Skip to main content

Trusted Information and Security in Smart Mobility Scenarios: The Case of S2-Move Project

  • Conference paper
Algorithms and Architectures for Parallel Processing (ICA3PP 2013)

Abstract

Smart cities and smart mobility represent two of the most significative real use case scenarios in which there is an increasing demand for collecting, elaborating, and storing large amounts of heterogenous data. In urban and mobility scenarios issues like data trustiness and data and network security are of paramount importance when considering smart mobility services like real-time traffic status, events reporting, fleets management, smart parking, etc. In this architectural paper, we present the main issues related to trustiness and security in the S2-Move project in which the contribution is to design and implement a complete architecture for providing soft real-time information exchange among citizens, public administrations and transportation systems. In this work, we first describe the S2-Move architecture, all the actors involved in the urban scenario, the communication among devices and the core platform, and a set of mobility services that will be used as a proof of the potentialities of the proposed approach. Then, considering both architecture and the considered mobility services, we discuss the main issues related to trustiness and security we should taken into account in the design of a secure and trusted S2-Move architecture.

The activities described in this paper are funded by MIUR in the field of Social Innovation of the program with the grant number PON04a3_00058. We would like to thank (i) University of Napoli Federico II for providing SincroLab and ArcLab laboratories for lodging some S2-Move activities; (ii) the industrial partners collaborating in the project; (iii) Dario Di Nocera, Antonio Saverio Valente, and Luca Iandolo for their valuable work and support.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. United Nations Department of Economic and Social Affairs Population Division, World Urbanization Prospects: The 2011 Revision (2012)

    Google Scholar 

  2. Marchetta, P., et al.: S2-MOVE: Smart and Social Move. In: IEEE GIIS (2012)

    Google Scholar 

  3. Marchetta, P., et al.: Social and Smart Mobility for Future Cities: the S2-Move project. In: AICA 2013 (2013)

    Google Scholar 

  4. Abdullahi, A., Brown, I., El-Moussa, F.: Privacy in the age of Mobility and Smart Devices in Smart Homes. In: PASSAT, SocialCom 2012 (2012)

    Google Scholar 

  5. Dainotti, A., Pescapé, A., Ventre, G.: Worm traffic analysis and characterization. In: IEEE Inter. Conference on Communications, ICC (2007)

    Google Scholar 

  6. Colleen, S., Moore, D.: The spread of the witty worm. IEEE Security & Privacy 2(4) (2004)

    Google Scholar 

  7. Dainotti, A., King, A., Claffy, K., Papale, F., Pescapé, A.: Analysis of a /0 stealth scan from a Botnet. In: ACM IMC (2012)

    Google Scholar 

  8. Barford, P., Vinod, Y.: An inside look at botnets. In: Malware Detection, vol. 27, pp. 171–191. Springer, US (2007)

    Chapter  Google Scholar 

  9. Landman, M.: Managing smart phone security risks. In: Information Security Curriculum Development Conference. ACM (2010)

    Google Scholar 

  10. Chourabi, H., et al.: Understanding smart cities: An integrative framework. In: HICSS (2012)

    Google Scholar 

  11. Wayne, J., Grance, T.: Guidelines on security and privacy in public cloud computing. NIST special publication (2011)

    Google Scholar 

  12. Armac, I., et al.: Privacy-friendly smart environments. In: NGMAST (2009)

    Google Scholar 

  13. Barbagli, B., et al.: A real-time traffic monitoring based on wireless sensor network technologies. In: IWCMC (2011)

    Google Scholar 

  14. Hadachi, A.: Travel time estimation using sparsely sampled probe GPS data in urban road network, Ph.D. Thesis, Normandie University (2013)

    Google Scholar 

  15. Hedrick, J.K., Tomizuka, M., Varaiya, P.: Control issues in automated highway systems. IEEE Control Systems 14(6) (1994)

    Google Scholar 

  16. Bernaschi, M., Cacace, F., Pescapé, A., Za, S.: Analysis and Experimentation over Heterogeneous Wireless Networks. In: TRIDENTCOM 2005, Trento, Italy (2005)

    Google Scholar 

  17. Iannello, G., Pescapè, A., Ventre, G., Vollero, L.: Experimental Analysis of Heterogeneous Wireless Networks. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol. 2957, pp. 153–164. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Karrer, R., Matyasovszki, I., Botta, A., Pescapé, A.: Experimental evaluation and characterization of the magnets wireless backbone. In: WINTECH, pp. 26–33 (2006)

    Google Scholar 

  19. Botta, A., Pescapé, A., Ventre, G.: Quality of Service Statistics over Heterogeneous Networks: Analysis and Applications. EJOR 191(3) (2008)

    Google Scholar 

  20. di Bernardo, M., et al.: Model reference adaptive control of discrete-time piecewise linear systems. International Journal of Robust and Nonlinear Control 23(7) (2013)

    Google Scholar 

  21. di Bernardo, M., Montanaro, U., Santini, S.: Canonical forms of generic piecewise linear continuous systems. IEEE TAC 56(8) (2011)

    Google Scholar 

  22. di Bernardo, M., et al.: Experimental implementation and validation of a novel minimal control synthesis adaptive controller for continuous bimodal piecewise affine systems. Control Engineering Practice 20(3) (2012)

    Google Scholar 

  23. Di Bernardo, M., Montanaro, U., Santini, S.: Novel switched model reference adaptive control for continuous piecewise affine systems. In: CDC 2013 (2008)

    Google Scholar 

  24. Kenney, J.B.: Dedicated Short-Range Communications (DSRC) Standards in the United States (2011)

    Google Scholar 

  25. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of Misbehaving and Faulty Nodes in Vehicular Networks (2007)

    Google Scholar 

  26. de Fuentes, J.M., Gonzalez-Tablas, A.I., Ribagorda, A.: Overview of Security issues in Vehicular Ad-hoc Networks (2010)

    Google Scholar 

  27. Malina, L., Hajny, J.: Group Signatures for Secure and Privacy Preserving Vehicular Ad Hoc Networks

    Google Scholar 

  28. Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks (2007)

    Google Scholar 

  29. Zhang, J.: A Survey on Trust Management for VANETs (2011)

    Google Scholar 

  30. Dotzer, F., et al.: VARS: A Vehicle Ad-Hoc Network Reputation System (2005)

    Google Scholar 

  31. Raya, M., Aziz, A., Hubaux, J.: Efficient Secure Aggregation in VANETs (2006)

    Google Scholar 

  32. Tajeddine, A., Kayssi, A., Chehab, A.: A Privacy-Preserving Trust Model for VANETs (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Marchetta, P., Natale, E., Salvi, A., Tirri, A., Tufo, M., De Pasquale, D. (2013). Trusted Information and Security in Smart Mobility Scenarios: The Case of S2-Move Project. In: Aversa, R., Kołodziej, J., Zhang, J., Amato, F., Fortino, G. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2013. Lecture Notes in Computer Science, vol 8286. Springer, Cham. https://doi.org/10.1007/978-3-319-03889-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03889-6_21

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03888-9

  • Online ISBN: 978-3-319-03889-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics