Uploaded by mail

IoT Based Smart City Security Issues and Tokenization, Pseudonymization, Tunneling Techniques used for Data Protection

International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
IoT Based Smart City: Security Issues and
Tokenization, Pseudonymization, Tunneling
Techniques used for Data Protection
Reshma Sunil Mandlik, Charulata Rajesh Pawar
Department of MCA, ASM Institute of Management & Computer Studies, Thane, Maharashtra, India
How to cite this paper: Reshma Sunil
Mandlik | Charulata Rajesh Pawar "IoT
Based Smart City: Security Issues and
Tokenization,
Pseudonymization,
Tunneling Techniques used for Data
Protection"
Published
in
International Journal
of Trend in Scientific
Research
and
Development
(ijtsrd), ISSN: 2456IJTSRD31233
6470, Volume-4 |
Issue-4, June 2020, pp.946-949, URL:
www.ijtsrd.com/papers/ijtsrd31233.pdf
ABSTRACT
IoT(Internet of things) refers to the quickest developing number of digital
devices and these devices can interconnect and speak with one another's over
the network and they can be remotely checked and controlled. IoT in smart
urban communities produced a large number of data consistently through
different applications including transport application, commercial application,
medicinal services application, and so forth. IoT is a standard technique to
coordinate advanced gadgets or sensors with the ICT arrangements. The
immense sending of IoT is permitting Smart City ventures and prompts all
over. In this paper, we do a little report and feature all the difficulties with
their fitting Solutions of applying the IoT advances dependent on Smart City.
KEYWORDS: Internet of Things (IOT), Smart City, Privacy, Security,
Tokenization, Pseudonymization
Copyright © 2020 by author(s) and
International Journal of Trend in Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the
Creative
Commons Attribution
License
(CC
BY
4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION
As the world turns out to be dynamically interconnected and
innovation reliant, a present influx of brilliant applications is
changing how we approach regular exercises. Clever urban
communities gather foundation and innovation to revamp
the way of life of residents and improve their collaborations
with the urban condition. The Internet of Things (IoT), could
have some of the appropriate responses. Made as a piece of
the shrewd innovation development, the IoT empowers
different articles and elements to talk with each other
through the net. By offering more innovative fit for
conveying across stages, IoT creates more information that
can improve different parts of the way of life. Urban areas
can recognize the two possibilities and difficulties
progressively. concentrating on diminishing these difficulties
and improve the solace of residents, make a profitable turn
of events and oversee current urban communities in a
reasonable and brilliant manner, a developing number of
urban communities all-inclusive have begun to advance their
own keen strategies. As the world's second-most crowded
country India alone has almost 100 shrewd cities extends in
progress under the Government of India. Various keen
arrangements have been executed and these shrewd
arrangements or applications may likewise represent
various security and protection issues because of
Susceptibility to attack regularly existing in applications. In
joining, some outsider subjects become protection dangers
@ IJTSRD
|
Unique Paper ID – IJTSRD31233
|
to occupants just as security, and security issues have
become a vital test that requires successful strides to be
taken to counter.
2. Smart city review Smart cities utilize the Internet of Things (IoT) gadgets like
associated sensors, lights, and meters to amass and break
down information. The urban areas at that point utilize this
information to upgrade framework, open utilities, and
administrations, and the sky is the limit from there.[1]
I.
Smart city benefits –
A. Secure Communities The Safe City idea as one of the central, required conditions
for the production of a Smart City. brilliant Cities center
around the financial, political, and social exercises of the
Volume – 4 | Issue – 4
|
May-June 2020
Page 946
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
States yet in addition a large portion of the wrongdoing and
dangers, for example, dealing, mechanical mishaps,
catastrophic events, and so on. Guaranteeing resident's wellbeing is one of the urban position's preeminent occupations,
both to fulfill populace needs and to update the personal
satisfaction and city claim for visitors, organizations, capable
employees.[7] The different Cities have as of late
collaborated with nearby organizations to build up an
attached cloud video stage that enables law requirement to
get the film from business surveillance cameras
continuously.[6]
B. Life Quality Smart city innovation has prone to patch up the key personal
satisfaction components for city occupants. The ability of the
shrewd city that organizes individuals both the occupants
and the guests above everything else will in general improve
the existence quality for everybody dwelling in the city.
