Analyzing Privacy: Reflection on Government's Smart Initiatives

Verified

Added on  2023/06/09

|15
|4587
|132
Essay
AI Summary
This essay provides a reflection on the privacy and security implications of the government's Smart State plan, focusing on the implementation of smart sensor networks and Wi-Fi networks. It discusses the categories of people affected by these initiatives, the expected behavioral changes from citizens, and the ethical considerations surrounding data management and privacy. The essay also explores potential security threats, such as Sybil attacks and denial-of-service attacks, and suggests mitigation strategies, including multi-layered security, network segmentation, and encryption. The analysis considers the impact on personal information, bodily privacy, and communication privacy, emphasizing the need for robust data protection policies in the context of smart city technologies. Desklib offers additional resources for students studying similar topics.
Document Page
Running head: PRIVACY AND SECURITY REFLECTION
Privacy and Security Reflection
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
PRIVACY AND SECURITY REFLECTION
Table of Contents
Introduction................................................................................................................................3
Implementation of Smart State plan...........................................................................................3
Implementation of Smart WiFi Network...................................................................................5
Discussion on the personal and ethical implications of the smart state plan.............................8
a. Category of people affected............................................................................................8
b. Behavioural changes from the normal citizens...............................................................9
c. Expectation of the changes in behaviour......................................................................10
Conclusion................................................................................................................................10
References................................................................................................................................12
Document Page
2
PRIVACY AND SECURITY REFLECTION
Introduction
A study is made on the concept of cloud computing and its application for the
development of the wireless sensor network. The cost of development and maintenance of the
scalable network framework is analysed and it is compared with the multi datacentre model
for the identification of the significant investment cost for the development of the network
solution. An analysis should be made for the identification of the resources required for the
development of the network and identification of the new technology that can be
implemented for the development of the network. The terminologies and the perspective for
the use of the cloud platform should be developed for the implementation of the on demand
self-service. There are growth in the cloud computing and with the popularity of the increase
in the smart phone and there should be an advancement of the internet technologies and it
provides easier access of the files and information for the remote location. There are different
factors that affects the policy such as economy, structure of the network and much attention
should be given to the cultural and the political factors for the development of the network
policy and development of the network framework.
1. Discussion on the personal and the ethical implications for the privacy of
the Government’s Smart Sensor Network
a. Categories of people affected with the implementation of the protocol
The criminals and the travellers would be affected the most with the implementation of
the wireless sensor network. It also helps in efficiently manage the waste and the sensors
installed in the waste bin can generate signal when it gets full for the collection of the trash.
The camera sensors installed in the traffic signals can record the over speeding of the vehicles
and track the registration number of the vehicle to get to them and take legal action against
them. The travellers in the city can download the application in their smart devices for getting
Document Page
3
PRIVACY AND SECURITY REFLECTION
the city map and navigate to their different location without facing any problem (Bhushan,
2017). There are different approach that can be used for the implementation of the smart state
plan and different models and activities are used for creating a routine and schedule for the
configuration of the wireless sensor network. Data are gathered from the real life
environment for the development of the system design and identification of the sensors that
are used for generating data from the network and process the data for creating different
algorithm and prediction of the routes used or the management of the network solution (Ko &
Choo, 2015). A database server is required for storing the information and the data analytics
is applied for the management of the information and analysis of the behaviour of the
network device and the components deployed in the wireless network solution. For the
implementation on the smart state plan the digital technology and planning for the
improvement of the smart transportation system and secure the data marketplace. The
wireless sensor network should be designed to enhance the public transportation service,
track the data for the public infrastructure and the amenities provided to the people (Pathan,
2016). The data gathered from the sensors installed in the bus stops, traffic lights, rubbish
bins and other location in the city should be used for maintenance, operational planning and
creating an incident response.
