Smart Sensor Networks and Collection of Data
The use of the sensors and cameras on the public places in the Singapore city can help the government of the organization to collect and use those collected in efficient execution of the different regulatory operations. The collected data through this sensor networks helps in measuring the traffic flow on the routes, in scanners that are helpful for the police officers in the city in order to locate stolen vehicles, or tracking crimes in the specific regions. In order to make a smart city the sensor networks are considered as the integral part of the city. The reason behind this can be sated as, the sensor networks are helpful in the collection of highly detailed information about different aspect of city life and its citizen (Weglein, Rein & Cernese, 2013). This collected data from the large sensor networks is usually connected to the citizens or the individuals and thus leading to develop detailed profiles of the residents of the city.
Smart sensor network program of government can have sever implications on the privacy of the visitors whose data will be collected by the sensor networks. This technique is also under question mark the grounds that they are particularly not quite the same as compared to the traditional data/information collection programs about the citizens or the visitors in the city. Average data collection programs vary in three noteworthy ways from smart sensor networks used in the data collection: 1) The data in this scenario is collected in same time intervals that are maintained by the authorities 2) The government agencies inform the people about the data collection programs and the consent of the person from which the data is to be collected, and at the end 3) all the collected data/ information is either anonymized before it is released publically (Shrier, Wu & Pentland, 2016). The traditional data collections programs utilize consent policies in order to get the data from people. In addition to that, back-end dataset anonymization is used to secure the privacy of an individual whereas, the smart sensor network collects the user’s data without their consent. Moreover, if any hacker is expert enough then they can connect the available data about an individual by accessing or breaching the sensor network implemented by the government. Notwithstanding, this technique breaks down despite sensor innovation, modern re-identification systems, and prescient, examination (Weglein, Rein & Cernese, 2013). As the consent of the individual is not computerized components, and the smart sensor network is introduced that collects data without any request to acquire consent before collecting the information through the use of the smart sensors. The visitors who are unaware of the facts that the data collected by the sensors and about their use by the authorities that they are being followed as they travel through the city sor the country.
Privacy Implications of Smart Sensor Networks
From the perspective of the resident of Singapore city, it is important for them to protect the collected data by using the sensor network in the different parts of the city. Sensors are the main elements for gathering data, and any cybercriminal can access the sensitive data about the citizens (personal or financial) by either accessing the stored information by the sensor information or by using the eavesdropping technique in the network. This data can be utilized by them indeed, even the apparently harmless information about a citizen can be used to harm the citizen badly in the event that they know how to associate various sensor inputs and collected data about them (Weglein, Rein & Cernese, 2013). For instance, someone who has accesses to the stored data by the sensors of an individuals, then the attackers or adversaries can get and exploit their financial data in order to harm or access their bank accounts and in this manner can economically harm the citizen through the exploitation of the collected data while breaching their privacy.
In case of the smart sensor networks if someone can get access to the private date of the citizens by observing the data transmissions between the different nodes (Shrier, Wu & Pentland, 2016). As an example the, a couple of smart sensors set outside a house may be capable to screen and observe the temperature and light readings of any house, that consequently uncovering point by point data about the inhabitants of the house and their daily activities in the house and there inhabitants (Ko & Choo ,2015). Sensor networks sends the data in encrypted format that helps in solving some of the issues however it requires an improved distribution scheme for the data transmission.
Personal data is as important as the corporate information, aside from that the unapproved utilization of this sensitive personal data straightforwardly impacts the person or the user of the devices which is connected through the internet via the sensors. This sensors are used to collect the data from the device that incorporates contacts, character data, wellbeing data, money related information, locations and data about relatives, the accumulation of which can prompt pantomime or even data fraud. Too, get to data is available, including secret key stores, and applications that auto login as the client, for example, email, logbook and web-based social networking. Secret word databases can give proposals to passwords utilized as a part of different settings (Weglein, Rein & Cernese, 2013). An additional difficulty is that personal data may incorporate data about shared qualifications, so the trade-off of one information source may prompt effect on other relatives or associates.
WiFi Offloading: A Solution for Network Congestion
As the number of smart phone users are increasing day by day, thus it is important to find a way in which the data traffic can be reduced from the existing telecommunication network infrastructure, thus the development of a new heterogeneous network infrastructure will enable the users to seamlessly connect to the internet network without the use of the mobile data.
WiFi offloading appears the most suitable solution in this scenario. Building more Wi-Fi hotspots is altogether less expensive than building out the new telecommunication infrastructure. In this way a greater part of data transactions is diverted through Wi-Fi systems, then the data traffic congestion on the networks will be reduced and the performance will be enhanced (Shrier, Wu & Pentland, 2016). Given that there are as of now a boundless sending of Wi-Fi systems, Wi-Fi offloading addresses the “time-tocapacity” issue for the present need of extra network capacity.
Open Access through the Wi-Fi hotspots eliminates the effect of interference and gives a superior performance from the perspective of throughput and QoS, in light of the fact that every single accessible asset are shared between clients.
User privacy on the shared network is related to the safeguard the user’s information like, name, address, interests and employment. This are further classes them into five sub-categories: social privacy, identity privacy, personal privacy, financial privacy.
Identity privacy: It refers to an individual’s name, driver permit number and other data that can distinguish who the individual is. Area security incorporates a client’s area follows, for example, where he is, the place he has been, and what put he as often as possible goes to.
Economic data security is related to the economic condition of an individual, for example, his/her online transactions, his/her stocks and other economic data.
Social security incorporates a client’s social data, for example, relationship and closeness with his companions, relatives, associates, or club individuals.
Individual security is the sort of data that can reflect a user’s personal life traits. For instance, the place where he grew up, marriage status, propensities and side interests, political perspectives, sexual orientation, identity and other individual data.
If the user is a visitor or a tourist in Singapore then, this heterogeneous network of sensors and Wi-Fi hot spots will enable the users to have flexibility to get the cloud based resources for internet connectivity in the city/country (Shrier, Wu & Pentland, 2016). Since in this type of open and unsecured networks the users does not have any influence or control over their transmission path as well as on the security mechanisms that are used for the secured transmission of the user data thus there is always a risk of data breach or theft of sensitive data via accessing the device. In case there is no or weak protection (encryption technique) are used then the chances of user data being accessed, stolen or modified by any third party or the hackers gets increased. Migrating the sensitive data, economic data becomes publically accessible via the backdoors of the smart sensor network that is going to be implemented by the government of Singapore (Weglein, Rein & Cernese, 2013). Thus, due to the lack of assurance for the security of the data in the user devices the visitor to the Singapore will hesitate to leverage the benefits of this heterogeneous network that helps them to seamlessly switch between the mobile data and the Wi-Fi network for their smart devices.
Privacy Implications of WiFi Offloading
The proposed Wi-Fi is easily accessible and convenient for the users on the go and thus helps the people to be connected with the internet using the public hotspots throughout the country as proposed by the Singapore government. The Wi-Fi networks uses radio wavesf for connectivity to connect with the user devices.
Even though the firewalls and antivirus are generally used for user’s online safety but unfortunately this tools are not able to protect sensitive user data while operating in a shared network or from the hackers in a public hotspot (Weglein, Rein & Cernese, 2013). Antivirus and Firewalls are helpful in preventing the attacks of the different Trozans, spyware, Ad-wares as well as controlling the data flow or data communication from the device to the access points.
Use of personal VPN: In this scenario in order to access and get the sensitive from the users it is important to sniff in the data communication between the aces point and the user device thus use of a personal VPN in order to encrypt all the data transmission from the device will help in protecting the data communication and consequently leading to the secured sensitive data on the device.
Figure 1: Personal VPN
(Source: Holt & Mal?i?, 2015)
Storage encryption of the mobile devices: presently most of the mobile devices are equipped with the ability to encrypt phone data storage that may play a significant role in securing the stored sensitive data on the device (Ko & Choo, 2015). Some of these devices do it by default seamlessly without asking for users consent and makes all the data inaccessible by the intruders and hence secures all the sensitive data.
The digital identity for a user is the specific data that distinctively describes a user’ or a person and contains information about its relationship with other entities in the cyberspace. In other words the social identity that a user establishes in the cyberspace through digital identities is referred to online identity for any user.
The digital identity can act naturally pronounced, the individual makes it and utilizes it as they observes it fit, or, then again approved by different third parties , making the identity more secure and broadening its level of confide in electronic data exchanges (Shrier, Wu & Pentland, 2016). A trusted personality is given by an ordinarily perceived, trusted outsider that creates, oversees and approves personalities through an arrangement of security works on including both on the web and disconnected procedures.
Protecting Sensitive Data with VPN
Personal data of any user is at present stored over multiple Internet services. In the given scenario of the smart sensor networks, the main issue is protection and management of the shared information over the sensor network and the lack of security mechanisms encompassing it, i.e. the way information is circulated over this smart sensor network and overseen by a few identity providers and put away on individual devices.
Using the smart sensor networks, the data about the visitors are gathered and this data can be separated into two classes: 1) information that is provided by the person or collected with their consent when they use any kind of services provided by the government; and 2) information that is taken without their consent or from their devices and their browsing history (Weglein, Rein & Cernese, 2013). The previous can incorporates address, name, telephone number, email, and other basic information.
Use of the digital identity makes a user anonymous in the cyber space or the data collected by the smart sensor network in the city. If the users strategically uses their different browsers, email addresses, devices, credit cards for their different activities on the web using the internet network provided by the government of the Singapore then it makes the access to the data by the cyber criminals or the hackers more difficult to collect one cohesive data set about any specific person in the city or the country.
So as to safeguard the user privacy who are operating their devices in the smart sensor network and is connected to the government implemented Wi-Fi hot spots, it fundamentally needs to guarantee that collected data is limited to the sensor network and is exposed just to approved authorities so that the data about an individual can be connected and consequently cannot be intercepted by the hackers or the cyber criminals (Shrier, Wu & Pentland, 2016). Along with this, individuals must be waned and being engaged to control how their own data is acquired, prepared, circulated, and utilized by any authority in the country. In any case, the limited impression of protection as mystery and get to control cannot cover the different of issues that fall under the security of the privacy using the digital identity.
Individuals would be able to utilize their digital identities, contingent upon the specific situation and with whom they are they are interacting (Shrier, Wu & Pentland, 2016). They ought to approach dependable, secure, privacy-by-design, dependable digital identities for online data transaction, especially those including the sensitive personal information (financial, personal and medical data) or other private data. At a principal level, these are the attributes that will support a safe, dependable and secure environment for protecting the privacy of the user.
Conclusion
The Digital identities need not be officially issued by the government authorities to be a reliable one. However, governments ought to consider offering electronic distinguishing proof for more-secure access to the data transactions that are transmitted through the smart senor networks that require an abnormal state of validation (Weglein, Rein & Cernese, 2013). This would contribute to value-based security for every one whether it is the citizen of the country or visitor to the country.
Use of two factor authentication process: The residents or the visitors in the city should utilize two-factor verification/authentication mechanism whenever conceivable. Regardless of the use of the strong passwords, presently the hackers and the used algorithms are efficient enough in breaking them to access the private data (Ko & Choo ,2015). Use of the two-factor authentication mechanism not only expect and ask the user to enter their password but also can be thought as the second form identity check on the online platform, for example, a unique finger impression or content informed code for unique physical identity making it significantly harder for programmers to get in and collect the data and breach the privacy of the users data.
