Exploring CBD retail performance, recovery and resilience of a smart city following COVID-19
- Fieger, Peter, Prayag, Girish, Dyason, David, Rice, John, Hall, C. Michael
- Authors: Fieger, Peter , Prayag, Girish , Dyason, David , Rice, John , Hall, C. Michael
- Date: 2023
- Type: Text , Journal article
- Relation: Sustainability Vol. 15, no. 10 (2023), p. 8300
- Full Text:
- Reviewed:
- Description: The city of Christchurch, New Zealand, incurred significant damage due to a series of earthquakes in 2010 and 2011. The city had, by the late 2010s, regained economic and social normalcy after a sustained period of rebuilding and economic recovery. Through the concerted rebuilding effort, a modern central business district (CBD) with redesigned infrastructure and amenities was developed. The Christchurch rebuild was underpinned by a commitment of urban planners to an open and connected city, including the use of innovative technologies to gather, use and share data. As was the case elsewhere, the COVID-19 pandemic brought about significant disruptions to social and economic life in Christchurch. Border closures, lockdowns, trading limitations and other restrictions on movement led to changes in traditional consumer behaviors and affected the retail sector’s resilience. In this study, we used CBD pedestrian traffic data gathered from various locations to predict changes in retail spending and identify recovery implications through the lens of retail resilience. We found that the COVID-19 pandemic and its related lockdowns have driven a substantive change in the behavioral patterns of city users. The implications for resilient retail, sustainable policy and further research are explored.
- Authors: Fieger, Peter , Prayag, Girish , Dyason, David , Rice, John , Hall, C. Michael
- Date: 2023
- Type: Text , Journal article
- Relation: Sustainability Vol. 15, no. 10 (2023), p. 8300
- Full Text:
- Reviewed:
- Description: The city of Christchurch, New Zealand, incurred significant damage due to a series of earthquakes in 2010 and 2011. The city had, by the late 2010s, regained economic and social normalcy after a sustained period of rebuilding and economic recovery. Through the concerted rebuilding effort, a modern central business district (CBD) with redesigned infrastructure and amenities was developed. The Christchurch rebuild was underpinned by a commitment of urban planners to an open and connected city, including the use of innovative technologies to gather, use and share data. As was the case elsewhere, the COVID-19 pandemic brought about significant disruptions to social and economic life in Christchurch. Border closures, lockdowns, trading limitations and other restrictions on movement led to changes in traditional consumer behaviors and affected the retail sector’s resilience. In this study, we used CBD pedestrian traffic data gathered from various locations to predict changes in retail spending and identify recovery implications through the lens of retail resilience. We found that the COVID-19 pandemic and its related lockdowns have driven a substantive change in the behavioral patterns of city users. The implications for resilient retail, sustainable policy and further research are explored.
The current and future role of smart street furniture in smart cities
- Nassar, Mohamed, Luxford, Len, Cole, Peter, Oatley, Giles, Koutsakis, Polychronis
- Authors: Nassar, Mohamed , Luxford, Len , Cole, Peter , Oatley, Giles , Koutsakis, Polychronis
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE Communications Magazine Vol. 57, no. 6 (2019), p. 68-73
- Full Text: false
- Reviewed:
- Description: Recently, street furniture, including bins, seats, and bus shelters, has become smart as it has been equipped with environmental sensors, wireless modules, processors, and microcontrollers. Accordingly, smart furniture is expected to become a vital part of the IoT infrastructure and one of the drivers of future smart cities. This work focuses on how smart street furniture can be exploited within the IoT architecture as a basis of recommender systems, toward achieving smart cities' different components. We present and discuss recent relevant work as well as the key challenges and opportunities for future research. We explain that much work is still required when it comes to combining scalability, real-time processing, smart furniture, and recommender systems.
