Skip to main content

Internet of Things for Developing Smart Sustainable Cities (SSC): A Security Perspective

  • Chapter
  • First Online:

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

We live in a fast-growing world and the Internet of Things (IoT) is an emerging technological paradigm of this world. Real growth in population, economy, and technology is focused on better well-being of human beings and the preservation of our environment. Cities across nations gear towards such smart and sustainable growth. In this context, the IoT is one such technology which has great potential to develop such smart sustainable cities. Information gathered through physical objects, transferred via advanced communication media, can be processed through high computation systems to generate information processes. These processes can help the city administrators towards providing information that is essential for maintenance services in a coordinated way. The IoT ensures quick and automated decisions, smart services, and better utilization of resources. In this way, the IoT paradigm opens the gate for information-based automated smart city governance which can bring all around development and well-being for its citizens. However, the success of any technology, to a large extent, depends on its security with questions such as how safe and secure the proposed technology is in managing its devices and networks and how best it can withstand such attacks. All this needs to be studied. Developing smart sustainable cities (SSC) presents many security challenges. Since the IoT is mostly composed of RFID (radio-frequency identification) and wireless sensor nodes, device security and network security which connect these devices need serious consideration. Additionally, inbuilt IoT constraints of heterogeneity, limited resource capability, scalability, and interoperability also raise urgent challenges in developing SSC. Therefore, while developing SSC, one has to consider seriously the security requirements in great detail. This chapter aims to discuss security aspects of SSC in the context of IoT.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Borgia E (2016) The internet of things vision: key features, applications and open issue. Comput Commun 54:1–31

    Article  Google Scholar 

  2. Gubbi J, Buyya R, Marusic S, Palaniswamia M (2013) Internet of things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660

    Article  Google Scholar 

  3. Lee J, Lee H (2014) Developing and validating a citizen-centric typology for smart city services. Gov Inf Q Elsevier 31:93

    Article  Google Scholar 

  4. Piro G (2014) Information centric services in smart cities. J Syst Softw 88:169–188

    Article  Google Scholar 

  5. Sundmaeker H, Guillemin P, Friess P, WoelfflÕision S (2010) Vision and challenges for realising the internet of things. Eur Union. doi:10.2759/26127

  6. Kyriazis D (2013) Smart, autonomous and reliable internet of things. Sci Dir 21:442–448

    Google Scholar 

  7. Kourtit K (2014) The new urban world: challenges and policy. Appl Geogr 49:1–3

    Article  Google Scholar 

  8. Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20:2481–2501

    Article  Google Scholar 

  9. Whitmore A, Agarwal A, Xu LD (2015) The internet of things—a survey of topics and trends. Inf Syst Front 17:261–274

    Article  Google Scholar 

  10. Sicari S, Cappiello C, De Pellegrini F, Miorandi D, Coen-Porisini A (2015) A security-and quality-aware system architecture for internet of things. Inf Syst Front. doi:10.1007/s10796-014-9538-x

    Google Scholar 

  11. Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 58:49–69

    Article  Google Scholar 

  12. Yick J, Mukherjee B, Ghosal D (2008) Wireless sensor network survey. Comput Netw 52:2292–2330

    Article  Google Scholar 

  13. Wanga F, Huang B, Yang LT (2012) SONR: a reliable reputation system of self-organized network. J Netw Comput Appl 35:914–926

    Article  Google Scholar 

  14. Mantri DS, Prasad NR, Prasad R (2016) Mobility and heterogeneity aware cluster-based data aggregation for wireless sensor network. Wirel Pers Commun 86:975–993

    Article  Google Scholar 

  15. De Poorter E, Moerman I, Demeester P (2011) Enabling direct connectivity between heterogeneous objects in the internet of things through a network-service-oriented architecture. EURASIP J Wirel Commun Netw, 61:1–14

    Google Scholar 

  16. Noll J, Mohammad MR, Chowdhury (2011) 5G: service continuity in heterogeneous environments. Wirel Pers Commun 57:413–429

    Article  Google Scholar 

  17. Li S, Xu LD, Zhao S (2011) The internet of things: a survey. Inf Syst Front 17:243–259

    Article  Google Scholar 

  18. Stallings W (2012) Network security essentials. Pearson, USA

    Google Scholar 

  19. Liu CH, Chung YF, Chen TS, Wang SD (2012) The enhancement of security in healthcare information systems. J Med Syst 36:1673–1688

    Article  Google Scholar 

  20. Yu H, He J, Zhang T, Xiao P, Zhang Y (2013) Enabling end-to-end secure communication between wireless sensor networks and the Internet. World Wide Web 16:515–540

    Article  Google Scholar 

  21. Ning H (2013) A security framework for the internet of things based on public key infrastructure. Adv Mater Res 671–674

    Google Scholar 

  22. Feng R, Che S, Wang X, Yu N (2013) Trust management scheme based on D-S evidence theory for wireless sensor networks. Int J Distrib Sensor Netw. doi:10.1155/2013/948641

    Google Scholar 

  23. Miorandi D, Sicari S, De Pellegrini F, Chalamtac I (2013) Internet of things: vision, applications and research challenges. Ad Hoc Networks 10:1497–1516

    Article  Google Scholar 

  24. Bekara C (2014) Security issues and challenges for the IoT-based smart grid. Procedia Comput Sci 34:532–537

    Article  Google Scholar 

  25. Xu Y, Chen G, Ford J, Makedon F (2008) Critical infrastructure protection. IFIP- Int Fed Inf Process 253:267–279

    Google Scholar 

  26. Shafieia H, Khonsaria A, Derakhshia H, Mousavia P (2014) Detection and mitigation of sinkhole attacks in wireless sensor networks. J Comput Syst Sci 80(3):644–653

    Article  Google Scholar 

  27. Zhao Y (2013) Research on data security technology in internet of things. In: 2013 2nd International Conference on Mechatronics and Control Engineering, ICMCE 2013, Dalian, China, 2013, 1752–1755

    Google Scholar 

  28. Liang X, Lu R, Shen X (2010) Sybil attacks and their defenses in the internet of things. Internet Things J 1(5):372–383

    Google Scholar 

  29. Heer T, Garcia-Morchon O, Hummen R, Keoh SL, Kumar SS, Wehrle K (2011) Security challenges in the IP-based internet of things. Wirel Pers Commun 61:527–542

    Article  Google Scholar 

  30. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164

    Article  Google Scholar 

  31. Velloso PB, Laufer RP, de O Cunha D et al (2010) Trust management in mobile Ad Hoc networks using a scalable maturity-based model. IEEE Trans Netw Serv Manag 7:3

    Article  Google Scholar 

  32. Tianshui WU, Gang Z (2014) A novel risk assessment model for privacy security in internet of things. Wuhan Univ J Nat Sci 19(5):398–404

    Article  Google Scholar 

  33. Roman R (2011) Key management systems for sensor networks in the context of the internet of things. Comput Electr Eng 37(2):147–159

    Article  Google Scholar 

  34. Kothmayr T, Schmitt C et al (2013) Dtls based security and two-way authentication for the internet of things. Ad Hoc Netw 11(8):2710–2723

    Article  Google Scholar 

  35. Zhao, Ling Y (2013) Research on data security technology in internet of things. Appl Mech Mater 1752:433–435

    Google Scholar 

  36. Ye N, Zhu Y et al (2014) An efficient authentication and access control scheme for perception layer of internet of things. Appl Math Inf Sci 8(4):1617–1624

    Article  Google Scholar 

  37. Wu J, Dong M, Ota K et al (2014) Securing distributed storage for social internet of things using regenerating code and blom key agreement. Peer-to-Peer Netw Appl. doi:10.1007/s12083-014-0286-y

    Google Scholar 

  38. Huang X, Fu R et al (2012) User interactive internet of things privacy preserved access control. In: 7th international conference for Internet Technology and Secured Transactions, ICITST 2012, London, pp 597–602

    Google Scholar 

  39. Cao J, Carminati B, Ferrari E, Tan KL (2011) CASTLE: continuously anonymizing data streams. IEEE Trans Dependable Secure Comput 8(3):337–352

    Article  Google Scholar 

  40. Yang J, Fang B (2011) Security model and key technologies for the internet of things. J China Univ Posts Telecommun 8(2):109–112

    Article  MathSciNet  Google Scholar 

  41. Wang Y, Wen Q (2011) A privacy enhanced dns scheme for the internet of things, In: IET international conference on Communication Technology and Application, ICCTA 2011, Beijing, pp 699–702

    Google Scholar 

  42. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Proc First IEEE Int Work Sensor Netw Protoc Appl 1(2):293–315

    Google Scholar 

  43. Delfs H, Knebl H (2007) Symmetric key encryption. In: Introduction to cryptography, Berlin: Springer, pp 11–13

    Google Scholar 

  44. Vucinic M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R (2015) OSCAR: object security architecture for the internet of things. Retrieved on 25.05.2015, available on http://arxiv.org/abs/1404.7799

    Google Scholar 

  45. Zhang GG, Bi Y, Li C (2013) Massive internet data security processing model research. Small Microcomput Syst 34(9):2090–2094

    Google Scholar 

  46. Qiu-Xin W, Han L (2013) Secure solution of trusted internet of things base on TCM. J China Univ Posts Telecommun, 47–52

    Google Scholar 

  47. Alcaide A, Palomar E, Castillo JM, Ribagorda A (2013) Anonymous authentication for privacy preserving IoT target driven applications. Comput Secur 37:111–123

    Article  Google Scholar 

  48. Liu M, Zhang A (2010) A solution to privacy preserving two party sign test on vertically partitioned data using data disguising techniques. In: Proceedings of the international conference on networking and information technology, pp 526–534. doi. 10.1109/ICNIT.2010.5508458

  49. Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-IoT: a trust management model based on fuzzy repudiation for internet of things. Comput Sci Inf Syst 8(4):1207–1228

    Article  Google Scholar 

  50. Javed N, Wolf T (2012) Automated sensor verification using outlier detection in the internet of things. In: Proceedings of the 32nd international conference on distributed computing systems workshop, pp 261–266

    Google Scholar 

  51. Sicari S, Coen-Porisini A, Riggio R (2013) DARE: evaluating data accuracy using node repudiation computer networks. 57(15):3098–3111

    Google Scholar 

  52. Evans D, Eyers DM (2012) Efficient data tagging for managing privacy in the internet of things. In: Proceedings of the IEEE international conference on green computing and communications, pp 244–248

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sivagurunathan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Sivagurunathan, S., Sebastian, A., Prathapchandran, K. (2016). Internet of Things for Developing Smart Sustainable Cities (SSC): A Security Perspective. In: Mahmood, Z. (eds) Connectivity Frameworks for Smart Devices. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-33124-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-33124-9_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-33122-5

  • Online ISBN: 978-3-319-33124-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics