Abstract
The Internet of Things (IoT) presents itself as a promising set of technologies to support a wide range of applications that aim to improve the quality of life of humans. IoT aims to simplify the way that users receive information providing a unique way of bringing them close to the source of information, hiding the complexity of knowing who or what one should ask to get that information. For this reason, IoT has become a key enabler for smart city applications, and municipalities are very interested to invest in IoT for providing advanced applications to their citizens, who might not be at all familiar with Information and Communication Technologies (ICT). It is quite common in the last few years that large cities are forming strategic agendas for becoming “smarter” through IoT technologies. Their main goal is to build IoT-based infrastructures that can be reused for supporting a plethora of smart city applications, for, i.e., monitoring the weather conditions, the traffic, the citizens’ needs, or for managing the wastes, the city waters, etc. All these applications are indeed very promising for making the cities smarter, but as they are becoming more and more mainstream, they are turning into attractive targets for attackers that aim to exploit the constrained nature of IoT devices toward stealing personal data or performing physical attacks on critical infrastructures. IoT deployments pose severe challenges with regard to ensuring the security of the overall system and the privacy of the users’ data, and only lately there have been advances toward designing secure IoT architectures for smart city applications. This chapter aims to provide an overview of the challenges, the methodology, and the latest attempts for securing the IoT architectures in smart city environments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
Parra, J.D.: PopularIoTy: http://github.com/nopbyte/popularioty-api/ (2014) and PopularIoTy Analytics: http://github.com/nopbyte/popularioty-analytics/ (2014).
- 11.
- 12.
References
Evans D (2011) The internet of things. How the Next Evolution of the Internet is Changing Everything, Whitepaper, Cisco Internet Business Solutions Group (IBSG)
Ranken, Margaret, M2M Global Forecast & Analysis 2014–24, Machina Research Strategy Report, 24, June 2015
Ruiz D et al (eds) (2015) Enhancing the autonomous smart objects and the overall system security of IoT based Smart Cities, RERUM Project Deliverable D3.1, 28 February 2015
Pöhls HC et al (eds) (2015) Privacy enhancing techniques in the Smart City applications, RERUM Project Deliverable D3.2, 2 Sept 2015
Blefari-Melazzi N, Bianchi G, Salgarelli L (eds) (2011) Trustworthy internet. Springer Science & Business Media
Vermesan O, Friess P (2014) Internet of things—from research and innovation to market deployment. River Publishers
Vermesan O, Friess P (eds) (2015) Building the hyperconnected society: IoT research and innovation value chains, ecosystems and markets, vol. 43. River Publishers
Internet of Things research study. Hewlett Packard Enterprise 2015 report. www8.hp.com/h20195/V2/GetPDF.aspx/4AA5–4759ENW.pdf
Mouroutis T et al. (eds) (2014) Use-cases definition and threat analysis, RERUM Project Deliverable D2.1, 31 May 2014
Bassi A et al (2013) Enabling things to talk. Designing IoT solutions with the IoT architectural reference model, pp 163–211
Howard M, Lipner S (2006) The security development lifecycle: SDL: a process for developing demonstrably more secure software. Microsoft Press (2006)
Gruschka N et al (eds) (2012) Concepts and Solutions for Privacy and Security in the Resolution Infrastructure, IoT-A Project Deliverable D4.2, 16 February 2012
Carrez F et al (eds) (2013) Final architectural reference model for the IoT v3.0, IoT-A Project Deliverable D1.5, 15 July 2013
Menoret S et al (eds) (2014) Final architectural reference model, iCore Project Deliverable D2.5, 2 Nov 2014
Baldini G et al (eds) Security requirements for the iCore cognitive management and control framework, iCore Project Deliverable D2.2, 31 May 2012
Neisse R, Steri G, Fovino IN, Baldini G (2015) SecKit: a model-based security toolkit for the internet of things. Comput Secur 54:60–76. ISSN 0167-4048
Integrated System Architecture and Initial Pervasive BUTLER proof of concept, BUTLER Project Deliverable D3.2, October 2013
Requirements, Specifications and Security Technologies for IoT Context-Aware Networks, BUTLER Project Deliverable D2.1, October 2012
Ethics, Privacy and Data Protection in BUTLER, BUTLER Project Deliverable D1.4, July 2013
Dimitropoulos P, Soldatos J, Kefalakis N, Bengtsson JE, Giuliano A et al (eds) OpenIoT detailed architecture and proof-of-concept specifications, OpenIoT Project Deliverable D2.3, 28 March 2013
