct52121.2021.9616943.

Ms. D. T. Bennet, Ms. P. S. Bennet, and D. Anitha, “Securing Smart City Networks - Intelligent Detection Of DDoS Cyber Attacks,” 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), pp. 1575–1580, Dec. 2022, doi:10.1109/ic3i56241.2022.10073271.

V. Promyslov and K. Semenkov, “Security Threats for Autonomous and Remotely Controlled Vehicles in Smart City,” 2020 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), pp. 1–5, May 2020, doi:10.1109/icieam48468.2020.9111907.

M. I. Ali and S. Kaur, “The Impact of India’s Cyber Security Law and Cyber Forensic On Building Techno-Centric Smartcity IoT Environment,” 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), pp. 751–759, Feb. 2021, doi: 10.1109/icccis51004.2021.9397243.

K. Haseeb, T. Saba, A. Rehman, Z. Ahmed, H. H. Song, and H. H. Wang, “Trust Management With Fault-Tolerant Supervised Routing for Smart Cities Using Internet of Things,” IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22608–22617, Nov. 2022, doi:10.1109/jiot.2022.3184632.

N. Z. Bawany and J. A. Shamsi, “SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks,” Journal of Network and Computer Applications, vol. 145, p. 102381, Nov. 2019, doi: 10.1016/j.jnca.2019.06.001.

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).