Cost and resource analysis for network development
A study is made on the concept of cloud computing and its application for the development of the wireless sensor network. The cost of development and maintenance of the scalable network framework is analysed and it is compared with the multi datacentre model for the identification of the significant investment cost for the development of the network solution. An analysis should be made for the identification of the resources required for the development of the network and identification of the new technology that can be implemented for the development of the network. The terminologies and the perspective for the use of the cloud platform should be developed for the implementation of the on demand self-service. There are growth in the cloud computing and with the popularity of the increase in the smart phone and there should be an advancement of the internet technologies and it provides easier access of the files and information for the remote location. There are different factors that affects the policy such as economy, structure of the network and much attention should be given to the cultural and the political factors for the development of the network policy and development of the network framework.
The criminals and the travellers would be affected the most with the implementation of the wireless sensor network. It also helps in efficiently manage the waste and the sensors installed in the waste bin can generate signal when it gets full for the collection of the trash. The camera sensors installed in the traffic signals can record the over speeding of the vehicles and track the registration number of the vehicle to get to them and take legal action against them. The travellers in the city can download the application in their smart devices for getting the city map and navigate to their different location without facing any problem (Bhushan, 2017). There are different approach that can be used for the implementation of the smart state plan and different models and activities are used for creating a routine and schedule for the configuration of the wireless sensor network. Data are gathered from the real life environment for the development of the system design and identification of the sensors that are used for generating data from the network and process the data for creating different algorithm and prediction of the routes used or the management of the network solution (Ko & Choo, 2015). A database server is required for storing the information and the data analytics is applied for the management of the information and analysis of the behaviour of the network device and the components deployed in the wireless network solution. For the implementation on the smart state plan the digital technology and planning for the improvement of the smart transportation system and secure the data marketplace. The wireless sensor network should be designed to enhance the public transportation service, track the data for the public infrastructure and the amenities provided to the people (Pathan, 2016). The data gathered from the sensors installed in the bus stops, traffic lights, rubbish bins and other location in the city should be used for maintenance, operational planning and creating an incident response.
Impact of network on travelers and criminals
For the development of the smart state plan the IoT devices should be used and interconnected with each other for generating data and use it for different purpose such as improvement of the mobility, healthcare, productivity and public safety. For the implementation of the smart state plan different governmental departments such as the land transport authority, cyber security agencies, waste management department and other agencies should be involved and different services should be managed for the development of the smart wireless network (Yildiz et al., 2016). The risk associated with the implementation of the smart state network should be identified for the preparation of the risk mitigation plan and responding against the risks for increasing the efficiency and reliability of the wireless sensor network. The effort needed for the management of the city can be reduced and all the departments can be controlled from a single point with the implementation of the smart wireless sensor network (Anaya et al., 2018). The citizens should be provided with different service and all the operations can be tracked for the enhancement of the different service provided to them. The identity of the citizen can be maintained and the network can help in tracking the activity of the people. It also helps the citizen to provide different platform which they can use for getting different information and resolve problem without depending on the government (Anwar et al., 2014). For the development of the wireless sensor network big data should be used because it plays an important role in management of the data generated from the IoT devices that are installed in different location of the city. There are different types of data generated from the devices such as raw, processed, communication protocol, etc. and it is vulnerable to different security risks.
A multi layered security should be applied and the network should be segmented for mitigation of the risk of corruption of data and prevent different types of attacks (Harari et al., 2016). The network access control policy should be developed according to the requirement of the Australian government and it should be combined with the software defined networking. The encryption of the network communication channel for securing the data and reduce the risk of data loss and data hijacking (Radhappa et al., 2017). A hybrid big data analytics platform should be developed with the implementation of the cloud computing, managed hosts, dedicated hosts and colocation. The different features that are available in different platform should be evaluated for the combining them and operate as a single platform and manage the different service for management of the platform and handle the IoT data. The IoT devices generate continuous stream of data and it scales up with the expansion of the network. Thus different methods should be selected for utilizing the data such as data analytics, statistics and metric calculation.
The benefits of the adoption of the wireless sensor network should be conveyed to the personnel and the users should be able to share the platform and gain new opportunity for digital transformation and get new investment for improvement of the quality of life. The integration of the navigation system helps in increasing the efficiency of the transportation system the GPS sensors can be installed in the vehicles and integrated with the system for getting the real time update of the traffic and estimate the time for the reaching the destination location. The wireless sensor devices such as the RFID and the IoT can be applied for monitoring the activity of the humans and for the implementation of the wireless network a research is made on the successful wireless network created by Singapore government and it can be used for the identification of the health status of the people. The sensor can be used in different application such as health care, transportation and payment. Typical scenario for the application of the sensors should be created and the security issues should be identified for reducing the privacy and the legal issues associated with the networking (Vaddadi & Krishna, 2017). There are different security issues such as eavesdropping and denial of service that can be used by the third party agents for gaining the access of the private information of the people and pose a serious social impact on the people living in the city. The chances of breach of the security should be minimized with the application of proper encryption algorithm and encrypting the communication channel (Sehgal et al., 2015). The threats associated with the wireless network is similar with the wired network and it is important to identify the security threats for management of the security issues. The wireless communication needs to broadcast its message and thus it can be easily tacked using eavesdropping (Gutierrez et al., 2014). There are different security measures that can be applied for the mitigation of the threats but it cannot be applied if there is disparity in the architecture of the wireless network.
Benefits for waste management, public transportation, and traffic control
The development of the ad hoc network can be an ideal choice for connecting the IoT devices location in different places of the city and a dynamic topology should be used for creating a peer to peer connection. The selection of the architecture can reduce the complexity of the network and the network administer can easily manage the different network components and troubleshoot the errors in the network. A data and a privacy policy should be developed for the management of the sensitive information and it should include the identity privacy for the protection of the confidential and the personal information (Chelli, 2015). Bodily policy, territorial privacy for the protection of the integrity of the physical person and the personal space, objects and property of the personnel. A location and movement policy should be created for the protection of the tracking beside the spatial behaviour. The communication privacy should be created for protecting the conversation for surveillance (Laudon & Laudon, 2015). The policy should also contain the transaction privacy for protecting the monitoring of the purchases and the other exchanges performed by the people and avoid the ethical issues in the network.
The different types of security threats and attacks are evaluated for the implementation of the wireless sensor network such as:
- Sybil attacks
- Hello Flood attack
- Denial of Service
- Information transit attack
- Warm hole attack
- Sink hole attacks
Sybil attacks – this type of attack is used for attacking the distributed storage and different routing mechanism such as aggregation of data, allocation of fair resources and detection of the misbehaviour should be identified (Maksimovic, Vujovic & Perisic, 2015). The identity of a node can be forged and the network information can be accessed for gaining the access of the information. The peer network can be vulnerable to the Sybil attack since each of the wireless sensor network can operate using a gateway and it can be prevented with the application of effective protocol (Loo, Mauri & Ortiz, 2016). It is difficult to detect a Sybil node in the network and it can be detected using a Pr detection formulae.
Hello Flood attack – It uses the hello packet for convincing the sensors installed in the wireless sensor network and the attacker uses a high radio transmission range and the hello message is send to multiple wireless sensor devices (Zahurul et al., 2016). If the victim node tries to get to the hello message by analysing that it is its neighbour node the attack can successfully spoof the sensor.
Denial of Service – it is used by the attacker to cause the node fail by exhausting the resources available in the node. Unnecessary data packets are sent to the node for preventing the node to serve the legitimate users for any request. This type of attack can disrupt a network and it can be performed in the wireless network in different layers. For the physical layer the denial of service can cause tampering or jamming (Butun, Morgera & Sankar, 2014). For the link layer it can cause exhaustion and collision of data packets causing loss of data and unavailability of the node. For the network layer it can cause black holes and misdirection. The attack can be performed by the attacker using malicious flooding and for the prevention of this type of attack the traffic in the network should be monitored and identified using strong authentication mechanism.
IoT devices and big data analytics for network management
Information transit attack – In the proposed sensor network the sensor is used for monitoring the different parameters and reporting on the sink following the requirement. While transmission of the report the data can be altered, replayed or spoofed by the attacker (Lounis et al., 2016). The wireless network is vulnerable to the eavesdropping and the flow of the data traffic can be monitored and intercepted for integrating wrong information to the base station.
Wormhole attack – This is a critical type of attack used by the attacker for recording the data packets from one location and tunnelling it to different location. The bits can be transmitted selectively and it can be a significant threat for the WSN because this network attack does not needs a sensor in the network to be compromised and it can be applied in the initial phase when the neighbouring information are discovered by the sensor (Conti et al., 2018). This is similar to the man in the middle attack where the attacker replays the packet to the neighbouring node and creates a warm hole in the network.
Sink hole attacks – It is used for attracting all the data traffic in the network by listening to the request of all the routers and replying to the targeted nodes. Thus the device can be inserted with the communication nodes and able to get all the packets flowing in the network.
Utilization of the digital identity for operating the mobile device environment
There is an increase in the use of wireless sensor network for the healthcare industry and different type so sensors has been developed for monitoring the heart rate, blood pressure, etc. The security and the privacy concerns among the people can restrict them to take thee full advantage of the system. They may think that the data gathered from the wireless sensor network can be used by the government for tracking their activity and this can affect their social life (Caron et al., 2016). The problems and the possible countermeasures are analysed and applied for the management of the behavioural changes of the citizens for increasing the efficiency of the wireless sensor network. The privacy policy and the security measures taken for the development of the wireless sensor network should be conveyed to the citizens for help the user to fully utilize the wireless sensor network and enable them to reduce the effort and improve the quality of life (Chung, Demiris & Thompson, 2015). The needs of implementation of the smart WiFi network for the configuration of the network for allowing the user to seamlessly switching between the mobile data and the WiFi network is analysed. The sensors should be connected with the wireless network for generating data from the network and create a heterogeneous network.
Steps taken for ensuring the security and privacy of the digital identity
For the improvement of the security and privacy the wireless sensor network should be secured from external access and it improves the quality of life of the people living in the city. The traffic jams and the security of the people living in the city can be improved with the implementation of the wireless sensor network. The people living in the city can track the busy routes and select alternative path for reaching the location (Mohammed et al., 2014). The can also search for available parking space from their mobile application and easily park their vehicle in the free space. It is expected that the people residing in the city would fully utilize the wireless sensor network and make the city a better place for living. The adoption of the wireless sensor network would help in management of the strategy and create new public and private business partnership for adding new technology. The individual needs are fulfilled with the network and it should also help the business groups for improvement of the environmental, social and financial areas (Yang et al., 2015). It is expected that the people would adopt the system slowly and more streamline service would be combined with the wireless sensor network for making the network sustainable and efficient for the people. The types of category of people affected with the implementation of the network is analysed depending upon the ethical implications and the changes in the behaviour of the people. The expectation for the changes in the behaviour is evaluated with the current changes by analysing the changes in the schedule of time and the activity of the user. The technologies should be optimized and integrated or improvement of the communication between the citizen and the government such that the city becomes a smart city (Glenn & Monteith, 2014). The outcome and the wireless sensor network should be optimized for the development of the smart city and serve the different needs of the citizens.
Multi-layered security for network protection
Conclusion
For the preparation of the report the smart plan of the Singapore government is analysed and the steps taken for the implementation in the Australia is given in the report. The personal and the ethical implication for the enforcement of the smart sensor network is analysed and documented in the report. From the above report it can be concluded that it is essential to analyse the government plan for the deployment of the smart WiFi network. A framework of the network should be developed for the deployment of the IoT devices in the different areas of the network. The ethical issues that the government can face with the implementation of the smart sensor network should be evaluated before application of the security policy. The citizen should be involved for analysing their needs and the policy should be developed according to them for the management of the choice of their activity and use the real time data for different purpose. The security of the data is the main point for the success of the wireless sensor network and big data is used for the management of the structured and the unstructured data. There are different test bed software that should be used for the management of the signals and gather data from the environment and communicate with the other sensor for setting up the wireless sensor network. The communication protocol that can be used for the accomplishment of the required task should be identified for the selection of the possible hardware and wireless technology used for interconnecting the IoT devices with the each other. The issues associated with the health and the privacy of the public should be analysed for the transmission of data. The risk of network security attacks should be identified and the loss of information should me minimum. Countermeasures should be taken for minimizing the attacks and a distributed system should be used such that there is no single point of failure and secure control process algorithm should be used for the implementation of the wireless sensor network system.