The role of big data analytics in internet of things
- Ahmed, Ejaz, Yaqoob, Ibrar, Hashem, Ibrahim, Khan, Imran, Imran, Muhammad
- Authors: Ahmed, Ejaz , Yaqoob, Ibrar , Hashem, Ibrahim , Khan, Imran , Imran, Muhammad
- Date: 2017
- Type: Text , Journal article
- Relation: Computer Networks Vol. 129, no. (2017), p. 459-471
- Full Text: false
- Reviewed:
- Description: The explosive growth in the number of devices connected to the Internet of Things (IoT) and the exponential increase in data consumption only reflect how the growth of big data perfectly overlaps with that of IoT. The management of big data in a continuously expanding network gives rise to non-trivial concerns regarding data collection efficiency, data processing, analytics, and security. To address these concerns, researchers have examined the challenges associated with the successful deployment of IoT. Despite the large number of studies on big data, analytics, and IoT, the convergence of these areas creates several opportunities for flourishing big data and analytics for IoT systems. In this paper, we explore the recent advances in big data analytics for IoT systems as well as the key requirements for managing big data and for enabling analytics in an IoT environment. We taxonomized the literature based on important parameters. We identify the opportunities resulting from the convergence of big data, analytics, and IoT as well as discuss the role of big data analytics in IoT applications. Finally, several open challenges are presented as future research directions. © 2017 Elsevier B.V. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Muhammad Imran” is provided in this record**
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Mehedi Hassan, Mohammad, Imam, Tasadduq, Wibowo, Santoso, Gordon, Steven, Fortino, Giancarlo
- Authors: Rashid, Md Mamunur , Kamruzzaman, Joarder , Mehedi Hassan, Mohammad , Imam, Tasadduq , Wibowo, Santoso , Gordon, Steven , Fortino, Giancarlo
- Date: 2022
- Type: Text , Journal article
- Relation: Computers and Security Vol. 120, no. (2022), p.
- Full Text: false
- Reviewed:
- Description: Intrusion Detection Systems (IDS) based on deep learning models can identify and mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models, which support the IDS's decision, could be vulnerable to a cyberattack known as adversarial attack. In this type of attack, attackers create adversarial samples by introducing small perturbations to attack samples to trick a trained model into misclassifying them as benign applications. These attacks can cause substantial damage to IoT-based smart city models in terms of device malfunction, data leakage, operational outage and financial loss. To our knowledge, the impact of and defence against adversarial attacks on IDS models in relation to smart city applications have not been investigated yet. To address this research gap, in this work, we explore the effect of adversarial attacks on the deep learning and shallow machine learning models by using a recent IoT dataset and propose a method using adversarial retraining that can significantly improve IDS performance when confronting adversarial attacks. Simulation results demonstrate that the presence of adversarial samples deteriorates the detection accuracy significantly by above 70% while our proposed model can deliver detection accuracy above 99% against all types of attacks including adversarial attacks. This makes an IDS robust in protecting IoT-based smart city services. © 2022 Elsevier Ltd
SmartEdge : An end-to-end encryption framework for an edge-enabled smart city application
- Jan, Mian, Zhang, Wenjing, Usman, Muhammad, Tan, Zhiyuan, Khan, Fazlullah, Luo, Entao
- Authors: Jan, Mian , Zhang, Wenjing , Usman, Muhammad , Tan, Zhiyuan , Khan, Fazlullah , Luo, Entao
- Date: 2019
- Type: Text , Journal article
- Relation: Journal of Network and Computer Applications Vol. 137, no. (2019), p. 1-10
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart cities generates voluminous amounts of data that need to be stored and processed in an efficient manner. Long-haul data transmission to the remote cloud data centers leads to higher delay and bandwidth consumption. In smart cities, the delay-sensitive applications have stringent requirements in term of response time. To reduce latency and bandwidth consumption, edge computing plays a pivotal role. The resource-constrained smart devices at the network core need to offload computationally complex tasks to the edge devices located in their vicinity and have relatively higher resources. In this paper, we propose an end-to-end encryption framework, SmartEdge, for a smart city application by executing computationally complex tasks at the network edge and cloud data centers. Using a lightweight symmetric encryption technique, we establish a secure connection among the smart core devices for multimedia streaming towards the registered and verified edge devices. Upon receiving the data, the edge devices encrypts the multimedia streams, encodes them, and broadcast to the cloud data centers. Prior to the broadcasting, each edge device establishes a secured connection with a data center that relies on the combination of symmetric and asymmetric encryption techniques. In SmartEdge, the execution of a lightweight encryption technique at the resource-constrained smart devices, and relatively complex encryption techniques at the network edge and cloud data centers reduce the resource utilization of the entire network. The proposed framework reduces the response time, security overhead, computational and communication costs, and has a lower end-to-end encryption delay for participating entities. Moreover, the proposed scheme is highly resilient against various adversarial attacks.
