<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="nlm-ta">REA Press</journal-id>
      <journal-id journal-id-type="publisher-id">null</journal-id>
      <journal-title>REA Press</journal-title><issn pub-type="ppub">3042-1349</issn><issn pub-type="epub">3042-1349</issn><publisher>
      	<publisher-name>REA Press</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">https://doi.org/10.22105/sci.v2i3.44</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Research Article</subject>
        </subj-group>
        <subj-group><subject>Smart city, Secure data transmission, Encryption, Key management, Cybersecurity, Authentication protocols</subject></subj-group>
      </article-categories>
      <title-group>
        <article-title>Enhancing data security and trust in IoT-based smart city infrastructures</article-title><subtitle>Enhancing data security and trust in IoT-based smart city infrastructures</subtitle></title-group>
      <contrib-group><contrib contrib-type="author">
	<name name-style="western">
	<surname>Fakheri </surname>
		<given-names>Soheil</given-names>
	</name>
	<aff>Department of Computer Engineering and Information Technology, La.C., Islamic Azad University, Lahijan, Iran.</aff>
	</contrib><contrib contrib-type="author">
	<name name-style="western">
	<surname>Alimoradi</surname>
		<given-names>Mahmud</given-names>
	</name>
	<aff>Department of Computer Engineering, Ayandegan Institute of Higher Education, Tonekabon, Iran.</aff>
	</contrib></contrib-group>		
      <pub-date pub-type="ppub">
        <month>09</month>
        <year>2025</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>23</day>
        <month>09</month>
        <year>2025</year>
      </pub-date>
      <volume>2</volume>
      <issue>3</issue>
      <permissions>
        <copyright-statement>© 2025 REA Press</copyright-statement>
        <copyright-year>2025</copyright-year>
        <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.5/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</p></license>
      </permissions>
      <related-article related-article-type="companion" vol="2" page="e235" id="RA1" ext-link-type="pmc">
			<article-title>Enhancing data security and trust in IoT-based smart city infrastructures</article-title>
      </related-article>
	  <abstract abstract-type="toc">
		<p>
			The increasing deployment of Internet of Things (IoT) devices has significantly impacted the development and management of smart city infrastructures. These devices facilitate automation, real-time data collection, and efficient resource management across various sectors, including transportation, healthcare, energy, and environmental monitoring. However, integrating diverse IoT devices across vast networks has introduced a new array of security challenges, primarily associated with data transmission vulnerabilities. Secure data transmission in IoT networks is crucial to prevent data breaches, unauthorized access, and cyber-attacks that can compromise sensitive information, disrupt services, and threaten public safety.  This paper presents a comprehensive approach to secure data transmission in IoT-based smart city networks, leveraging a multi-layered security model. The proposed solution combines advanced encryption techniques, secure key management protocols, and robust authentication mechanisms to ensure data confidentiality, integrity, and availability across IoT networks. We incorporate AES-256 encryption for efficient and high-speed data encryption, Public Key Infrastructure (PKI) for device authentication, and the Diffie-Hellman key exchange protocol for secure key management. Additionally, we utilize lightweight communication protocols like Message Queuing Telemetry Transport (MQTT) with Transport Layer Security (TLS) to maintain data integrity while minimizing computational overhead on resource-constrained devices.
		</p>
		</abstract>
    </article-meta>
  </front>
  <body></body>
  <back>
    <ack>
      <p>null</p>
    </ack>
  </back>
</article>