Skip to main content

2018 | OriginalPaper | Buchkapitel

An Information Security Architecture for Smart Cities

verfasst von : A. R. R. Berkel, P. M. Singh, M. J. van Sinderen

Erschienen in: Business Modeling and Software Design

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The growing use of ICT in public life has coerced the concept of smart cities. In a smart city, numerous physical devices coupled with latest ICT technologies are used by city authorities to provide better services and infrastructure to its citizens. Smart cities have unique security challenges. Owing to the involvement of numerous stakeholders, information security breaches can have wide ranging, long-lasting consequences. The challenges of smart city information security have not received the attention they deserve. This paper combines threat analysis and enterprise architecture modelling to address and mitigate these challenges from a holistic perspective. An information security architecture is presented, which can help stakeholders of the smart city projects to build more secure smart cities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Anbuky, A. Sensor-actuator smart lighting system: system organizational concept and challenges. In: ICT4S 2014. Atlantis Press (2014) Al-Anbuky, A. Sensor-actuator smart lighting system: system organizational concept and challenges. In: ICT4S 2014. Atlantis Press (2014)
2.
Zurück zum Zitat Anthopoulos, L., Fitsilis, P.: From digital to ubiquitous cities: defining a common architecture for urban development. In: 2010 Sixth International Conference on Intelligent Environments (IE), pp. 301–306. IEEE (2010) Anthopoulos, L., Fitsilis, P.: From digital to ubiquitous cities: defining a common architecture for urban development. In: 2010 Sixth International Conference on Intelligent Environments (IE), pp. 301–306. IEEE (2010)
3.
Zurück zum Zitat Band, I., et al.: Modeling Enterprise Risk Management and Security with the ArchiMate (2015) Band, I., et al.: Modeling Enterprise Risk Management and Security with the ArchiMate (2015)
4.
Zurück zum Zitat Bartoli, A., et al.: Security and privacy in your smart city. In: Proceeding of the Barcelona Smart Cities Congress, pp. 1–6 (2011) Bartoli, A., et al.: Security and privacy in your smart city. In: Proceeding of the Barcelona Smart Cities Congress, pp. 1–6 (2011)
5.
Zurück zum Zitat Batty, M., et al.: Smart cities of the future. Eur. Phys. J. Spec. Top. 214(1), 481–518 (2012)CrossRef Batty, M., et al.: Smart cities of the future. Eur. Phys. J. Spec. Top. 214(1), 481–518 (2012)CrossRef
6.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Con Tos5 (2014) Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Con Tos5 (2014)
9.
Zurück zum Zitat Caragliu, A., Del Bo, C., Nijkamp, P.: Smart cities in Europe. J. Urban Technol. 18(2), 65–82 (2011)CrossRef Caragliu, A., Del Bo, C., Nijkamp, P.: Smart cities in Europe. J. Urban Technol. 18(2), 65–82 (2011)CrossRef
10.
Zurück zum Zitat Chourabi, H., et al.: Understanding smart cities: an integrative framework. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 2289–2297. IEEE (2012) Chourabi, H., et al.: Understanding smart cities: an integrative framework. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 2289–2297. IEEE (2012)
11.
Zurück zum Zitat Coplien, J., Hoffman, D., Weiss, D.: Commonality and variability in software engineering. IEEE Softw. 15(6), 37–45 (1998)CrossRef Coplien, J., Hoffman, D., Weiss, D.: Commonality and variability in software engineering. IEEE Softw. 15(6), 37–45 (1998)CrossRef
13.
