Page 451 - Shaping smarter and more sustainable cities - Striving for sustainable development goals
P. 451

o  Similarly, information on critical infrastructure like smart grids is highly sensitive, and if
                       compromised or in the wrong hands, could endanger national security and economic
                       interests.
                    o  Identity theft, counterfeiting and forgery are other instances of data‐related threats that
                       could aim at different sorts of fraud, e.g. card cloning or license plate counterfeit.
                  Data availability issues

                    o  A vast number of RFID and other IoT devices in SSC will involve potential issues with the
                       traditional  authentication  systems.  The  massive  presence  of  strict  certification
                       requirements can cause a severe impact on system efficiency, for example, when cross‐
                       domain access is needed, involving authentication systems.



            7       Security architecture of SSC

            An information security system provides a security guard for a smart sustainable city both in terms
            of technology and management aspects. A sample architecture is presented in Figure 2, and includes
            the following main components:
              information security infrastructure;

              information security mechanism:
                –  information security management system;
                –  information security technical protection;
                –  information security operation and maintenance system;

              security of applications (top section of Figure 2).

            The  information  security  infrastructure  can  include  several  centers,  such  as  the  security
            management center, the key management center and the identity management center.

            A comprehensive security strategy should address the security risk at each of these layers (i.e.
            sensing layer, communication layer, data layer and application layer), in order to ensure a system‐
            wide, all‐encompassing protection for SSC from the multiple threats that can affect the optimal
            operation of its services.

            This protection mechanism should also cover the various applications implemented in SSC (e.g.
            medical, traffic, travel).




























            ITU‐T's Technical Reports and Specifications                                                  441
   446   447   448   449   450   451   452   453   454   455   456