{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T16:23:04Z","timestamp":1774974184063,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:00:00Z","timestamp":1771977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"vor","delay-in-days":34,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Symbiosis International"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-026-00312-y","type":"journal-article","created":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T14:16:38Z","timestamp":1772028998000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A review of cybersecurity in smart cities and intelligent transport systems"],"prefix":"10.1007","volume":"6","author":[{"given":"Sujata","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Akshay","family":"Baviskar","sequence":"additional","affiliation":[]},{"given":"Sarvesh","family":"Rajmane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,25]]},"reference":[{"key":"312_CR1","doi-asserted-by":"publisher","first-page":"100252","DOI":"10.1016\/j.treng.2024.100252","volume":"16","author":"M Elassy","year":"2024","unstructured":"Elassy M, Al Hattab M, Takruri M, Badawi S. Intelligent transportation systems for sustainable smart cities: A review. Transp Eng. 2024;16:100252. https:\/\/doi.org\/10.1016\/j.treng.2024.100252.","journal-title":"Transp Eng"},{"key":"312_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1108\/JGOSS-01-2021-0009","volume":"16","author":"DR Maditati","year":"2023","unstructured":"Maditati DR, Munim ZH, Kummer S, Schramm H-J. Comparing outsourcing outlook of manufacturing firms and logistics service providers in India and DACH countries. J Glob Oper Strateg Sourc. 2023;16:24\u201346. https:\/\/doi.org\/10.1108\/JGOSS-01-2021-0009.","journal-title":"J Glob Oper Strateg Sourc"},{"key":"312_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS58141.2023.10131723","author":"G Hossain","year":"2023","unstructured":"Hossain G, Tarrant J. CyberTMS: A recommendation framework for cognitive transportation cybersecurity management system in the Society 5.0. Proc 11th Int Symp Digit Forensics Secur (ISDFS). 2023. https:\/\/doi.org\/10.1109\/ISDFS58141.2023.10131723. Chattanooga, TN, USA.","journal-title":"Proc 11th Int Symp Digit Forensics Secur (ISDFS)"},{"key":"312_CR4","doi-asserted-by":"publisher","first-page":"805","DOI":"10.32604\/iasc.2022.023771","volume":"34","author":"S Bojjagani","year":"2022","unstructured":"Bojjagani S, Brabin DRD, Saravanan K. Early DDoS detection and prevention with traced back blocking in SDN environment. Intell Autom Soft Comput. 2022;34:805\u201319. https:\/\/doi.org\/10.32604\/iasc.2022.023771.","journal-title":"Intell Autom Soft Comput"},{"key":"312_CR5","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.3390\/smartcities7050096","volume":"7","author":"T Alam","year":"2024","unstructured":"Alam T. Metaverse of Things (MoT) applications for revolutionizing urban living in smart cities. Smart Cities. 2024;7:2466\u201394. https:\/\/doi.org\/10.3390\/smartcities7050096.","journal-title":"Smart Cities"},{"key":"312_CR6","doi-asserted-by":"publisher","first-page":"e1012008","DOI":"10.1371\/journal.pcbi.1012008","volume":"20","author":"J Svoboda","year":"2024","unstructured":"Svoboda J, Joshi S, Tkadlec J, Chatterjee K. Amplifiers of selection for the Moran process with both birth\u2013death and death\u2013birth updating. PLoS Comput Biol. 2024;20:e1012008. https:\/\/doi.org\/10.1371\/journal.pcbi.1012008.","journal-title":"PLoS Comput Biol"},{"key":"312_CR7","doi-asserted-by":"publisher","first-page":"127","DOI":"10.32604\/cmc.2023.042886","volume":"78","author":"K Aurangzeb","year":"2024","unstructured":"Aurangzeb K, et al. Deep learning approach for hand gesture recognition: Applications in deaf communication and healthcare. Comput Mater Contin. 2024;78:127\u201344. https:\/\/doi.org\/10.32604\/cmc.2023.042886.","journal-title":"Comput Mater Contin"},{"key":"312_CR8","doi-asserted-by":"publisher","first-page":"777","DOI":"10.17762\/ijritcc.v11i9s.7968","volume":"11","author":"S Gore","year":"2023","unstructured":"Gore S, Metre KV, Chitte PP, Mahankale N, Gore S, Gore S. Cloud computing for effective cyber security attack detection in smart cities. Int J Recent Innov Trends Comput Commun. 2023;11:777\u201385. https:\/\/doi.org\/10.17762\/ijritcc.v11i9s.7968.","journal-title":"Int J Recent Innov Trends Comput Commun"},{"key":"312_CR9","doi-asserted-by":"publisher","first-page":"3655","DOI":"10.32604\/cmc.2024.054610","volume":"80","author":"M Alharb","year":"2024","unstructured":"Alharb M, Alabdulatif A. Intelligent transport systems: Analysis of applications, security challenges, and robust countermeasures. Comput Mater Contin. 