Privacy and Security Reflection on Government's Smart Sensor and Wi-Fi Network
Verified
Added on 2023/06/09
|15
|4587
|132
AI Summary
This article discusses the personal and ethical implications of the smart state plan and smart Wi-Fi network implemented by the government. It covers the categories of people affected, expected behavioural changes, and implications for sensitive information management.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: PRIVACY AND SECURITY REFLECTION Privacy and Security Reflection Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 PRIVACY AND SECURITY REFLECTION Table of Contents Introduction................................................................................................................................3 Implementation of Smart State plan...........................................................................................3 Implementation of Smart WiFi Network...................................................................................5 Discussion on the personal and ethical implications of the smart state plan.............................8 a.Category of people affected............................................................................................8 b.Behavioural changes from the normal citizens...............................................................9 c.Expectation of the changes in behaviour......................................................................10 Conclusion................................................................................................................................10 References................................................................................................................................12
2 PRIVACY AND SECURITY REFLECTION Introduction A study is made on the concept of cloud computing and its application for the development of the wireless sensor network. The cost of development and maintenance of the scalable network framework is analysed and it is compared with the multi datacentre model for the identification of the significant investment cost for the development of the network solution. An analysis should be made for the identification of the resources required for the developmentofthenetworkandidentificationofthenewtechnologythatcanbe implemented for the development of the network. The terminologies and the perspective for the use of the cloud platform should be developed for the implementation of the on demand self-service. There are growth in the cloud computing and with the popularity of the increase in the smart phone and there should be an advancement of the internet technologies and it provides easier access of the files and information for the remote location. There are different factors that affects the policy such as economy, structure of the network and much attention should be given to the cultural and the political factors for the development of the network policy and development of the network framework. 1. Discussion on the personal and the ethical implications for the privacy of the Government’s Smart Sensor Network a.Categories of people affected with the implementation of the protocol The criminals and the travellers would be affected the most with the implementation of the wireless sensor network. It also helps in efficiently manage the waste and the sensors installed in the waste bin can generate signal when it gets full for the collection of the trash. The camera sensors installed in the traffic signals can record the over speeding of the vehicles and track the registration number of the vehicle to get to them and take legal action against them. The travellers in the city can download the application in their smart devices for getting
3 PRIVACY AND SECURITY REFLECTION the city map and navigate to their different location without facing any problem (Bhushan, 2017). There are different approach that can be used for the implementation of the smart state plan and different models and activities are used for creating a routine and schedule for the configurationofthewirelesssensornetwork.Dataaregatheredfromthereallife environment for the development of the system design and identification of the sensors that are used for generating data from the network and process the data for creating different algorithm and prediction of the routes used or the management of the network solution (Ko & Choo, 2015). A database server is required for storing the information and the data analytics is applied for the management of the information and analysis of the behaviour of the network device and the components deployed in the wireless network solution. For the implementationonthesmartstateplanthedigitaltechnologyandplanningforthe improvement of the smart transportation system and secure the data marketplace. The wireless sensor network should be designed to enhance the public transportation service, track the data for the public infrastructure and the amenities provided to the people (Pathan, 2016). The data gathered from the sensors installed in the bus stops, traffic lights, rubbish bins and other location in the city should be used for maintenance, operational planning and creating an incident response. b.Behaviour Changes expected from the normal citizens For the development of the smart state plan the IoT devices should be used and interconnected with each other for generating data and use it for different purpose such as improvementofthemobility,healthcare,productivityandpublicsafety.Forthe implementation of the smart state plan different governmental departments such as the land transportauthority,cybersecurityagencies,wastemanagementdepartmentandother agencies should be involved and different services should be managed for the development of the smart wireless network (Yildiz et al., 2016). The risk associated with the implementation
