Iotunit 5
Iotunit 5
Indeed, IoT is a more demanding environment in terms of scalability and man- ageability
due both to the potentially unbounded number of things (resources and subjects), the
expected most relevant need to support the orchestration and integration of different
services, the relevance of short-lived, often casual and/ or spontaneous interaction
patterns, the relevance of contexts, etc.
Fig. 4.4 Capability-based authorization architectural components and their interactions
The issue of security and privacy is therefore central in the BUTLER project and develops in
several requirements, the main require- ments relate to:
Standard issues of data security, both at data storage level as at data communication level
exists in IoT application.
The application enabled by the Internet of Things may pose additional privacy issues in
the use that is made of the data
However, Privacy and Security do not only refer to security of the exchange of data over the
network, but shall also include:
(a) Protection of the accu- racy of the data exchanged,
(b) Protection of the server information,
(c) Protec- tion of the usage of the data by explicit, dynamic authorization mechanisms,
(d) Selected disclosure of Data and
(e) The implementation of “Transparency of data usage” policies.
4. Security, Privacy and Trust in Iot-Data-Platformsfor Smart Cities
Smart City technologies is to provide different optimization mechanisms for different aspects of
data management
Figure 5.1 shows the components of a typical smart city information sys-tem. From this
picture it is clearly visible that information needs to cross multiple administrative boundaries
and can be used for multiple purposes —in fact it could be used for, at the time of gathering,
unknown purposes
Fig. 5.1 Architectural components
The major proper- ties of SoS especially for application fields as those intended in the
SMARTIE project are dependability, security and privacy. Dependability comprises the
following attributes:
• Availability — readiness for correct service
• Reliability — continuity of correct service
• Safety — absence of catastrophic consequences on the system user and its
environment
• Integrity — lack of inappropriate system alternations
• Maintainability — ability to undergo updates and repairs
The main aspects of security are confidentiality (absence of unauthorized disclosure of
information), integrity, (the prevention of unauthorized modification or deletion of information)
andavailability for authorized actions.
There is a limited theory on how to SoS should be managed [19]. The authors present five
characteristics that give possible representation of funda- mental building blocks for realizing
and managing SoS.
• Autonomy — the ability to make independent choices — the SoShas a higher purpose
than any of its constituent systems, indepen-dently or additively.
• Belonging — happiness found in a secure relationship — systems
may need to undergo some changes to be part of SoS.
• Connectivity — the ability of system to link with other systems — systems are
heterogeneous and unlikely to conform to a priori con- nectivity protocols and the SoS
relies on effective connectivity indynamic operations.
• Diversity — distinct elements in a group — SoS can achieve its
purposes by leveraging the diversity of its constituent systems.
Emergence — new properties appear in the course of development or evolution — SoS has
dynamic boundaries, which are always clearly defined, SoS should be capable of developing
an emergence culture with enhanced agility and adaptability
FAIR (fuzzy-based aggregation providing in-network resilience) [43] is an example how trust
can be established and maintained at least between a base station and sensor node in the field.
The strength of FAIR is the com- patibility with the aggregation hierarchy that makes FAIR
well suitable for medium size or large sensor networks
There are three roles pseudo-randomly distributed among the nodes at the begin- ning of
each epoch: the Aggregator Node, the Normal Nodes and the Storage Nodes. The protocol
consists of two message rounds, where each message is authenticated and broadcasted:
(1) Periodically, the aggregator node triggers the network to start an aggregation process;
each node senses the environment and sends back its measurement.
(2) The aggregator node collects all the values, removes the outliers and computes the
aggregate, which consists of the result and a measure of precision. This precision
expresses the dispersion of the “genuine” data set.
Figure 5.2 gives an overview on those two protocol rounds.
Fig. 5.2 General overview of the protocol: 1. AN triggers the network 2. Network sends back
measurements
3. AN aggregates data and send back the tuple [result; precision] 4. Every node checks the
result and sends a confirmation message to the SN.
Minimal Disclosure
Individuals wish to control their personal information in the online domain, especially as more and
more sensors are available that could be linked to theuser in order to generate data
Three features of privacy-friendly credentials are informally described in NSTIC [28]
documents:
(1) Issuance of a credential cannot be linked to a use, or “show,” of the credential even if the
issuer and the relying party share information, except as permitted by the attributes
certified by the issuer and shown to the relying party.
(2) Two shows of the same credential to the same or different relying parties cannot be
linked together, even if the relying parties shareinformation.
(3) The user agent can disclose partial information about the attributes asserted by a
credential. For example, it can prove that the user if over 21 years of age based on a
birthdate attribute, without disclos- ing the birthdate itself.
