simultaneously. All SC stakeholders will get valuable
and secure information in IoT ecosystems, which is
security issues become a major concern. Reliable,
economical and efficient security including privacy
for IoT is needed to ensure the appropriate
confidentiality, integrity, authentication and access
control among others.
3.1 IS Security Management in SC
The SC initiative will integrate IS and emerging IT,
such as IoT, into urban development to enable
government functionality, city operations, services
deliveries, and intelligent analytics that will enhance
public services, production, and usability. These are
essential backbones for connecting the core IS
together in a city. As information creation and sources
become dynamic, the IS is exposed to different
security attacks and critical vulnerabilities (Kumar et
al., 2018). IS security in IoT-enabled SC involves
issues in technology, applications, infrastructure, and
information, which are affected by the emergent
integration of IoT, leading to intensive
communication, high complexity, and high
interdependency. Cyber security, particularly in IS
for IoT-enabled SC, is challenged by the difficulty to
ensure end-to-end security via large and
interdependent IS, with multiple stakeholders
involved, and incompatible data standards and
formats for integration. The IS security concerns
specifically with IoT applications in SC, including
attacks on data confidentiality, threats to data
integrity (Dunkerley & Tejay, 2009; Gil-Garcia,
Pardo & Nam, 2015; Witti & Konstantas, 2019),
misuse of resources, bandwidth degradation, battery
or resources exhaustion, unauthorised access
(Gharaibeh et al., 2017; Hassanien et al., 2019;
Zedadra et al., 2019), threats to authentication, and
Denial of Service (DoS).
Furthermore, the characteristics of SC require
higher speed communication, more constant
engagement between multiple organisations, and
appropriate governance agenda (Ruhlandt, 2018) such
as policy (Bull & Azennoud, 2016; Irshad, 2017; Lam
& Ma, 2018; Laudon & Laudon, 2018; Ruhlandt,
2018; Theodorou & Sklavos, 2019; Trček, 2003;
Whitmore et al., 2015; Witti & Konstantas, 2019),
accountability (Hassanien et al., 2019; Irshad, 2017;
Ruhlandt, 2018; Witti & Konstantas, 2019), and
auditability (Hassanien et al., 2019; Irshad, 2017;
Laudon & Laudon, 2018; Ruhlandt, 2018; Witti &
Konstantas, 2019). Information integrity and systems
security have always been vital in IS management.
However, the various information types from multiple
technologies and processing platforms in SC have also
heightened the criticality in ensuring information
integrity and systems
security (Gichoya, 2005). Fast
and reliable technology (Gharaibeh et al., 2017;
Harrison et al., 2010; Taewoo Nam & Theresa A.
Pardo, 2011; Witti & Konstantas, 2019) and
communication between multiple organisations to
integrate information, also affect the IS
interoperability, as integration becomes more complex.
3.2 IoT Security Management in SC
The security aspects, such as communication
confidentiality (Gharaibeh et al., 2017; Hassanien et
al., 2019; Witti & Konstantas, 2019; Zedadra et al.,
2019), authenticity (Gharaibeh et al., 2017; Hassanien
et al., 2019; Witti & Konstantas, 2019; Zedadra et al.,
2019), trustworthiness of communication partners
(Aldein Mohammeda & Ali Ahmed, 2017; Hassanien
et al., 2019), message integrity, and other
requirements need to be highlighted in IoT. The
challenges in the application of IoT-enabled SC are to
the citizens’ security and privacy, whenever their
personal and private information is collected and
analysed in IoT platform. It will be exposed to
vulnerabilities and several attacks, so it is important
to manage the way citizens and service providers are
able to control the information and how they are
exposed to third-party applications (Moreno et al.,
2017). There is a necessity to access certain services
or prevent from communicating with other things in
IoT (Aldein Mohammeda & Ali Ahmed, 2017).
Furthermore, IS in IoT-enabled SC is connected to
the IoT application context. Authorities as service
providers, must analyse their target, specify the
required computing hardware and software, and
finally, integrate these heterogeneous subsystems. The
existence of such infrastructure and the provision of an
appropriate collaborating structure among IS can be a
huge challenging task for the IoT-based IS (Arasteh et
al., 2016). Such complexity in the communication
among IS in IoT environment is problematic to the
interoperability of the IS, due to non-standard
heterogeneous interfaces in IS (Lam & Ma, 2018).
Additionally, each type of smart object in IoT has
different information, processing, and communication
capabilities; and subjected to different conditions, such
as energy availability and the communications
bandwidth required. To facilitate communication and
cooperation of these objects, common standards are
required (Aldein Mohammeda & Ali Ahmed, 2017).
The reliability problem has become significant in IoT-
based systems due to numerous smart devices involved
(Arasteh et al., 2016).