Page 445 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 445

Recommendations
               Public  key  infrastructure  (PKI)  or  managed  PKI  can  be  used  to  avoid  the  fraudulent
                 manipulation of smart meters in large scale and advanced metering infrastructures (AMIs),
                 thus securing data integrity, revenue streams and service continuity.

               The smart grid can be secured at the communication layer by implementing PKI directly into
                 meters,  enabling  identification,  verification,  validation  and  authentication  of  connected
                 meters for network access. PKIs are ideal for large‐scale security deployments requiring a high
                 level of security with minimal impact on performance. In a PKI environment, it is essential that
                 private keys and certificates be guarded by a reliable management solution that protects
                 against ever‐evolving data threats.


            The  European  Union  (EU)  has  engaged  in  a  number  of  initiatives  in  the  critical  infrastructure
            protection (CIP) space.

            The Project CRISALIS (CRitical Infrastructure Security AnaLysIS) was launched in June 2012. Its goal
            is  to  provide  new  methodologies  to  secure  critical  infrastructure  environments  from  targeted
            attacks, deliver new tools to detect intrusions, and develop new techniques to analyse successful
            intrusions.
                   Intelligent transportation

            Keeping the city moving is critical. Transportation strategies have an impact on public safety, the
            environment, energy, emergency response services, the ability to do business, and on the delivery
            of other critical services, as well as the overall maintenance of the quality of life of citizens.
            Real‐time traffic flow information, coupled with telecommunications, global positioning systems
            (GPSs), machine‐to‐machine (M2M) communication, wireless fidelity (Wi‐Fi) and RFID technologies,
            as well as data analytics and prediction techniques, can be used to enhance private and public travel.
            Sensors  can  collect  information  about  traffic  conditions  at  critical  city  spots  and  send  this
            information,  via  wireless  communication,  to  centralized  control  systems.  This  data  can  then
            influence decision‐making or even operate processes like traffic light synchronization.

            Optimizing transportation models requires a high degree of complexity from the ICT infrastructure
            and its components to avoid disruptions. These can be the result of malicious intent or simply well‐
            meaning insiders' actions. For example, traffic management could be impaired by hacking into the
            navigation  system  that  directs  a  bus  driver  into  the  city  through  a  wrong  route,  due  to  false
            information about traffic volume.


             Recommendations
               The data transmitted from devices may be subject to spoofing. Unencrypted traffic data may
                 be subject to attackers injecting false traffic reports into satellite navigation devices, as proven
                 by cybersecurity experts.
               Vulnerabilities  can  also  put  information  at  risk  due  to  unintentional  actions,  mistakes,
                 carelessness or inadequate processes.







            ITU‐T's Technical Reports and Specifications                                                  435
   440   441   442   443   444   445   446   447   448   449   450