- Authors: Jan, Mian , Zhang, Wenjing , Usman, Muhammad , Tan, Zhiyuan , Khan, Fazlullah , Luo, Entao
- Date: 2019
- Type: Text , Journal article
- Relation: Journal of Network and Computer Applications Vol. 137, no. (2019), p. 1-10
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has the potential to transform communities around the globe into smart cities. The massive deployment of sensor-embedded devices in the smart cities generates voluminous amounts of data that need to be stored and processed in an efficient manner. Long-haul data transmission to the remote cloud data centers leads to higher delay and bandwidth consumption. In smart cities, the delay-sensitive applications have stringent requirements in term of response time. To reduce latency and bandwidth consumption, edge computing plays a pivotal role. The resource-constrained smart devices at the network core need to offload computationally complex tasks to the edge devices located in their vicinity and have relatively higher resources. In this paper, we propose an end-to-end encryption framework, SmartEdge, for a smart city application by executing computationally complex tasks at the network edge and cloud data centers. Using a lightweight symmetric encryption technique, we establish a secure connection among the smart core devices for multimedia streaming towards the registered and verified edge devices. Upon receiving the data, the edge devices encrypts the multimedia streams, encodes them, and broadcast to the cloud data centers. Prior to the broadcasting, each edge device establishes a secured connection with a data center that relies on the combination of symmetric and asymmetric encryption techniques. In SmartEdge, the execution of a lightweight encryption technique at the resource-constrained smart devices, and relatively complex encryption techniques at the network edge and cloud data centers reduce the resource utilization of the entire network. The proposed framework reduces the response time, security overhead, computational and communication costs, and has a lower end-to-end encryption delay for participating entities. Moreover, the proposed scheme is highly resilient against various adversarial attacks.
Cloudlet computing : recent advances, taxonomy, and challenges
- Babar, Mohammad, Khan, Muhammad, Ali, Farman, Imran, Muhammad, Shoaib, Muhammad
- Authors: Babar, Mohammad , Khan, Muhammad , Ali, Farman , Imran, Muhammad , Shoaib, Muhammad
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Access Vol. 9, no. (2021), p. 29609-29622
- Full Text:
- Reviewed:
- Description: A cloudlet is an emerging computing paradigm that is designed to meet the requirements and expectations of the Internet of things (IoT) and tackle the conventional limitations of a cloud (e.g., high latency). The idea is to bring computing resources (i.e., storage and processing) to the edge of a network. This article presents a taxonomy of cloudlet applications, outlines cloudlet utilities, and describes recent advances, challenges, and future research directions. Based on the literature, a unique taxonomy of cloudlet applications is designed. Moreover, a cloudlet computation offloading application for augmenting resource-constrained IoT devices, handling compute-intensive tasks, and minimizing the energy consumption of related devices is explored. This study also highlights the viability of cloudlets to support smart systems and applications, such as augmented reality, virtual reality, and applications that require high-quality service. Finally, the role of cloudlets in emergency situations, hostile conditions, and in the technological integration of future applications and services is elaborated in detail. © 2013 IEEE.