Secure Authentication and Access Control in Constrained Devices
Embedded systems and especially wireless sensor nodes can be easilyattacked. This is due
to the fact that they are normally unprotected by crypto- graphic means
State of the Art: There are several lightweight security approaches designed for wireless sensor
networks. The SPINS [12] protocols encompass authenticated and confidential
communication, and authenticated broadcast. [13] uses asymmetric cryptographic schemes to
exchange secret session keys between nodes and symmetric crypto approaches for data
encryption.
present LiSP: a lightweight security protocol, which supports all security attributes, but at a
high level of power consumption when compared to the protocols
The lightweight security approach presented in [16] is based on the RC4 stream cipher. It
provides data confidentiality, data authentication, data integrity, and data freshness with low
overhead and simple operation.
6. Smartie Approach
The vision of SMARTIE1 (Secure and sMArter ciTIEs data management) is to create a
distributed framework for IoT based applications sharing large vol- umes of heterogeneous
information. This framework is envisioned to enable end-to-end security and trust in information
delivery for decision-making pur- poses following data owner’s privacy requirements. New
challenges identified for privacy, trust and reliability are:
• Providing trust and quality-of-information in shared information models to enable
re-use across many applications.
• Providing secure exchange of data between IoT devices and con-
sumers of their information.
• Providing protection mechanisms for vulnerable devices.
SMARTIE will design and build a data-centring information sharing platform in which information
will be accessed through an information service layer operating above heterogeneous network
devices and data sources and provide services to diverse applications in a transparent manner
It is crucial for the approach that all the layers involve appropriate mechanisms to protect the data
already at the perception layer as well as at the layers on top of it.
SMARTIE will focus on key innovations that strengthen security, privacy and trust at different
IoT Layers as depicted in the following table:
IoT layers Security requirements
Smart Transportation
Smart City Objectives
Improving the management of the public transportation networks to foster greater use of
sustainable transport modes and to providetime and cost benefits to travellers.
• Involving user smartphones in order to include additional informa- tion related to their
travels.
• Improving the management of individual motor car traffic, to
reduce travelling time in the town, improve traffic flow and reduce fine dust
pollution.
• Extending traffic control systems with mobile traffic control sys-
tems to react fast on abnormal situations, planned ones (e.g. road reconstruction)
and also unplanned ones (e.g. accidents).
• Exploiting heterogeneous wireless sensor networks placed on pub-
lic transport vehicles and in the environment (streets etc.) e.g. sta- tionary traffic
sensors/actuators placed at cruces of the transporta-tion network.
Usage
• Public transportation companies monitor the current demand of travellers for public
transportation for certain routes and optimise the number of vehicles to match the
demand. They also monitor location of all public vehicles.
• Travel plan component located on the cloud infrastructure calcu-
lates the best routing option for the traveller taking into account the traveller location,
expected arrival times and current traffic condi- tions. This information is then
forwarded to the associated smart-phone application and presented to the traveller.
• City traffic authorities monitor the current traffic conditions:
• Monitoring energy efficient in the campus considering energy con- sumption and
energy generation.
• Evaluating real-time behaviour of systems jointly acting as a sus-
tainable ecosystem.
• Providing the user capability to interact with the system to facilitate the improvement
of the energy efficiency.
Usage
• Energy Supervisor entity will be able to collect from the different sources:
information in real time about building consumption and energy generation from the
different entities involved (photovoltaic generators).
• Energy Monitoring entity will collect data from the sensors being
deployed and also data aggregated and summarized about the dif- ferent energy
producers to take decisions over different actuators involved in the system.
• Energy Producer will provide data aggregated to the Entity Mon-
itoring based on the agreement established and will provide more detail data to the
Energy Supervisor as main regulator.
• User will provide in certain situations their positions and presence information to the
Energy Monitoring entity by means of the sensor within the building or light-street
pathways.
• Access to the data of the sensor should be controlled based on access control and
privacy rules. Hence only certain services of the entity monitoring could read or act over
them especially in the case the monitoring entity is a third party.
• The exchange will require mechanisms including data protection
and integrity in the transfer between the different parties.
• Scalable and secure management protocol which lets the verifica- tion and
authentication of new sensors deployed and ensure the extension of the trust domain
to new devices in the deployment environment.
• Entities are actually restricted to use the data based on the national
protection data law. They will like to explore how to reuse the data and possible being
able to share to third parties but also controlling what can be shared based on
legislation.
• Data exchange between entities needs to follow data minimization
principles and allow traceability.
• User data information exchange could be in some case anonymous and in other case could
be needed some control over the distribution of data.