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 PRIVACY AND SECURITY REFLECTION of the smart state network should be identified for the preparation of the risk mitigation plan and responding against the risks for increasing the efficiency and reliability of the wireless sensor network. The effort needed for the management of the city can be reduced and all the departments can be controlled from a single point with the implementation of the smart wireless sensor network (Anaya et al., 2018). The citizens should be provided with different service and all the operations can be tracked for the enhancement of the different service provided to them. The identity of the citizen can be maintained and the network can help in tracking the activity of the people. It also helps the citizen to provide different platform which they can use for getting different information and resolve problem without depending on the government (Anwar et al., 2014). For the development of the wireless sensor network big data should be used because it plays an important role in management of the data generated from the IoT devices that are installed in different location of the city. There are different types of data generated from the devices such as raw, processed, communication protocol, etc. and it is vulnerable to different security risks. c.Changes in the individual behaviour A multi layered security should be applied and the network should be segmented for mitigation of the risk of corruption of data and prevent different types of attacks (Harari et al., 2016). The network access control policy should be developed according to the requirement oftheAustraliangovernmentanditshouldbecombinedwiththesoftwaredefined networking. The encryption of the network communication channel for securing the data and reduce the risk of data loss and data hijacking (Radhappa et al., 2017). A hybrid big data analytics platform should be developed with the implementation of the cloud computing, managed hosts, dedicated hosts and colocation. The different features that are available in different platform should be evaluated for the combining them and operate as a single platform and manage the different service for management of the platform and handle the IoT
5 PRIVACY AND SECURITY REFLECTION data. The IoT devices generate continuous stream of data and it scales up with the expansion of the network. Thus different methods should be selected for utilizing the data such as data analytics, statistics and metric calculation. 2. Discussion on the personal and the ethical implications for privacy of the Government’s Smart Wi-Fi Network a. Categories of people affected with the proposal The benefits of the adoption of the wireless sensor network should be conveyed to the personnel and the users should be able to share the platform and gain new opportunity for digital transformation and get new investment for improvement of the quality of life. The integration of the navigation system helps in increasing the efficiency of the transportation system the GPS sensors can be installed in the vehicles and integrated with the system for getting the real time update of the traffic and estimate the time for the reaching the destination location. The wireless sensor devices such as the RFID and the IoT can be applied for monitoring the activity of the humans and for the implementation of the wireless network a research is made on the successful wireless network created by Singapore government and it can be used for the identification of the health status of the people. The sensor can be used in different application such as health care, transportation and payment. Typical scenario for the application of the sensors should be created and the security issues should be identified for reducing the privacy and the legal issues associated with the networking (Vaddadi & Krishna, 2017). There are different security issues such as eavesdropping and denial of service that can be used by the third party agents for gaining the access of the private information of the people and pose a serious social impact on the people living in the city. The chances of breach of the security should be minimized with the application of proper encryption algorithm and encrypting the communication channel (Sehgal et al., 2015). The
6 PRIVACY AND SECURITY REFLECTION threats associated with the wireless network is similar with the wired network and it is important to identify the security threats for management of the security issues. The wireless communication needs to broadcast its message and thus it can be easily tacked using eavesdropping (Gutierrez et al., 2014). There are different security measures that can be applied for the mitigation of the threats but it cannot be applied if there is disparity in the architecture of the wireless network. b. Behavioural changes expected from the normal citizens The development of the ad hoc network can be an ideal choice for connecting the IoT devices location in different places of the city and a dynamic topology should be used for creatingapeertopeerconnection.Theselectionofthearchitecturecanreducethe complexity of the network and the network administer can easily manage the different network components and troubleshoot the errors in the network. A data and a privacy policy should be developed for the management of the sensitive information and it should include the identity privacy for the protection of the confidential and the personal information (Chelli, 2015). Bodily policy, territorial privacy for the protection of the integrity of the physical person and the personal space, objects and property of the personnel. A location and movement policy should be created for the protection of the tracking beside the spatial behaviour. The communication privacy should be created for protecting the conversation for surveillance (Laudon & Laudon, 2015). The policy should also contain the transaction privacy for protecting the monitoring of the purchases and the other exchanges performed by the people and avoid the ethical issues in the network. c. Changes in the individual behaviours d. Implications for management of the sensitive information
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 PRIVACY AND SECURITY REFLECTION Thedifferenttypesofsecuritythreatsandattacksareevaluatedforthe implementation of the wireless sensor network such as: Sybil attacks Hello Flood attack Denial of Service Information transit attack Warm hole attack Sink hole attacks Sybil attacks –this type of attack is used for attacking the distributed storage and different routing mechanism such as aggregation of data, allocation of fair resources and detection of the misbehaviour should be identified (Maksimovic, Vujovic & Perisic, 2015). The identity of a node can be forged and the network information can be accessed for gaining the access of the information. The peer network can be vulnerable to the Sybil attack since each of the wireless sensor network can operate using a gateway and it can be prevented with the application of effective protocol (Loo, Mauri & Ortiz, 2016). It is difficult to detect a Sybil node in the network and it can be detected using a Pr detection formulae. Hello Flood attack –It uses the hello packet for convincing the sensors installed in the wireless sensor network and the attacker uses a high radio transmission range and the hello message is send to multiple wireless sensor devices (Zahurul et al., 2016). If the victim node tries to get to the hello message by analysing that it is its neighbour node the attack can successfully spoof the sensor. Denial of Service –it is used by the attacker to cause the node fail by exhausting the resources available in the node. Unnecessary data packets are sent to the node for preventing the node to serve the legitimate users for any request. This type of attack can disrupt a
8 PRIVACY AND SECURITY REFLECTION network and it can be performed in the wireless network in different layers. For the physical layer the denial of service can cause tampering or jamming (Butun, Morgera & Sankar, 2014). For the link layer it can cause exhaustion and collision of data packets causing loss of data and unavailability of the node. For the network layer it can cause black holes and misdirection. The attack can be performed by the attacker using malicious flooding and for the prevention of this type of attack the traffic in the network should be monitored and identified using strong authentication mechanism. Information transit attack –In the proposed sensor network the sensor is used for monitoring the different parameters and reporting on the sink following the requirement. While transmission of the report the data can be altered, replayed or spoofed by the attacker (Lounis et al., 2016). The wireless network is vulnerable to the eavesdropping and the flow of the data traffic can be monitored and intercepted for integrating wrong information to the base station. Wormhole attack –This is a critical type of attack used by the attacker for recording the data packets from one location and tunnelling it to different location. The bits can be transmitted selectively and it can be a significant threat for the WSN because this network attack does not needs a sensor in the network to be compromised and it can be applied in the initial phase when the neighbouring information are discovered by the sensor (Conti et al., 2018). This is similar to the man in the middle attack where the attacker replays the packet to the neighbouring node and creates a warm hole in the network. Sink hole attacks –It is used for attracting all the data traffic in the network by listening to the request of all the routers and replying to the targeted nodes. Thus the device can be inserted with the communication nodes and able to get all the packets flowing in the network.