Smart parking, effective transportation administrations,
open Wi-Fi, digitalize government, these innovations make a
positive effect on the life of the residents as they make things
trustworthy and easy for them. With applying the keen
innovations to make brilliant urban areas, there are risks
across practically all policy-driven issues-from lodging to
ship, to instructive administrations, to natural conditions, to
bliss, to well-being.[2]
C. Reduced climate foot-mark Nations around the globe have set threatening focuses for
cutting ozone harming substance discharges. On the off
chance that such points are to be satisfied, urban areas
should utilize outstandingly less vitality. Vitality effective
structures, air quality sensors, and sustainable power
sources are furnishing urban areas with new instruments to
contract their biological crash. building up air quality
sensors around a city, for example, can give information to
follow top occasions of low air quality, perceiving
contamination starting points, and convey information
scientific authorities need to create activity plans. These
sensors can help put an establishment for diminishing air
contamination in even the most occupied urban
communities, something that makes certain to spare lives
since clinical concerns identified with contamination
guarantee a great many lives every year.[6]
II.
Smart Application -
A. Smart Health-care One of the motivations behind the Smart Cities Mission is to
upgrade personal satisfaction, particularly of the destitution
stricken, so as to make Smart Cities complete in the world.
The procedure of Smart Health depends on giving minimal
effort specialist consideration, decently valued meds, and
@ IJTSRD
|
Unique Paper ID – IJTSRD31233
|
reasonable diagnostics. This should be possible by meeting
various plans.[3]
B. Smart Waste Management Intelligent waste executives manage control of the express
amount of waste made regularly. Shoppers hurl a huge
number of pounds of trash every year. For the most part, we
should concentrate on lower costs, as it is particularly
expensive, since it includes numerous individuals from staff
and vehicles just as refining the arranging of waste social
occasion, since having a high coordination segment, permits
a wide edge of progress through arrangements.
Consequently, while the correct advancement of a Smart City
tends to squander the executives in a total manner, the
assortment of waste is basic to improve the support of the
resident and furthermore on the ecological side, just as with
the reason of acquiring a monetary putting something aside
for the administration.[4]
C. Efficient Water Supply A smart water arrangement is a completely coordinated
arrangement of items that gathers continuous significant and
noteworthy information from the water organize. As keen
water arrangements are completed, water administrations
are made a similar amount of information in one day that
they recently made in a year. The issue that administrations
as of now face is that this information is put aside
independently and in various zones of the business for
various thought processes.[7]
3. Literature review A smart city can be portrayed as the city which surprisingly
changes from regular urban zones by merging current
advancements, for example, big data, Internet of Things,
Sensor organize, AI and new designs to help the life of its
residents. It furnished with different electronic segments for
different applications, similar to a road camera seeing
system utilized for the vehicle arrangement of sensors, keen
water the executive's system comprises of physical parts, for
example, pipes, stores installed with sensors which deal with
information investigation, the social insurance application
which tracks the patient, staff. Also, the area of the
emergency vehicle, blood items are observed to check the
accessibility on-line, a brilliant vehicle parking through
which new parking area for additional vehicles ought to be
built up, etc. In a Smart City, wireless sensor systems are the
significant wellsprings of the colossal and different data
generation. At the point when all the data is accumulated and
assessed in the equivalent IoT stage, the system may go up
against various assaults, for example, cross-site scripting,
Denial-of-service (DoS), Phishing attack, and so forth.
Additionally, its multi-occupancy may prompt security issues
also which brings about information spillage.[8] Without this
assurance, residents can't trust to government, and
furthermore the assortment of data turns out to be
increasingly troublesome. Numerous protection strategies,
for example, encryption, bio-metrics are generally applied in
various application fields. Be that as it may, these strategies
are not sufficient for the smart city condition. The principal
reason is that the greater part of the sensors and gadgets
have constrained computational force, so just basic
cryptography
calculations
can
be
utilized
straightforwardly.[9] These incapable measures by
implication present genuine threats to the entire framework.