b. Behaviour Changes expected from the normal citizens
For the development of the smart state plan the IoT devices should be used and
interconnected with each other for generating data and use it for different purpose such as
improvement of the mobility, healthcare, productivity and public safety. For the
implementation of the smart state plan different governmental departments such as the land
transport authority, cyber security agencies, waste management department and other
agencies should be involved and different services should be managed for the development of
the smart wireless network (Yildiz et al., 2016). The risk associated with the implementation
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
PRIVACY AND SECURITY REFLECTION
of the smart state network should be identified for the preparation of the risk mitigation plan
and responding against the risks for increasing the efficiency and reliability of the wireless
sensor network. The effort needed for the management of the city can be reduced and all the
departments can be controlled from a single point with the implementation of the smart
wireless sensor network (Anaya et al., 2018). The citizens should be provided with different
service and all the operations can be tracked for the enhancement of the different service
provided to them. The identity of the citizen can be maintained and the network can help in
tracking the activity of the people. It also helps the citizen to provide different platform which
they can use for getting different information and resolve problem without depending on the
government (Anwar et al., 2014). For the development of the wireless sensor network big
data should be used because it plays an important role in management of the data generated
from the IoT devices that are installed in different location of the city. There are different
types of data generated from the devices such as raw, processed, communication protocol,
etc. and it is vulnerable to different security risks.
c. Changes in the individual behaviour
A multi layered security should be applied and the network should be segmented for
mitigation of the risk of corruption of data and prevent different types of attacks (Harari et al.,
2016). The network access control policy should be developed according to the requirement
of the Australian government and it should be combined with the software defined
networking. The encryption of the network communication channel for securing the data and
reduce the risk of data loss and data hijacking (Radhappa et al., 2017). A hybrid big data
analytics platform should be developed with the implementation of the cloud computing,
managed hosts, dedicated hosts and colocation. The different features that are available in
different platform should be evaluated for the combining them and operate as a single
platform and manage the different service for management of the platform and handle the IoT
Document Page
5
PRIVACY AND SECURITY REFLECTION
data. The IoT devices generate continuous stream of data and it scales up with the expansion
of the network. Thus different methods should be selected for utilizing the data such as data
analytics, statistics and metric calculation.
2. Discussion on the personal and the ethical implications for privacy of the
Government’s Smart Wi-Fi Network
a. Categories of people affected with the proposal
The benefits of the adoption of the wireless sensor network should be conveyed to the
personnel and the users should be able to share the platform and gain new opportunity for
digital transformation and get new investment for improvement of the quality of life. The
integration of the navigation system helps in increasing the efficiency of the transportation
system the GPS sensors can be installed in the vehicles and integrated with the system for
getting the real time update of the traffic and estimate the time for the reaching the
destination location. The wireless sensor devices such as the RFID and the IoT can be applied
for monitoring the activity of the humans and for the implementation of the wireless network
a research is made on the successful wireless network created by Singapore government and
it can be used for the identification of the health status of the people. The sensor can be used
in different application such as health care, transportation and payment. Typical scenario for
the application of the sensors should be created and the security issues should be identified
for reducing the privacy and the legal issues associated with the networking (Vaddadi &
Krishna, 2017). There are different security issues such as eavesdropping and denial of
service that can be used by the third party agents for gaining the access of the private
information of the people and pose a serious social impact on the people living in the city.
The chances of breach of the security should be minimized with the application of proper
encryption algorithm and encrypting the communication channel (Sehgal et al., 2015). The
Document Page
6
PRIVACY AND SECURITY REFLECTION
threats associated with the wireless network is similar with the wired network and it is
important to identify the security threats for management of the security issues. The wireless
communication needs to broadcast its message and thus it can be easily tacked using
eavesdropping (Gutierrez et al., 2014). There are different security measures that can be
applied for the mitigation of the threats but it cannot be applied if there is disparity in the
architecture of the wireless network.
b. Behavioural changes expected from the normal citizens
The development of the ad hoc network can be an ideal choice for connecting the IoT
devices location in different places of the city and a dynamic topology should be used for
creating a peer to peer connection. The selection of the architecture can reduce the
complexity of the network and the network administer can easily manage the different
network components and troubleshoot the errors in the network. A data and a privacy policy
should be developed for the management of the sensitive information and it should include
the identity privacy for the protection of the confidential and the personal information (Chelli,
2015). Bodily policy, territorial privacy for the protection of the integrity of the physical
person and the personal space, objects and property of the personnel. A location and
movement policy should be created for the protection of the tracking beside the spatial
behaviour. The communication privacy should be created for protecting the conversation for
surveillance (Laudon & Laudon, 2015). The policy should also contain the transaction
privacy for protecting the monitoring of the purchases and the other exchanges performed by
the people and avoid the ethical issues in the network.
c. Changes in the individual behaviours
d. Implications for management of the sensitive information
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
PRIVACY AND SECURITY REFLECTION
The different types of security threats and attacks are evaluated for the
implementation of the wireless sensor network such as:
Sybil attacks
Hello Flood attack
Denial of Service
Information transit attack
Warm hole attack
Sink hole attacks
Sybil attacks – this type of attack is used for attacking the distributed storage and
different routing mechanism such as aggregation of data, allocation of fair resources and
detection of the misbehaviour should be identified (Maksimovic, Vujovic & Perisic, 2015).
The identity of a node can be forged and the network information can be accessed for gaining
the access of the information. The peer network can be vulnerable to the Sybil attack since
each of the wireless sensor network can operate using a gateway and it can be prevented with
the application of effective protocol (Loo, Mauri & Ortiz, 2016). It is difficult to detect a
Sybil node in the network and it can be detected using a Pr detection formulae.
Hello Flood attack – It uses the hello packet for convincing the sensors installed in
the wireless sensor network and the attacker uses a high radio transmission range and the
hello message is send to multiple wireless sensor devices (Zahurul et al., 2016). If the victim
node tries to get to the hello message by analysing that it is its neighbour node the attack can
successfully spoof the sensor.
Denial of Service – it is used by the attacker to cause the node fail by exhausting the
resources available in the node. Unnecessary data packets are sent to the node for preventing
the node to serve the legitimate users for any request. This type of attack can disrupt a
Document Page
8
PRIVACY AND SECURITY REFLECTION
network and it can be performed in the wireless network in different layers. For the physical
layer the denial of service can cause tampering or jamming (Butun, Morgera & Sankar,
2014). For the link layer it can cause exhaustion and collision of data packets causing loss of
data and unavailability of the node. For the network layer it can cause black holes and
misdirection. The attack can be performed by the attacker using malicious flooding and for
the prevention of this type of attack the traffic in the network should be monitored and
identified using strong authentication mechanism.
Information transit attack – In the proposed sensor network the sensor is used for
monitoring the different parameters and reporting on the sink following the requirement.
While transmission of the report the data can be altered, replayed or spoofed by the attacker
(Lounis et al., 2016). The wireless network is vulnerable to the eavesdropping and the flow of
the data traffic can be monitored and intercepted for integrating wrong information to the
base station.
Wormhole attack – This is a critical type of attack used by the attacker for recording
the data packets from one location and tunnelling it to different location. The bits can be
transmitted selectively and it can be a significant threat for the WSN because this network
attack does not needs a sensor in the network to be compromised and it can be applied in the
initial phase when the neighbouring information are discovered by the sensor (Conti et al.,
2018). This is similar to the man in the middle attack where the attacker replays the packet to
the neighbouring node and creates a warm hole in the network.
Sink hole attacks – It is used for attracting all the data traffic in the network by
listening to the request of all the routers and replying to the targeted nodes. Thus the device
can be inserted with the communication nodes and able to get all the packets flowing in the
network.
