ITU‐T's Technical Reports and Specifications 435 Recommendations Public key infrastructure (PKI) or managed PKI can be used to avoid the fraudulent manipulation of smart meters in large scale and advanced metering infrastructures (AMIs), thus securing data integrity, revenue streams and service continuity. The smart grid can be secured at the communication layer by implementing PKI directly into meters, enabling identification, verification, validation and authentication of connected meters for network access. PKIs are ideal for large‐scale security deployments requiring a high level of security with minimal impact on performance. In a PKI environment, it is essential that private keys and certificates be guarded by a reliable management solution that protects against ever‐evolving data threats. The European Union (EU) has engaged in a number of initiatives in the critical infrastructure protection (CIP) space. The Project CRISALIS (CRitical Infrastructure Security AnaLysIS) was launched in June 2012. Its goal is to provide new methodologies to secure critical infrastructure environments from targeted attacks, deliver new tools to detect intrusions, and develop new techniques to analyse successful intrusions. Intelligent transportation Keeping the city moving is critical. Transportation strategies have an impact on public safety, the environment, energy, emergency response services, the ability to do business, and on the delivery of other critical services, as well as the overall maintenance of the quality of life of citizens. Real‐time traffic flow information, coupled with telecommunications, global positioning systems (GPSs), machine‐to‐machine (M2M) communication, wireless fidelity (Wi‐Fi) and RFID technologies, as well as data analytics and prediction techniques, can be used to enhance private and public travel. Sensors can collect information about traffic conditions at critical city spots and send this information, via wireless communication, to centralized control systems. This data can then influence decision‐making or even operate processes like traffic light synchronization. Optimizing transportation models requires a high degree of complexity from the ICT infrastructure and its components to avoid disruptions. These can be the result of malicious intent or simply well‐ meaning insiders' actions. For example, traffic management could be impaired by hacking into the navigation system that directs a bus driver into the city through a wrong route, due to false information about traffic volume. Recommendations The data transmitted from devices may be subject to spoofing. Unencrypted traffic data may be subject to attackers injecting false traffic reports into satellite navigation devices, as proven by cybersecurity experts. Vulnerabilities can also put information at risk due to unintentional actions, mistakes, carelessness or inadequate processes.