Zurück zum Zitat Deng, H., Mukherjee, A., Agrawal, D.P.: Threshold and identity-based key management and authentication for wireless ad hoc networks. In: Proceedings International Conference on ITCC 2004, vol. 1, pp. 107–111. IEEE (2004) Deng, H., Mukherjee, A., Agrawal, D.P.: Threshold and identity-based key management and authentication for wireless ad hoc networks. In: Proceedings International Conference on ITCC 2004, vol. 1, pp. 107–111. IEEE (2004)
14.
Zurück zum Zitat de Oliveira Albuquerque, R., et al.: A layered trust information security architecture. Sensors 14(12), 22754–22772 (2014)CrossRef de Oliveira Albuquerque, R., et al.: A layered trust information security architecture. Sensors 14(12), 22754–22772 (2014)CrossRef
15.
Zurück zum Zitat Dhillon, G., Backhouse, J.: Technical opinion: information system security management in the new millennium. Commun. ACM 43(7), 125–128 (2000)CrossRef Dhillon, G., Backhouse, J.: Technical opinion: information system security management in the new millennium. Commun. ACM 43(7), 125–128 (2000)CrossRef
16.
17.
Zurück zum Zitat Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceeding of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceeding of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002)
18.
Zurück zum Zitat Filipponi, L., et al.: Smart city: an event driven architecture for monitoring public spaces with heterogeneous sensors. In: 2010 Fourth International Conference on SENSORCOMM, pp. 281–286. IEEE (2010) Filipponi, L., et al.: Smart city: an event driven architecture for monitoring public spaces with heterogeneous sensors. In: 2010 Fourth International Conference on SENSORCOMM, pp. 281–286. IEEE (2010)
19.
Zurück zum Zitat Gaur, A., Scotney, B., Parr, G., McClean, S.: Smart city architecture and its applications based on IoT. Procedia Comput. Sci. 52, 1089–1094 (2015)CrossRef Gaur, A., Scotney, B., Parr, G., McClean, S.: Smart city architecture and its applications based on IoT. Procedia Comput. Sci. 52, 1089–1094 (2015)CrossRef
20.
Zurück zum Zitat Jain, M.K.: Wireless sensor networks: security issues and challenges. Int. J. Comput. Inf. Technol. 2(1), 62–67 (2011) Jain, M.K.: Wireless sensor networks: security issues and challenges. Int. J. Comput. Inf. Technol. 2(1), 62–67 (2011)
21.
Zurück zum Zitat Jalali, R., El-Khatib, K., McGregor, C.: Smart city architecture for community level services through the internet of things. In 2015 18th International Conference on ICIN, pp. 108–113. IEEE (2015) Jalali, R., El-Khatib, K., McGregor, C.: Smart city architecture for community level services through the internet of things. In 2015 18th International Conference on ICIN, pp. 108–113. IEEE (2015)
22.
Zurück zum Zitat Jalali, S., Wohlin, C.: Systematic literature studies: database searches vs. backward snowballing. In: Proceedings of the ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 29–38. ACM (2012) Jalali, S., Wohlin, C.: Systematic literature studies: database searches vs. backward snowballing. In: Proceedings of the ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 29–38. ACM (2012)
23.
Zurück zum Zitat Jin, J., Gubbi, J., Marusic, S., Palaniswami, M.: An information framework for creating a smart city through internet of things. IEEE Internet Things J. 1(2), 112–121 (2014)CrossRef Jin, J., Gubbi, J., Marusic, S., Palaniswami, M.: An information framework for creating a smart city through internet of things. IEEE Internet Things J. 1(2), 112–121 (2014)CrossRef
25.
26.
Zurück zum Zitat Kandukuri, B.R., Rakshit, A.: Cloud security issues. In: IEEE International Conference on Services Computing, SCC 2009, pp. 517–520. IEEE (2009) Kandukuri, B.R., Rakshit, A.: Cloud security issues. In: IEEE International Conference on Services Computing, SCC 2009, pp. 517–520. IEEE (2009)
28.
Zurück zum Zitat Lavallee, M., Robillard, P.N., Mirsalari, R.: Performing systematic literature reviews with novices: an iterative approach. IEEE Trans. Educ. 57(3), 175–181 (2014)CrossRef Lavallee, M., Robillard, P.N., Mirsalari, R.: Performing systematic literature reviews with novices: an iterative approach. IEEE Trans. Educ. 57(3), 175–181 (2014)CrossRef
29.
Zurück zum Zitat Merlino, G., et al.: A smart city lighting case study on an openstack-powered infrastructure. Sensors 15(7), 16314–16335 (2015)CrossRef Merlino, G., et al.: A smart city lighting case study on an openstack-powered infrastructure. Sensors 15(7), 16314–16335 (2015)CrossRef
30.
Zurück zum Zitat Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26–41 (1994)CrossRef Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26–41 (1994)CrossRef
31.
Zurück zum Zitat Murray, W.H.: Enterprise security architecture. Inf. Syst. Secur. 6(4), 43–54 (1998)CrossRef Murray, W.H.: Enterprise security architecture. Inf. Syst. Secur. 6(4), 43–54 (1998)CrossRef
32.
Zurück zum Zitat Nam, T., Pardo, T.A.: Conceptualizing smart city with dimensions of technology, people, and institutions. In: Proceeding of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging times, pp. 282–291. ACM (2011) Nam, T., Pardo, T.A.: Conceptualizing smart city with dimensions of technology, people, and institutions. In: Proceeding of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging times, pp. 282–291. ACM (2011)
33.
Zurück zum Zitat Nardi, J.C., Almeida, J.P.A., et al.: Service commitments and capabilities across the ArchiMate architectural layers. In: 2016 IEEE 20th International EDOCW, pp. 1–10. IEEE (2016) Nardi, J.C., Almeida, J.P.A., et al.: Service commitments and capabilities across the ArchiMate architectural layers. In: 2016 IEEE 20th International EDOCW, pp. 1–10. IEEE (2016)
34.
Zurück zum Zitat Perez, R., Sailer, R., van Doorn, L.: vTPM: virtualizing the trusted platform module. In: Proceedings of 15th Conference on USENIX Security Symposium, pp. 305–320 (2006) Perez, R., Sailer, R., van Doorn, L.: vTPM: virtualizing the trusted platform module. In: Proceedings of 15th Conference on USENIX Security Symposium, pp. 305–320 (2006)
35.
Zurück zum Zitat Ralko, S., Kumar, S.: Smart City Security (2016) Ralko, S., Kumar, S.: Smart City Security (2016)
36.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.M.: U.S. Patent No. 4,405,829. U.S. Patent and Trademark Office, Washington, D.C. (1983) Rivest, R.L., Shamir, A., Adleman, L.M.: U.S. Patent No. 4,405,829. U.S. Patent and Trademark Office, Washington, D.C. (1983)
38.
Zurück zum Zitat Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 international Conference on ICCSEE, vol. 3, pp. 648–651. IEEE (2012) Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 international Conference on ICCSEE, vol. 3, pp. 648–651. IEEE (2012)
39.
Zurück zum Zitat The Open Group: ArchiMate 3.0 Specification. Van Haren Publishing, Zaltbommel (2016) The Open Group: ArchiMate 3.0 Specification. Van Haren Publishing, Zaltbommel (2016)
40.
Zurück zum Zitat van Drunen, H., Willemsz, E. (eds.): ArchiMate Made Practical. ArchiMate Foundation, Netherlands (2007) van Drunen, H., Willemsz, E. (eds.): ArchiMate Made Practical. ArchiMate Foundation, Netherlands (2007)
41.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings of IEEE INFOCOM, pp. 1–9. IEEE (2010) Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings of IEEE INFOCOM, pp. 1–9. IEEE (2010)
42.
Zurück zum Zitat Wenge, R., et al.: Smart city architecture: a technology guide for implementation and design challenges. China Commun. 11(3), 56–69 (2014)CrossRef Wenge, R., et al.: Smart city architecture: a technology guide for implementation and design challenges. China Commun. 11(3), 56–69 (2014)CrossRef
Metadaten
Titel
An Information Security Architecture for Smart Cities
verfasst von
A. R. R. Berkel
P. M. Singh
M. J. van Sinderen
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-94214-8_11