Gwadera R et al (eds) (2013) Privacy and Security Framework, OpenIoT Project Deliverable D5.2.1, 27 Sept 2013
Azevedo R et al (eds) (2014) Requirements, SMARTIE Project Deliverable D2.2
Skarmeta A et al (eds) (2015) Initial Architecture Specification, SMARTIE Project Deliverable D2.3
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy. SP’07, pp 321–334
Pitu L et al (eds) (2015) End-to-End Security and Privacy: Design and Open Specification (Updated), COSMOS Project Deliverable D3.1.2, 30 April 2015
Carrez F et al (eds) (2015) Conceptual Model and Reference Architecture (Updated), COSMOS Project Deliverable D2.3.2, 30 April 2015
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654
Deliverable D1.2.2 Final COMPOSE architecture document
Schreckling D, Parra JD, Doukas C, Posegga J (2015) Data-Centric Security for the IoT. In: Proceedings of the 2nd EAI international conference on IoT as a Service, Rome, Italy
Broberg N, Sands D (2010) Paralocks: Role-based information flow control and be- yond. In: Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on principles of programming languages. pp 431–444. POPL’10, ACM, New York, NY, USA
Parra J, Schreckling D, Posegga J (2014) Identity Management in Platforms Of fering IoT as a Service. In: 1st international conference on IoT as a service. Lecture Notes in Computer Science (LNCS), Springer, Rome, Italy
Demirel D, Derler D, Hanser C, Pöhls HC, Slamanig D, Traverso G (2015) PRISMACLOUD D4.4: Overview of Functional and Malleable Signature Schemes
Lorünser T, Länger T, Slamanig D, Pöhls HC (2016) PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In: Proceedings of a workshop on security, privacy, and identity management in the cloud collocated at the 11th international conference on availability, reliability and security. ARES’16, Salzburg, Austria, 2016
Pohls HC et al (2014) RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects. In: Wireless communications and networking conference workshops (WCNCW), 2014 IEEE. IEEE, 2014
Tragos EZ et al (2014) Enabling reliable and secure IoT-based smart city applications. In: 2014 IEEE international conference on pervasive computing and communications workshops (PERCOM Workshops). IEEE, 2014
Cuellar J et al (eds) (2014) System Requirements and Smart Objects Model, RERUM Project Deliverable D2.2, 31 May 2014
Tragos E et al (eds) (2015) Final System Architecture, RERUM Project Deliverable D2.5, 4 Sept 2015
Capossele A et al (2015) Security as a CoAP resource: an optimized DTLS implementation for the IoT. In: IEEE international conference on communications (ICC), IEEE, 2015
Charalampidis P, Fragkiadakis A, Tragos E (2015) Rate-adaptive compressive sensing for IoT applications, VTC2015-Spring, Glasgow
Fragkiadakis A, Tragos E, Papadakis S, Charalampidis P (2014) Experiences with deploying Compressive Sensing and Matrix Completion techniques in IoT devices, IEEE CAMAD 2014, Athens, 2014
Fragkiadakis A, Tragos E, Traganitis A (2014) Lightweight and secure encryption using channel measurements, Wireless Vitae 2014, Aalborg
Pöhls HC (2015) JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application. In: 9th international conference on innovative mobile and internet services in ubiquitous computing (IMIS). IEEE, Santa Cantarina, Brazil, 2015
Pöhls HC, Samelin K (2015) Accountable redactable signatures. In: 10th international conference on availability, reliability and security (ARES). IEEE, 2015
Baldini G et al (2015) Internet of Things. IoT Governance, Privacy and Security Issues, European Research Cluster on The Internet of things, Activity Chain 05 Whitepaper, January 2015
Trifa V, Larizgoitia I (2013) Design of the object virtualization specification, Compose Deliverable D2.1.1, 30 Oct 2013
Fragkiadakis A, Angelakis V, Tragos EZ (2014) Securing cognitive wireless sensor networks: a survey. Int J Distrib Sens Netw (2014)
Schreckling D et al (2015) The Compose Security Framework, COMPOSE Deliverable D5.4.2, 15 Nov 2015
Acknowledgements
This work has received funding from the European Union’s Seventh Framework Programme (FP7/2007-2013) under grant agreements no 609094, 612361 and 644962.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Tragos, E., Fragkiadakis, A., Angelakis, V., Pöhls, H.C. (2017). Designing Secure IoT Architectures for Smart City Applications. In: Angelakis, V., Tragos, E., Pöhls, H., Kapovits, A., Bassi, A. (eds) Designing, Developing, and Facilitating Smart Cities. Springer, Cham. https://doi.org/10.1007/978-3-319-44924-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-44924-1_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44922-7
Online ISBN: 978-3-319-44924-1
eBook Packages: EngineeringEngineering (R0)