| Literature DB >> 26712752 |
José Antonio Sánchez Alcón1, Lourdes López2, José-Fernán Martínez3, Gregorio Rubio Cifuentes4.
Abstract
The products and services designed for Smart Cities provide the necessary tools to improve the management of modern cities in a more efficient way. These tools need to gather citizens' information about their activity, preferences, habits, etc. opening up the possibility of tracking them. Thus, privacy and security policies must be developed in order to satisfy and manage the legislative heterogeneity surrounding the services provided and comply with the laws of the country where they are provided. This paper presents one of the possible solutions to manage this heterogeneity, bearing in mind these types of networks, such as Wireless Sensor Networks, have important resource limitations. A knowledge and ontology management system is proposed to facilitate the collaboration between the business, legal and technological areas. This will ease the implementation of adequate specific security and privacy policies for a given service. All these security and privacy policies are based on the information provided by the deployed platforms and by expert system processing.Entities:
Keywords: Internet of Things; Smart Cities; Smart Grid; Utility Matrix; Wireless Sensor Network; personal data protection; privacy; security services
Year: 2015 PMID: 26712752 PMCID: PMC4732049 DOI: 10.3390/s16010016
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Smart City applications.
| Applications | Target |
|---|---|
| Smart Economy | Innovative spirit; Entrepreneurship; Economic image/trademarks; Productivity; Flexibility of labor market; International embeddedness. |
| Smart People | Level of qualification; Affinity to lifelong learning; Social and ethnic plurality; Flexibility; Creativity; Cosmopolitanism/Open-mindedness; Participation in public life. |
| Smart Governance | Participation in decision-making; Public and social services; Transparent governance; Political strategies/perspectives |
| Smart Mobility | Local accessibility; Accessibility; Availability of ICT-infrastructure; Sustainable, innovative and safe transport systems |
| Smart Environment | Natural conditions; Pollution; Environmental protection; Sustainable resource management |
| Smart Living | Cultural facilities; Health conditions; Individual safety; Housing quality; Education facilities; Social cohesion |
Figure 1Registration and discovery of subsystems and services in ACCUS.
Figure 2(a) Overall layout; (b) Ontology connector.
Figure 3Registration of a service in ACCUS.
Figure 4Discovery process in ACCUS.
Figure 5Joint service in the city as the superposition of individual services.
Figure 6Selection chain of security mechanisms.
Figure 7Involved information. Automatic Selection System for making decisions concerning security and privacy policies.
Figure 8Expert System. Automatic Selection System for making decisions over security and privacy policies.
Figure 9Working network.
Figure 10Mediation chain.
Figure 11Overview of the system operation.
Figure 12The most important information to select the adequate security and privacy mechanisms.
Processing stages.
| Information Involved | ||
|---|---|---|
| Input | Knowledge Base | Output |
| Business Knowledge | ||
| Laws and standards Knowledge | ||
| Attacks, security services, mechanisms Knowledge | ||
| Business Knowledge | ||
| Validity check | ||
Utility Matrix: Service.
| Utility Matrix: | Description |
|---|---|
| Service name | Living at home longer autonomously and safely. |
| Service Type | Health-care; Safety |
| Environment Type | Home |
| Country | Spain |
| Promoter | Joint venture: Health care and Home insurance companies |
| User | Elder people |
| Monitored person | People and rooms at home. |
| Legal capacity of person | Full legal capacity |
| Special needs person | Elder people with logical limitations, without special needs |
| Continuity of service | Push button, critical sensors for life: CO, smoke, gas, presence sensor and outside door and windows open and critical sensor for service. |
| Critically of the service | high |
| Network type | NW_Type1 |
Utility Matrix: Network type for the service.
| Network Type: | Living at Home Longer Autonomously and Safely |
|---|---|
| Network Type Name | NW_Type1 |
| Mote resources limit | Wearable mote: Memory to store data on standalone operation |
| Connectivity | Radio |
| Communications | Wearable mote—Gateway, via radio when push button is pressed to call with assistant center. ZigBee connection between wearable node and sink for send data via internet to the assistant center. |
| The home sensors—sync via ZigBee and connection via internet from gateway to service provider. In case of CO, gas or smoke alarm, is communicated to actuators to shut down the problem and open outside window and send alarm to the person. | |
| BS Resources Limit | None, when power is down, it has batteries and connections via GSM, 3G. In home there is an emergency battery for four hours (emergency light and sensors power). |
| Topology | Star |
| Nodes Roles | The wearable node has collected basically function |
| All nodes has collected basically function except window sensor node; it has an actuator function to open outside window directly when CO, gas or smoke are detected. | |
| Routing | Routing is unicast for all sensors to Gateway. |
Legal Imperatives in DPIA-T format.
| DPIA-T: Living at Home Longer, Autonomously and Safely | |||
|---|---|---|---|
| Security Service | Attack | Target | Defence |
| Availability | DoS | 1) The physical layer is degraded and the communication among nodes is impossible (jamming). | The situation must be known to face it. |
| 2) A spurious node starts sending malicious data packets to the network. | |||
| Authentication | Sybil | A node is asking for multiple IDs, and if the attack succeeds, the node is able to subvert the trust mechanism. | Restore trust mechanism by rejecting the malicious node. |
| Node replication | When a node ID is copied, replicated in a new node, and then introduced in the network. From that moment on, the network accepts the node with the cloned ID as an authorized node. | Realize and revoke the malicious node. | |
| False node | It introduces data traffic in the network to stop legitimate nodes from communicating (injecting false data messages, requesting authorization continuously, | Identify the false node and discard all messages. | |
| Integrity | Message corruption | When a message reaches the recipient with a different content than the one sent by the source. This situation is either because the message has been degraded in the transmission, or because the message has been intercepted and intentionally changed. | Ensure that messages have not been altered. |
| Privacy | Eavesdropping | Other devices listening in the same frequency may intercept all communications between two nodes. | Provide authentication and ciphering capabilities. |
| Use data anonymization. | |||
| Node subversion | When a node is captured and cryptoanalyzed the secret keys, node ID, security policies, and so forth are disclosed. | Use few data stored in each node and renew the keys. | |
Data protection over data sets.
| Sensor | Reason | Tipo | Auth | Integr | Privacy | Avail | Intruders Insiders | |
|---|---|---|---|---|---|---|---|---|
| 1 | Push button | Emergency | Body | - | - | - | Y | - |
| 2 | Temperature | Private information | Y | Y | Y | Y | Y | |
| 3 | heart rate | |||||||
| 4 | Fall detector | |||||||
| 5 | Temperature | Auxiliary Information | Home | Y | Y | - | Y | |
| 6 | CO | Vital for life | - | |||||
| 7 | Smoke | - | ||||||
| 8 | Gas | - | ||||||
| 9 | Water flood | - | ||||||
| 10 | Door | Vital for security | Y | |||||
| 11 | Window | |||||||
| 12 | Presence | Vital for Service | ||||||
| 13 | Pres in bed | |||||||
Trust domains defined.
| Sensor | Trust Domain | Sensor Type | |
|---|---|---|---|
| 1 | Push button | Out of domains | Wearable |
| 2 | Temperature | Domain 1 Policy | |
| 3 | heart rate | ||
| 4 | Fall detector | ||
| 5 | Temperature | Domain 2 Policy | Home |
| 6 | CO | ||
| 7 | Smoke | ||
| 8 | Gas | ||
| 9 | Water flood | ||
| 10 | Door | Domain 1 Policy | |
| 11 | window | ||
| 12 | Presence | ||
| 13 | Presence in bed | ||
Trust domain 1 policies.
| Domain 1 Policy | ||
|---|---|---|
| Security Service | Attack | Countermeasure |
| Availability | DoS | |
| Authentication | Sybil | |
| Node replication | It provides two mechanisms to avoid this attack. | |
| False node | ||
| Integrity | Message corruption | |
| Privacy | Eavesdropping | |
| Node subversion | ||
Trust domain 2 policies.
| Domain 2 Policy | ||
|---|---|---|
| Availability | DoS | |
| Authentication | Sybil | |
| Node replication | ||
| False node | ||
| Integrity | Message corruption | |
Restrictions and limitations.
| Sensor | Critical Requirement | ||
|---|---|---|---|
| Battery | Delay | ||
| 1 | Push button | Y | N |
| 2 | Body Temperature | Y | |
| 3 | Heart rate | ||
| 4 | Fall detector | ||
| 5 | Home Temperature | N | N |
| 6 | CO | Y | |
| 7 | Gas | ||
| 8 | Smoke | ||
| 9 | Water flood | ||
| 10 | Outside door | N | |
| 11 | window | ||
| 12 | Presence at home | ||
| 13 | Presence in bed | ||
Figure 13Energy spent vs. security services.
Figure 14Delay vs. security services.
Citizen protection impact and reaction.
| Impact and Reaction: | ||||
|---|---|---|---|---|
| Security Service | Incidences | Impact | Resolution Time | Pending |
| Authentication | 7 | 1 | Manually | 0 |
| Integrity | 7 | 1 | Manually | 0 |
| Privacy | 7 | 2 | Manually | 0 |
| Other incidences | - | |||
System parts behavior.
| 10 | 4 | 70 ms | |
| 6 | 0 | 4.2 s | |
| 6 | 0 | 3.2 s | |
| 6 | 0 | 120 ms | |
| 6 | 0 | 3.5 s | |
| 6 | 0 | 30 ms | |
| 6 | 0 | 50 ms | |
| 6 | 0 | 7.8 s | |
| 6 | 0 | 12.1 s | |
| Internal process. is possible to do it with the information received? | |||
| 6 | 0 | 340 ms | |
| Generate the actuations and configure the testing nodes. | |||
| 6 | 18.21 min | ||