References
Anaya, L. S., Alsadoon, A., Costadopoulos, N., & Prasad, P. W. C. (2018). Ethical implications of user perceptions of wearable devices. Science and engineering ethics, 1-28.
Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., Qureshi, K. N., Computing, F., & Bahru, J. (2014). Security issues and attacks in wireless sensor network. World Applied Sciences Journal, 30(10), 1224-1227.
Bhushan, B. (Ed.). (2017). Springer handbook of nanotechnology. Springer.
Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks. IEEE communications surveys & tutorials, 16(1), 266-282.
Caron, X., Bosua, R., Maynard, S. B., & Ahmad, A. (2016). The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective. Computer law & security review, 32(1), 4-15.
Chelli, K. (2015, July). Security issues in wireless sensor networks: Attacks and countermeasures. In Proceedings of the World Congress on Engineering (Vol. 1, pp. 1-3).
Chung, J., Demiris, G., & Thompson, H. J. (2015). Ethical Considerations Regarding the Use of Smart Home Technologies for Older Adults. Annual Review of Nursing Research, Volume 34, 2016: Nursing Ethics: Vulnerable Populations and CHanging Systems of Care, 155.
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities.
Glenn, T., & Monteith, S. (2014). New measures of mental state and behavior based on data collected from sensors, smartphones, and the Internet. Current psychiatry reports, 16(12), 523.
Gutiérrez, J., Villa-Medina, J. F., Nieto-Garibay, A., & Porta-Gándara, M. Á. (2014). Automated irrigation system using a wireless sensor network and GPRS module. IEEE transactions on instrumentation and measurement, 63(1), 166-176.
Harari, G. M., Lane, N. D., Wang, R., Crosier, B. S., Campbell, A. T., & Gosling, S. D. (2016). Using smartphones to collect behavioral data in psychological science: opportunities, practical considerations, and challenges. Perspectives on Psychological Science, 11(6), 838-854.
Ko, R., & Choo, R. (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngre
Laudon, K. C., & Laudon, J. P. (2015). Management information systems (Vol. 8). Prentice Hall.
Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016). Mobile ad hoc networks: current status and future trends. CRC Press.
Lounis, A., Hadjidj, A., Bouabdallah, A., & Challal, Y. (2016). Healing on the cloud: Secure cloud architecture for medical wireless sensor networks. Future Generation Computer Systems, 55, 266-277.
Maksimovi?, M., Vujovi?, V., & Peri?i?, B. (2015, June). A custom Internet of Things healthcare system. In Information Systems and Technologies (CISTI), 2015 10th Iberian Conference on (pp. 1-6). IEEE.
Mohammed, F., Idries, A., Mohamed, N., Al-Jaroodi, J., & Jawhar, I. (2014, May). UAVs for smart cities: Opportunities and challenges. In Unmanned Aircraft Systems (ICUAS), 2014 International Conference on (pp. 267-273). IEEE.
Pathan, A. S. K. (Ed.). (2016). Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
Radhappa, H., Pan, L., Xi Zheng, J., & Wen, S. (2017). Practical overview of security issues in wireless sensor network applications. International Journal of Computers and Applications, 1-12.
Sehgal, V. K., Patrick, A., Soni, A., & Rajput, L. (2015). Smart human security framework using internet of things, cloud and fog computing. In Intelligent distributed computing (pp. 251-263). Springer, Cham.
Vaddadi, S. K., & Krishna, B. (2017). Ensuring Distributed Data Discovery by Providing High Security in Wireless Sensor Networks. IJMCA, 4(6), 425-431.
Yang, J. J., Li, J., Mulder, J., Wang, Y., Chen, S., Wu, H., … & Pan, H. (2015). Emerging information technologies for enhanced healthcare. Computers in Industry, 69, 3-11.
Yildiz, H. U., Bicakci, K., Tavli, B., Gultekin, H., & Incebacak, D. (2016). Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies. Ad Hoc Networks, 37, 301-323.
Zahurul, S., Mariun, N., Grozescu, I. V., Tsuyoshi, H., Mitani, Y., Othman, M. L., … & Abidin, I. Z. (2016). Future strategic plan analysis for integrating distributed renewable generation to smart grid through wireless sensor network: Malaysia prospect. Renewable and Sustainable Energy Reviews, 53, 978-992.