- Authors: Babar, Mohammad , Khan, Muhammad , Ali, Farman , Imran, Muhammad , Shoaib, Muhammad
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Access Vol. 9, no. (2021), p. 29609-29622
- Full Text:
- Reviewed:
- Description: A cloudlet is an emerging computing paradigm that is designed to meet the requirements and expectations of the Internet of things (IoT) and tackle the conventional limitations of a cloud (e.g., high latency). The idea is to bring computing resources (i.e., storage and processing) to the edge of a network. This article presents a taxonomy of cloudlet applications, outlines cloudlet utilities, and describes recent advances, challenges, and future research directions. Based on the literature, a unique taxonomy of cloudlet applications is designed. Moreover, a cloudlet computation offloading application for augmenting resource-constrained IoT devices, handling compute-intensive tasks, and minimizing the energy consumption of related devices is explored. This study also highlights the viability of cloudlets to support smart systems and applications, such as augmented reality, virtual reality, and applications that require high-quality service. Finally, the role of cloudlets in emergency situations, hostile conditions, and in the technological integration of future applications and services is elaborated in detail. © 2013 IEEE.
Exploring human mobility for multi-pattern passenger prediction : a graph learning framework
- Kong, Xiangjie, Wang, Kailai, Hou, Mingliang, Xia, Feng, Karmakar, Gour, Li, Jianxin
- Authors: Kong, Xiangjie , Wang, Kailai , Hou, Mingliang , Xia, Feng , Karmakar, Gour , Li, Jianxin
- Date: 2022
- Type: Text , Journal article
- Relation: IEEE Transactions on Intelligent Transportation Systems Vol. 23, no. 9 (2022), p. 16148-16160
- Full Text:
- Reviewed:
- Description: Traffic flow prediction is an integral part of an intelligent transportation system and thus fundamental for various traffic-related applications. Buses are an indispensable way of moving for urban residents with fixed routes and schedules, which leads to latent travel regularity. However, human mobility patterns, specifically the complex relationships between bus passengers, are deeply hidden in this fixed mobility mode. Although many models exist to predict traffic flow, human mobility patterns have not been well explored in this regard. To address this research gap and learn human mobility knowledge from this fixed travel behaviors, we propose a multi-pattern passenger flow prediction framework, MPGCN, based on Graph Convolutional Network (GCN). Firstly, we construct a novel sharing-stop network to model relationships between passengers based on bus record data. Then, we employ GCN to extract features from the graph by learning useful topology information and introduce a deep clustering method to recognize mobility patterns hidden in bus passengers. Furthermore, to fully utilize spatio-temporal information, we propose GCN2Flow to predict passenger flow based on various mobility patterns. To the best of our knowledge, this paper is the first work to adopt a multi-pattern approach to predict the bus passenger flow by taking advantage of graph learning. We design a case study for optimizing routes. Extensive experiments upon a real-world bus dataset demonstrate that MPGCN has potential efficacy in passenger flow prediction and route optimization. © 2000-2011 IEEE.
