Smart Cities: A Survey on Data Management, Security, and Enabling Technologies

Ammar Gharaibeh, Mohammad A. Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani*, Ala Al-Fuqaha

*Corresponding author for this work

Research output: Contribution to journalReview articlepeer-review

476 Citations (Scopus)

Abstract

Integrating the various embedded devices and systems in our environment enables an Internet of Things (IoT) for a smart city. The IoT will generate tremendous amount of data that can be leveraged for safety, efficiency, and infotainment applications and services for city residents. The management of this voluminous data through its lifecycle is fundamental to the realization of smart cities. Therefore, in contrast to existing surveys on smart cities we provide a data-centric perspective, describing the fundamental data management techniques employed to ensure consistency, interoperability, granularity, and reusability of the data generated by the underlying IoT for smart cities. Essentially, the data lifecycle in a smart city is dependent on tightly coupled data management with cross-cutting layers of data security and privacy, and supporting infrastructure. Therefore, we further identify techniques employed for data security and privacy, and discuss the networking and computing technologies that enable smart cities. We highlight the achievements in realizing various aspects of smart cities, present the lessons learned, and identify limitations and research challenges.

Original languageEnglish
Article number8003273
Pages (from-to)2456-2501
Number of pages46
JournalIEEE Communications Surveys and Tutorials
Volume19
Issue number4
DOIs
Publication statusPublished - 1 Oct 2017

Keywords

  • Internet of Things (IoT)
  • Smart cities
  • cloud computing
  • data management
  • data security
  • network functions virtualization (NFV)
  • software-defined networking (SDN)

Fingerprint

Dive into the research topics of 'Smart Cities: A Survey on Data Management, Security, and Enabling Technologies'. Together they form a unique fingerprint.

Cite this