Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Immunity-Empowered Collaboration Security Protection for Mega Smart Cities

Version 1 : Received: 3 May 2024 / Approved: 3 May 2024 / Online: 6 May 2024 (02:25:25 CEST)

How to cite: Lan, K.; Li, J.; Huang, W.; Li, G. Immunity-Empowered Collaboration Security Protection for Mega Smart Cities. Preprints 2024, 2024050190. https://doi.org/10.20944/preprints202405.0190.v1 Lan, K.; Li, J.; Huang, W.; Li, G. Immunity-Empowered Collaboration Security Protection for Mega Smart Cities. Preprints 2024, 2024050190. https://doi.org/10.20944/preprints202405.0190.v1

Abstract

The cyber physical systems of smart cities are facing increasingly severe attack situations, and traditional separate protection methods are difficult to effectively respond to. It is urgent to coordinate public security and network security protection. However, the integration of the two faces many challenges and is a very promising research field. The aim of this study is to investigate technical approaches for the synergy between public safety and cyber security. This paper proposes a smart city safety protection model inspired by the human immune mechanism. It was found that through a three line defense architecture similar to the human immune mechanism, and with the help of certain algorithms and functional middleware modules, public security and network security protection components can be dynamically combined to achieve collaboration. This work has verified through experiments a promising path to effectively resist complicated attack threats intertwined with public safety and cyber security factors.

Keywords

cyber security; cyber physical systems; mega smart cities; public safety; human immune mechanism

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.