Page 445 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 445
Recommendations
Public key infrastructure (PKI) or managed PKI can be used to avoid the fraudulent
manipulation of smart meters in large scale and advanced metering infrastructures (AMIs),
thus securing data integrity, revenue streams and service continuity.
The smart grid can be secured at the communication layer by implementing PKI directly into
meters, enabling identification, verification, validation and authentication of connected
meters for network access. PKIs are ideal for large‐scale security deployments requiring a high
level of security with minimal impact on performance. In a PKI environment, it is essential that
private keys and certificates be guarded by a reliable management solution that protects
against ever‐evolving data threats.
The European Union (EU) has engaged in a number of initiatives in the critical infrastructure
protection (CIP) space.
The Project CRISALIS (CRitical Infrastructure Security AnaLysIS) was launched in June 2012. Its goal
is to provide new methodologies to secure critical infrastructure environments from targeted
attacks, deliver new tools to detect intrusions, and develop new techniques to analyse successful
intrusions.
Intelligent transportation
Keeping the city moving is critical. Transportation strategies have an impact on public safety, the
environment, energy, emergency response services, the ability to do business, and on the delivery
of other critical services, as well as the overall maintenance of the quality of life of citizens.
Real‐time traffic flow information, coupled with telecommunications, global positioning systems
(GPSs), machine‐to‐machine (M2M) communication, wireless fidelity (Wi‐Fi) and RFID technologies,
as well as data analytics and prediction techniques, can be used to enhance private and public travel.
Sensors can collect information about traffic conditions at critical city spots and send this
information, via wireless communication, to centralized control systems. This data can then
influence decision‐making or even operate processes like traffic light synchronization.
Optimizing transportation models requires a high degree of complexity from the ICT infrastructure
and its components to avoid disruptions. These can be the result of malicious intent or simply well‐
meaning insiders' actions. For example, traffic management could be impaired by hacking into the
navigation system that directs a bus driver into the city through a wrong route, due to false
information about traffic volume.
Recommendations
The data transmitted from devices may be subject to spoofing. Unencrypted traffic data may
be subject to attackers injecting false traffic reports into satellite navigation devices, as proven
by cybersecurity experts.
Vulnerabilities can also put information at risk due to unintentional actions, mistakes,
carelessness or inadequate processes.
ITU‐T's Technical Reports and Specifications 435