Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2022 Feb 28;12:3281. doi: 10.1038/s41598-022-07197-1

The assessment of smart city information security risk in China based on zGT2FSs and IAA method

Hui Zhao 1, Yiting Wang 1,, Xin Liu 1
PMCID: PMC8885652  PMID: 35228589

Abstract

The continuous expansion of the construction scale of smart city has reconstructed the urban information pattern. How to maintain the stability of information security while giving full play to the role of information sharing is a practical problem that must be solved for the sustainable development of smart city. Based on the information ecology theory, this paper construct the smart city information security risk evaluation system from six aspects. Then, zGT2FSs is established based on type-2 fuzzy set theory and IAA method, which fully considers the internal and external uncertainty of expert decision-making. According to the calculation results, the key influencing factors of information security risk of smart city are analyzed to provide suggestions and guidance for the formulation of information security control in the process of smart city construction in China.

Subject terms: Applied mathematics, Information technology, Engineering, Mathematics and computing

Introduction

Smart city deeply integrates emerging technologies such as big data, cloud computing and Internet of Things with urban construction1,2, which is conducive to the sustainable development of urban economy, society and environment, and at the same time, it has greatly changed the information pattern of smart city3,4, causing multi-angle impact on information security. For example, in the process of building smart city, there exists security risks such as hackers attacks and the lack of awareness of network security protection57. The Chinese government attaches great importance to the construction of smart city in urban development and governance. Vigorously promoting the construction of new smart city has become the strategic direction of China's urban development8,9. In the context of the massive urban data collection required for the prevention and control of the world's COVID-19, how to identify the key influencing factors of information security risks in smart city while giving full play to the great role of information sharing, collaboration and integration, and how to formulate and improve relevant policies to maintain information security and stability are practical problems that must be solved for the sustainable development of smart city.

Smart city aims to integrate all subsystems of the city by using advanced information technology and operate the city in a smarter way10. Compared to digital city, smart city empathizes people's subjective feelings, like care applications for the health emergency management and the vulnerable groups11, etc. At the technical level, smart city apply and integrate the latest information and communication technologies such as Internet of things and cloud computing, gathering many aspects of urban development such as sustainable, innovative and availability, and pursuing integration of ICT in transportation systems and many other systems in urban construction12; At the level of urban governance, smart city emphasize participatory governance, focusing on relationship between urban residents and local government by expanding the investment scale of human and social capital13; At the target level, smart city aim to realize the wisdom of urban governance, public services and people's life14,15.

At present, the academic research on smart city information security risks can be roughly divided into three categories: risk connotation, risk measurement and information security countermeasures. The risk research methods that have been applied to information security include Random Forest16, DEMATEL17, Bayesian Network18 and so on. Felipe19 proposed nine aspects of information security for smart city systems, including information access, information tracking, and cross-access, focusing on information security issues and countermeasures in the planning and implementation phases of smart city construction. Moch proposed a point of insightful view that in the process of smart city construction, local governments need to focus on the safety and security of urban planning, services and decision-making, which also requires the joint efforts of both urban residents and the government20. Wang Yin21 believed that the key reason for frequent smart city information security problems in China is that the construction is immature. In addition, due to the integration of technology, governance, manpower, external economy, society, ecological environment and other factors in the process of building a smart city, a large number of complex problems would arise22. The development and construction of smart city projects must go through the technology, safety and convenience evaluation and reach the target before acceptance, and the project construction should be based on planning, development and maintenance of land system, so as to ensure the balanced utilization of land in urban construction23,24. Among the existing research results, most risk studies are only considered from the perspective of information technology risks, and the results of holistic analysis from multiple angles are few. Moreover, the uncertainty in decision-making is seldom considered when determining the indicator weight, which includes the inter-uncertainty when experts make decisions, and the intra-uncertainty when experts make decisions on the same object at different times.

Higher order fuzzy logic systems such as interval type-2 fuzzy logic systems have been shown to be very well suited to dealing with the large amounts of uncertainties present in the majority of real world applications25,26. Type-2 fuzzy set (T2 FSs), as a three-dimensional fuzzy set, has a better ability to measure fuzziness than type-1 fuzzy set (T1 FSs) in two-dimensional space. Inter and intra uncertainties can be identified and modeled using the different degrees of freedom of type-2 FSs, thus providing a clear representation and separation of these individual types of uncertainty present in the data2729. ZSlice method of T2 FSs reduce both the complexity and the computational requirements for general type-2 fuzzy logic systems. As well as IAA method based on zSlice-based general type-2 fuzzy sets (zGT2FSs) can well measure the inter and intra uncertainties in decision making and make the evaluation process more accurate and comprehensive30.

In this paper, information security risk assessment system of smart city is established based on the information ecology theory, and IAA method based on zGT2FSs is used to calculate the index weights, providing reference for the related research and decision-making of information security risk of smart city.

Materials and methods

zSlice-based general type-2 fuzzy sets (zGT2FSs)

Type-1 fuzzy sets (T1 FSs) and Type-2 fuzzy sets (T2 FSs)

Classical Logic (represented by Boolean logic) holds that all objects or statements can be represented by binary terms such as 0 or 1, yes or no, black or white31. Given the set X, every element in its universe either belongs to the set X completely or does not belong to X at all, and there is no case where part of it belongs to X. However, the semantic concepts used in people's daily communication are often uncertain, and whether an element belongs to a semantic concept is often a gradual process rather than a sudden change, which cannot be simply described by the yes and no32,33.

In order to better model semantic concepts, Zadeh34 put forward fuzzy set theory (as T1 FSs in this paper). Compared with classical logic, T1 FSs can better measure the uncertainty of a single user's understanding of semantic concepts, which is Intra uncertainty. In 1975, Zadah35 put forward the concept of T2 FSs based on T1 FSs. Compared with T1 FSs, T2 FSs are characterized by 3 dimensional MFs, which in turn making T2 FSs a better ways to solve the high levels of uncertainty36. Different Representations of Temperature By Boolean Logic (Classic Logic), T1 FSs and IT2 FSs are shown in Fig. 1.

Figure 1.

Figure 1

Different representations of temperature by Boolean logic (classic logic), T1 FSs and IT2 FSs.

A T1 FSs can be generalized as as set function on a universe X into 0,1. MF can be represented by μx and classic T1 FS can be defined as:

A=x,μAxxX 1

where X is continues, A can be commonly formalized as:

A=xμAx/x 2

where is union over all xX.

The T2 FSs can be defined as:

A~=x,u,μA~x,uxX,uJx0,1 3

Or

A~=xXuJxμA~x,u/x,u 4

where Jx is the primary membership and Jx0,1, μA~x,u is the secondary membership corresponding to each primary membership and 0μA~x,u1.

Interval Type-2 fuzzy sets (IT2 FSs)

Interval Type-2 Fuzzy Sets (IT2 FSs) are simplification forms of T2 FSs which the primary membership is defined as the interval y_,y¯, where y_ and y¯ represent the different degrees of membership of x in the lower membership function (LMF) and upper membership function (UMF) respectively30,37, we give a sample of membership function of IT2 FSs in Fig. 2.

Figure 2.

Figure 2

Membership function of IT2 FSs.

Thus, a IT2 FS can be presented as:

A~=xXyy_x,y¯x1/x,y 5

IT2 FSs also can be expressed as:

A~=x,Ax=A_x,A¯x|xX 6

where the mapping A:XL0,1 is the membership function, A_x and A_x represent the LMF and UMF. And it is worth noting that L0,1 represents all close subinterval of 0,1, expressed as:

L0,1=X=x_,x¯|x_,x¯0,12,x_x¯ 7

LMF, UMF and FOU (Footprint of Uncertainty) can be written as:

UMF=x,bx,xX 8
LMF=x,ax,xX 9
FOU=xXx×Lx=xXx×ax,bx 10

GT2 FSs based on zSlices (zGT2FSs)

In respect to the set operation of T2 FSs, Karnik present the Vertical Slices38 to facilitate the discretized point of T2 FSs where at each x exist a secondary membership, and defined the secondary membership as Vertical Slice. Since this method is intuitive and easy to understand, it has been widely popularized and applied39,40. The vertical slice based on T2 FSs in the universe X can be expressed as:

A~=xXμA~x=xXuJxfxu/u,0fxu1,Jx0,1 11

On the basis of vertical slice, scholars put forward wavy slices41, computational geometry approach42 and other methods43.

A zSlice is formed by slicing a general type-2 fuzzy set in the third dimension (z) at level zi, creating an interval set with height zi in the third dimension (as Fig. 3). A zSlice Z~i can be expressed as:

Z~i=xXuiJixzi/x,ui 12
Figure 3.

Figure 3

(a) Front view of a general type-2 set F~. (b) Third dimension at x of a zSlice based type-2 fuzzy set.

Or

Z~i=xXuili,rizi/x,ui 13

Or

Z~i=xi,ui,zixX,uili,ri 14

where zi=i/I,1iI, the notation I means the the number of zSlices. In Eq. (11), a zSlice Z~i is equal to a T2 FSs which membership grade μZ~ix,u in the third dimension equal zi,0zi1.

Specially, when z=0,

Z~0=xXuiJx0/x,u 15

A general T2 FS F~ is equal to the collection of zSlices:

F~=0iIZ~i,I 16

In a discrete situation, Eq. (15) can also be written as:

F~=0iIZ~i 17

The MF μG~x of the zSlice based general type-2 fuzzy set (zGT2FSs)F~ can be written as:

μF~x=μJxmaxzi/u,Jx0,1 18

where 0iI,μG~x is a T1 FS.

Interval agreement approach (IAA)

The academic method research on modeling survey based data using T2 FSs such as the interval approach (IA)44 and enhanced interval approach (EIA)45,46 has made a lot of progress, but these methods require data preprocessing and specific FSs forms, which makes it difficult for calculation and operation47. Wagner (2014)48 proposed a new approach about how uncertain intervals (where there is uncertainty about the endpoints of intervals) collected from decision-makers or multiple survey participants over repeated surveys can be modeled using type-1, interval type-2, or general type-2 FSs based on zSlices, named interval agreement approach (IAA). This method captures and models survey-based uncertainty requiring no data preprocessing and the prior definition of a specified MT type49.

IAA method can effectively reduce the quantity and degree of assumptions. In addition, this method constructs nonparametric model based on interval data without determining the specific type of FSs (such as Gaussian and Triangular)50,51. At same times it can greatly diminish the loss of information when reduce the higher ordered model52.

In this paper, we focus on modeling more uncertainty intervals from multiple sources, therefore, we only explain the principle in that case. And it is worth note that we claim all methods were carried out in accordance with relevant guidelines and regulations, all experimental protocols were approved by the Academic Ethics Committee of Qingdao University of Technology, Academic Committee of Qingdao University of Technology, informed consent was obtained from all subjects and/or their legal guardians. IAA method is conducted by following steps.

Step 1. Generate the IT2 FSs for each source.

μA=y1/i1=1NA¯i+y2/i1=1N-1i2=i1+1N-1A¯i1A¯i2++yN/i1=11iN=NNA¯i1A¯iN 19

where yi=iN. And it is worth noting that we employ Eq. (18) independently for all outer and inner endpoints, create the UMF and LMF of IT2 FSs model.

Step 2. Aggregate IT2 FSs to create a zGT2 FS.

μA~=z1/i1=1NAi1+z2/i1=1N-1i2=i1+1N-1Ai1Ai2++zN/i1=11iN=NNAi1AiN 20

where zi=iN. In this step, Eq. (19) is applied twice to get all source-specific UMFs and LMFs resulting in the UMFs and LMFs of respective zSlices.

The steps above create zGT2FS that provides a model of both intra and inter uncertainty for the given set of uncertain intervals.

Case study

Problem description

The application of emerging technologies in the construction of smart city fully integrates data resources and changes the information pattern of cities, leading to significant changes in the connotation and conformation of information security of smart city, bringing about a multi-faceted impact on information security (Fig. 4). Information security is the foundation of smart city construction and the guarantee of healthy development of it, hence the significance for the information security risk evaluation to ensure sustainable development. In China, promote the construction of new smart city has become the strategic direction of China's urban development53. With the gradual deepening of smart city construction, the issue of information security has become an increasingly prominent focus54. Information security is the foundation of smart city construction and the guarantee of healthy development of smart city55, which plays a vital role in smart city system and even national and social stability.

Figure 4.

Figure 4

Smart city information security impact framework.

The problem faced by the decision makers in China's smart city project is to prioritize the dimensions and application areas separately so that project resources are allocated according to the importance and urgency of the each application area and the dimension related with it. The application of the smart city concept is conceptualized as a MCDM problem and IAA approach with zSlice type-2 fuzzy sets is utilized to solve this problem.

Smart city information security risk evaluation indicator system

In 1869, Haeckel56 put forward the concept of ecology for the first time, he stated that ecology is the whole relationship between animals, organic and inorganic environments. Ecology developed rapidly and penetrated into many disciplines after that5761. Information ecology is a new subject research field which emerged from the intersection of information science and ecology, existing studies have confirmed the applicability of information ecology theory in information security system6264. Smart city is a typical information ecosystem which covers many elements such as people, information, technology and institutions. Based on the information ecology theory, we investigate the elements of smart city information ecosystem and existing security risks, comprehensively analyze the characteristics of information security risks in smart city according to the roles and influences among the elements and construct the evaluation indicator system. Through analyzing the literature in recent 10 years and screening the indicators (details at ESM Appendix I), the evaluation indicator system of information security risk assessment is shown in Fig. 5.

Figure 5.

Figure 5

Smart city information security risk evaluation indicator system.

Experimental results

Aiming at the information security risk evaluation of smart city, four experts were selected from different organizations for interview research. The purpose of this study is to provide decision-making reference for professionals who are responsible for information security risks in smart city. Therefore, we do not cover all stakeholders of information security risks in smart city in an all-round way, but give priority to the opinions of the implementation and decision-makers who have a say in the project. The four experts selected in this paper have more than 10 years of relevant experience in their specific fields in smart city and have decision-making ability in their organizations.

According to IAA, in order to capture uncertainty during data collection, the survey design in which experts can express their uncertainty about a given response by specifying an interval, rather than specifying or choosing a crisp point such as on Likert scale. Each decision-makers is asked to provide a variance in each decision which can be interpreted as the uncertainty of in their answers. In this method, experts’ certainty in their view denoted by the width of the interval, a narrow interval indicates that experts are sure about their answer, a wider interval means that they are less certain (as Fig. 6).

Figure 6.

Figure 6

Example interval response (where (a) represents a more uncertainty response, (b) represents a less uncertainty response, (c) shows the uncertain intervals where for the latter each endpoint is itself an interval (variance)).

In this paper, three repeated questionnaires were conducted for four experts at different 3 times. The contents of the questionnaires were the same, and a total of 12 questionnaire results were obtained, based on which the internal and external uncertainties in the expert decision-making process were measured. Each pair of intervals is calculated according:

p¨=a-u,a+u,b-u,b+u 21

where p¨ is the resulting pair of intervals, u is the uncertainty value, and a,b is an expert’s opinion.

In order to show the above decision-making process more intuitively, the ellipse drawn by experts from one of the surveys is summarized in digital form as shown in Table 1.

Table 1.

One of the expert decision result.

Indicators Expert A Expert B Expert C Expert D
Answer Uncertainty Answer Uncertainty Answer Uncertainty Answer Uncertainty
Mobile internet AP coverage 4–7 0.5 5–6.5 0.2 4–6 1.1 4.5–6.5 0.4
Virtualized resource pool stability 5–7 0.5 3–6 0.9 4–7 0.3 5.5–6.5 0.9
Maturity of smart city application system 6–8 1 5–8 0.5 6–9 0.2 4–6 1.5
Failure rate of software and hardware 6–9 0.8 5–7.5 1.5 6–8 0.5 6.5–7.5 0.7
Data theft and falsification 2–7.5 0.5 4–6 0.5 3–6 0.8 2–5 0.2
Development level of information industry 4–6 1.6 4–7 0.3 5–9 0.5 7–8 0.4
Security strategy and management 2–5 0.3 3–5 0.5 2–4 0.2 3–4 0.7
Security O&M management level 2–8 0.5 3–8.5 0.5 2.5–7.5 0.5 4–6.5 0.6
Perfection of special emergency plan 2–6 0.2 4–5 1.1 3–5 0.6 3–6 0.3
Incidence of accidents caused by responsibility and authority 5–7 0.4 4–6 0.5 3–5 0.9 5–8 0.1
Key personnel controlled 4–6.5 0.8 3–7 0.1 5–6 0.4 4–6.5 0.5
Practitioner intelligence level 6–9 0.2 5–8 0.5 7–8 0.5 6–7 0.3
Anti-virus software coverage 3–6 0.6 4.5–7 0.2 6–7 0.1 4–5 1.5
Access control and identity authentication 5.5–8 0.5 6–8 0.5 5–7 0.3 6–7.5 0.4
Data encryption and recovery 7–9 1.2 6–9 0.6 5–8 0.2 7–8 0.6
Perfection of information security standards 4.5–5 0.8 3–6 0.1 4–7.5 0.4 5–6 0.8
Information security legal binding 3–4 0.5 2–5 0.5 5–6 0.5 2–4 0.7
Public awareness of information security 7–9 1 5–9.5 0.2 6–8 0.3 7–8 1.5