In addition, the heterogeneity, versatility, and dynamic
Volume – 4 | Issue – 4
|
May-June 2020
Page 947
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
highlights of IoT frameworks subject shrewd applications to
high security and protection hazard. It is required to know
about security and protection alerts when planning and
applying new frameworks. As different IoT gadgets and
sensors are interconnected through the Internet so security
turns into a basic test. Making sure about IoT gadgets
becomes fruitful when the entire IoT biological system is
made sure about. To accomplish these IoT makers need to
focus on security as a prerequisite from the earliest starting
point of the item improvement to an arrangement.
Protection is viewed as an urgent treatment in the IoT. The
most compromising piece of IoT is that buyers are
surrendering their privacy, without seeing it, since they are
uninformed of what information is being controlled and how
it is being utilized.[15] The developing number of Privacy
concern makes hard for the client to distinguish their real
information inclinations. The information made by a sensor
or a machine will be transport through a wide range of
systems of not at all like sorts having a place with an
assortment of specialist organizations before broadening the
focused on application server. so each specialist co-op is just
liable for its security.
4. Research Methodology The monstrous favorable circumstances that can emerge out
of savvy city inventiveness, there's likewise a great deal that
we should be careful about. Significant regions of concern
incorporate the enormous measures of information gathered
and its conceivable effect on the protection of residents, the
likelihood of this information being taken by hackers, and
contender starting to lead the pack of this interconnected
innovation to dispatch attacks, disintegrate urban areas to a
halt.[10]
I.
Tokenization Tokenization is the way toward replacing delicate
information with special acknowledgment signs that hold all
the pivotal data in regards to information without bargaining
its security.[11] Here we exchange a haphazardly or
algorithmically produced esteem which is known as a token
for sensitive information, for example, credit card number,
bank account number, and social security number. along
these lines, after tokenization, the mapping of the token to its
essential information is put away in a hundred database.[12]
Here we do the trading of sensitive information with a
randomized number in some configuration however with no
regular estimation of its own. The token doesn't contain any
sort of unique information, it just fills in as an agent of it. In
information, encryption is that it is reversible. By
configuration, the encoded information can be arrival to its
unique decoded structure. This implies any individual or
element that approaches the key can utilize it to reveal
sensitive information. the quality of the encryption depends
on its key which is utilized to make sure about the data.[13]
A long way from the encryption, there is no numerical
relationship connecting the token and its unique information
to turn around the tokenization, the hacker must approach
the mapping database.[12]
II.
Pseudonymization Pseudonymization replaces the identity of the data subject
or persons involved in such a way that supplementary
information is required to re-identify the data-subject. It
forms the private information of the client in such a way, that
the private information can never again appear comparable
@ IJTSRD
|
Unique Paper ID – IJTSRD31233
|
to a particular data subject. In straightforward terms, the
technique for pseudonymization to private information and
can reduce the hazard for the information client worries
about their information security and furthermore help
controllers and processors meet their information assurance
commitment.[14] Without the utilization of additional data,
if you can’t ready to re-distinguish the client, you need to
give the extra data to recognize proprietor or client of
information. Extra data is kept independently and is just
managed specialized and business measures to guarantee
that the individual information is not being depicted to a
recognized or recognizable individual. This method utilizes
encryption to make an interpretation of private recognizable
information to limitless information where the information
subject cannot be perceived. Here you are looking for a
safety effort to the private information to forestall
connecting that encoded information to the first character of
the individual. The information can in any case be returned
with the correct controls or the encryption keys to redistinguish the information subject just inside the protected
condition of the data controller.[14]
III.
Tunneling In a smart city project, different IoT devices and sensors are
established to collect and exchange information. So the
information created by a sensor or machine is going to be
shipped through various networks before arriving at the
focused on an application server. As a consequence, the
information has to be decrypted and re-encrypted inside
every entryway, from one specialist organization to the next.
