Skip to main content

Designing Secure IoT Architectures for Smart City Applications

  • Chapter
  • First Online:
Designing, Developing, and Facilitating Smart Cities

Abstract

The Internet of Things (IoT) presents itself as a promising set of technologies to support a wide range of applications that aim to improve the quality of life of humans. IoT aims to simplify the way that users receive information providing a unique way of bringing them close to the source of information, hiding the complexity of knowing who or what one should ask to get that information. For this reason, IoT has become a key enabler for smart city applications, and municipalities are very interested to invest in IoT for providing advanced applications to their citizens, who might not be at all familiar with Information and Communication Technologies (ICT). It is quite common in the last few years that large cities are forming strategic agendas for becoming “smarter” through IoT technologies. Their main goal is to build IoT-based infrastructures that can be reused for supporting a plethora of smart city applications, for, i.e., monitoring the weather conditions, the traffic, the citizens’ needs, or for managing the wastes, the city waters, etc. All these applications are indeed very promising for making the cities smarter, but as they are becoming more and more mainstream, they are turning into attractive targets for attackers that aim to exploit the constrained nature of IoT devices toward stealing personal data or performing physical attacks on critical infrastructures. IoT deployments pose severe challenges with regard to ensuring the security of the overall system and the privacy of the users’ data, and only lately there have been advances toward designing secure IoT architectures for smart city applications. This chapter aims to provide an overview of the challenges, the methodology, and the latest attempts for securing the IoT architectures in smart city environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.iot-a.eu.

  2. 2.

    www.iot-icore.eu.

  3. 3.

    www.iot-butler.eu.

  4. 4.

    www.openiot.eu.

  5. 5.

    http://www.smartie-project.eu.

  6. 6.

    http://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.sp.800-162.pdf.

  7. 7.

    http://docs.oasis-open.org/xacml/xacml-json-http/v1.0/xacml-json-http-v1.0.html

  8. 8.

    www.iot-cosmos.eu.

  9. 9.

    http://www.compose-project.eu.

  10. 10.

    Parra, J.D.: PopularIoTy: http://github.com/nopbyte/popularioty-api/ (2014) and PopularIoTy Analytics: http://github.com/nopbyte/popularioty-analytics/ (2014).

  11. 11.

    http://www.prismacloud.eu.

  12. 12.

    www.ict-rerum.eu.

References

  1. Evans D (2011) The internet of things. How the Next Evolution of the Internet is Changing Everything, Whitepaper, Cisco Internet Business Solutions Group (IBSG)

    Google Scholar 

  2. Ranken, Margaret, M2M Global Forecast & Analysis 2014–24, Machina Research Strategy Report, 24, June 2015

    Google Scholar 

  3. Ruiz D et al (eds) (2015) Enhancing the autonomous smart objects and the overall system security of IoT based Smart Cities, RERUM Project Deliverable D3.1, 28 February 2015

    Google Scholar 

  4. Pöhls HC et al (eds) (2015) Privacy enhancing techniques in the Smart City applications, RERUM Project Deliverable D3.2, 2 Sept 2015

    Google Scholar 

  5. Blefari-Melazzi N, Bianchi G, Salgarelli L (eds) (2011) Trustworthy internet. Springer Science & Business Media

    Google Scholar 

  6. Vermesan O, Friess P (2014) Internet of things—from research and innovation to market deployment. River Publishers

    Google Scholar 

  7. Vermesan O, Friess P (eds) (2015) Building the hyperconnected society: IoT research and innovation value chains, ecosystems and markets, vol. 43. River Publishers

    Google Scholar 

  8. Internet of Things research study. Hewlett Packard Enterprise 2015 report. www8.hp.com/h20195/V2/GetPDF.aspx/4AA5–4759ENW.pdf

  9. Mouroutis T et al. (eds) (2014) Use-cases definition and threat analysis, RERUM Project Deliverable D2.1, 31 May 2014

    Google Scholar 

  10. Bassi A et al (2013) Enabling things to talk. Designing IoT solutions with the IoT architectural reference model, pp 163–211

    Google Scholar 

  11. Howard M, Lipner S (2006) The security development lifecycle: SDL: a process for developing demonstrably more secure software. Microsoft Press (2006)

    Google Scholar 

  12. Gruschka N et al (eds) (2012) Concepts and Solutions for Privacy and Security in the Resolution Infrastructure, IoT-A Project Deliverable D4.2, 16 February 2012

    Google Scholar 

  13. Carrez F et al (eds) (2013) Final architectural reference model for the IoT v3.0, IoT-A Project Deliverable D1.5, 15 July 2013

    Google Scholar 

  14. Menoret S et al (eds) (2014) Final architectural reference model, iCore Project Deliverable D2.5, 2 Nov 2014

    Google Scholar 

  15. Baldini G et al (eds) Security requirements for the iCore cognitive management and control framework, iCore Project Deliverable D2.2, 31 May 2012

    Google Scholar 

  16. Neisse R, Steri G, Fovino IN, Baldini G (2015) SecKit: a model-based security toolkit for the internet of things. Comput Secur 54:60–76. ISSN 0167-4048

    Google Scholar 

  17. Integrated System Architecture and Initial Pervasive BUTLER proof of concept, BUTLER Project Deliverable D3.2, October 2013

    Google Scholar 

  18. Requirements, Specifications and Security Technologies for IoT Context-Aware Networks, BUTLER Project Deliverable D2.1, October 2012

    Google Scholar 

  19. Ethics, Privacy and Data Protection in BUTLER, BUTLER Project Deliverable D1.4, July 2013

    Google Scholar 

  20. Dimitropoulos P, Soldatos J, Kefalakis N, Bengtsson JE, Giuliano A et al (eds) OpenIoT detailed architecture and proof-of-concept specifications, OpenIoT Project Deliverable D2.3, 28 March 2013

    Google Scholar 

  21. Gwadera R et al (eds) (2013) Privacy and Security Framework, OpenIoT Project Deliverable D5.2.1, 27 Sept 2013

    Google Scholar 

  22. Azevedo R et al (eds) (2014) Requirements, SMARTIE Project Deliverable D2.2

    Google Scholar 

  23. Skarmeta A et al (eds) (2015) Initial Architecture Specification, SMARTIE Project Deliverable D2.3

    Google Scholar 

  24. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: IEEE symposium on security and privacy. SP’07, pp 321–334

    Google Scholar 

  25. Pitu L et al (eds) (2015) End-to-End Security and Privacy: Design and Open Specification (Updated), COSMOS Project Deliverable D3.1.2, 30 April 2015

    Google Scholar 

  26. Carrez F et al (eds) (2015) Conceptual Model and Reference Architecture (Updated), COSMOS Project Deliverable D2.3.2, 30 April 2015

    Google Scholar 

  27. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654

    Article  MathSciNet  MATH  Google Scholar 

  28. Deliverable D1.2.2 Final COMPOSE architecture document

    Google Scholar 

  29. Schreckling D, Parra JD, Doukas C, Posegga J (2015) Data-Centric Security for the IoT. In: Proceedings of the 2nd EAI international conference on IoT as a Service, Rome, Italy

    Google Scholar 

  30. Broberg N, Sands D (2010) Paralocks: Role-based information flow control and be- yond. In: Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on principles of programming languages. pp 431–444. POPL’10, ACM, New York, NY, USA

    Google Scholar 

  31. Parra J, Schreckling D, Posegga J (2014) Identity Management in Platforms Of
fering IoT as a Service. In: 1st international conference on IoT as a service. 
Lecture Notes in Computer Science (LNCS), Springer, Rome, Italy

    Google Scholar 

  32. Demirel D, Derler D, Hanser C, Pöhls HC, Slamanig D, Traverso G (2015) PRISMACLOUD D4.4: Overview of Functional and Malleable Signature Schemes

    Google Scholar 

  33. Lorünser T, Länger T, Slamanig D, Pöhls HC (2016) PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. In: Proceedings of a workshop on security, privacy, and identity management in the cloud collocated at the 11th international conference on availability, reliability and security. ARES’16, Salzburg, Austria, 2016

    Google Scholar 

  34. Pohls HC et al (2014) RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects. In: Wireless communications and networking conference workshops (WCNCW), 2014 IEEE. IEEE, 2014

    Google Scholar 

  35. Tragos EZ et al (2014) Enabling reliable and secure IoT-based smart city applications. In: 2014 IEEE international conference on pervasive computing and communications workshops (PERCOM Workshops). IEEE, 2014

    Google Scholar 

  36. Cuellar J et al (eds) (2014) System Requirements and Smart Objects Model, RERUM Project Deliverable D2.2, 31 May 2014

    Google Scholar 

  37. Tragos E et al (eds) (2015) Final System Architecture, RERUM Project Deliverable D2.5, 4 Sept 2015

    Google Scholar 

  38. Capossele A et al (2015) Security as a CoAP resource: an optimized DTLS implementation for the IoT. In: IEEE international conference on communications (ICC), IEEE, 2015

    Google Scholar 

  39. Charalampidis P, Fragkiadakis A, Tragos E (2015) Rate-adaptive compressive sensing for IoT applications, VTC2015-Spring, Glasgow

    Google Scholar 

  40. Fragkiadakis A, Tragos E, Papadakis S, Charalampidis P (2014) Experiences with deploying Compressive Sensing and Matrix Completion techniques in IoT devices, IEEE CAMAD 2014, Athens, 2014

    Google Scholar 

  41. Fragkiadakis A, Tragos E, Traganitis A (2014) Lightweight and secure encryption using channel measurements, Wireless Vitae 2014, Aalborg

    Google Scholar 

  42. Pöhls HC (2015) JSON Sensor Signatures (JSS): End-to-End Integrity Protection from Constrained Device to IoT Application. In: 9th international conference on innovative mobile and internet services in ubiquitous computing (IMIS). IEEE, Santa Cantarina, Brazil, 2015

    Google Scholar 

  43. Pöhls HC, Samelin K (2015) Accountable redactable signatures. In: 10th international conference on availability, reliability and security (ARES). IEEE, 2015

    Google Scholar 

  44. Baldini G et al (2015) Internet of Things. IoT Governance, Privacy and Security Issues, European Research Cluster on The Internet of things, Activity Chain 05 Whitepaper, January 2015

    Google Scholar 

  45. Trifa V, Larizgoitia I (2013) Design of the object virtualization specification, Compose Deliverable D2.1.1, 30 Oct 2013

    Google Scholar 

  46. Fragkiadakis A, Angelakis V, Tragos EZ (2014) Securing cognitive wireless sensor networks: a survey. Int J Distrib Sens Netw (2014)

    Google Scholar 

  47. Schreckling D et al (2015) The Compose Security Framework, COMPOSE Deliverable D5.4.2, 15 Nov 2015

    Google Scholar 

Download references

Acknowledgements

This work has received funding from the European Union’s Seventh Framework Programme (FP7/2007-2013) under grant agreements no 609094, 612361 and 644962.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elias Tragos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Tragos, E., Fragkiadakis, A., Angelakis, V., Pöhls, H.C. (2017). Designing Secure IoT Architectures for Smart City Applications. In: Angelakis, V., Tragos, E., Pöhls, H., Kapovits, A., Bassi, A. (eds) Designing, Developing, and Facilitating Smart Cities. Springer, Cham. https://doi.org/10.1007/978-3-319-44924-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44924-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44922-7

  • Online ISBN: 978-3-319-44924-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics