Page 450 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 450
These capabilities can be exploited in SSC environments in the various disciplines identified so far,
thus providing the ability to remotely control the components of the different systems.
With this ability come additional vulnerabilities: on one hand, in the shape of new doors for
malicious attacks, and on the other, in terms of the significant amount of data generated while
exchanging information or data that will need to be managed, stored and restored in case of an
incident. Hence, this constitutes an additional area of potential concern in managing SSCs.
Sensor network security
Sensor information should be transmitted outside through one or more sensing nodes, called
gateway nodes. Thus, the security of sensor network security should be considered.
Sensor nodes are deployed in unattended situations, for example, when node resources are severely
limited it is difficult to adopt sophisticated security mechanisms, or when the node processing
capacity is weak. Due to these features, the sensor nodes can pose security issues such as
intermittent connection, vulnerability to capture, or false data being sent. In these cases, the
traditional security mechanisms cannot be applied.
In these circumstances, the risks are as follows:
a) If the sensor network gateway node is controlled by the attacker, it may lead to the loss of
security in the sensor network, with subsequent uncontrolled access to the existing
information through the gateway.
b) If the ordinary sensor node is still controlled, but the key is leaked, the attacker could be
able to gain control of the node in order to transmit some erroneous data.
c) If the ordinary sensor node is controlled, but not the key, then the attacker can discriminate
node functions, such as testing temperature, humidity, among others.
Bottlenecks of radio frequency identification (RFID) security
The characteristics of RFID include non‐contact operation, long distance identification, and reading
without visible light, among others. Due to its nature, RFID technology involves privacy risks. For
example, information may be illegally collected and the location illegally tracked. Furthermore, RFID
authentication should also be considered as part of the security strategies.
Data
Embedding security with data to achieve confidentiality, integrity and authentication
o SSC will need to manage a significant number of smart devices and associated data,
together with identity and services across the entire supply chain. Thus, it will be
important to secure smart endpoints and embedded systems in order to ensure these
devices to avoid exposing to additional threat vectors and risk.
o Protecting data explosion, including real‐time information, involves a sound
management approach to storing, protecting, and backing‐up, as well as archiving and
retrieving data whenever needed.
Data confidentiality issues
o SSC systems can access, use and exchange sensitive personal information, which, if
disclosed, could cause great harm to individuals. Typically, health care systems will
include detailed medical history and other sensitive information closely related to the
patient's life.
440 ITU‐T's Technical Reports and Specifications