{"id":20680,"date":"2017-12-20T16:44:33","date_gmt":"2017-12-21T00:44:33","guid":{"rendered":"https:\/\/www.rambus.com\/?page_id=20680"},"modified":"2020-03-05T13:31:35","modified_gmt":"2020-03-05T21:31:35","slug":"smart-cities","status":"publish","type":"page","link":"https:\/\/www.rambus.com\/iot\/smart-cities\/","title":{"rendered":"Smart Cities: Threats and Countermeasures"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20680\" class=\"elementor elementor-20680\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-add4bcc elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"add4bcc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a1336fc\" data-id=\"a1336fc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b9955fd elementor-widget elementor-widget-breadcrumbs\" data-id=\"b9955fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.rambus.com\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5d1a5c7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5d1a5c7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d77660\" data-id=\"9d77660\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f4de058 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f4de058\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8be23b0\" data-id=\"8be23b0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-795a60b elementor-widget elementor-widget-text-editor\" data-id=\"795a60b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Smart Cities: Threat and Countermeasures<\/h1><p>Billions of connected \u2018things\u2019 are deployed in smart cities around the world. The rise of the Internet of Things (IoT) exposes a wide range of vulnerabilities that can be exploited by cyber criminals and other malicious actors. Although smart cities are designed to increase productivity and ef\ufb01ciency, they can potentially present serious risks for residents and authorities when cyber security is neglected. There are an unknown number of potential vulnerabilities and methodologies, some of the most common attacks include:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-948ad87 elementor-widget elementor-widget-image\" data-id=\"948ad87\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-1024x576.png\" class=\"attachment-large size-large wp-image-20699\" alt=\"Smart City Threats and Countermeasures\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-1024x576.png 1024w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-150x84.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-300x169.png 300w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-768x432.png 768w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-200x113.png 200w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-400x225.png 400w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-600x338.png 600w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-800x450.png 800w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f34e245 elementor-widget elementor-widget-text-editor\" data-id=\"f34e245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Man-in-the-middle<\/strong>: An attacker breaches, interrupts or spoofs communications between two systems. For example, a man-in-the-middle attack on a smart valve in a wastewater system could be used to cause a biohazard spill.<\/p><p><strong>Data and identity theft<\/strong>: Data generated by unprotected smart city infrastructure such as parking garages, EV charging stations and surveillance feeds provide cyber attackers with an ample amount of targeted personal information that can potentially be exploited for fraudulent transactions and identify theft.<\/p><p><strong>Device hijacking<\/strong>: The attacker hijacks and effectively assumes control of a device. These attacks can be dif\ufb01cult to detect because in many cases, the attacker does not alter the basic functionality of the device. In the context of a smart city, a cyber-criminal could exploit hijacked smart meters to launch ransomware attacks on Energy Management Systems (EMS) or stealthily siphon energy from a municipality.<\/p><p><strong>Distributed Denial of Service (DDoS)<\/strong>: A denial-of- service attack (DoS attack) attempts to render a machine or network resource unavailable to its intended users by temporarily or inde\ufb01nitely disrupting services of a host connected to the Internet. This is typically achieved by flooding the target with superfluous requests to prevent legitimate requests from being fulfilled. In the case of a distributed denial-of-service attack (DDoS attack), incoming traffic flooding a target originates from multiple sources, making it difficult to stop the cyber offensive by simply blocking a single source. Within smart cities, a plethora of\u00a0devices, such as parking meters, can be breached and forced to join a botnet programmed to overwhelm a system by requesting a service simultaneously.<\/p><p><strong>Permanent Denial of Service (PDoS)<\/strong>: Permanent denial- of-service attacks (PDoS), also known loosely as phlashing, is an attack that damages the device so badly that it requires replacement or reinstallation of hardware. In a smart city scenario, a hijacked parking meter could also fall victim to sabotage and would have to be replaced.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-417102e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"417102e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eba7cd0\" data-id=\"eba7cd0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5a07d85 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a07d85\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8f5a828\" data-id=\"8f5a828\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e966838 elementor-widget elementor-widget-text-editor\" data-id=\"e966838\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-inline-fontsize=\"true\" data-inline-lineheight=\"true\" data-fontsize=\"34\" data-lineheight=\"40\">Securing Smart Cities<\/h2><p>Connected smart city devices should be protected by comprehensive IoT security solutions (device to cloud). Practical and simple, yet secure, solutions that can be easily and widely adopted by OEMs and services are more effective than a \u2018super solution\u2019 that fails to gain serious traction. Such solutions should include the following capabilities:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a28d56f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a28d56f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-644270d\" data-id=\"644270d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2dd8bf2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2dd8bf2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-d80f402\" data-id=\"d80f402\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4e2fdd4\" data-id=\"4e2fdd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3a8c70 elementor-widget elementor-widget-image\" data-id=\"f3a8c70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot.png\" class=\"attachment-large size-large wp-image-20855\" alt=\"Firmware integrity and secure boot icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-0c0a9ec\" data-id=\"0c0a9ec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f65e5b elementor-widget elementor-widget-text-editor\" data-id=\"2f65e5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Firmware integrity and secure boot<\/span><\/h3><p>Secure boot utilizes cryptographic code signing techniques, ensuring that a device only executes code generated by the device OEM or another trusted party. Use of secure boot technology prevents hackers from replacing \ufb01rmware with malicious versions, thereby preventing attacks. Unfortunately, not all IoT chipsets are equipped with secure boot capabilities. In such a scenario, it is important to ensure that the IoT device can only communicate with authorized services to avoid the risk of replacing \ufb01rmware with malicious instruction sets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-73676cf\" data-id=\"73676cf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-84a9288 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"84a9288\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-649cef7\" data-id=\"649cef7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-39ab295\" data-id=\"39ab295\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5804f4f elementor-widget elementor-widget-image\" data-id=\"5804f4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication.png\" class=\"attachment-large size-large wp-image-20856\" alt=\"Mutual authentication icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5d508ae\" data-id=\"5d508ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bf5cf6 elementor-widget elementor-widget-text-editor\" data-id=\"7bf5cf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Mutual authentication<\/span><\/h3>\nEvery time a smart city device connects to the network it should be authenticated prior to receiving or transmitting data. This ensures that the data originates from a legitimate device and not a fraudulent source. Secure, mutual authentication\u2014 where two entities (device and service) must prove their identity to each other\u2014helps protect against malicious attacks.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-f4fae6a\" data-id=\"f4fae6a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bf6af0a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bf6af0a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-07fecc5\" data-id=\"07fecc5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-cd848f1\" data-id=\"cd848f1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7aa28d9 elementor-widget elementor-widget-image\" data-id=\"7aa28d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis.png\" class=\"attachment-large size-large wp-image-20857\" alt=\"Security monitoring and analysis\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-54b1dca\" data-id=\"54b1dca\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2222808 elementor-widget elementor-widget-text-editor\" data-id=\"2222808\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Security monitoring and analysis<\/span><\/h3><p>Captures data on the overall state of the system, including endpoint devices and connectivity traf\ufb01c. This data is then analyzed to detect possible security violations or potential system threats. Once detected, a broad range of actions formulated in the context of an overall system security policy should be executed, such as quarantining devices based on anomalous behavior.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5f5add4\" data-id=\"5f5add4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-51c4e96 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51c4e96\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-d42de96\" data-id=\"d42de96\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-3cf071a\" data-id=\"3cf071a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a921647 elementor-widget elementor-widget-image\" data-id=\"a921647\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management.png\" class=\"attachment-large size-large wp-image-20305\" alt=\"Security Lifecycle Management icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5ee62fe\" data-id=\"5ee62fe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f2184c elementor-widget elementor-widget-text-editor\" data-id=\"0f2184c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Security lifecycle management <\/span><\/h3><p>The lifecycle management feature allows service providers and OEMs to control the security aspects of IoT devices when in operation. Rapid over the air (OTA) device key(s) replacement during cyber disaster recovery ensures minimal service disruption. In addition, secure device decommissioning ensures that scrapped devices will not be repurposed and exploited to connect to a service without authorization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-d6ba2e2\" data-id=\"d6ba2e2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1718bb0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1718bb0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d94e7a\" data-id=\"3d94e7a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6e16909 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6e16909\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9a30385\" data-id=\"9a30385\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc2113 elementor-widget elementor-widget-text-editor\" data-id=\"9dc2113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-inline-fontsize=\"true\" data-inline-lineheight=\"true\" data-fontsize=\"34\" data-lineheight=\"40\">Rambus Security Solutions for Smart Cities<\/h2><p><a href=\"https:\/\/www.rambus.com\/security\/root-of-trust\/\">Root of Trust<\/a> solutions provide the hardware-level foundation for security enabling functions such as secure boot, secure execution of applications, tamper detection and protection, and secure storage and handling of keys.<\/p><p><a href=\"https:\/\/www.rambus.com\/security\/protocol-engines\/\">Protocol Engines<\/a>\u202fsecure network communications between IIOT devices and the cloud without altering the traffic. They enable secure end-to-end communications while maintaining vital network performance.<\/p><p><a href=\"https:\/\/www.rambus.com\/security\/provisioning-and-key-management\/\">Provisioning and Key Management <\/a> secure supply chain solutions for chip and IoT device manufacturers enable secure key insertion and cloud-based device key management services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Rambus CryptoManager IoT Security Service is a turnkey solution for smart city service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":15280,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-full.php","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"tags":[],"class_list":{"0":"post-20680","1":"page","2":"type-page","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Smart Cities: Threats and Countermeasures - Rambus<\/title>\n<meta name=\"description\" content=\"Billions of connected \u2018things\u2019 are deployed in smart cities around the world. The rise of the Internet of Things (IoT) exposes a wide range of vulnerabilities that can be exploited by cyber criminals and other malicious actors. Although smart cities are designed to increase productivity and ef\ufb01ciency, they can potentially present serious risks for residents and authorities when cyber security is neglected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rambus.com\/iot\/smart-cities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smart Cities: Threats and Countermeasures\" \/>\n<meta property=\"og:description\" content=\"The Rambus CryptoManager IoT Security Service is a turnkey solution for smart city service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rambus.com\/iot\/smart-cities\/\" \/>\n<meta property=\"og:site_name\" content=\"Rambus\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RambusInc\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-05T21:31:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-1024x576.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@rambusinc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-cities\/\",\"url\":\"https:\/\/www.rambus.com\/iot\/smart-cities\/\",\"name\":\"Smart Cities: Threats and Countermeasures - Rambus\",\"isPartOf\":{\"@id\":\"https:\/\/www.rambus.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-cities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-cities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-1024x576.png\",\"datePublished\":\"2017-12-21T00:44:33+00:00\",\"dateModified\":\"2020-03-05T21:31:35+00:00\",\"description\":\"Billions of connected \u2018things\u2019 are deployed in smart cities around the world. The rise of the Internet of Things (IoT) exposes a wide range of vulnerabilities that can be exploited by cyber criminals and other malicious actors. Although smart cities are designed to increase productivity and ef\ufb01ciency, they can potentially present serious risks for residents and authorities when cyber security is neglected.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-cities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rambus.com\/iot\/smart-cities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-cities\/#primaryimage\",\"url\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures.png\",\"contentUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures.png\",\"width\":1200,\"height\":675,\"caption\":\"Smart City Threats and Countermeasures\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-cities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rambus.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT\",\"item\":\"https:\/\/www.rambus.com\/iot\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Smart Cities: Threats and Countermeasures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rambus.com\/#website\",\"url\":\"https:\/\/www.rambus.com\/\",\"name\":\"Rambus\",\"description\":\"At Rambus, we create cutting-edge semiconductor and IP products, providing industry-leading chips and silicon IP to make data faster and safer.\",\"publisher\":{\"@id\":\"https:\/\/www.rambus.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rambus.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rambus.com\/#organization\",\"name\":\"Rambus\",\"url\":\"https:\/\/www.rambus.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png\",\"contentUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png\",\"width\":200,\"height\":62,\"caption\":\"Rambus\"},\"image\":{\"@id\":\"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RambusInc\",\"https:\/\/x.com\/rambusinc\",\"https:\/\/www.linkedin.com\/company\/rambus\",\"https:\/\/www.youtube.com\/user\/RambusWeb\"],\"description\":\"Rambus is a provider of industry-leading chips and silicon IP.\",\"email\":\"ebiz@rambus.com\",\"telephone\":\"+1-408-462-8000\",\"legalName\":\"Rambus Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Smart Cities: Threats and Countermeasures - Rambus","description":"Billions of connected \u2018things\u2019 are deployed in smart cities around the world. The rise of the Internet of Things (IoT) exposes a wide range of vulnerabilities that can be exploited by cyber criminals and other malicious actors. Although smart cities are designed to increase productivity and ef\ufb01ciency, they can potentially present serious risks for residents and authorities when cyber security is neglected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rambus.com\/iot\/smart-cities\/","og_locale":"en_US","og_type":"article","og_title":"Smart Cities: Threats and Countermeasures","og_description":"The Rambus CryptoManager IoT Security Service is a turnkey solution for smart city service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).","og_url":"https:\/\/www.rambus.com\/iot\/smart-cities\/","og_site_name":"Rambus","article_publisher":"https:\/\/www.facebook.com\/RambusInc","article_modified_time":"2020-03-05T21:31:35+00:00","og_image":[{"url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-1024x576.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@rambusinc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rambus.com\/iot\/smart-cities\/","url":"https:\/\/www.rambus.com\/iot\/smart-cities\/","name":"Smart Cities: Threats and Countermeasures - Rambus","isPartOf":{"@id":"https:\/\/www.rambus.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rambus.com\/iot\/smart-cities\/#primaryimage"},"image":{"@id":"https:\/\/www.rambus.com\/iot\/smart-cities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures-1024x576.png","datePublished":"2017-12-21T00:44:33+00:00","dateModified":"2020-03-05T21:31:35+00:00","description":"Billions of connected \u2018things\u2019 are deployed in smart cities around the world. The rise of the Internet of Things (IoT) exposes a wide range of vulnerabilities that can be exploited by cyber criminals and other malicious actors. Although smart cities are designed to increase productivity and ef\ufb01ciency, they can potentially present serious risks for residents and authorities when cyber security is neglected.","breadcrumb":{"@id":"https:\/\/www.rambus.com\/iot\/smart-cities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rambus.com\/iot\/smart-cities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rambus.com\/iot\/smart-cities\/#primaryimage","url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures.png","contentUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-City-Threats-and-Countermeasures.png","width":1200,"height":675,"caption":"Smart City Threats and Countermeasures"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rambus.com\/iot\/smart-cities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rambus.com\/"},{"@type":"ListItem","position":2,"name":"IoT","item":"https:\/\/www.rambus.com\/iot\/"},{"@type":"ListItem","position":3,"name":"Smart Cities: Threats and Countermeasures"}]},{"@type":"WebSite","@id":"https:\/\/www.rambus.com\/#website","url":"https:\/\/www.rambus.com\/","name":"Rambus","description":"At Rambus, we create cutting-edge semiconductor and IP products, providing industry-leading chips and silicon IP to make data faster and safer.","publisher":{"@id":"https:\/\/www.rambus.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rambus.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rambus.com\/#organization","name":"Rambus","url":"https:\/\/www.rambus.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png","contentUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png","width":200,"height":62,"caption":"Rambus"},"image":{"@id":"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RambusInc","https:\/\/x.com\/rambusinc","https:\/\/www.linkedin.com\/company\/rambus","https:\/\/www.youtube.com\/user\/RambusWeb"],"description":"Rambus is a provider of industry-leading chips and silicon IP.","email":"ebiz@rambus.com","telephone":"+1-408-462-8000","legalName":"Rambus Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/20680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/comments?post=20680"}],"version-history":[{"count":0,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/20680\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/15280"}],"wp:attachment":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/media?parent=20680"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/tags?post=20680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}