WATCH

Wednesday 25 May 2016

Securing the Smart City.



 How smart can turn dumb -

A smart city uses technology to automate and improve city services, ultimately making citizens’ lives better. It describes a city full of connections, where information technology and the Internet of Things (IoT) is embedded into everyday life. The problem is, for each connection, there’s a risk. Data is shared across networks that, if poorly encrypted, can be accessed. Each connection, however remote or seemingly innocuous, could provide an entry point for a hacker who could potentially manipulate that system for their own devices.

Digital security experts like Cesar Cerrudo, CTO for IOActive Labs, have concerns about how robust this encryption is. Cerrudo points out that many use weak encryption algorithms, and others have poor key encryption generation or fixed keys that hackers can gain access to. It’s not just fragile encryption or weak connection security - citizens in a smart city have a part to play too. Simple or shared passwords and lost memory sticks could potentially offer hackers the opportunity to access personal and business information that we hold. Malware can be stored within apps we freely download.

And how many of us ever read the terms and conditions when we sign up for apps or do much checking before clicking the button to allow our apps to access our data? Given that many of them are longer than novels (Apple’s Terms and Conditions are notoriously longer than Shakespeare’s Macbeth), it’s not surprising we don’t, but it could have implications for our security.

“If that technology is not secure and if it’s not properly protected, city infrastructure and citizens won’t be safe and will suffer cyber attacks,” Cerrudo says, warning that smart cities run the risk of becoming dumb cities if they continually suffer cyber attacks because of weak infrastructure.

Cerrudo himself has demonstrated how simple our cities’ systems can be to hack. Using a laptop and hardware that cost under $100, he was able to access individual traffic lights, changing them at will. Pushing further, he could access these systems from up to a mile away and even from an airborne drone.
The technology used for managing traffic lights in New York is also used to manage the traffic infrastructure in cities across the world, including Washington DC, New York, Seattle, San Francisco, London, Lyon, and Melbourne. Cerrudo’s example illustrates just how incredibly fragile our cities are, with small incidents having big consequences. It’s the principle of the ‘cascade’ effect. In a cyber attack, hackers may use the cumulative impact of a number of small intrusions that, when multiplied together, can cause havoc.

As an example of what can be achieved, in 2006 two aggrieved Los Angeles traffic operators remotely accessed four traffic lights at busy intersections. This seemingly minor interruption caused gridlock that lasted for days. Even more concerning was that it took three years for the perpetrators to be found, after they owned up to the crime.

Hyper-Cat -

If multiple entry points and unsecured data sharing across systems is the biggest risk for our smart cities, then surely the answer must be in having one system that manages everything?
The idea of the Urban Operating System (UOS) has in the past been a key part of the concept of a Smart City. From one single operating system, the entire infrastructure of a city can be connected, organised and managed. But it’s increasingly viewed negatively by smart-city experts like Tom Saunders, senior researcher at Nesta, who believe we’re actually safer if systems are fragmented.

“Companies are still pushing the one-system model,” says Saunders, who is also the author of ‘Rethinking Smart Cities from the Ground Up’. But for him at least, it’s not the answer: “To be secure you want lots of separate systems that compete. That way, the whole city network can’t be hacked.”
One of the main reasons Saunders believes the UOS model won’t take hold is that, contrary to claims made, there are no real smart cities, just a collection of individual projects. “In the UK, we can’t afford to roll out 100,000 sensors across the city,” he says. Smart Cities like Bristol, Milton Keynes and most recently Manchester are investing in small-scale smart projects, not imposing a complete smart system upon the city. The infrastructure and technology behind the projects aren’t linked, meaning hacking them all would be complex and time-consuming.

If we’re unable to build our Smart Cities from the bottom up, then it’s essential that we impose security upon the systems that we already have. Symantec is one of a number of organisations working together to develop a secure communications standard that it hopes will do just that.
Called Hyper-Cat, the standard is a JavaScript Object Notation (JSON) catalogue that securely shares IoT asset information across the web, making it much more difficult for hackers to access. “The system isn’t a UOS,” says Sian John, Symantec’s head of resilience. “It’s a set of standards that enables the safe communication between IoT devices”.

At the moment, many city systems enjoy ‘security through anonymity’. As these systems are increasingly introduced to Smart City elements, experts like those at Hyper-Cat are calling for the introduction of a safe operating standard that can ensure that minimum security conditions are met.
Cerrudo agrees that securing this communication is the biggest challenge for a smart city, but he’s critical of the industry. “Most smart city technology vendors are immature and don’t have enough cyber security knowledge,” he says.

Rather than developing new communication standards, Securing Smart Cities - a non-profit organisation that brings together academics and businesses - creates resources and guidance for public and private sector organisations to help cities protect themselves. Securing Smart Cities is increasingly calling on governments to take a much greater involvement in smart cities. “Right now governments are blindly trusting vendors and deploying technology without making sure it’s secure,” says Cerrudo.

Smart crime-fighting -

Security in a smart city often focuses on the big threats to the population, and on how critical infrastructure can be protected. But smart, connected cities also play a key role in protecting the citizens. After all, smart cities thrive on ‘big data’. This mountain of seemingly unconnected data is being processed by sophisticated computer programs to help predict real crimes. It may sound like science fiction, but the concept - dubbed predictive analytics - is actually in development and being trialled in many places around the world.
In 2011, the Santa Cruz Police Department introduced such ‘predictive policing’ to the force, and saw arrests increase by 57 per cent. The system divides the city into cells 450m square, with a computer algorithm assigning a probability of crime based on an analysis of previous crime data, social media and other local data sources.

The technique is being further developed by companies like Hitachi, whose Visualization Predictive Crime Analytics system blends real-time event data captured from public safety systems and sensors with historical and contextual crime data from record management systems and other sources. Spatial and temporal prediction algorithms are used to assign threat levels for every city block and also to create threat level predictions, forecasting where crimes are likely to occur or additional resources may be needed. Hitachi estimates that the system can predict crimes to within a 200-metre radius.
New technology has always been used by police forces to tackle crime, with GPS trackers in cars, mobile phone records, bridge toll passes and more being used as evidence in cases. As our cities become increasingly connected, law enforcement agencies will be able to use this data to prosecute criminals. But information can also be misused. The police have strict rules defining how they investigate crimes and name suspects, but the general public doesn’t. In April 2013, Boston was shaken by the detonation of two bombs at its annual marathon. After the incident, the entire city went into lock-down as the perpetrators went on the run.

During this time, CCTV images, social media and a variety of other open sources were used by concerned citizens and media outlets to identify and name potential suspects. The problem was, these people were innocent bystanders and, in one case, a participant in the marathon. The smart city can help protect its citizens, but access to information should come with some responsibilities.


No comments:

Post a Comment