- Authors: Kong, Xiangjie , Wang, Kailai , Hou, Mingliang , Xia, Feng , Karmakar, Gour , Li, Jianxin
- Date: 2022
- Type: Text , Journal article
- Relation: IEEE Transactions on Intelligent Transportation Systems Vol. 23, no. 9 (2022), p. 16148-16160
- Full Text:
- Reviewed:
- Description: Traffic flow prediction is an integral part of an intelligent transportation system and thus fundamental for various traffic-related applications. Buses are an indispensable way of moving for urban residents with fixed routes and schedules, which leads to latent travel regularity. However, human mobility patterns, specifically the complex relationships between bus passengers, are deeply hidden in this fixed mobility mode. Although many models exist to predict traffic flow, human mobility patterns have not been well explored in this regard. To address this research gap and learn human mobility knowledge from this fixed travel behaviors, we propose a multi-pattern passenger flow prediction framework, MPGCN, based on Graph Convolutional Network (GCN). Firstly, we construct a novel sharing-stop network to model relationships between passengers based on bus record data. Then, we employ GCN to extract features from the graph by learning useful topology information and introduce a deep clustering method to recognize mobility patterns hidden in bus passengers. Furthermore, to fully utilize spatio-temporal information, we propose GCN2Flow to predict passenger flow based on various mobility patterns. To the best of our knowledge, this paper is the first work to adopt a multi-pattern approach to predict the bus passenger flow by taking advantage of graph learning. We design a case study for optimizing routes. Extensive experiments upon a real-world bus dataset demonstrate that MPGCN has potential efficacy in passenger flow prediction and route optimization. © 2000-2011 IEEE.
Zero-Touch Network Security (ZTNS) : a network intrusion detection system based on deep learning
- Qazi, Emad-Ul-Haq, Zia, Tanveer, Hamza Faheem, Muhammad, Shahzad, Khurram, Imran, Muhammad, Ahmed, Zeeshan
- Authors: Qazi, Emad-Ul-Haq , Zia, Tanveer , Hamza Faheem, Muhammad , Shahzad, Khurram , Imran, Muhammad , Ahmed, Zeeshan
- Date: 2024
- Type: Text , Journal article
- Relation: IEEE Access Vol. 12, no. (2024), p. 141625-141638
- Full Text:
- Reviewed:
- Description: The rapid evaluation of smart cities has revolutionized the research and development field to a very extensive level which presents challenges in handling massive amounts of data. However, the integration of IoT into various aspects of life has introduced various challenges related to the security and privacy of IoT systems. IoT sensors capture large volumes of sensitive customer data, which can potentially make them a target and pose serious threats, including financial loss and identity theft. Strong intrusion detection systems are essential for protecting networked, data-driven ecosystems from potential cyber threats. In this paper, we propose a novel deep learning-based approach that focuses on emerging zero-Touch networks that autonomously manage network resources to ensure network security, the proposed approach identifies various network intrusions such as DDoS, Botnet, Brute force, and Infiltration. Our proposed approach presents a major improvement in IoT security. We have used the CICIDS-2018 benchmark dataset and propose a deep learning-based network intrusion detection System for Zero Touch Networks (DL-NIDS-ZTN). The proposed study utilizes convolutional neural networks that correctly identify benign and malicious traffic and achieve 99.80% accuracy with the CICIDS-2018 dataset. By implementing the DL-NIDS-ZTN methodology, we aim to strengthen the security framework of smart cities and ensure the secure and seamless integration of IoT. © 2013 IEEE.
- Authors: Qazi, Emad-Ul-Haq , Zia, Tanveer , Hamza Faheem, Muhammad , Shahzad, Khurram , Imran, Muhammad , Ahmed, Zeeshan
- Date: 2024
- Type: Text , Journal article
- Relation: IEEE Access Vol. 12, no. (2024), p. 141625-141638
- Full Text:
- Reviewed:
- Description: The rapid evaluation of smart cities has revolutionized the research and development field to a very extensive level which presents challenges in handling massive amounts of data. However, the integration of IoT into various aspects of life has introduced various challenges related to the security and privacy of IoT systems. IoT sensors capture large volumes of sensitive customer data, which can potentially make them a target and pose serious threats, including financial loss and identity theft. Strong intrusion detection systems are essential for protecting networked, data-driven ecosystems from potential cyber threats. In this paper, we propose a novel deep learning-based approach that focuses on emerging zero-Touch networks that autonomously manage network resources to ensure network security, the proposed approach identifies various network intrusions such as DDoS, Botnet, Brute force, and Infiltration. Our proposed approach presents a major improvement in IoT security. We have used the CICIDS-2018 benchmark dataset and propose a deep learning-based network intrusion detection System for Zero Touch Networks (DL-NIDS-ZTN). The proposed study utilizes convolutional neural networks that correctly identify benign and malicious traffic and achieve 99.80% accuracy with the CICIDS-2018 dataset. By implementing the DL-NIDS-ZTN methodology, we aim to strengthen the security framework of smart cities and ensure the secure and seamless integration of IoT. © 2013 IEEE.
Cyberattacks detection in iot-based smart city applications using machine learning techniques
- Rashid, Md Mamunur, Kamruzzaman, Joarder, Hassan, Mohammad, Imam, Tasadduq, Gordon, Steven
- Authors: Rashid, Md Mamunur , Kamruzzaman, Joarder , Hassan, Mohammad , Imam, Tasadduq , Gordon, Steven
- Date: 2020
- Type: Text , Journal article
- Relation: International Journal of Environmental Research and Public Health Vol. 17, no. 24 (2020), p. 1-21
- Full Text:
- Reviewed:
- Description: In recent years, the widespread deployment of the Internet of Things (IoT) applications has contributed to the development of smart cities. A smart city utilizes IoT-enabled technologies, communications and applications to maximize operational efficiency and enhance both the service providers’ quality of services and people’s wellbeing and quality of life. With the growth of smart city networks, however, comes the increased risk of cybersecurity threats and attacks. IoT devices within a smart city network are connected to sensors linked to large cloud servers and are exposed to malicious attacks and threats. Thus, it is important to devise approaches to prevent such attacks and protect IoT devices from failure. In this paper, we explore an attack and anomaly detection technique based on machine learning algorithms (LR, SVM, DT, RF, ANN and KNN) to defend against and mitigate IoT cybersecurity threats in a smart city. Contrary to existing works that have focused on single classifiers, we also explore ensemble methods such as bagging, boosting and stacking to enhance the performance of the detection system. Additionally, we consider an integration of feature selection, cross-validation and multi-class classification for the discussed domain, which has not been well considered in the existing literature. Experimental results with the recent attack dataset demonstrate that the proposed technique can effectively identify cyberattacks and the stacking ensemble model outperforms comparable models in terms of accuracy, precision, recall and F1-Score, implying the promise of stacking in this domain. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.
- Authors: Rashid, Md Mamunur , Kamruzzaman, Joarder , Hassan, Mohammad , Imam, Tasadduq , Gordon, Steven
- Date: 2020
- Type: Text , Journal article
- Relation: International Journal of Environmental Research and Public Health Vol. 17, no. 24 (2020), p. 1-21
- Full Text:
- Reviewed:
- Description: In recent years, the widespread deployment of the Internet of Things (IoT) applications has contributed to the development of smart cities. A smart city utilizes IoT-enabled technologies, communications and applications to maximize operational efficiency and enhance both the service providers’ quality of services and people’s wellbeing and quality of life. With the growth of smart city networks, however, comes the increased risk of cybersecurity threats and attacks. IoT devices within a smart city network are connected to sensors linked to large cloud servers and are exposed to malicious attacks and threats. Thus, it is important to devise approaches to prevent such attacks and protect IoT devices from failure. In this paper, we explore an attack and anomaly detection technique based on machine learning algorithms (LR, SVM, DT, RF, ANN and KNN) to defend against and mitigate IoT cybersecurity threats in a smart city. Contrary to existing works that have focused on single classifiers, we also explore ensemble methods such as bagging, boosting and stacking to enhance the performance of the detection system. Additionally, we consider an integration of feature selection, cross-validation and multi-class classification for the discussed domain, which has not been well considered in the existing literature. Experimental results with the recent attack dataset demonstrate that the proposed technique can effectively identify cyberattacks and the stacking ensemble model outperforms comparable models in terms of accuracy, precision, recall and F1-Score, implying the promise of stacking in this domain. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.
- «
- ‹
- 1
- ›
- »