Next, calculate the intervals according to Eq. (20), the results are showed as Table 2.

Table 2.

Uncertain intervals of one expert conducted from the expert decision result of the indicator security O&M management level.

Experts 1st survey 2nd survey 3rd survey
A 0.15,0.25,0.75,0.85 0.25,0.35,0.80,0.90 0.20,0.30,0.70,0.80
B 0.25,0.35,0.80,0.90 0.22,0.28,0.77,0.83 0.31,0.39,0.76,0.84
C 0.20,0.30,0.70,0.80 0.14,0.26,0.74,0.86 0.35,0.45,0.65,0.75
D 0.34,0.46,0.59,0.71 0.35,0.45,0.62,0.72 0.31,0.39,0.66,0.74

Using Eq. (18) with the above intervals (detailed calculations can be found in ESM Appendix II, (2)), results in

μ¯A~=y1/0.15,0.90+y2/0.20,0.85+y3/0.25,0.80 22
μ_A~=y1/0.25,0.80+y2/0.30,0.75+y3/0.35,0.70 23

It is worth noting that the notation μ¯A~ means the UMF and μ_A~ means the LMF which together completely describe the IT2 FS A~ for expert A.

After complete generating the IT2 FSs, we proceed to step 2 to create a zGT2 FS that can representing the intra and inter uncertainty. According to “Materials and methods”, the secondary membership domain is divided into 4 levels, at membership degrees of 0.25, 0.5, 0.75 and 1, also can be express as Z~1=1/4=0.25, Z~2=2/4=0.5, Z~3=3/4=0.75 and Z~4=1. Equations (24) and (25) give the details of Z~1 which are calculated using Eq. (19), and a more detailed view of the calculations can be found in ESM Appendix II.

Z~1¯=0.25/0.33/0.14,0.90+0.66/0.20,0.85+1/0.25,0.83
Z~1_=0.25/0.33/0.25,0.80+0.66/0.30,0.77+1/0.35,0.76
Z~2¯=0.5/0.33/0.15,0.90+0.66/0.20,0.84+1/0.31,0.80
Z~2_=0.5/0.33/0.26,0.80+0.66/0.30,0.75+1/0.39,0.70
Z~3¯=0.75/0.33/0.22,0.86+0.66/0.25,0.80+1/0.35,0.75
Z~3_=0.75/0.33/0.28,0.74+0.66/0.35,0.70+1/0.45,0.65
Z~4¯=1/0.33/0.31,0.74+0.66/0.34,0.72+1/0.35,0.71
Z~4_=1/0.33/0.39,0.66+0.66/0.45,0.62+1/0.46,0.59 24
Z~=Z~1Z~2Z~3Z~4 25

The IT2 FSs and zGT2 FSs based on expert decision results constructed by IAA method are obtained through the above steps, as shown in Figs. 7 and 8. Figure 7 shows the IT2 FSs created for each of the experts over the three surveys, Fig. 8 shows the zSlices at the respective secondary membership degrees (zLevels) of 0.25, 0.5, 0.75, and 1.

Figure 7.

Figure 7

IT2 FSs produced with IAA (a) Expert A, (b) Expert B, (c) Expert C, (d) Expert D.

Figure 8.

Figure 8

GT2 FSs Z~i produced with IAA. (a) Z~1=0.25, (b) Z~2=0.5, (c) Z~3=0.75, (d) Z~4=1.

Repeat the above steps to obtain zGT2FSs corresponding to 18 indicators. The calculation results are summarized in Table 3. Thus, the indicator weights are showed in Table 4.

Table 3.

zSlice details with intervals and associated primary and secondary membership.

Z~1=0.25 Z~2=0.5 Z~3=0.75 Z~4=1
UMFs Z~1¯ Z~2¯ Z~3¯ Z~4¯
y=0.33 0.14,0.90 0.15,0.90 0.22,0.86 0.31,0.74
y=0.66 0.20,0.85 0.20,0.84 0.25,0.80 0.34,0.72
y=1 0.25,0.83 0.31,0.80 0.35,0.75 0.35,0.71
LMFs Z~1_ Z~2_ Z~3_ Z~4_
y=0.33 0.25,0.80 0.26,0.80 0.28,0.74 0.39,0.66
y=0.66 0.30,0.77 0.30,0.75 0.35,0.70 0.45,0.62
y=1 0.35,0.76 0.59,0.70 0.45,0.65 0.46,0.59
Defuzzified 0.5516

Table 4.

Indicators weight.

Indicator Weight Relative weight
Mobile internet AP coverage 0.5501 0.0532
Virtualized resource pool stability 0.6147 0.0594
Maturity of smart city application system 0.6959 0.0673
Failure rate of software and hardware 0.7241 0.0700
Data theft and falsification 0.4512 0.0436
Development level of information industry 0.5278 0.0510
Security strategy and management 0.3097 0.0299
Security O&M management level 0.5516 0.0533
Perfection of special emergency plan 0.4313 0.0417
Incidence of accidents caused by responsibility and authority 0.4007 0.0387
Key personnel controlled 0.6567 0.0635
Practitioner intelligence level 0.7216 0.0698
Anti-virus software coverage 0.5749 0.0556
Access control and identity authentication 0.6811 0.0659
Data encryption and recovery 0.8005 0.0774
Perfection of information security standards 0.5419 0.0524
Information security legal binding 0.4775 0.0462
Public awareness of information security 0.6294 0.0609

In order to verify the superiority of the IAA model, we conducted a comparison experiment of EIA and IA method use the same data of the 4 experts above according44 and45, results are shown directly as Fig. 9.

Figure 9.

Figure 9

IT2 FSs, EIA and IA using corresponding crisp intervals for each expert (a) Expert A, (b) Expert B, (c) Expert C, (d) Expert D, (e) Expert A-EIA, (f) Expert B-EIA, (g) Expert C-EIA, (h) Expert D-EIA, (i) Expert A-IA, (j) Expert B-IA, (k) Expert C-IA, (m) Expert D-IA.

A direct comparison was showed above, it is apparent that the shape of the sets generated by three models have similarity, illustrates the effectiveness of the IAA method in evaluation. EIA and IA are two classic method of T2-fuzzistics methodology to obtain IT2 FS models that have already proved by many researches about their practical and validity6569. Through above analysis, it can be known that IAA method models the intra-uncertainty in the primary membership, inter-uncertainty in the FOU, while EIA/IA method models the intra-uncertainty in the FOU, and do not capture the interval endpoints uncertainty. Next, the overall results demonstrate superiority of IAA when measuring different types of uncertainty (both inter and intra). EIA/IA combine both intra and inter-uncertainty in the triangular IT2 FS, different from the IAA using secondary membership to capture uncertainty across 4 experts, enable the capturing of both crisp and uncertain intervals, minimizing any loss of information and any assumptions.

Therefore, we summarize the different characteristics of the three methods and the superiority od IAA as:

  • (1) if the decision come from a single source, which is, the intervals are crisp, IAA generates T1FS while IA produce IT2 FSs to measure intra-uncertainty based on single or repeated surveys;

  • (2) if decisions come from multiple sources, which is, the intervals are crisp, IAA generates zGT2 FS to measure intra and inter uncertainty using primary and secondary membership while IA and EIA produce IT2 FS combining both types of uncertainty;

  • (3) the IAA approach enables the capturing and modeling of uncertain intervals which is currently not directly possible with the IA/EIA approaches.

Results and discussion

Based on the analysis results, the top 5 critical factors of smart city information security risk are: Data Encryption and Recovery (0.0774), Failure Rate of Software and Hardware (0.0700), Practitioner Intelligence Level (0.0698), Maturity of Smart City Application System (0.0673), Access Control and Identity Authentication (0.0659). From the results we deduct from the survey above, it can be seen that there are 2 index from the top 5 most important factors belong to the same category which is information security assurance (0.1989). And the rest of categories can be ranked by importance as information infrastructure (0.1799), information security personnel (0.1720), information technology (0.1647), information security environment (0.1594) and information management (0.1250). As the operations results show the rules and characters in the field of smart city information security, the policy orientation in the real world is also in agreement with it (we would give samples of those situation and cases in next paragraph), which prove that the methodology proposed in this paper can be used to analysis smart city information security during the government scientific decision-making process by giving the stakeholders a importance ranking reference, as they can use in relevant invest or policy-making programs.

In the context of the normalization of epidemic prevention and control, a large amount of data has been made publicly available to national research organizations in order to enhance epidemic traceability and prediction, leading to a significant increase in the difficulty of data encryption and recovery processing. Meanwhile, in the field of software and hardware, Huawei established the most stringent routing WIFI testing laboratory in Wuhan, 2019, gradually expanding its global market share through self-developed technology, and further enhancing China's global IT industry position. Further more, as the construction of smart cities continues, the construction of a new smart city puts forward higher requirements for the technological innovation and concept change of smart city practitioners, with a view to realizing the integration of smart city with financial technology, urban and rural planning, emergency decision-making and other fields. After Equifax and Alteryx data breaches, the need for authentication to protect privacy is increasing. The Chinese native open source server operating systems represented by Kylin focus on enhancing identity authentication, executing control mechanism and security audit70, but compared to the high level of security and reliability as it claimed, Kylin also faces problems like physical memory limits, unknown error occurred after resetting metadata71, etc.

In general, the development of China's smart city information security technology has achieved certain results, but still face many challenges. A large amount of foreign technologies and achievements have been applied in the core construction of China's smart city, bringing certain supply chain risks. In addition, with the world's urban development focusing on carbon emission and carbon neutrality, the construction and development of smart city have increased the strategic direction of reducing carbon emission, which puts forward new requirements for scientific and technological innovation and application. With the public attaching importance to the safety and sustainability of urban construction, the development of smart city in China should actively integrate social resources, strengthen technology R&D and promotion, truly realize the autonomy and controllability of core technology, and the refinement and intelligence of urban governance.

Based on the above analysis, we proposed the following strategy suggestions.

  • (1) Strengthen the top-level design of information security in smart city. Government departments should conduct overall coordination from the top-level design, formulate all-round information security strategies, policies, plans and schemes, establish and improve the information security management mechanism of smart city, to avoid overlapping or blank areas of the functions of participating departments.

  • (2) Build the smart city information security framework system. Combine the results from this paper above, optimizing access control is the focus and difficulty of managing information security risks in smart cities. In the application of smart city data, government should strengthen the security of the operating system, realize access control and hardware security through identity authentication technology and cloud storage security technology, to ensure the stability of the security system.

  • (3) Improve the smart city information security evaluation mechanism. Security assessment can help the government and relevant departments effectively analyze system risks, master system security status, make scientific decisions, and improve the level of information security. Combined with the research of this paper, the government should fully consider the information uncertainty in decision-making, and comprehensively improve the information security evaluation mechanism of smart city from assets, threats, vulnerability and security measures.

Conclusion

In this study, we discuss smart city information security risk prioritization problems using zGT2FSs and IAA method from the point of view of solving the problem of information loss in multi-criteria decision making. The results show that data encryption and recovery is the most critical factor affecting the smart city information security risk, and IAA method has apparently better ability to represent multidimensional uncertainty compared with EIA and IA. In the context of the normalization of COVID-19 prevention and control, it is very urgent to manage and protect a large number of data resources. As the operations results show the rules and characters in the field of smart city information security, the policy orientation in the real world is also in agreement with it, we suggest IAA method is very useful for capturing interval-based (survey) data and uncertainty information in fuzzy sets models by minimizing any assumptions or loss of information, which can supports crisp or uncertain intervals setting from multiple sources captured over different surveys. Compared with other MCDM methods such as VIKOR, TOPSIS, UAT etc., the IT2FSs & IAA method is also more realistic and easier to comprehend and implement.

However, there are still some deficiencies in this paper. Firstly, we only adopt 4 experts in this paper for case study, although there are advantages such as adequacy of the small number of decision makers and ease of application, limited to the computing complexity of high-class fuzzy logic system, the sample size is not big enough to a certain extent. Secondly, we have not proposed a practical case study from one or some smart cities in China as samples due to the general model data set limitation. In the future, we would aim to adopt reduct algorithms and machine learning to optimization computing process, enlarge the group number of experts, and we are also working on explore practical applications focusing on conducting a web- or mobile-app-based data collection exercise, which will expand the IAA method to access more representative data and evaluate the proposed approach in real-world contexts.

Supplementary Information

Supplementary Information. (145.4KB, docx)

Author contributions

Conceptualization, Y. Wang, H. Zhao and X. Liu; methodology, Y. Wang (section 2 and 3); data curation, Y. Wang and X. Liu (Table 1-4); writing—original draft preparation, Y. Wang; writing—review and editing, H. Zhao and X. Liu; supervision, H. Zhao; project administration, H. Zhao. All authors reviewed the manuscript.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary Information

The online version contains supplementary material available at 10.1038/s41598-022-07197-1.

References

  • 1.Zhan Y, Li S. Financial development, technical innovation, and the construction of smart cities: An information development perspective. J. Finan. Econ. 2016;42:4–15. [Google Scholar]
  • 2.Li G, Li Y. Construction of emergency decision-making intelligence system against the background of smart city. J. Library Sci. China. 2016;42:39–54. [Google Scholar]
  • 3.Yu W, Xu C. Technological and political rationalities of smart city initiatives in China-An empirical analysis based on 147 cities. J. Public Manag. 2016;13:127–138. [Google Scholar]
  • 4.Lim H, Taeihagh A. Autonomous vehicles for smart and sustainable Cities: An in-depth exploration of privacy and cybersecurity implications. Energies. 2018;11:1062. [Google Scholar]
  • 5.Wang J, Li C, Xiong Z, et al. Survey of data-centric smart city. J. Comput. Res. Dev. 2014;51:239–259. [Google Scholar]
  • 6.Tang S, Zhang Y, Shan Z, et al. Development status, situation and policy suggestions of new smart city in China. E-Government. 2020;04:70–80. [Google Scholar]
  • 7.Hadi H, Brian H, Fazel A, et al. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustain. Cities Soc. 2019;05:101660. [Google Scholar]
  • 8.Xu H. Developing smart cities based on “digital twin”. Frontiers. 2020;08:94–99. [Google Scholar]
  • 9.Yin L, Zhang C. Summary of theoretical research and practical progress of smart city in China. E-Government. 2019;01:111–121. [Google Scholar]
  • 10.Harrison C, Eckman B, Hamilton R, et al. Foundations for smarter cities. IBM J. Res. Dev. 2010;54:1–16. [Google Scholar]
  • 11.Barlow M, Lévy-Bencheton C. Smart City, Smart Future: Showcasing Tomorrow. Wiley; 2018. [Google Scholar]
  • 12.Gassmann O, Jonas B, Maximilian P. Smart Cities: Introducing Digital Innovation to Cities. Emerald Group Publishing; 2019. [Google Scholar]
  • 13.Anthopoulos LG. Understanding Smart Cities: A Tool for Smart Government or an Industrial Trick? Springer; 2017. [Google Scholar]
  • 14.Zhuhadar L, Thrasher E, Marklin S, et al. The next wave of innovation-review of smart cities intelligent operation systems. Comput. Hum. Behav. 2017;66:273–281. [Google Scholar]
  • 15.Mattoni B, Gugliermetti F, Bisegna F. A multilevel method to assess and design the renovation and integration of smart cities. Sustain. Cities Soc. 2015;15:105–119. [Google Scholar]
  • 16.Xiang S, Zou K, Jiang Z, et al. Risk prediction of smart city information security based on random forest. Chinese J. Manag. Sci. 2016;24:266–270. [Google Scholar]
  • 17.Hou, L. Information Security Risks of Smart Cities Influencing Factors. Master Thesis. (Xiangtan University, 2020).
  • 18.Mao Z, Mei H, Xiao Y, et al. Risk assessment of smart city information security based on Bayesian network. J. Mod. Inf. 2020;40:19–26. [Google Scholar]
  • 19.Felipe, S., & Carlos, A. Smart City Security Issues: Depicting Information Security Issues in the Role of a Urban Environment. in 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, London (2014).
  • 20.Moch N, Wereda W. Smart security in the smart city. Sustainability. 2020;12(23):9900. [Google Scholar]
  • 21.Wang Y, Li L, Yu H. Construction of risk and security system for information security of smart city. Video Eng. 2021;45:148–151. [Google Scholar]
  • 22.Sun J, Pei L, Qiu P, et al. The challenge and success experience of smart city initiatives-based on literature review and case analysis. Library Inf. 2016;06:18–24. [Google Scholar]
  • 23.Yunbo L, Anshen L. Analysis of the challenges and solutions of building a smart city. Int. Conf. Constr. Real Estate Manag. 2013;2013:1511–1515. [Google Scholar]
  • 24.Zou K, Xiang S, Zhang Z, et al. Model construction and empirical study on smart city information security risk assessment. Library Inf. Serv. 2016;60:19–24. [Google Scholar]
  • 25.Huang J, Dou L, Fang H, et al. Distributed backstepping-based adaptive fuzzy control of multiple high-order nonlinear dynamics. Nonlinear Dyn. 2015;81:63–75. [Google Scholar]
  • 26.Chen CLP, Ren C, Du T. Fuzzy observed-based adaptive consensus tracking control for second-order multiagent systems with heterogeneous nonlinear dynamics. IEEE Trans. Fuzzy Syst. 2016;24:906–915. [Google Scholar]
  • 27.Oscar C, Leticia A, Juan R, et al. A comparative study of type-1 fuzzy logic systems, interval type-2 fuzzy logic systems and generalized type-2 fuzzy logic systems in control problems. Inf. Sci. 2016;354:257–274. [Google Scholar]
  • 28.Bustince H, et al. A historical account of types of fuzzy sets and their relationships. IEEE Trans. Fuzzy Syst. 2016;24:179–194. [Google Scholar]
  • 29.Rodríguez RM, Martínez L, Torra V, et al. Hesitant fuzzy sets: State of the art and future directions. Int. J. Intell. Syst. 2014;29:495–524. [Google Scholar]
  • 30.Wagner C, Hagras H. Toward general type-2 fuzzy logic systems based on zSlices. IEEE Trans. Fuzzy Syst. 2010;18:637–660. [Google Scholar]
  • 31.Benzmüller C. Combining and automating classical and non-classical logics in classical higher-order logics. Ann. Math. Artif. Intell. 2011;62:103–128. [Google Scholar]
  • 32.Rohrlich F. Why physics needs mathematics. Gen. Relativ. Gravity. 2011;43:3665–3669. [Google Scholar]
  • 33.Dellunde P, García-Cerdaña À, Noguera C. Löwenheim-Skolem theorems for non-classical first-order algebraizable logics. Logic J. IGPL. 2016;24:321–345. [Google Scholar]
  • 34.Zadeh L. Fuzzy sets. Inf. Control. 1965;8:338–353. [Google Scholar]
  • 35.Zadeh L. The concept of a linguistic variable and its application to approximate reasoning—I. Inf. Sci. 1975;8:199–249. [Google Scholar]
  • 36.Patricia M, Oscar C. A review on type-2 fuzzy logic applications in clustering, classification and pattern recognition. Appl. Soft Comput. 2014;21:568–577. [Google Scholar]
  • 37.Wu D, Mendel JM. A comparative study of ranking methods, similarity measures and uncertainty measures for interval type-2 fuzzy sets. Inf. Sci. 2009;179:1169–1192. [Google Scholar]
  • 38.Karnik NN, Mendel JM. Operations on type-2 fuzzy sets. Fuzzy Sets Syst. 2001;122:327–348. [Google Scholar]