It's said that the protection level of an entire system is
characterized by its weakest connection. The burrowing
convention allows for the safe movement of information
between the systems. It permits private system interchanges
to be sent over the open system, through a procedure called
encapsulation.[16] The encapsulation procedure permits the
information bundles to seem like an open information
packets when they are really private information packet,
permitting them to go through without notice. In tunneling,
the information is broken into little pieces called packets.
When the packets travel through the tunnel, they're
encrypted and further the procedure of encapsulation
happens. The private system data along with the convention
data are encapsulated freely arrange transmission units for
sending. The units appear as open information, permitting
them to be transmitted across the internet.[16]
Encapsulation permits the packets to reach their appropriate
goal. Further at the goal stage, the method of de-capsulation
and decoding happens.
5. Conclusion In this paper, we see about the IoT Based smart city and its
advantages and application like medicinal services, parking,
smart waste management, and water supply, life quality. so it
can facilitate the life of individuals lived in a smart city give
them urban personal satisfaction. likewise, we get security
and protection worries of the individuals wherein clientdriven savvy city they have to reserve the option to offer
access to the proposed individual or move his information
starting with one service provider then onto the next service
provider. A smart city ought to likewise support the
possibility of attainable improvement as it is the central
need of time and we can't settle in managing the important
characteristic assets and fall into calamity.
Volume – 4 | Issue – 4
|
May-June 2020
Page 948
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
6. Future Enhancement The IoT can be characterized as a network of networks,
wherein heterogeneous systems, for example, the Internet,
cell phone systems, social communities, and mechanical
networks, are interconnected and coordinated. Most
organizations that take a shot at IoT are at the preliminary
stage, generally on the grounds that the sensor innovation,
remote advances like 5G, and so forth are as yet getting
created. So without having appropriate guidelines and
security it's despite everything being an on-going issue.
Thus, to fulfill solid portability, flexibility, dynamic, and ease
necessities, further research is required to create lightweight
countermeasures to limit overhead while all the while
ensuring security.
7. Reference [1] https://www.businessinsider.com/iot-smart-citytechnology?IR=T
[2] https://www.iot-now.com/2019/09/06/98516exploring-benefits-building-smart-city-countryparttwo/
[3] http://smartcities.gov.in/upload/advisiory/58a3de08
68e9dAdvisory6.pdf
[5] https://www.plantemoran.com/explore-ourthinking/insight/2018/04/thinking-about-becomingasmart-city-10-benefits-of-smart-cities
|
Unique Paper ID – IJTSRD31233
[7] http://bwsmartcities.businessworld.in/article/Effectiv
e-Water-Management-Indispensable-for-smart-cities/09-05-2018-148681/
[8] Saber Talari, Miadreza Shafie-khah, Pierluigi Siano,
Vincenzo Loia , Aurelio Tommasetti and João P. S.
Catalão,” A Review of Smart Cities Based on the
Internet of Things Concept.”
[9] Youyang Qu and Longxiang Gao, “Security and Privacy
in Smart Cities: Challenges and Opportunities. ”
[10] https://www.comparitech.com/blog/vpnprivacy/smart-cities-privacy-risks/
[11] https://searchsecurity.techtarget.com/definition/toke
nization
[12] https://www.forbes.com/sites/gilpress/2017/10/17/
top-10-hot-data-security-and-privacytechnologies/#799d4d006b3f
[13] https://www.tokenex.com/blog/tokenization-vsencryption-which-one-is-best-for-your-business
[14] https://www.youtube.com/watch?v=6Jl38L9ygiQ
[4] https://geographica.com/en/blog/wastemanagement/
@ IJTSRD
[6] https://www.thalesgroup.com/en/markets/defenceand-security/protection-systems/smart-and-safe-city
|
[15] https://techcrunch.com/2016/08/14/the-iot-threatto-privacy/
[16] https://www.techopedia.com/definition/5402/tunneli
ng
Volume – 4 | Issue – 4
|
May-June 2020
Page 949