9 PRIVACY AND SECURITY REFLECTION 3.Utilizationofthedigitalidentityforoperatingthemobiledevice environment There is an increase in the use of wireless sensor network for the healthcare industry and different type so sensors has been developed for monitoring the heart rate, blood pressure, etc. The security and the privacy concerns among the people can restrict them to take thee full advantage of the system. They may think that the data gathered from the wireless sensor network can be used by the government for tracking their activity and this can affect their social life (Caron et al., 2016). The problems and the possible countermeasures are analysed and applied for the management of the behavioural changes of the citizens for increasing the efficiency of the wireless sensor network. The privacy policy and the security measures taken for the development of the wireless sensor network should be conveyed to the citizens for help the user to fully utilize the wireless sensor network and enable them to reduce the effort and improve the quality of life (Chung, Demiris & Thompson, 2015). The needs of implementation of the smart WiFi network for the configuration of the network for allowing the user to seamlessly switching between the mobile data and the WiFi network is analysed. The sensors should be connected with the wireless network for generating data from the network and create a heterogeneous network. 4. Steps taken for ensuring the security and privacy of the digital identity For the improvement of the security and privacy the wireless sensor network should be secured from external access and it improves the quality of life of the people living in the city. The traffic jams and the security of the people living in the city can be improved with the implementation of the wireless sensor network. The people living in the city can track the busy routes and select alternative path for reaching the location (Mohammed et al., 2014). The can also search for available parking space from their mobile application and easily park
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 PRIVACY AND SECURITY REFLECTION their vehicle in the free space. It is expected that the people residing in the city would fully utilize the wireless sensor network and make the city a better place for living. The adoption of the wireless sensor network would help in management of the strategy and create new public and private business partnership for adding new technology. The individual needs are fulfilled with the network and it should also help the business groups for improvement of the environmental, social and financial areas (Yang et al., 2015). It is expected that the people would adopt the system slowly and more streamline service would be combined with the wireless sensor network for making the network sustainable and efficient for the people. The types of category of people affected with the implementation of the network is analysed depending upon the ethical implications and the changes in the behaviour of the people. The expectation for the changes in the behaviour is evaluated with the current changes by analysing the changes in the schedule of time and the activity of the user. The technologies should be optimized and integrated or improvement of the communication between the citizen and the government such that the city becomes a smart city (Glenn & Monteith, 2014).Theoutcomeandthewirelesssensornetworkshouldbeoptimizedforthe development of the smart city and serve the different needs of the citizens. Conclusion For the preparation of the report the smart plan of the Singapore government is analysed and the steps taken for the implementation in the Australia is given in the report. The personal and the ethical implication for the enforcement of the smart sensor network is analysed and documented in the report. From the above report it can be concluded that it is essential to analyse the government plan for the deployment of the smart WiFi network. A framework of the network should be developed for the deployment of the IoT devices in the different areas of the network. The ethical issues that the government can face with the implementation of the smart sensor network should be evaluated before application of the
11 PRIVACY AND SECURITY REFLECTION security policy. The citizen should be involved for analysing their needs and the policy should be developed according to them for the management of the choice of their activity and use the real time data for different purpose. The security of the data is the main point for the success of the wireless sensor network and big data is used for the management of the structured and the unstructured data. There are different test bed software that should be used for the management of the signals and gather data from the environment and communicate with the other sensor for setting up the wireless sensor network. The communication protocol that can be used for the accomplishment of the required task should be identified for the selection of the possible hardware and wireless technology used for interconnecting the IoT devices with the each other. The issues associated with the health and the privacy of the public should be analysed for the transmission of data. The risk of network security attacks should be identified and the loss of information should me minimum. Countermeasures should be taken for minimizing the attacks and a distributed system should be used such that there is no single point of failure and secure control process algorithm should be used for the implementation of the wireless sensor network system.
12 PRIVACY AND SECURITY REFLECTION References Anaya, L. S., Alsadoon, A., Costadopoulos, N., & Prasad, P. W. C. (2018). Ethical implications of user perceptions of wearable devices.Science and engineering ethics, 1-28. Anwar, R. W., Bakhtiari, M., Zainal, A., Abdullah, A. H., Qureshi, K. N., Computing, F., & Bahru, J. (2014). Security issues and attacks in wireless sensor network.World Applied Sciences Journal,30(10), 1224-1227. Bhushan, B. (Ed.). (2017).Springer handbook of nanotechnology. Springer. Butun, I., Morgera, S. D., & Sankar, R. (2014). A survey of intrusion detection systems in wireless sensor networks.IEEE communications surveys & tutorials,16(1), 266-282. Caron, X., Bosua, R., Maynard, S. B., & Ahmad, A. (2016). The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective.Computer law & security review,32(1), 4-15. Chelli,K.(2015,July).Securityissuesinwirelesssensornetworks:Attacksand countermeasures. InProceedings of the World Congress on Engineering(Vol. 1, pp. 1-3). Chung, J., Demiris, G., & Thompson, H. J. (2015). Ethical Considerations Regarding the Use of Smart Home Technologies for Older Adults.Annual Review of Nursing Research, Volume 34, 2016: Nursing Ethics: Vulnerable Populations and CHanging Systems of Care, 155. Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13 PRIVACY AND SECURITY REFLECTION Glenn, T., & Monteith, S. (2014). New measures of mental state and behavior based on data collectedfromsensors,smartphones,andtheInternet.Currentpsychiatry reports,16(12), 523. Gutiérrez, J., Villa-Medina, J. F., Nieto-Garibay, A., & Porta-Gándara, M. Á. (2014). AutomatedirrigationsystemusingawirelesssensornetworkandGPRS module.IEEE transactions on instrumentation and measurement,63(1), 166-176. Harari, G. M., Lane, N. D., Wang, R., Crosier, B. S., Campbell, A. T., & Gosling, S. D. (2016). Using smartphonesto collectbehavioral datain psychologicalscience: opportunities, practical considerations, and challenges.Perspectives on Psychological Science,11(6), 838-854. Ko, R., & Choo, R. (2015).The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngre Laudon, K. C., & Laudon, J. P. (2015).Management information systems(Vol. 8). Prentice Hall. Loo, J., Mauri, J. L., & Ortiz, J. H. (Eds.). (2016).Mobile ad hoc networks: current status and future trends. CRC Press. Lounis, A., Hadjidj, A., Bouabdallah, A., & Challal, Y. (2016). Healing on the cloud: Secure cloudarchitectureformedicalwirelesssensornetworks.FutureGeneration Computer Systems,55, 266-277. Maksimović, M., Vujović, V., & Periśić, B. (2015, June). A custom Internet of Things healthcare system. InInformation Systems and Technologies (CISTI), 2015 10th Iberian Conference on(pp. 1-6). IEEE.
14 PRIVACY AND SECURITY REFLECTION Mohammed, F., Idries, A., Mohamed, N., Al-Jaroodi, J., & Jawhar, I. (2014, May). UAVs for smart cities: Opportunities and challenges. InUnmanned Aircraft Systems (ICUAS), 2014 International Conference on(pp. 267-273). IEEE. Pathan, A. S. K. (Ed.). (2016).Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. Radhappa, H., Pan, L., Xi Zheng, J., & Wen, S. (2017). Practical overview of security issues in wireless sensor network applications.International Journal of Computers and Applications, 1-12. Sehgal, V. K., Patrick, A., Soni, A., & Rajput, L. (2015). Smart human security framework usinginternetofthings,cloudandfogcomputing.InIntelligentdistributed computing(pp. 251-263). Springer, Cham. Vaddadi, S. K., & Krishna, B. (2017). Ensuring Distributed Data Discovery by Providing High Security in Wireless Sensor Networks.IJMCA,4(6), 425-431. Yang, J. J., Li, J., Mulder, J., Wang, Y., Chen, S., Wu, H., ... & Pan, H. (2015). Emerging information technologies for enhanced healthcare.Computers in Industry,69, 3-11. Yildiz, H. U., Bicakci, K., Tavli, B., Gultekin, H., & Incebacak, D. (2016). Maximizing WirelessSensorNetworklifetimebycommunication/computationenergy optimization of non-repudiation security service: Node level versus network level strategies.Ad Hoc Networks,37, 301-323. Zahurul, S., Mariun, N., Grozescu, I. V., Tsuyoshi, H., Mitani, Y., Othman, M. L., ... & Abidin,I.Z.(2016).Futurestrategicplananalysisforintegratingdistributed renewablegenerationtosmartgridthroughwirelesssensornetwork:Malaysia prospect.Renewable and Sustainable Energy Reviews,53, 978-992.