2024;80:3655\u201383. https:\/\/doi.org\/10.32604\/cmc.2024.054610.","journal-title":"Comput Mater Contin"},{"key":"312_CR10","doi-asserted-by":"publisher","first-page":"100715","DOI":"10.1016\/j.iot.2023.100715","volume":"22","author":"A Alotaibi","year":"2023","unstructured":"Alotaibi A, Barnawi A. Securing massive IoT in 6G: Recent solutions, architectures, future directions. Internet Things. 2023;22:100715. https:\/\/doi.org\/10.1016\/j.iot.2023.100715.","journal-title":"Internet Things"},{"key":"312_CR11","doi-asserted-by":"publisher","first-page":"36","DOI":"10.5539\/ijbm.v11n9p36","volume":"11","author":"S Saggese","year":"2016","unstructured":"Saggese S. Governance of industrial districts: Bibliometric and cluster analyses. Int J Bus Manag. 2016;11:36\u201350. https:\/\/doi.org\/10.5539\/ijbm.v11n9p36.","journal-title":"Int J Bus Manag"},{"key":"312_CR12","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/j.jclepro.2019.04.055","volume":"226","author":"M Bartolini","year":"2019","unstructured":"Bartolini M, Calandra D, Castellani V, Vecchio S. Green warehousing: Systematic literature review and bibliometric analysis. J Clean Prod. 2019;226:242\u201358. https:\/\/doi.org\/10.1016\/j.jclepro.2019.04.055.","journal-title":"J Clean Prod"},{"key":"312_CR13","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.scs.2018.02.039","volume":"39","author":"T Braun","year":"2018","unstructured":"Braun T, Fung BCM, Iqbal F, Shah B. Security and privacy challenges in smart cities. Sustain Cities Soc. 2018;39:499\u2013507. https:\/\/doi.org\/10.1016\/j.scs.2018.02.039.","journal-title":"Sustain Cities Soc"},{"key":"312_CR14","doi-asserted-by":"publisher","first-page":"1976","DOI":"10.3390\/su10061976","volume":"10","author":"FJ Garrigos Sim\u00f3n","year":"2018","unstructured":"Garrigos Sim\u00f3n FJ, Narangajavana Kaosiri Y, Lengua Lengua I. Tourism and sustainability: A bibliometric and visualization analysis. Sustainability. 2018;10:1976. https:\/\/doi.org\/10.3390\/su10061976.","journal-title":"Sustainability"},{"key":"312_CR15","doi-asserted-by":"publisher","first-page":"17","DOI":"10.18568\/1980-4865.13117-31","volume":"13","author":"CS Saito","year":"2018","unstructured":"Saito CS, Strehlau VI. Tourist destination choice: A bibliometric study. Internext \u2013 Rev Eletr\u00f4nica Neg\u00f3cios Internacionais. 2018;13:17\u201331. https:\/\/doi.org\/10.18568\/1980-4865.13117-31.","journal-title":"Internext \u2013 Rev Eletr\u00f4nica Neg\u00f3cios Internacionais"},{"key":"312_CR16","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang K, et al. Security and privacy in smart city applications: Challenges and solutions. IEEE Commun Mag. 2017;55:122\u20139. https:\/\/doi.org\/10.1109\/MCOM.2017.1600267CM.","journal-title":"IEEE Commun Mag"},{"key":"312_CR17","doi-asserted-by":"publisher","unstructured":"Kshetri N. Smart cities and the Internet of Things. Cybersecurity Management: An Organizational and Strategic Approach. Univ. Toronto; 2021. https:\/\/doi.org\/10.3138\/9781487531249-018.","DOI":"10.3138\/9781487531249-018"},{"key":"312_CR18","doi-asserted-by":"publisher","first-page":"3681","DOI":"10.3390\/s23073681","volume":"23","author":"K Kim","year":"2023","unstructured":"Kim K, et al. Cybersecurity and cyber forensics for smart cities: A comprehensive literature review and survey. Sensors. 2023;23:3681. https:\/\/doi.org\/10.3390\/s23073681.","journal-title":"Sensors"},{"key":"312_CR19","doi-asserted-by":"publisher","first-page":"100452","DOI":"10.1016\/j.cosrev.2021.100452","volume":"43","author":"K Ahmad","year":"2021","unstructured":"Ahmad K, et al. Developing future human-centered smart cities: Critical analysis of smart city security, interpretability, and ethical challenges. Comput Sci Rev. 2021;43:100452. https:\/\/doi.org\/10.1016\/j.cosrev.2021.100452.","journal-title":"Comput Sci Rev"},{"key":"312_CR20","doi-asserted-by":"publisher","first-page":"102655","DOI":"10.1016\/j.scs.2020.102655","volume":"66","author":"D Chen","year":"2021","unstructured":"Chen D, Wawrzy\u0144ski P, Lv Z. Cyber security in smart cities: A review of deep learning-based applications and case studies. Sustain Cities Soc. 2021;66:102655. https:\/\/doi.org\/10.1016\/j.scs.2020.102655.","journal-title":"Sustain Cities Soc"},{"key":"312_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.58496\/MJCS\/2022\/001","volume":"2","author":"MM Mijwil","year":"2022","unstructured":"Mijwil MM, et al. Cybersecurity challenges in smart cities: An overview and prospects. Mesopotamian J Cybersecur. 