  • 39.Sarah G, Francisco C, Simon C, et al. The collapsing method of defuzzification for discretised interval type-2 fuzzy sets. Inf. Sci. 2009;179:2055–2069. [Google Scholar]
  • 40.Mendel JM. General type-2 fuzzy logic systems made simple: A tutorial. IEEE Trans. Fuzzy Syst. 2014;22:1162–1182. [Google Scholar]
  • 41.Mendel JM, John RIB. Type-2 fuzzy sets made simple. IEEE Trans. Fuzzy Syst. 2002;10:117–127. [Google Scholar]
  • 42.Coupland S, John R. Geometric type-1 and type-2 fuzzy logic systems. IEEE Trans. Fuzzy Syst. 2007;15:3–15. [Google Scholar]
  • 43.Mendel JM, Hagras H, Tan W, et al. Introduction to Type-2 Fuzzy Logic Control: Theory and Application. Wiley; 2014. [Google Scholar]
  • 44.Liu F, Mendel J. Encoding words into interval type-2 fuzzy sets using an interval approach. IEEE Trans. Fuzzy Syst. 2008;16:1503–1521. [Google Scholar]
  • 45.Coupland S, Mendel J, Wu D. Enhanced interval approach for encoding words into interval type-2 fuzzy sets and convergence of the word FOUs. Proc. IEEE Int. Conf. Fuzzy Syst. 2010;2010:1–8. [Google Scholar]
  • 46.Wu D, Mendel J, Coupland S. Enhanced interval approach for encoding words into interval type-2 fuzzy sets and its convergence analysis. IEEE Trans. Fuzzy Syst. 2012;20:499–513. [Google Scholar]
  • 47.Dongrui WU, Zhigang ZENG, Hong MO, et al. Interval type-2 fuzzy sets and systems: Overview and outlook. ACTA Autom. Sin. 2020;46:1539–1556. [Google Scholar]
  • 48.Wagner C, Miller S, Garibaldi JM, et al. From interval-valued data to general type-2 fuzzy sets. IEEE Trans. Fuzzy Syst. 2014;23:248–269. [Google Scholar]
  • 49.Chao F, Zhou D, Lin C, et al. Type-2 fuzzy hybrid controller network for robotic systems. IEEE Trans. Cybern. 2020;50:3778–3792. doi: 10.1109/TCYB.2019.2919128. [DOI] [PubMed] [Google Scholar]
  • 50.McCulloch J, Wagner C. On the choice of similarity measures for type-2 fuzzy sets. Inf. Sci. 2020;510:135–154. [Google Scholar]
  • 51.Wu D, Mendel JM. Similarity measures for closed general type-2 fuzzy sets: Overview, comparisons, and a geometric approach. IEEE Trans. Fuzzy Syst. 2019;27:515–526. [Google Scholar]
  • 52.Havens TC, Anderson DT, Wagner C. Data-informed fuzzy measures for fuzzy integration of intervals and fuzzy numbers. IEEE Trans. Fuzzy Syst. 2015;23:1861–1875. [Google Scholar]
  • 53.X. Jinping. Build a Moderately Prosperous Society in an All Round Way and Win the Great Victory of Socialism with Chinese Characteristics in the New Era. in Report at the 19th National Congress of the Communist Party of China. http://cpc.people.com.cn/n1/2017/1028/c64094-29613660.html.
  • 54.Li X, Li H, Sun B, et al. Assessing information security risk for an evolving smart city based on fuzzy and grey FMEA. J. Intell. Fuzzy Syst. 2018;34:2491–2501. [Google Scholar]
  • 55.Andrea L, Giacomo L. RFID-plants in the smart city: Applications and outlook for urban green management. Urban For. Urban Green. 2014;13:630–637. [Google Scholar]
  • 56.Haeckel E. Generelle Morphologie Der Organismen. De Gruyter; 1866. [Google Scholar]
  • 57.Shihai T, Jiayu Z, Meiqi S. Research on the derivation of internet public opinion information ecological community based on improved SIR. Inf. Sci. 2020;38:3–9. [Google Scholar]
  • 58.Jayavardhana G, Rajkumar B, Slaven M, et al. Internet of things (IoT): A vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 2013;29:1645–1660. [Google Scholar]
  • 59.Schmidt KA, Sasha D, Jan A. The ecology of information: An overview on the ecological significance of making informed decisions. Oikos. 2010;119:304–316. [Google Scholar]
  • 60.Nazi KM. The personal health record paradox: Health care professionals' perspectives and the information ecology of personal health record systems in organizational and clinical settings. J. Med. Internet Res. 2013;2013:14. doi: 10.2196/jmir.2443. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 61.Finin T, Joshi A, Kolari P, et al. The information ecology of social media and online communities. AI Mag. 2008;29:77–92. [Google Scholar]
  • 62.Dou Y. Research on construction of “3×3” emergency intelligence system from the perspective of information ecology. Library Inf. Serv. 2020;64(15):82–89. [Google Scholar]
  • 63.Wei F. Study on theory, method and optimization countermeasures of network information ecological environment evaluation. Inf. Sci. 2021;39(10):146–151. [Google Scholar]
  • 64.Bekkers VJJM, Homburg V, editors. The Information Ecology of e-Government: e-Government as Institutional and Technological Innovation in Public Administration. IOS Press; 2005. [Google Scholar]
  • 65.Jennison C, Turnbull BW. Interim analyses: The repeated confidence interval approach. J. R. Stat. Soc.: Ser. B (Methodol.) 1989;51(6):305–334. [Google Scholar]
  • 66.King RP, Robison LJ. An interval approach to measuring decision maker preferences. Am. J. Agric. Econ. 1981;63(3):510–520. [Google Scholar]
  • 67.Cocks K, Torgerson DJ. Sample size calculations for pilot randomized trials: A confidence interval approach. J. Clin. Epidemiol. 2013;66(2):197–201. doi: 10.1016/j.jclinepi.2012.09.002. [DOI] [PubMed] [Google Scholar]
  • 68.Coupland S, Mendel JM, Wu D. Enhanced interval approach for encoding words into interval type-2 fuzzy sets and convergence of the word fous. Int. Conf. Fuzzy Syst. IEEE. 2010;2010:1–8. [Google Scholar]
  • 69.Mendel JM. A comparison of three approaches for estimating (synthesizing) an interval type-2 fuzzy set model of a linguistic term for computing with words. Granular Comput. 2016;1(1):59–69. [Google Scholar]
  • 70.Lv P, Zhao R, Wang C, et al. Design and implementation of SRIO routing based on NeoKylin system. Radio Eng. 2021;51(06):492–497. [Google Scholar]
  • 71.Liu K, Gu J, Du Y, et al. Development of PXI instrument software based on QT and NeoKylin operating system. Comput. Meas. Control. 2019;27(10):159–162. [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Supplementary Materials

Supplementary Information. (145.4KB, docx)

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES