Security and Privacy for Emerging Smart Community Infrastructures

Bogdan Copos, Karl Levitt, Jeff Rowe, Parisa Kianmajd, Chen-Nee Chuah, George Kesidis


Smart communities of the future have features that make them susceptible to novel forms of cyber-attack and a potential loss of privacy for the citizens they serve. We view these communities as metro level wide area control systems with sensors and actuators located in residences, the workplace, in mobile vehicles and even worn on the body. In addition, this distributed system may not be subject to centralized control. It needs to be responsive to the individual needs of citizen owners yet still maintain the ability to coordinate actions across a neighborhood, or larger metropolitan area. The question we wish to address is, as frameworks emerge to handle these unique challenges, how can we provide security and privacy for such and open and decentralized environment? We suggest ways to add security and privacy to low level IoT devices, to a cloudlet based application platform, to a wide area SDN for coordination, and to negotiation protocols for citizen coordination.


  1. A. Chen, B. Khorashadi, C.-N. C. D. G. and Zhang, M. (2006). Smoothing vehicular traffic flow using vehicular-based ad hoc networking amp; computing grid (vgrid). In Intelligent Transportation Systems Conference, 2006. ITSC 7806. IEEE, pages 349 -354.
  2. A. Thiagarajan, L. Ravindranath, K. L. S. M. H. B. S. T. and Eriksson, J. (2009). Vtrack: accurate, energy-aware road traffic delay estimation using mobile phones. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, SenSys 7809, pages 85-98, New York, NY, USA. ACM.
  3. Alizadeh, M., Scaglione, A., Applebaum, A., Kesidis, G., and Levitt, K. (2014a). Reduced-order load models for large populations of flexible appliances. IEEE Transactions on Power Systems, PP(99):1-17.
  4. Alizadeh, M., Scaglione, A., and Kesidis, G. (Nov. 2013a). Clustering consumption in queues: A scalable model for electric vehicle scheduling. In Proc. IEEE Asilomar Conference, invited session on Signal Processing for the Smart Grid.
  5. Alizadeh, M., Scaglione, A., and Kesidis, G. (Oct. 2013b). Scalable model predictive control of demand for ancillary services. In Proc. IEEE SmartGridsComm, Vancouver, BC.
  6. Alizadeh, M., Xiao, Y., Scaglione, A., and van der Schaar, M. (2014b). Dynamic incentive design for participation in direct load scheduling programs. IEEE Journal of Selected Topics in Signal Processing, PP(99):1-1.
  7. Amoozadeh, M., Raghuramu, A., Chuah, C.-n., Ghosal, D., Zhang, H. M., Rowe, J., and Levitt, K. (2015). Security vulnerabilities of connected vehicle streams and their impact on cooperative driving. Communications Magazine, IEEE, 53(6):126-132.
  8. B. Liu, B. Khorashadi, D. G. C. C. and Zhang, M. (2010). Assessing the vanet's local information storage capability under different traffic mobility. In INFOCOM, pages 116-120.
  9. Boudot, F. (2000). Efficient proofs that a committed number lies in an interval. In Advances in CryptologyEUROCRYPT 2000, pages 431-444. Springer.
  10. Camenisch, J., Chaabouni, R., et al. (2008). Efficient protocols for set membership and range proofs. In Advances in Cryptology-ASIACRYPT 2008, pages 234- 252. Springer.
  11. Cheung, S. and Levitt, K. N. (1997). Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection. In Proceedings of the 1997 New Security Paradigms Workshop (NSPW).
  12. Hounsell, N., Landles, J., Bretherton, R. D., and Gardener, K. (1998). Intelligent systems for priority at traffic signals in london: the INCOME project. Number 454. IEEE.
  13. James, R. D. (1995). Automated highway system. EP Patent 0,683,911.
  14. Khorashadi, B., Liu, F., Ghosal, D., Zhang, M., and Chuah, C. (2011). Distributed automated incident detection with vgrid. Wireless Communications, IEEE, 18(1):64 -73.
  15. Lu, H., Pang, G., and Kesidis, G. (Oct. 2013). Automated scheduling of deferrable PEV/PHEV load by powerprofile unevenness. In Proc. IEEE SmartGridsComm, Vancouver, BC.
  16. Pedersen, T. P. (1991). Non-interactive and informationtheoretic secure verifiable secret sharing. In Advances in CryptologyCRYPTO91, pages 129-140. Springer.
  17. Sander, T. (1999). Efficient accumulators without trapdoor extended abstract. In Information and Communication Security, pages 252-262. Springer.
  18. Vasseur, J., Agarwal, N., Hui, J., Shelby, Z., Bertrand, P., and Chauvenet, C. (2011). Rpl: The ip routing protocol designed for low power and lossy networks. Internet Protocol for Smart Objects (IPSO) Alliance, 36.
  19. Wallgren, L., Raza, S., and Voigt, T. (2013). Routing attacks and countermeasures in the rpl-based internet of things. International Journal of Distributed Sensor Networks, 2013.
  20. Zyskind, G., Nathan, O., and Pentland, A. (2015). Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE, pages 180-184. IEEE.

Paper Citation

in Harvard Style

Copos B., Levitt K., Rowe J., Kianmajd P., Chuah C. and Kesidis G. (2016). Security and Privacy for Emerging Smart Community Infrastructures . In Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD, ISBN 978-989-758-183-0, pages 148-155. DOI: 10.5220/0005929901480155

in Bibtex Style

author={Bogdan Copos and Karl Levitt and Jeff Rowe and Parisa Kianmajd and Chen-Nee Chuah and George Kesidis},
title={Security and Privacy for Emerging Smart Community Infrastructures},
booktitle={Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,},

in EndNote Style

JO - Proceedings of the International Conference on Internet of Things and Big Data - Volume 1: IoTBD,
TI - Security and Privacy for Emerging Smart Community Infrastructures
SN - 978-989-758-183-0
AU - Copos B.
AU - Levitt K.
AU - Rowe J.
AU - Kianmajd P.
AU - Chuah C.
AU - Kesidis G.
PY - 2016
SP - 148
EP - 155
DO - 10.5220/0005929901480155