2022;2:1\u20134. https:\/\/doi.org\/10.58496\/MJCS\/2022\/001.","journal-title":"Mesopotamian J Cybersecur"},{"key":"312_CR22","doi-asserted-by":"publisher","unstructured":"Van Zoonen L. Data governance and citizen participation in the digital welfare state. Data Policy. 2020;2(E10). https:\/\/doi.org\/10.1017\/dap.2020.10.","DOI":"10.1017\/dap.2020.10"},{"key":"312_CR23","doi-asserted-by":"publisher","first-page":"625","DOI":"10.32604\/cmc.2021.014165","volume":"67","author":"MU Tariq","year":"2021","unstructured":"Tariq MU, et al. Security requirement management for cloud-assisted and Internet of Things\u2013enabled smart city. Comput Mater Contin. 2021;67:625\u201339. https:\/\/doi.org\/10.32604\/cmc.2021.014165.","journal-title":"Comput Mater Contin"},{"key":"312_CR24","doi-asserted-by":"publisher","first-page":"553","DOI":"10.46488\/NEPT.2023.v22i02.002","volume":"22","author":"SC Patil","year":"2023","unstructured":"Patil SC, Gidde MR. RFID and IoT enabled framework to make Pune city an eco-friendly smart city. Nat Environ Pollut Technol. 2023;22:553\u201363. https:\/\/doi.org\/10.46488\/NEPT.2023.v22i02.002.","journal-title":"Nat Environ Pollut Technol"},{"key":"312_CR25","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-981-16-4713-0_10","volume-title":"Soft Computing in Interdisciplinary Sciences","author":"U Chatterjee","year":"2022","unstructured":"Chatterjee U, Ray S. Security issues on IoT communication and evolving solutions. In: Chakraverty S, editor. Soft Computing in Interdisciplinary Sciences. Singapore: Springer; 2022. pp. 247\u201367. https:\/\/doi.org\/10.1007\/978-981-16-4713-0_10."},{"key":"312_CR26","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1111\/spsr.12433","volume":"27","author":"M Dunn Cavelty","year":"2021","unstructured":"Dunn Cavelty M. Hyper-securitization, everyday security practice and technification: Cyber security logics in Switzerland. Swiss Polit Sci Rev. 2021;27:139\u201349. https:\/\/doi.org\/10.1111\/spsr.12433.","journal-title":"Swiss Polit Sci Rev"},{"key":"312_CR27","doi-asserted-by":"publisher","first-page":"5523","DOI":"10.3390\/su15065523","volume":"15","author":"Y Zhang","year":"2023","unstructured":"Zhang Y, Chatterjee P, Mukherjee A. Trust, privacy and security for smart cities. Sustainability. 2023;15:5523. https:\/\/doi.org\/10.3390\/su15065523.","journal-title":"Sustainability"},{"key":"312_CR28","doi-asserted-by":"publisher","first-page":"2792","DOI":"10.3390\/s22072792","volume":"22","author":"NM Alzahrani","year":"2022","unstructured":"Alzahrani NM, Alfouzan FA. Augmented reality (AR) and cyber security for smart cities\u2014A systematic literature review. Sensors. 2022;22:2792. https:\/\/doi.org\/10.3390\/s22072792.","journal-title":"Sensors"},{"key":"312_CR29","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1145\/3406115","volume":"21","author":"A Acar","year":"2021","unstructured":"Acar A, Aksu H, Uluagac AS, Akkaya K. AI-empowered IoT security for smart cities. ACM Trans Internet Technol. 2021;21:520. https:\/\/doi.org\/10.1145\/3406115.","journal-title":"ACM Trans Internet Technol"},{"key":"312_CR30","doi-asserted-by":"publisher","unstructured":"Mishra S, Bhatt V, Singh P. Smart infrastructure in smart cities: Scope and implications for sustainable tourism development. In Sustainable Development Goal Advancement Through Digital Innovation in the Service Sector. IGI Global, 2023. https:\/\/doi.org\/10.4018\/979-8-3693-0650-5.ch010","DOI":"10.4018\/979-8-3693-0650-5.ch010"},{"issue":"1","key":"312_CR31","doi-asserted-by":"publisher","first-page":"2334","DOI":"10.59400\/issc2334","volume":"5","author":"Y Ghaderi","year":"2025","unstructured":"Ghaderi Y, Ghaderi MR. Navigating the future of smart cities: Addressing IoT challenges through blockchain solutions. Inform Syst Smart City. 2025;5(1):2334. https:\/\/doi.org\/10.59400\/issc2334.","journal-title":"Inform Syst Smart City"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-026-00312-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00312-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00312-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T14:28:59Z","timestamp":1774967339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-026-00312-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,25]]},"references-count":31,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["312"],"URL":"https:\/\/doi.org\/10.1007\/s43926-026-00312-y","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,25]]},"assertion":[{"value":"13 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"41"}}