Document Page
9
PRIVACY AND SECURITY REFLECTION
3. Utilization of the digital identity for operating the mobile device
environment
There is an increase in the use of wireless sensor network for the healthcare industry and
different type so sensors has been developed for monitoring the heart rate, blood pressure,
etc. The security and the privacy concerns among the people can restrict them to take thee
full advantage of the system. They may think that the data gathered from the wireless sensor
network can be used by the government for tracking their activity and this can affect their
social life (Caron et al., 2016). The problems and the possible countermeasures are analysed
and applied for the management of the behavioural changes of the citizens for increasing the
efficiency of the wireless sensor network. The privacy policy and the security measures taken
for the development of the wireless sensor network should be conveyed to the citizens for
help the user to fully utilize the wireless sensor network and enable them to reduce the effort
and improve the quality of life (Chung, Demiris & Thompson, 2015). The needs of
implementation of the smart WiFi network for the configuration of the network for allowing
the user to seamlessly switching between the mobile data and the WiFi network is analysed.
The sensors should be connected with the wireless network for generating data from the
network and create a heterogeneous network.
4. Steps taken for ensuring the security and privacy of the digital identity
For the improvement of the security and privacy the wireless sensor network should
be secured from external access and it improves the quality of life of the people living in the
city. The traffic jams and the security of the people living in the city can be improved with
the implementation of the wireless sensor network. The people living in the city can track the
busy routes and select alternative path for reaching the location (Mohammed et al., 2014).
The can also search for available parking space from their mobile application and easily park
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
PRIVACY AND SECURITY REFLECTION
their vehicle in the free space. It is expected that the people residing in the city would fully
utilize the wireless sensor network and make the city a better place for living. The adoption
of the wireless sensor network would help in management of the strategy and create new
public and private business partnership for adding new technology. The individual needs are
fulfilled with the network and it should also help the business groups for improvement of the
environmental, social and financial areas (Yang et al., 2015). It is expected that the people
would adopt the system slowly and more streamline service would be combined with the
wireless sensor network for making the network sustainable and efficient for the people. The
types of category of people affected with the implementation of the network is analysed
depending upon the ethical implications and the changes in the behaviour of the people. The
expectation for the changes in the behaviour is evaluated with the current changes by
analysing the changes in the schedule of time and the activity of the user. The technologies
should be optimized and integrated or improvement of the communication between the
citizen and the government such that the city becomes a smart city (Glenn & Monteith,
2014). The outcome and the wireless sensor network should be optimized for the
development of the smart city and serve the different needs of the citizens.
Conclusion
For the preparation of the report the smart plan of the Singapore government is
analysed and the steps taken for the implementation in the Australia is given in the report.
The personal and the ethical implication for the enforcement of the smart sensor network is
analysed and documented in the report. From the above report it can be concluded that it is
essential to analyse the government plan for the deployment of the smart WiFi network. A
framework of the network should be developed for the deployment of the IoT devices in the
different areas of the network. The ethical issues that the government can face with the
implementation of the smart sensor network should be evaluated before application of the
Document Page
11
PRIVACY AND SECURITY REFLECTION
security policy. The citizen should be involved for analysing their needs and the policy
should be developed according to them for the management of the choice of their activity and
use the real time data for different purpose. The security of the data is the main point for the
success of the wireless sensor network and big data is used for the management of the
structured and the unstructured data. There are different test bed software that should be used
for the management of the signals and gather data from the environment and communicate
with the other sensor for setting up the wireless sensor network. The communication protocol
that can be used for the accomplishment of the required task should be identified for the
selection of the possible hardware and wireless technology used for interconnecting the IoT
devices with the each other. The issues associated with the health and the privacy of the
public should be analysed for the transmission of data. The risk of network security attacks
should be identified and the loss of information should me minimum. Countermeasures
should be taken for minimizing the attacks and a distributed system should be used such that
there is no single point of failure and secure control process algorithm should be used for the
implementation of the wireless sensor network system.
chevron_up_icon
1 out of 15
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]