Avoiding the open Wi-Fi and hotspots: Even though the open Wi-Fi and hotspots implemented in the city can be incredible for reduction in the charges for the data usage and advantageously helps in completing their work on the go (Weglein, Rein & Cernese, 2013). This kind of access points are likewise very uncertain, and cyber criminals can undoubtedly utilize their backdoors to perceive and collect any user’s personal data on the web and get their records. It is observed that more than 40 percent of individuals neglect to take this fundamental safety effort, for which there is high probability that their digital identity can be compromised by the hackers or intruders through the smart sensor network implemented in the city
Keeping the devices updated: In case the device software is not updated then it becomes easier for the intruders to hack into the stored database of the device. Thus it is important for the users (citizens or the visitors to update the programs used in their devices. However downloading the most updated versions of the software’s will protect the users to have the latest security mechanisms at place (Shrier, Wu & Pentland, 2016). When accessing the web, it is important for the users to go for the sites that uses “https” protocol on the Web, in order to affirm that that webpage is secure and the data through the smart sensor network will be transmitted in encrypted format with lesser probability of intrusion.
Two step authentication advantages
This authentication process helps in protecting sensitive data of the user data and prevents the access of attackers or the cyber criminals.
This process can be amazingly easy and straightforward for the end users use, as it does not require any high level technical knowledge or any obscure information.
Two step authentication disadvantages
Even though this process reduces the risk of intruders gaining access to sensitive data stored on the user device, on the contrary this process is not completely resistant to card-reader skimming and malware attacks on the devices.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357-383.
Atick, J. (2016). Digital Identity: The Essential Guide1. ID4Africa Identity Forum.
Boutsis, I., & Kalogeraki, V. (2013, March). Privacy preservation for participatory sensing data. In Pervasive Computing and Communications (PerCom), 2013 IEEE International Conference on (pp. 103-113). IEEE.
Cho, V., & Jimerson, J. B. (2016). Managing digital identity on Twitter: The case of school administrators. Educational Management Administration & Leadership, 1741143216659295.
Connolly, I. (2016). Self and identity in cyberspace. An introduction to cyberpsychology, 45-57.
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086-1090.
De Judicibus, D., Leopardi, S., Modeo, L., & Pergola, N. (2013). U.S. Patent No. 8,583,499. Washington, DC: U.S. Patent and Trademark Office.
Garcia, L. G., Hernandez, A. H., Garcia, J. E. L., & Organero, P. L. M. (2013). U.S. Patent No. 8,448,257. Washington, DC: U.S. Patent and Trademark Office.
Gope, P., & Hwang, T. (2016). BSN-Care: A secure IoT-based modern healthcare system using body sensor network. IEEE Sensors Journal, 16(5), 1368-1376.
Holt, J., & Mal?i?, S. (2015). The Privacy Ecosystem: Regulating Digital Identity in the United States and European Union. Journal of Information Policy, 5, 155-178.
Ko, R., & Choo, R. (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress.
Nakamura, L. (2013). Cybertypes: Race, ethnicity, and identity on the Internet. Routledge.
Shi, J., Meng, L., Striegel, A., Qiao, C., Koutsonikolas, D., & Challen, G. (2016, April). A walk on the client side: Monitoring enterprise wifi networks using smartphone channel scans. In Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on (pp. 1-9). IEEE.
Shrier, D., Wu, W., & Pentland, A. (2016). Blockchain & infrastructure (identity, data security). Retrieved 27-11-16, from https://cdn. resources. getsmarter. ac/wp-content/uploads/2016/06/MIT_Blockain_Whitepaper_PartThree. pdf.
Tzeng, S. F., Horng, S. J., Li, T., Wang, X., Huang, P. H., & Khan, M. K. (2017). Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs. IEEE Transactions on Vehicular Technology, 66(4), 3235-3248.
Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005, March). Energy analysis of public-key cryptography for wireless sensor networks. In Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference on (pp. 324-328). IEEE.
Weglein, J., Rein, D., & Cernese, F. (2013). U.S. Patent No. 8,528,068. Washington, DC: U.S. Patent and Trademark Office.