122 80 3MB
English Pages 96 [91] Year 2021
EAI/Springer Innovations in Communication and Computing
Fadi Al-Turjman Naveenbalaji Gowthaman Editors
Advanced Controllers for Smart Cities An Industry 4.0 Perspective
EAI/Springer Innovations in Communication and Computing Series editor Imrich Chlamtac, European Alliance for Innovation, Ghent, Belgium
Editor’s Note The impact of information technologies is creating a new world yet not fully understood. The extent and speed of economic, life style and social changes already perceived in everyday life is hard to estimate without understanding the technological driving forces behind it. This series presents contributed volumes featuring the latest research and development in the various information engineering technologies that play a key role in this process. The range of topics, focusing primarily on communications and computing engineering include, but are not limited to, wireless networks; mobile communication; design and learning; gaming; interaction; e-health and pervasive healthcare; energy management; smart grids; internet of things; cognitive radio networks; computation; cloud computing; ubiquitous connectivity, and in mode general smart living, smart cities, Internet of Things and more. The series publishes a combination of expanded papers selected from hosted and sponsored European Alliance for Innovation (EAI) conferences that present cutting edge, global research as well as provide new perspectives on traditional related engineering fields. This content, complemented with open calls for contribution of book titles and individual chapters, together maintain Springer’s and EAI’s high standards of academic excellence. The audience for the books consists of researchers, industry professionals, advanced level students as well as practitioners in related fields of activity include information and communication specialists, security experts, economists, urban planners, doctors, and in general representatives in all those walks of life affected ad contributing to the information revolution. About EAI EAI is a grassroots member organization initiated through cooperation between businesses, public, private and government organizations to address the global challenges of Europe’s future competitiveness and link the European Research community with its counterparts around the globe. EAI reaches out to hundreds of thousands of individual subscribers on all continents and collaborates with an institutional member base including Fortune 500 companies, government organizations, and educational institutions, provide a free research and innovation platform. Through its open free membership model EAI promotes a new research and innovation culture based on collaboration, connectivity and recognition of excellence by community.
More information about this series at http://www.springer.com/series/15427
Fadi Al-Turjman • Naveenbalaji Gowthaman Editors
Advanced Controllers for Smart Cities An Industry 4.0 Perspective
Editors Fadi Al-Turjman Research Center for AI and IoT Near East University, Nicosia Mersin, Turkey
Naveenbalaji Gowthaman School of Electrical, Electronic and Computer Engineering University of KwaZulu-Natal Howard College Campus Durban, KwaZulu-Natal, South Africa
ISSN 2522-8595 ISSN 2522-8609 (electronic) EAI/Springer Innovations in Communication and Computing ISBN 978-3-030-48538-2 ISBN 978-3-030-48539-9 (eBook) https://doi.org/10.1007/978-3-030-48539-9 © Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
To Dr. P. Gowthaman Mrs. K. Dhanalakshmi
Preface
This book is useful to beginners of the Smart City developers and gives them constructive insights to develop their projects. The prototypes can be developed for building Sustainable Smart Cities with an Industry 4.0 perspective. This book covers topics such as data security, cloud computing, energy harvesting, smart grids for power transmission, battery power optimization, and healthcare devices. Industry 4.0 is the subset of the fourth mechanical revolution that concerns industry. The fourth industrial revolution includes regions which are not regularly named as industry, such as smart cities, for instance. In spite of the fact that the terms “industry 4.0” and “fourth industrial revolution” are regularly utilized conversely, “industry 4.0” processing plants have machines which are enlarged with remote network and sensors, associated with a framework that can imagine the whole creation line and settle on choices all alone. Generally, industry 4.0 is the pattern towards computerization and information exchange in assembling innovations and procedures which incorporate cyber- physical systems (CPS), the internet of things (IoT), industrial internet of things (IIOT), distributed computing, cognitive computing, and artificial intelligence. Industry 4.0 encourages what has been called as a “brilliant processing plant.” Inside particular modular structured smart plants, cyber-physical systems screen physical procedures, make a virtual duplicate of the physical world, and settle on decentralized choices. Mersin, Turkey Fadi Al-Turjman Durban, South Africa Naveenbalaji Gowthaman
vii
Acknowledgments
I express enough thanks to my board for their continued support and encouragement: Management of SNS College of Technology and Dr. S. Chenthur Pandian, Principal, SNS College of Technology. I offer my sincere appreciation for the learning opportunities provided by my board. My immense thanks to Prof. Viranjay M. Srivastava, Department of Electronic Engineering, Howard College Campus, University of KwaZulu-Natal, Durban, 4041, South Africa for his untired support. My completion of this book could not have been accomplished without the support of my faculty friends and staff of Electronics and Communication Engineering Department, SNS College of Technology, Coimbatore, India & Department of Electronic Engineering, University of KwaZulu-Natal, Durban, South Africa. Thanks to my parents as well, Dr. P. Gowthaman and Mrs. K. Dhanalakshmi. The countless times you took care of the family during our hectic schedules will not be forgotten. Finally, to my caring, loving, and supportive brother, Mr. G. Deepak Srinivas: my deepest gratitude. Your encouragement when the times got rough are much appreciated and duly noted. It was a great comfort and relief to know that you were willing to provide management of our household activities while I completed my work. My heartfelt thanks. Naveenbalaji Gowthaman
ix
Contents
1 AI-Based Smart Micro Grids�������������������������������������������������������������������� 1 S. Jayashree and K. Malarvizhi 2 An Improved Solution to Tackle Cyber Attacks������������������������������������� 15 N. Ambika 3 Impact and Prerequisite of Smart Cities ������������������������������������������������ 25 R. Arun Sekar and S. Sasipriya 4 Secure and Efficient Data Sharing Scheme in Cloud for Protecting Data in Smart Cities���������������������������������������������������������� 41 P. Chinnasamy and V. Praveena 5 Standalone PV-Wind-DG-Battery Hybrid Energy System for Zero Energy Buildings in Smart City Coimbatore, India���������������� 55 Karthick Alagar and Sakthi Thirumal 6 Smart Healthcare System for Psychological Disorders in Smart Cities�������������������������������������������������������������������������������������������� 65 B. Bindu Bhavani and Lakkavaram V. S. Raghuveer Index�������������������������������������������������������������������������������������������������������������������� 77
xi
About the Editors
Fadi Al-Turjman received his Ph.D. in computer science from Queen’s University, Kingston, Ontario, Canada, in 2011. He is a full professor and a research center director at Near East University, Nicosia, Cyprus. Prof. Al-Turjman is a leading authority in the areas of smart/intelligent, wireless, and mobile network architectures, protocols, deployments, and performance evaluation. His publication history spans over 250 publications in journals, conferences, patents, books, and book chapters, in addition to numerous keynotes and plenary talks at flagship venues. He has authored and edited more than 25 books about cognition, security, and wireless sensor network deployment in smart environments published by Taylor & Francis, Elsevier, and Springer. He has received several recognitions and best paper awards at top international conferences. He also received the prestigious Best Research Paper Award from Elsevier’s Computer Communications journal for the period 2015–2018, in addition to the Top Researcher Award for 2018 at Antalya Bilim University, Turkey. Prof. Al-Turjman has led a number of international symposia and workshops in flagship communication society conferences. Currently, he serves as an associate editor and the lead guest/associate editor for several well-reputed journals, including the IEEE Communications Surveys & Tutorials (IF 22.9) and the Elsevier Sustainable Cities and Society (IF 4.7).
xiii
xiv
About the Editors
Naveenbalaji Gowthaman received his Ph.D. in Information and Communication Engineering from Anna University, Chennai, India in 2019. He is currently associated with the University of KwaZuluNatal, Durban, South Africa as a Post Doctoral Research Staff. He has rich experience in research and teaching for more than 8 years. He has authored 5 books under Springer Banner. He is an editor and reviewer in many UGC approved journals & IET Computers and Digital Techniques Journal. Naveen has published more than 90+ papers in international journals and international conferences. He is a member of ISTE, IETE, IRED, IAENG, ISRD, and several other professional bodies. His area of interest includes low power VLSI, testing of VLSI circuits, Cylindrical Surrounding Double-Gate MOSFETs, Strained Silicon CMOS Technology and Dielectric Materials.
Chapter 1
AI-Based Smart Micro Grids S. Jayashree and K. Malarvizhi
1.1 Introduction Every city’s evolutionary process aims to improve the quality of life of and quality of services to the community. Swift increase in city population creates a lot of sociological, structural and environmental strains around the world. Nowadays, urban housing is becoming narrow and luxurious, while accommodating the additional energy demand with the existing infrastructure has introduced greater trouble to the local power grids. More consumers means a high demand, which necessitates additional supply [11]. Roughly 50% of the world’s population live in cities, utilizing 66% of the total power production through conventional energy sources. Still, regrettably, fossil fuels are the major and common source of energy. Almost all city planning tend to motivate the conceptvs of “Smart” and “Green Everywhere” in order to reduce pollution and carbon emissions [5]. The foremost motives in a smart city’s evolutionary process include the citizens’ needs, accounting urban issues, adopting customer-centric vision and engaging citizens in city planning cum management activities. Moreover, a smart city can be defined as a system which incorporates both individual and societal interaction and provides technology-enabled solutions [11]. In addition, the smart city vision focuses on both urban and industrial growth without disturbing the facility of future generations. Six primary goals of promoting a smart grid are as listed: smart inhabitants, smart livelihood, smart financial system, smart environment, smart transport and smart communication [12]. Hence, upgrading an existing city’s energy infrastructure is mandatory to meet S. Jayashree (*) Department of Electrical and Electronics Engineering, SNS College of Technology, Coimbatore, Tamil Nadu, India K. Malarvizhi Department of Electrical and Electronics Engineering, Kumaraguru College of Technology, Coimbatore, Tamil Nadu, India © Springer Nature Switzerland AG 2021 F. Al-Turjman, N. Gowthaman (eds.), Advanced Controllers for Smart Cities, EAI/Springer Innovations in Communication and Computing, https://doi.org/10.1007/978-3-030-48539-9_1
1
2
S. Jayashree and K. Malarvizhi
the rise in power demand and utilization. Local governments and municipalities have started framing new policies to enhance the use of renewable sources and employing new technologies like micro grids (localized grids), smart homes, green buildings, electrical vehicles and net metering [4]. A big challenge is that integrating urban development with micro grids would seriously aggravate technology issues around urbanization [10]. In spite of all contradictories, if smart micro grid comes into existence, then the quality of service, energy supply efficiency and local demand supply ratio improve.
1.2 Smart Micro Grid 1.2.1 Definition Smart grid policies define a “Smart Micro grid” (SMG) as an intellectual electricity distribution network which consists of distributed energy sources, energy storage and loads within visibly defined electrical margins and acts as a sole controllable entity together with the main electrical grid. The micro grid uses previous data, history, communication technologies and control methodologies to operate the overall system’s distributed resources and supply in a restricted and synchronized way by either working in grid-connected mode or islanded mode. Based on resource availability, the micro grid can operate either in grid or islanded mode [1]. The National Smart Grid Mission(NSGM), Ministry of Power, envisions to enlarge the electricity value supply chain in a decentralized way through various policies by completely using recent distributed renewable energy resources. The installed renewable energy capacity in India for the past 6 years is shown in Fig. 1.1. Developing advanced smart energy grids to help the balance between energy supply and customers’ needs within closed boundaries with the aid of smart energy management systems [13]. In addition, it aids in building up virtual power plants, latest storage options, renewable-to-grid technologies and grid-to-autonomous systems to manage the peak requirement, optimally use energy storages and restrict load curtailment, load shedding and blackouts. The phrase demand side management (DSM) signifies an extensive range of supervision, from long-term establishments to short-term events. Moreover, the concept of smart micro grids can have major influence on short-duration actions, by providing time-scale data and automated decision-making. The “Smart Cities Initiatives and Communities Mission“in Europe envisages to achieve the goal of zero-energy-infrastructures (ZEIs) and green buildings to promote the usage of renewable energy sources, which are in abundance, and carbon emission reduction [2]. Table 1.1 gives a brief survey of how effective implementation of micro grids in various popular cities around the world reduces CO2 and SO2 emissions. Practically, green buildings have to meet all their power needs from adequate renewable sources within their boundary, thereby partially omitting grid power
1 AI-Based Smart Micro Grids
3
Fig. 1.1 Installed renewable capacity in India for the past 6 years Table 1.1 CO2 and So2 emissions in various cities Tons/year City Sao Paolo Cairo Shanghai Lagos London Mumbai New York Mexico
On-power grid SO2 CO2 7.72E+04 5.01E+02 9.73E+04 4.71E+02 1.23E+05 6.64E+02 7.65E+04 5.36E+02 1.58E+05 4.82E+02 7.82E+04 6.64E+02 1.53E+05 8.15E+02 1.13E+05 4.61E+02
Micro grid CO2 2.73E+04 4.55E+04 5.67E+04 2.72E+04 8.69E+04 2.72E+04 7.67E+04 5.73E+04
SO2 1.78E+00 2.78E+00 3.45E+00 1.77E+00 5.25E+00 1.79E+00 4.63E+00 3.47E+00
Reduction (%) CO2 SO2 63.78% 99.55% 57.72% 99.33% 52.21% 99.65% 61.81% 99.52% 43.53% 98.96% 63.82% 99.65% 47.23% 99.33% 51.77% 99.28%
dependence. In some cases, merging co-power generation with micro grids can make use of the waste heat for external heating and hot water production, thereby supplementing climate management and carbon production control [11]. Figure 1.2 illustrates renewable energy contribution in India in April 2019. Wind power is predominant compared to other sources [3]. Solar PV also contributes considerably to the local grids. Several more renewable power producers are available in micro- level generation; Fig. 1.2 shows the major role players. Thus, the concept of micro grid is penetrated into the traditional grid network and as a result becomes an
4
S. Jayashree and K. Malarvizhi
Fig. 1.2 Installed renewable capacity – April 2019
i ntelligent system which can utilize maximum available renewable energy resources with minimum cost. In conventional grid systems, power is transferred from distant generators to consumers, whereas in smart micro grids, there is a bidirectional flow of energy as well as information between autonomous systems (prosumers) and grid to create an advanced distributing energy system which can deliver a clean, consistent, efficient, safe, secure and resilient power. Smart micro grids are featured with a bidirectional flow of power and data by monitoring the whole system, starting from generating stations to customer preferences using a variety of control and measuring units. This technology uses ICT devices, communication protocol and various electronic devices that offer real-time monitoring services, immediate demand supply balance, available resources and future predictions. In a traditional grid network, power is generated from various generating stations and transferred through high-voltage long-distance transmission lines which incur great power losses and less efficiency [1]. Based on the customer category and time of usage, the tariff for the energy consumed is fixed in the present system. The role of consumers is almost passive in a conventional system. Whereas in SMGs, consumers can actively take part in the power transactions and support the growing energy demand [13]. With a change in consumers’ actions, it is favorable to restrict the peak demand, and this can be achieved by the invasion of smart meters. These smart metering offer the consumer to observe real-time energy consumption and render two-way com-
1 AI-Based Smart Micro Grids
5
munication between data provider (operator) and consumer. The incorporation of various technologies, computational systems and information platforms, required to construct smart micro grid applications and services, is a big challenge to overcome. A range of IT systems, electronics and microelectronics and the easy access of high- performance computers, built and created by novel models and smart algorithms, with the help of latest methodologies to produce affordable energy, have ended the new concept of smart micro grid in power-producing industries. In addition, the smart micro grids consist of highly enabled fault-tolerant technology to enhance reliable services to the customers with optimal cost, together with reduction in waste of resources and better environment [2]. These elevated level of needs necessitates network automation insists the immense use of different artificial intelligence techniques.
1.2.2 Role of Several Components Smart micro grid functionalities could manage, integrate, control and optimize a mixture of distributed resources by the use of highly responsive, fast technologies; facilitate changing electricity value supply chain and active participation in market communities and can address interoperability and reliability issues. In general, a fast, intelligent, competent and efficient demand and supply management is accomplished with the help of specialized hardware and software. Figure 1.3 gives an elaborate view on smart micro grid architecture and various components integrated with the system. SMGs contain all the basic elements of the conventional macro grid [3]. The role and functions of several components of SMGs are as follows: • Distribute energy resources like solar PV, wind, bio gas and small hydro which supply a range of electrical power. • Control sensing and communication technologies like PSUs (Phasor measuring unit) and ICTs to produce, distribute, administer and utilize electricity more wisely and feasibly. • Incorporate suitable electrical energy storage technologies like electrochemical devices (Pb acid, Li ion, fuel cells, flow batteries), mechanical storage (flywheel) and electromagnetic storage (SMES, super capacitor). • Robust demand and energy supply management, self-healing, highly efficient demand response ability. • Self-configure and balance instantaneous demand with unpredictable renewable generation, plug and play mode. • Integrate energy storage and safeguard grid reliability and load shifting.
6
S. Jayashree and K. Malarvizhi
Fig. 1.3 Smart micro grid architecture
1.3 AI Methodologies in Micro Grid Optimization In finding solution to optimization problems, the changeover from descriptive methods to predictive analytics is more prominent. As artificial intelligence techniques are less reactive and more proactive, they are being applied widely in complex optimization problems. AI techniques are built on the advantages of predictive analytics by imitating human decision-making principles. Frequently, this analysis is applied to one or more courses of action and gives you an idea about the outcome of each decision. As these embedded algorithms happen to be more invasive at various levels of the power network, starting from consumer end (smart meters) to sensing units (phasor measuring units) in transmission end, machine learning and computational intelligence would turn into gradually more significant methodologies in making automated decisions and provide response to system dynamics [6, 7]. Following the evaluation of the present application field, the prime focus is on the upcoming capability of computational intelligence and machine learning in the smart micro grid area, marking the key challenges that can be overcome through the accomplishment of latest techniques [1]. Evolutionary algorithms are the attractive
1 AI-Based Smart Micro Grids
7
Fig. 1.4 Various methodologies for battery sizing
option for the authors in most cases. Technology selection is also critical and can be done based on problem formulation [14]. Battery storage size determination can be performed using multiple techniques, each method having its own features. Various methodologies for battery size determination are given in Fig. 1.4.
1.3.1 Probabilistic Methods Probabilistic methods are highly spontaneous and easy methods for solving problems and can easily address the dynamic nature of renewables. Stochastic optimization techniques like the Monte Carlo approach have been used for solving dual objective problems and generating a number of scenarios. The actual benefits of applying AI techniques come when such predictive analytics and dogmatic capabilities are implanted into business development and are brought into play with computational intelligence and historical data, taking instantaneous decisions within milli seconds to minutes [10]. A model is to be developed for the required problem, to address the dynamic nature of renewable sources, with subsequent reduction in total operating cost of micro grids by optimally scheduling the generators using various algorithms like genetic algorithm, particle swarm optimization, improved bat algorithm, artificial bee colony, differential evolution, tabu learning–based optimization, etc.
1.3.2 Analytical Methods Analytical methods are robust deterministic methods and are widely used for battery storage size calculations. Moreover, different battery sizes can impact the MG system, in addition to the techno-economic factors, using sensitivity analysis.
8
S. Jayashree and K. Malarvizhi
Dynamic renewable DGs are modeled using differential equations with advanced numerical techniques [9]. Usually, analytical methods through a numerical model can be solved by several simulations with multiple battery capacities, and analyzing the reaction of the MG system and renewable curtailment.
1.3.3 Mathematical Optimization From the speculative view of mathematical optimization techniques, energy storage size optimization can be performed as linear programming, nonlinear programming or mixed integer programming. Solution to sizing problem with these techniques consists of an objective function added with some constraints, which can be solved in many iterations and stops when the best solution is arrived. In another mathematical approach, dynamic programming–adopted recursive techniques give solution to optimization problems by building solution sets from subproblems [5]. Dynamic programming is not suitable for complex problems like nonlinear programming which struggle to converge for optimal result. Dynamic programming has been employed to certain problems either to maximize the MG profit or minimize daily operating cost.
1.3.4 Heuristic Methods Another category of optimization, Heuristic Methods conceptually nature inspired methods such as Genetic Algorithm, Particle swarm optimization, Bat algorithm, Firefly algorithm etc. provide nonoptimal solution. In contrast, nature-inspired methods offer greater flexibility and quick convergence and are easy to implement in MGs. PSO is accepted to be the best heuristic method for battery sizing; in addition, BA and TS also proven to be idle methods for battery size determination.
1.3.5 Hybrid Methods Yet another final method of optimization is hybrid methods, which combine any two optimization techniques and covers the advantages of both while removing their inbuilt weakness. Nowadays, these methods are strongly accepted as they can deliver strong process and provide global optimal solution [14]. For example, robust mixed integer programming can easily address the intermittency of renewable sources and calculate the minimum total invest cost, which warrantees to give optimum result.
1 AI-Based Smart Micro Grids
9
1.4 Problem Outline Renewable energy sources, particularly solar and wind, have been commonly used in Micro grids to tackle the crucial issues of CO2 emissions, rise in demand and oil depletion. In hybrid renewable energy sources, low generation of one source could be compensated by high generation of another source. An ideal example is the complementary nature of wind and solar. These renewable sources forcibly depend on climate conditions and are intermittent in nature. Energy storage has been largely recognized as one of the possible solutions to ensuring reliable power supply [2]. Among various energy storage devices, battery storage is a widely accepted storage technology with characteristics including quick response ability, ecological independence, controllability and continued power delivery. Besides all the advantages stated, battery storage incurs heavy cost to the micro grid owners. Hence, the determining optimal size of battery plays a crucial role towards the operation cost of SMGs [4]. This chapter provides a brief idea about how artificial intelligence techniques are applied in solving battery size determination problems. While framing battery sizing optimization problem, there are two main performance indicators that need to be considered: financial and technical indicators, which are employed individually or combined. A Few financial parameters to be included in energy trade are capital cost, operation and maintenance cost, net present value, cost of electricity and battery life cycle cost. Mainly, the total benefits in grid-connected mode are to be maximized and cost towards islanded mode is to be minimized. Calculations are performed in 24-hours time horizon. In optimization problems, technical parameters such as load curtailment, forecast errors, loss of load expectation, frequency and voltage regulation, charge/discharge rates and depth of discharge can be taken as foremost factors for storage size determination. The power capability of battery is more vital than energy capability (Fig. 1.5) [3].
1.5 Problem Formulation To guarantee consistent, reliable and economic operation of SMGs, the battery storage should be optimally sized. The significant factors that have a great influence on battery size determination are included in problem formulation. The calendric age battery greatly depends on the number of charging and discharging cycles of a particular battery configuration and depth of discharge [6]. The lifetime of a battery, that is the degradation of the battery, is the main factor considered in the battery sizing model framed. The Ampere-hour model is usually applied to evaluate the lifetime of a battery. The investment cost of a battery usually depends on its size, power rating cost and energy rating cost [7]. An abnormal high-size battery renders more cost, whereas a low-size storage may not provide the expected delivery.
10
S. Jayashree and K. Malarvizhi
Fig. 1.5 Formulation of optimization problem
Figure 1.6 shows how the size of a battery affects the micro grid development cost. Battery energy storage (BES) investment cost increases gradually, whereas micro grid operating cost decreases nonlinearly with respect to battery size. The optimal cost of battery is in between the minimum of these two cost curves. The micro grid development problem is usually formed using mixed integer programming (MIP), where the objective function is either to be maximized or minimized [9]. The objective of the proposed battery storage sizing problem is to minimize the micro grid development cost while considering operational constraints.
1.5.1 Objective Function
(
)
M min å å å å Fi Pidho , I idho + å rdh , Pdho + å prs å å å LSbdhs v iÎG d h iÎG d d bÎK d h y y R R + å å Pib CPi + CMi + Cib CEi + CI i bÎK d
( (
) (
))
(1.1)
Eq.1.1 represents the objective function of the proposed micro grid expansion problem. The first term outlines the micro grid operating cost during grid mode, and the third term tells the reliability index [7]. It is to be noted that load curtailment is zero when renewable power generation in the micro grid satisfies the demand.
1 AI-Based Smart Micro Grids
11
Fig. 1.6 Formulation of Optimization Problem
1.5.2 Micro Grid Model Performance of micro grids in two modes of operation is to be considered while modeling a particular SMG configuration. The micro grid model needs to satisfy power balance, power trade between grids during grid mode, load curtailment limits in autonomous mode and also network load flow in distribution system.
å
iÎ{G .W }
ch dch mib + Pidhs å ( Pibdhs + Pibdhs ) + å y ib fidhs + PdhMs + LSbdhs = Dbdh l ÎL
iÎB
M -P M . max zdhs £ Pdhs £ P M . max zdhs
0 £ LSbdhs £ ( Dbdh - Cbdh )
(1.2) (1.3) (1.4)
Eq. 1.2 depicts the power balance in the system, that is whether renewable power generation and battery storage compensate the demand. Eq. 1.4 shows the load curtailment when demand exceeds generation during islanded operation.
1.5.3 Battery Storage Model For sizing and selection of battery for a particular MG configuration outlined, a few factors need to be taken care of. The battery model considered in this work is composed of power rating and energy rating limits, depth of discharge and capability to power ratio constraints [8].
12
S. Jayashree and K. Malarvizhi
Pi min xib £ PibR £ Pi max xib
(1.5)
µimin PibR £ CibR £ µimax PibR
(1.6)
dch 0 £ Pibdhs £ PibR uibdhs
(1.7)
Eq. 1.5 denotes power rating limits of battery configuration considered in this work. For some battery technologies, power rating is associated with energy rating and so cannot be separated for sizing [5]. In Eq. 1.6, the factor ‘α‘denotes the ratio of the capacity of the battery to its power capacity, which is also to be considered while modeling. The discharging boundary limits are depicted in Eq. 1.7.
1.6 Numerical Simulation Results The proposed MG development problem is tested in a 5 bus micro grid, which consists of a wind turbine, solar PV and a gas generator. Renewable generation details and load data are collected on an hourly basis and used for simulation. The point of common coupling that connects the test MG to the macro grid is placed at bus 1. Three battery technologies are used in the test system, and their characteristics are shown in Table 1.2. Maximum power rating of battery is assumed to be 3 MW in this work. A maximum discharge time of 4 hours and minimum discharge time of 30 minutes are considered. Using the manufacturers’ data sheet, ten different depth of discharge values are computed and results are verified. Accurate and optimal results can be derived by increasing the number of computations. In autonomous operating mode, 1-hour time period is taken for each scenario. Three cases are studied in test system by simulation: first case: without including battery storage; second case: battery storage included; third case: with all constraints, like lifetime, DoD, etc. are considered. In all the cases, the MGs’ operating cost is computed to check the least value. The micro grid expansion problem model is modeled using the proposed mathematical model, and the results are discussed. Battery storage installation cost and capital costs are calculated, for a choice of project lifetime. The life of battery used is so calculated such that the battery should not be replaced for the entire project phase. The results of the proposed Table 1.2 Characteristics of battery configurations Battery technology Li ion Ni cd Lead acid
Power cost ($/ kW) 850 550 220
Energy cost ($/ kwhr) 550 450 220
Installation cost($/ kwhr) 3.4 10 15
Efficiency (%) 96 83 68
13
1 AI-Based Smart Micro Grids
problem consist of optimum battery configuration, number of battery elements required, life of battery storage employed and micro grid total cost. The results are discussed for two modes of operation. In grid mode, due to battery installation, the cost is considerably reduced by storing power during off-peak hours and releasing power during high-peak hours. A micro grid’s reliability improves in autonomous mode due to battery support. The distributed generators are connected in bus number 3, and battery is connected in the same bus, which supports to reduce the imported energy from utility during high price hours, thereby reducing the micro grid overall cost. Assuming the project lifetime as 15 years, the cost of the battery is also calculated. Compared to the first case, the energy wasted due to unnerved load is decreased by 94% in the second case. Installing battery storage can reduce the micro grid operation cost and improve system reliability by minimizing the wasted unused renewable power. Tables 1.3 and 1.4 discuss the results obtained, and it is seen that the performance of Li ion battery for long project life (20 years) is preferable. In addition, micro grid development cost is also considerably reduced with Li ion battery. It has been found that by installing appropriate battery configuration, the micro grid development cost is reduced. Furthermore, during autonomous operation, the system’s reliability is improved by curtailing the amount of wasted unused energy. The proposed model determines and optimizes battery size, number of units needed, particular technology and lifetime that reduces total MG development cost in autonomous operation. Another result shows how the unserved unused energy varies with the battery life time. By considering the life time of 15 years, the amount of unserved energy is reduced, whereas it increases while assuming life time as 20 years, thereby giving unrealistic solution. Table 1.3 Optimal parameters of battery storage Battery life (years) 10 15 20
Optimized parameters of battery energy storage Power rating Energy rating Technology (MW) (MWhr) Pb acid 2.805 5.828 NaS 1.343 1.850 Li ion 1.571 1.686
Number of cycles/ year 46 386 250
Table 1.4 Optimal development cost of SMG Battery Pb acid NaS Li ion
Associated development cost($/Yr) Investment cost Generation cost 355,682 856,778 445,445 856,778 346,420 856,778
Cost to grid 1,826,639 1,785,512 1,824,893
Unserved energy 65,372 10,760 23,750
MG Total cost 3,230,371 3,184,416 3,143,053
14
S. Jayashree and K. Malarvizhi
1.7 Conclusion A comprehensive battery storage sizing solution for smart micro grids is proposed in this work. A few vital battery performance factors such as variety of technologies, their life time, depth of discharge, number of charging/discharging cycles, their location and two modes of operation of MG are considered. To estimate the impact of battery operation on the lifetime, a battery deprivation model is developed which relies on battery DoD and its life cycle. To check the reliability of the proposed system, a large number of islanding scenarios are developed using the Monte Carlo approach when the system works in autonomous mode. The usefulness of the proposed model is tested by conducting numerical simulations on a test system. A powerful optimization methodology is applied to handle the renewable generation uncertainties and dynamic load demand.
References 1. B. Bahmani -Firouzi, R. Azizipanah-Abarghooee, Optimal sizing of battery energy storage for micro-grid operation management using a new improved bat algorithm. Electr. Power Energy Syst. 56(2014), 42–54 (2013) 2. Y. Yang, S. Bremner, C. Menictas, M. Kay, Battery energy storage system size determination in renewable energy systems: A review. Renew. Sust. Energ. Rev. 91(2018), 109–125 (2018) 3. I. Alsaidan, A. Khodaei, W. Gao, A comprehensive battery energy storage optimal sizing model for microgrid applications. IEEE Trans. Power Syst. (2017). https://doi.org/10.1109/ TPWRS.20172769639 4. S. Jayashree, K. Malarvizhi, R. Pradeep, Impact of hybrid electric vehicle penetration and its challenges on distribution system. Adv. Nat. Appl. Sci. 11(5), 101–108 (2017). ISSN: 1995– 0772 EISSN: 1998–1090 5. S. Jayashree, K. Malarvizhi, An overview of electrical energy storage technologies in microgrid applications: performance perspective. Int. J. Pure Appl. Math. 118(20), 733–743 (2018) 6. R. Iswarya, S. Jayashree, Modelling and control design of three phase-four wire upqc for power quality improvemenet. Pak. J. Biotechnol. 31(special issue on Innovations in information Embedded and communication Systems), 474–477 (2016) 7. S. Bahramirad, W. Reder, A. Khodaei, Reliability-constrained optimal sizing of energy storage system in a microgrid (2012). https://doi.org/10.1109/TSG.2012.2217991 8. H. Alhabi, K. Bhattacharya, Optimal sizing of battery energy storage Systems for Microgrids. Electr. Power Energy Conf. (2014). https://doi.org/10.1109/EPEC.2014.44 9. S. Sharma, S. Bhattacharjee, A. Bhattacharya, Grey Wolf optimization for optimal sizing of battery energy storage device to minimize operation cost of microgrid (2015). ISSN 1751–8687 10. P. Nikolaidis, A. Poullikkas, A comparative review of electrical energy storage systems for better sustainability. J. Power Technol. 97(3), 220–245 (2017) 11. A. Pieroni, N.S.L. Di Nunzio, F. Fallucchi, M. Raso, Smarter city: smart energy grid based on blockchain technology. Int. J. Adv. Sci. Eng. Inf. Technol. 8(1). ISSN: 2088–5334 (2018) 12. R. Ghatikar, Smart Microgrids: re-visioning smart grid and smart city development in India. https://doi.org/10.1007/978-981-10-8249-8_24 13. E. O’Dwyer, I. Pan, S. Achaa, N. Shaha, Smart energy systems for sustainable smart cities: Current developments, trends and future directions. Appl. Energy 237, 581–597 (2019) 14. S. Jayashree, Fuzzy based modelling of s-ipfc without dc link for power flow control in three phase transmission line. Int. J. Adv. Technol. Eng. Sci. (IJATES)-ISSN, 2348–7550
Chapter 2
An Improved Solution to Tackle Cyber Attacks N. Ambika
2.1 Introduction The world is today overwhelmed by innovation [5]. The latest different new advances creations have improved the way of life. The utilization of the Internet has made a virtual territory of correspondence where fiber-optic links or wires transmit data to and from the Internet. This space has been expanding relentlessly in size as more data is sustained into it. The Internet has bit by bit penetrated all parts of human life, for example, banking [26], hospitals [20], education [22], emergency administrations [9], and military [27]. The multi-faceted nature has additionally been expanding. Such dangers are called digital assaults [4]. These assaults are utilized to spread deception, cripple strategic administrations, and get to delicate data, surveillance, information robbery, and money-related misfortunes. Digital assaults in the context of open administrations hinder the server, disavowing administration. This can be an intense issue for those residents who are keen on the rapid execution of these administrations. Disturbance of respectability or credibility of information or data is named as disturbance of respectability or credibility of information or data is named as assault or digital assault. The malignant code changes the rationale of the program and that causes blunders in the yield. The way toward hacking includes the checking of the Internet to get the frameworks that contain poor security control [8] and searching for frameworks that are not designed appropriately. When a programmer taints the framework, he/she can remotely work the contaminated framework and directions can be sent to make the framework spy for the aggressors; it can likewise be utilized to disturb different frameworks. The programmer will anticipate that the tainted framework should have a few blemishes, for example, bugs in programming, hostile behavior leading to assault, and defective framework setup so different frameworks can be tainted N. Ambika (*) SSMRV College, Bengaluru, Karnataka, India © Springer Nature Switzerland AG 2021 F. Al-Turjman, N. Gowthaman (eds.), Advanced Controllers for Smart Cities, EAI/Springer Innovations in Communication and Computing, https://doi.org/10.1007/978-3-030-48539-9_2
15
16
ba nk in g
se cu rit y ne tw or k
tra ns po rta tio n
16 15.8 15.6 15.4 15.2 15 14.8 14.6 14.4 go ve rn m en t
% OF GROWTH IN CYBER BREACHES
N. Ambika
SECTORS Fig. 2.1 Cyber security market analysis [10]
through this framework. Digital assault takes or hacks the data of any association or government workplace. Figure 2.1 provides the cyber security market analysis. Cyber security [11] worries with the comprehension of encompassing issues of differing digital assaults and formulating guard methodologies that protect the secrecy, honesty, and accessibility of any computerized and data advances. Some instances of the attack are: • Hollywood Presbyterian Medical Center (HPMC) [14] in Los Angeles, California, paid programmers $3.4 million in Bitcoin for a decoding key after being bolted out of their PC frameworks. HPMC later discharged an announcement denying those reports, however affirming they paid a $17,000 deliver in light of a legitimate concern for rapidly reestablishing emergency clinic tasks to give persistent consideration. Numerous individuals have condemned HPMC’s choice to pay the payoff and contend that this choice may have been straightforwardly liable for various resulting human services ransomware assaults. • Methodist Hospital reported [18] an inward highly sensitive situation last March after being contaminated by a ransomware variation known as “Locky.” The assault constrained Methodist’s entrance to all online and electronic interchanges, and the medical clinic had to shut down personal computers to detach the infection. Programmers requested a $1,600 emancipate yet supposedly yielded after Methodist reestablished its IT frameworks utilizing reinforcement information. • Likewise, in March 2016, Medstar Health [15] came under a ransomware assault that forestalled Medstar offices from understanding information, necessitating to defer persistent arrangements and surgeries now and again. Programmers took steps to devastate the unscrambling key and render records forever out of reach if Medstar didn’t pay $19,000 in Bitcoin within 10 days. Medstar was likewise given the choice to decode a solitary PC for $1,250 in Bitcoin.
2 An Improved Solution to Tackle Cyber Attacks
17
• Kansas Heart Hospital in Witchita [25] ccould not get back their records after their servers endured a ransomware assault. When Kansas Heart made the underlying payments, the programmers reacted by decoding a bit of the taken data. The programmers made another payment interest for the remainder of the encoded patient data. Kansas Heart didn’t make a second payoff. In [21] the authors have provided the suggestion on how to tackle the attack [2] [1] in the subway. An analysis is done with respect to the attacks that happed in Russia. The analysis tells that the Russian subway security in the transport system is one of the best available today. The metros used are maintained by independent authorities. Inspection zones are installed at the entrance of the station. The platform is designed with explosion-proof containers and high-radiation detectors. The security personnel on duty are highly skilled. The environment is under constant vigilance by intelligent video surveillance systems. The system also has tight security over automated systems used: cryptographic and antivirus protection and detection and alerting the cyber-attacks. The proposed work is an improvement of previous contribution [21]. The work is divided into five sections. The section 2 provides a summary of the previous work, as suggested by various authors. Section 3 details the proposed system. Section 4 details the analysis of the proposed system. Section 5 is the conclusion.
2.2 Literature Survey Wanna Cry attack or ransomware [17] makes PC information insecure. Ransomware is one of the product infections that commandeer the client’s information. Ransomware may secure the framework in a way that isn’t for an educated individual to reverse. It does not just target home computers but business too gets influenced. It encodes information so that an ordinary individual can never again unscramble. Ransomware can be sent through different sources like emails, advertisement, and by making sites and some more things that can share the ransomware with the PC clients. Ransomware confines the utilization of the framework in different manners in the wake of barging into the system. The first ransomware in history was developed in 1989. It was known as the AIDS Trojan. It spread by means of floppy circles and included sending $189 to a mail station confine Panama to pay the ransom. There are numerous ransomware like Reveton, CryptoLocker, CryptoLocker and TorrentLocker, Crypto Wall, Crypto Tear, Fusob, and Wanna Cry. Ransomware Wanna Cry assaulted numerous medical clinics, organizations, colleges, and government association crosswise over in any event 150 colleges, having more than 2, 00,000 unfortunate casualties. It bolted all PCs and requested payoff. [29] is crypto-ransomware assaults with multiple stages, that is a developing the digital risk to the basic framework. The model is an assault procedure utilizing an assault diagram with three passage hubs, meaning three invasion sources (Corporate Network, Trusted Third Party, and Direct Internet Connection). The ransomware
18
N. Ambika
tries to assault the supervisory control and data acquisition networks (SCADA) or creation systems to make critical infrastructure and industrial control system information distant. The cascaded network segmentation approach, which organizes the security of creation arrange gadgets is suggested. [24] is a socio-specialized approach to deal with address ransomware. The four larger advance associations can attempt to verify an electronic wellbeing record framework and the fundamental registering foundation. To begin with, successful IT experts need to guarantee sufficient framework assurance by accurately introducing and designing PCs and systems that interface them. Next, the social insurance associations need to guarantee progressively dependable framework protection by actualizing client-centered methodologies, remembering recreation, and preparing for complete utilization of PCs and system applications. Correspondingly, the association needs to screen PC and application use constantly with an end goal to distinguish suspicious exercises and recognize and address security issues before they hurt. The associations need to react sufficiently to and recuperate rapidly from ransomware assaults and take actions to forestall them in the future. [16] is a suggestion that consists of three fundamental subprocesses. Formal Model Construction subprocess targets getting formal models beginning from the Java Bytecode. The Bytecode of the application under investigation is parsed, and appropriate conventional models of the framework are created. A Java Bytecode-toCCS changing capacity has been characterized for the guidance of the Java Bytecode. This interpretation must be performed just one time for each application to be dissected, and it has to be computerized. Transient Logic Properties Construction step attempts to perceive explicit and unmistakable highlights of the ransomware conduct concerning the various malware families. Ransomware Family Detection subprocess checks the arrangements of rationale properties got from the ransomware malware family portrayal against the CCS model of the application. In our methodology, we conjure the Concurrency Workbench of the New Century (CWB-NC) as a formal check condition. Honeypots are counterfeit PC assets conveyed by organizing overseers to go about as fake PCs and recognize any unlawful access. The examination researched [19] answered whether a honeypot organizer could be made and observed for changes. The examinations decided an appropriate strategy to recognize changes to this territory. The examination explored strategies to actualize a honeypot to identify ransomware movement and chose two alternatives: the File Screening administration of the Microsoft File Server Resource Manager highlight and EventSentry to control the Windows Security logs. The exploration built up and arranged reactions to assaults to the framework alongside edges when there were activated. [7] talks about ransomware strategies leading to contamination. The innovation should be possible to help forestall the following unfortunate casualty. This chapter explores the most widely recognized crypto-ransomware, different payload strategies for contamination, run-of-the-mill conduct of crypto-ransomware, its strategies, how an assault is conventionally done, what documents are most g enerally focused on an injured individual’s PC, and suggestions for counteraction and protections are recorded also.
2 An Improved Solution to Tackle Cyber Attacks
19
[28] portrays the fundamental Android segment. It explains Android predominant nature and why assaulting came in. The work dissected and infiltrated pernicious payoff products, which dangers versatile security now with the created computerized examination approach for portable malware recognition. The work [23] suggests CryptoDrop, an early-cautioning identification framework. The contribution alarms a client during suspicious document action. Utilizing a lot of conduct markers, CryptoDrop can stop a procedure that has all the earmarks of altering a lot of the client’s information. By consolidating a lot of pointers normal to ransomware, the framework can be parameterized for fast recognition with low bogus positives. The investigation [12] uncovers countless examples. The malware basically bolts the unfortunate casualty’s of PC work area or endeavors to scramble or erase the injured individual’s documents utilizing shallow strategies. Our examination additionally proposes that halting progressed ransomware assaults isn’t as mind-boggling as it has been recently detailed. The assessment on the record framework exercises of different ransomware tests proposes that by taking a gander at I/O demands and securing Master File Table (MFT) in the NTFS document framework, it is conceivable to identify and forestall countless zero-day ransomware assaults. The contribution [3] proposed ShieldFS. It is an extra driver that makes the Windows local Filesystem invulnerable to ransomware assaults. For each running procedure, ShieldFS progressively flips an assurance layer that goes about as a duplicate on-compose system, as indicated by the result of its location segment. Inside, ShieldFS screens the low-level Filesystem movement to refresh a lot of versatile models that profile the framework action after some time. At whatever point at least one procedures abuse these models, their activities are regarded malevolent and the reactions on the Filesystem are straightforwardly moved back. The proposal [13] recommends a dynamic ransomware security strategy. It replaces the irregular number generator of the OS with a client-characterized generator. As the proposed strategy causes the infection program to create keys dependent on the yield from the client characterized generator, it is conceivable to recuperate a tainted document framework by imitating the keys the aggressor used to play out the encryption. [6] suggested layers of double-dealing frameworks with identity any interruption or ransomware attempting to access bargain private documents by utilizing a trickery framework dependent on honey files and honeytokens. The creators send a proof of idea usage of one of the key double-dealing strategies proposed to recognize ransomware and interlopers. In [21], the authors have provided the suggestion on how to tackle the attack [2] [1] in the subway. The analysis tells that the Russian subway security in the transport system is one of the best available until today. The metros used are maintained by independent authorities. The inspection zones are installed at the entrance of the station. The platform designed is explosion-proof containers and high radiation detectors. The security personnel on duty are highly skilled. The environment is under constant vigilance by intelligent video surveillance systems. The system also has tight security over automated systems used – cryptographic and antivirus protection, detection and alerting the cyber-attacks.
20
N. Ambika
2.3 Proposed System The proposed system is composed of the following subsystem: The system is composed of many subsystems that cooperate to detect any terrorist activity in the deployed environment. The proposed system has added some subcomponents to make the detection more effective than it was previously [21]. The environment has a certain amount of official personnel who carry gadgets that receive signals from the system in case of any suspicious activity and alert the personnel. Figure 2.2 provides the components of the system. The narration of the same is provided below: • Video Surveillance Subsystem: The subsystem is responsible to capture the state of the object and provide timely report of the same. It is capable of recognition and automatic control over the images. It maintains other responsibilities similar to [21]. In doing so, it matches with the activities obtained from the data sources.
Fig. 2.2 Proposed model
2 An Improved Solution to Tackle Cyber Attacks
21
If the operation is positive, it tracks the object of interest and provides timely report to all the personnel around. After capturing the guilty, the recordings are documented in data sources of previous case studies. • Digital Operational Communication Subsystem: The system keeps a record of all the personnel and their schedules. In case of emergency, they are contacted through short text messages. Apart from [21], the system conveys the location of the suspected object to the personnel on duty. The personnel can aid the innocent people to safety and take appropriate action. • Automated and Integrated Control Subsystem: The system follows similar actions as [21]. The system aids in documenting some evidences of the emergency handled at a particular instance. The evidences include video and audio recordings, personnel on duty, date and time details, the feedback of the personnel, and related evidence similar to any of the data sources. • Technological Control and Management Subsystem: The system aids in providing control over automated devices. Every single activity going on in the area [21] are considered in the study. The system is made strong with the help of antivirus and additional components enhancing the security [30] of the system.
2.4 Analysis of the Proposed System The proposed system consists of two add-on components in the data source. The previous case is the inclusion of the learning mechanism of the present system. The real-time tested scenarios are the set of experiments conducted and ended up successfully. As the number of cases included into the system increases, filtering the same becomes essential. The data processing unit consists of a filter subcomponent. The video surveillance picks up the images and transfers the integrated control subsystem. A mapping is made between the data sources availability and the video surveillance output by the filter subcomponent to generate a sublist of appropriate data. The additional functionality of the proposal enables early detection of suspicious activity by 2.7% compared to [21]. The same is represented in Fig. 2.3. The data sources available are increased by 10% by including two subcomponents: previous case and real-time tested scenarios.
2.5 Conclusion With the exponential development of digital-physical frameworks, new security challenges have arisen. Different vulnerabilities, dangers, assaults, and controls have been presented for the new age of cyber-physical systems. Be as it may, there is no orderly investigation of the security issues of cyber-physical systems. Specifically, the heterogeneity of cyber-physical system segments and the assorted variety of cyber-physical system frameworks have made it extremely hard to exam-
22
N. Ambika
Fig. 2.3 Comparison of two work w.r.t to % of early detection
ine the issue with one summed-up model. The proposed work is an improvement of the previous work and suggests a better solution to detect ransomware attack on the system. The proposed system has some add-on subcomponents that make the current system vigilant. The system provides 2.7% early detection of the attack on the system.
References 1. B. Cashell, W. Jackson, M. Jickling, & B. Webel The economic impact of cyber-attacks. Congressional Research Service Documents (2004). CRS Report for Congress. 2. F. Cleveland, Cyber security issues for advanced metering infrastructure. Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy (IEEE, 2008), pp. 1–5 3. A. Continella, A. Guagnelli, G. Zingaro, G. De Pasquale, A. Barenghi, S. Zanero, et al., ShieldFS: a self-healing, ransomware-aware filesystem, in 32nd Annual Conference on Computer Security Applications, (ACM, 2016), pp. 336–347 4. Dakhani, M. M., & Dakhani, M. Z. (2017). Another Way to Deal with Research Privacy in the IOT: Threats and Assaults on IOT and its Solutions. 5. K. Demertzis, L.S. Iliadis, V.D. Anezakis, An innovative soft computing system for smart energy grids cybersecurity. Advances in Building Energy Research 12(1), 3–24 (2018) 6. El-Kosairy, A., & Azer, M. A. (2018). Intrusion and ransomware detection system. 1st International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-7). Riyadh, Saudi Arabia: IEEE. 7. D. Gonzalez, T. Hayajneh, Detection and prevention of crypto-ransomware, in 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), (IEEE, New York, NY, USA, 2017), pp. 472–478 8. L.A. Gordon, M.P. Loeb, W. Lucyshyn, R. Richardson, CSI/FBI computer crime and security survey. Computer Security Journal 21(3), 1 (2005) 9. M.A. Harris, Using Bloom’s and Webb’s Taxonomies to Integrate Emerging Cybersecurity Topics into a Computic Curriculum. Journal of Information Systems Education 26(3), 4 (2019) 10. A. Hegde, Cyber Security Market 2019 Size By Industry, Organization, Product Type, Regional Outlook, Application Potential, Competitive Market Share, & Forecast 2024 (Global Market Insights, Inc., USA, 2019)
2 An Improved Solution to Tackle Cyber Attacks
23
11. A. Humayed, J. Lin, F. Li, B. Luo, Cyber-physical systems security—A survey. IEEE Int. Things J. 4(6), 1802–1831 (2017) 12. A. Kharraz, W. Robertson, D. Balzarotti, L. Bilge, E. Kirda, Cutting the Gordian Knot: A Look Under the Hood of Ransomware Attacks. International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (Springer, 2015), pp. 3–24. 13. H. Kim, D. Yoo, J.S. Kang, Y. Yeom, Dynamic ransomware protection using deterministic random bit generator, in IEEE Conference on Application, Information and Network Security (AINS), (IEEE, Miri, 2017), pp. 64–68 14. Los Angeles hospital pays,(2017) Retrieved from New York Times: https://www.nytimes. com/2016/02/19/business/los-angeles-hospital-pays-hackers-17000-after-attack.html 15. M.K. McGee, infoRisk Today (2016). Retrieved from https://www.inforisktoday.com/ medstar-shuts-systems-after-cyberattack-a-8999 16. F. Mercaldo, V. Nardone, A. Santone, C.A. Visaggio, Ransomware steals your phone. formal methods rescue it, in International Conference on Formal Techniques for Distributed Objects, Components, and Systems, (Springer, Cham, 2016), pp. 212–221 17. S. Mohurle, M. Patil, A brief study of wannacry threat: Ransomware attack 2017. Int. J. Adv. Res. Comput. Sci. 8(5) (2017) 18. B. Monegain, HealthcarelTnews (2016). Retrieved from HealthcarelTnews : https://www. healthcareitnews.com/news/methodist-hospital-recovering-five-day-ransomware-attack- claims-it-did- not-pay 19. C. Moore, Detecting ransomware with honeypot techniques, in Cybersecurity and Cyberforensics Conference (CCC), (IEEE, Amman, 2016), pp. 77–81 20. E.D. Perakslis, Cybersecurity in health care. New England J. Med. 371(5), 395–397 (2014) 21. A.S. Petrenko, S.A. Petrenko, K.A. Makoveichuk, P.V. Chetyrbok, Protection model of PCS of subway from attacks type «wanna cry», «petya» and «bad rabbit» IoT. In Petrenko, A.S., Petrenko, S.A., Makoveic IEEE Conference of Russian Young Researchers in Electrical and Electronic engineering (2018), pp. 945–949. Moscow. 22. D.C. Rowe, B.M. Lunt, J.J. Ekstrom, The role of cyber-security in information technology education. Conference on Information technology education (ACM, 2011), pp. 113–122 23. N. Scaife, H. Carter, P. Traynor, K.R. Butler, Cryptolock (and drop it): stopping ransomware attacks on user data, in 36th International Conference on Distributed Computing Systems (ICDCS), (IEEE, Nara, 2016), pp. 303–312 24. D.F. Sittig, H. Singh, A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Appl. Clin. Inf. 7(2), 624–632 (2016) 25. Siwicki, B., HealthcareITnews (2016). Retrieved from https://www.healthcareitnews.com/ news/kansas-hospital-hit-ransomware-pays-then-attackers-demand-second-ransom 26. M. Ula, Z. Ismail, Z.M. Sidek, A Framework for the governance of information security in banking system. J. Inf. Assur. Cyber Sec., 1–12 (2011) 27. W.A. Vacca, Military culture and cyber security. Survival 53(6), 159–176 (2011) 28. T. Yang, Y. Yang, K. Qian, D.C. Lo, Y. Qian, L. Tao, Automated detection and analysis for android ransomware, in 17th International Conference on High Performance Computing and Communications, (IEEE, New York, 2015), pp. 1338–1343 29. A. Zimba, Z. Wang, H. Chen, Multi-stage crypto ransomware attacks: a new emerging cyber threat to critical infrastructure and industrial control systems. Ict. Express 4(1), 14–18 (2018) 30. N. Ambika, Improved methodology to detect advanced persistent threat attacks, in quantum cryptography and the future of cyber security, B. B. Prajapati, N. K. Chaubey (Eds.), Hershey, Pennsylvania (US: IGI Global., 2020), ch. 9, pp. 184–202
Chapter 3
Impact and Prerequisite of Smart Cities R. Arun Sekar and S. Sasipriya
3.1 Introduction Present day urban areas face non-minor supportability and operational difficulties because of developing populations, maturing establishment, and the expanding unpredictability of urban frameworks. While smart city innovations have become an appealing apparatus to attempt to address these difficulties, urban leaders must have the option to legitimize such developments by comprehending and assessing their effect, a procedure which is confused by the nature and dissemination of innovation in the urban condition. The developing accessibility of large-scale urban information, recording different parts of urban movement, gives a remarkable chance to display urban unpredictability and survey the effect of discrete mechanical mediations. In the course of recent years, datasets on urban movement, for example wireless associations, GPS readings, web-based social networking, different sensor information, have been investigated as valuable intermediaries for urban portability and different kinds of urban conduct. One of the most pertinent information hotspots for understanding business movement is customer spending conduct. This kind of information gives insight into the elements of financial and buying patterns of high spatial and fleeting goals and have been effectively applied to detecting urban elements and financial execution crosswise over neighborhoods, urban communities, and locales. Fast urbanization has been remarkable. As indicated by a UN report, 180,000 individuals move all through the urban communities consistently. The size of urban R. Arun Sekar (*) Department of ECE, GMR Institute of Technology, Rajam, Andhra Pradesh, India S. Sasipriya Department of ECE, Sri Krishna College of Engineering and Technology, Coimbatore, Tamil Nadu, India © Springer Nature Switzerland AG 2021 F. Al-Turjman, N. Gowthaman (eds.), Advanced Controllers for Smart Cities, EAI/Springer Innovations in Communication and Computing, https://doi.org/10.1007/978-3-030-48539-9_3
25
26
R. Arun Sekar and S. Sasipriya
communities has likewise expanded in the past couple of decades. Till the 1950s, New York City was the main city with a populace of more than ten million occupants. This race to urban areas has left them everywhere throughout the world confronting comparative issues such as poor lodging, disturbing pace of contamination, day by day car influxes, and expanding wrongdoing rate. This expansion in the pace of urbanization and mechanical advancement gives some energizing chances to development and rejuvenation. Subsequently, the challenge between urban areas will keep on developing financially, socially, and ecologically. The urban communities that will hold onto innovation will surface as champions. There is, accordingly, a squeezing requirement for these urban areas to become more brilliant so as to deal with this large-scale urbanization and find better approaches to oversee complexity, increase effectiveness, decrease costs, and improve personal satisfaction Brilliant urban communities are fairly a dream, a continuous procedure, to, for all intents and purposes, interface urban areas foundation, its residents, the legislature, and every other partner, utilizing information and communication technology (ICT), so urban communities become progressively bearable and can react speedier to new difficulties. A smart city is an urban improvement utilizing information and communication technology (ICT) and Internet of things (IoT) to give valuable data to successfully oversee assets and resources. This incorporates information gathered from residents and mechanical gadgets that are taken care of and seperated to screen and regulate traffic and transport frameworks, control plants, water supply systems, squander transfer, and so on. Additionally, called eco-city or supportable city, the smart city intends to improve the quality of urban administrations and decrease their expenses. It stands apart for its specificities: smart administration, way of life, portability, lodging – just as a smart economy. Their principle objective is to accommodate mechanical advancement with the financial, social and environmental difficulties of the city of tomorrow. Their leitmotiv is personal satisfaction: how to live better together considering our condition. The chapter is organized as follows. Section I explains the related works regarding smart cities. Section II explains the advantages of smart cities. Section III explains the smart technologies involved in smart cities. Section IV describes the importance of smart cities. Section V talks about a case study related to smart cities. Section VI concludes the chapter.
3.2 Related Works Alawadhi et al. [1] described the implementation of smart cities using information and communication technology. This was first discussed by the California Institute. Hollands [2] first proposed the label “smart city”. Nam and Pardo [3] explained the exact meaning of “smart” as intelligent. Smartness is implied only when the system is intelligent. Harrison et al. [4] described a smart city as interconnected and
3 Impact and Prerequisite of Smart Cities
27
intelligent. This has been explained in the IBM document. While interconnectedness refers to the integration of data into computer technology and then implementing the communication in different cities, intelligence generally refers to the optimization, modelling and complex analytics of taking decisions. According to Ballas [5], a smart city is treated as an ideological dimension in which strategic dimensions are involved. Batty et al. [6] described the role of ICT technology in smart cities and the different ways of enhancing the quality of life through subsystems. The difference between a digital city and a smart city was explained by Nam and Pardo [3]. Washburn et al. [7] explained in depth the concept of ICT, in which basic infrastructure is discussed. The integration of ICT with artificial intelligence was discussed by Klein and Kaefer [8]. Ghaffarian Hoseini et al. [9] talked about smart homes and smart buildings. They are generally embedded with mobile terminals and sensors. The physical infrastructure in a smart city is monitored, and applications related to it have been discussed by Hancke et al. [10]. Liu and Peng [11].
3.3 Advantages of Smart Cities 3.3.1 Ecological Effect Lessening the CO2 impression is the fundamental driver behind the advancement of savvy and feasible urban areas. Improving vitality effectiveness and capacity, waste the officials, traffic conditions are some of the best preferences.
3.3.2 Energy and Water Importance Smart networks and smart water the executives are repeating subjects of brilliant urban areas. Vitality utilization and consumable water checking guarantee the availability of essentialness and the idea of spigot water over the city.
3.3.3 Transportation Spotless and effective transportation of products, administrations, and individuals is basic. The desire for upgrading portability is urging numerous urban areas to shrewd advances to ease traffic blockage and give clients constant updates.
28
R. Arun Sekar and S. Sasipriya
3.3.4 Security Wellbeing is a need for all urban areas. The quick advancement of brilliant urban communities ought to enable regions to all the more likely screen their residents with CCTV cameras with facial acknowledgment. What’s more, cutting edge CCTV cameras are likewise outfitted with movement and smoke alarms, as a caution mechanism.
3.3.5 Foundation and Expenses Smart urban areas use sensor innovation to accumulate and break down data, for example, busy time details, air quality, or wrongdoing rates. The execution of these sensors requires a complex and exorbitant framework.
3.3.6 Private Concern Even though security is a piece of the advantages, it can likewise be viewed as a test as the utilization of IoT and sensor innovation increments. Truth be told, the danger of digital assaults is a basic issue for shrewd urban communities. Additionally, to stay away from worries about information use, brilliant urban communities need to include their residents. Mindfulness, instruction, and straightforwardness on the motivation behind information assortment are vital to make the network feel that they are genuinely partaking in making their city increasingly supportable.
3.3.7 Social Dangers Comprehensive urbanization must be a need to manage the expanding helplessness of poor and ghetto populaces. That is the reason we have to guarantee that no populace is avoided from savvy city information assortment and use.
3.4 Smart Cities Technologies 3.4.1 Smart Governance A few urban communities have profited from the development of ICTs, which improve administration. This ICT-based administration is known as savvy governance [12]. According to Forrester, smart administration is the center of smart urban
3 Impact and Prerequisite of Smart Cities
29
communities’ initiatives. Smart administration [13] includes utilization of ICT to improve execution of open area. It involves changing how governments work, sharing data, and conveying administrations. It utilizes ICT to change associations with residents, organizations, and between the arms of the government. Smart administration incorporates a functioning cooperation and collaboration between the government and its residents and a shrewd utilization of ideas, for example, “egovernment” and “e-majority rules system.” Smart administration can profit residents by decreasing postponements and uniting various administrations under one rooftop. For organizations, smart administration frequently implies less administration, not less governance. Businesses regularly face noteworthy managerial barricades while cooperating with the government. Electronic movement can abridge the turnaround on license applications for some time to several days. Rules can be made straightforward and steady crosswise over offices. Exchange costs between two organizations and the government can be diminished, and the government can profit by an increasingly productive income collection. E-democracy rules system can extensively be portrayed as the utilization of ICT to increment and improve residents’ commitment in popularity-based procedures. The Institute for Public Policy Research says that e-Democracy is tied in with “urging individuals to collaborate on a local level to comprehend their problems.”
Transparent
Decision making
Smart Governance
Political strategies
Social services
30
R. Arun Sekar and S. Sasipriya
3.4.2 Smart Infrastructure Water, energy, transportation, and environmental places constitute the infrastructure of an area. Interest for energy is expanding far and wide, incited by the expanding monetary and populace development, especially in rising economies. As the quality of life and GDP have improved, nations like China and India have seen a monstrous development in per capita vitality use. Challenges regarding environmental change, flooding urbanization, and the pattern towards vehicle reliance have posed concerns for one’s natural wellbeing security. Urban communities, in this way, have an unavoidable job in improving vitality proficiency and diminishing carbon discharges, while advancing energy strength as far as security of supply and costs. Governments overall are putting resources into the new Smart Grid and Smart Energy Management Structure (SEMS) with a target of making an energy dissemination and the executives framework that reacts to human portability and standards of conduct, which thus increments energy effectiveness, advances energy preservation and improves energy the executives. It can help nations to lessen the requirement for limit expansion, and decline ozone-depleting substance discharges, while giving significant investment funds to customers.
Polluction
Environmental protection
Smart environment
Resourse management
Attractivity-natural conditions
3 Impact and Prerequisite of Smart Cities
31
3.4.3 Smart Mobility Advancing electric vehicles, self-administration bicycles, open vehicle and carpooling systems, just as giving charging stations must be a need, to give city inhabitants genuine supportable options in contrast to the single-tenant fossil fueled vehicle. Transport majorly affects personal satisfaction in a city, its condition, and the economy. The standard ways to deal with create answers for the relating issues never again appear to be sufficient. Development of an Intelligent Transportation Systems (ITS) holds potential answers for some of these issues. ITS improve limit, upgrade travel encounters, and make transportation more secure and progressively effective Traffic chiefs increase citywide perceivability to help ease clog and quickly react to episodes utilizing savvy frameworks, for example traffic checking and the board, blockage the board, street client charging, crisis reaction, open data frameworks, shrewd stopping, and incorporated traffic light administration.
ICT
Infrastructure
Smart mobility
Transport systems
Accessibility
32
R. Arun Sekar and S. Sasipriya
3.4.4 Smart Lighting Lighting advancement targets the diminishing vitality utilization of lighting frameworks by providing the right measure of light at the right time with effective apparatuses. Keen and climate versatile streetlights are a genuine case of shrewd lighting frameworks.
3.4.5 Smart Roads Control sensors can be used to screen certain traffic models and normal blocked streets. In addition, splendid headways can recognize the possible debilitating of equipment, for example, traffic lights and light boards for people on foot, or the impact of traffic on the earth.
Productivity
Flexibility
Innovative spirit
Smart economy
Economic Image
International embedd
Ability to transform
3 Impact and Prerequisite of Smart Cities
33
3.4.6 Smart Water Systems Smart water management systems can give a stronger and proficient water supply framework, diminishing expenses and improving supportability. High-innovation answers for the water part incorporate advanced meters and sensors, supervisory control and information obtaining (SCADA) frameworks, and geographic data frameworks (GIS). Brilliant innovation can change traditional water and wastewater frameworks into instrumented, interconnected, and clever frameworks. Instrumented: the capacity to recognize, sense, measure, and record information. Interconnected: the capacity to convey and connect with framework administrators and directors. Smart: the capacity to investigate the circumstance, empower fast reactions, and streamline investigating arrangements. Advanced yield instruments (meters and sensors) are used to gather and transmit data continuously. Smart frameworks such as downpour measures, stream meters, water quality observation and other natural information, acoustic gadgets for ongoing spillage location, camcorder for asset the board, smart water meters for estimating utilization, weight checking for spillage identification and siphon enhancement as models can give precise and modern data that empower educated and efficient, as opposed to impromptu, basic leadership of water supervisors. These can mechanize undertakings and lessen staffing necessities. Keen advances in the commercial center are not restricted to smart water supply. These might be applied over various areas and utilized for coordinated urban arranging. Where conceivable, shrewd city execution should take advantage of existing open or private systems, which incorporate neighborhood, cell 4G/LTE systems, fiber/copper systems, and low-control wide zone systems.
3.4.7 Smart Buildings A smart structure utilizes sensors, actuators, and microchips, so as to gather information and oversee it as per a business’s capacities and administrations.
34
R. Arun Sekar and S. Sasipriya
Affinity
Social and ethinic
Level of qualification
Smart people
Flexibility
Participation
Creativity
The streamlining of administrations like warming, ventilation, and cooling (HVAC), just as vitality use and effectiveness, is significant. Building-incorporated photovoltaics are an extraordinary arrangement with respect to smart buildings. Smart places of business, human services offices, medical clinics, instructive offices, arenas, and numerous different kinds of keen structures exist around the world. Making a brilliant structure, or making a structure smart, starts by connecting center frameworks. Numerous new building have “brilliant” innovation and are associated with and receptive to a smart control lattice. The advantages of making or changing a structure into a brilliant structure is helpful for both the proprietor and the associations working inside. These advantages extend from vitality reserve funds to profitability additions to supportability. Savvy building methodologies can decrease vitality costs, increase the efficiency of the office staff, improve building activities, bolster maintainability endeavors, and upgrade basic leadership over the association. One case of energy productivities is the utilization of ideal beginning/stop, which permits the structure robotization framework to realize when it ought to bring the cooling framework online for a specific zone in the structure. Another component is
3 Impact and Prerequisite of Smart Cities
35
electrical burdens, which are assembled into classes from basic to high need to unimportant.
3.4.8 Role of IoT in Smart Building The primary meaning of smart structure was explained by the Intelligent Buildings Institute of United states (US), which characterizes an astute structure as “one which gives a beneficial and practical condition through enhancement of four essential components: structure, frameworks, administrations and the executives, and the interrelationship between them.” However, with mechanical progressed and the key job of the Internet of Things (IoT), the importance of smart structures is developing.
3.4.9 Innovation Economy To completely comprehend what innovation economy is, it is critical to initially know how it happened. The hypothesis of this type of financial aspects was grown distinctly over the past couple of decades. Already, the development of the economy was controlled by the market’s reaction to value flag on organic market bends and the effective designation of assets. Furthermore, this appeared well and good as the economy rose up out of the Second Industrial Revolution. Notwithstanding, as the pace of mechanical improvement expanded—explicitly with advanced innovation—everything changed. While in more seasoned financial models, advancement is viewed as an autonomous power, in development financial aspects, development is seen as a focal fundamental that ought to be supported by government approaches and reinforced by information, innovation, and business. Prodding these variables ought to be the fundamental objective of monetary arrangement, alongside creating viable private, open associations that flash expanded development and efficiency. The development economy is moving the focal point of social orders far and wide. Rather than economies concentrated on creating and appropriating significant items from rare assets, society’s new objective is to build personal satisfaction for all and grow riches by growing new plans of action, items and administrations, and types of generation. Development began in the tech business and immediately snowballed into different divisions of the economy. With improved innovative capacities, more generally open information bases, and a globalized world, people and firms had the option to all the more viably make items and administrations that improved individuals’ lives. People can purchase their food supplies on the web and get it delivered at their doorstep in a couple of hours. Shoppers can print a new part at home for their dishwasher. Clients can find a date for the evening, who may wind up becoming the warmth for their life, with a straight swipe of their thumb. Be as it may, it’s not just about customers and the items and administrations they use.
36
R. Arun Sekar and S. Sasipriya
The innovation economy is affecting callings and the aptitudes expected to seek after them. In the medicinal field, increasingly exact machines enable specialists to determine more adequacy. In the legitimate field, online stages are enabling a lawyer to have practical experience in specialty zones. In instruction, gamification is empowering educators to more readily interface with and draw in understudies. The innovation economy stands to make immense and expansive waves in our reality. The advancements that have been made in the course of the past couple of decades, alone, have adjusted the manner in which we live our lives, the manner in which we work together, the manner in which we devour, the manner in which we interface with others, and what we esteem. This sort of economy has filled our heart with joy and progressively helpful and made quicker and better approaches to do pretty much everything. This implies individuals have more opportunity to do what they need and more cash to spare or spend on extravagant things or administrations. So life becomes more comfortable. The open doors that have been springing up due to a pledge to development can be seen from the inundation of remote relocation to the city. Individuals need to live in places where occupations are accessible, individuals are taught, and energizing open doors are always springing up.
Social cohesion
Educational facilities
Cultural facilities
Smart living
Housing quality
Health conditions
Individual safety
3 Impact and Prerequisite of Smart Cities
37
3.5 Importance of Smart Cities 3.5.1 Power As per the Planning Commission, around 66% of our energy requirements will be delivered locally continuously in 2021–22. Reliance on imports will be basic to connect the energy request and supply hole. Energy concentrated smart cities will shoot up the substantial reliance on petroleum products for energy generation, except if sustainable fuel choices are accessible.
3.5.2 Infrastructure Urban administrations like water supply, sewerage, strong waste administration, storm water channels, and so on would require at any rate 20% of the aggregate foreseen venture. Development, activity, and support of new and existing framework will likewise be basic. In any case, given the present pace of interest in urban framework, there is probably going to be a colossal deficit in meeting foreseen request. Notwithstanding the physical framework, the new urban areas will require substantial interest in social framework (which incorporates lodging, training, medicinal services, and amusement among others). Verifying financing to execute such large-scale foundation improvements will be pivotal and a difficult assignment.
3.5.3 Funds 3.5.3.1 Technology Smart cities are characterized by broad utilization of innovation to make urban communities manageable and improve general personal satisfaction. Such innovation subordinate activities require stages that permits consistent advancement and improvement of existing innovations to increase general execution in all segments, including computerized innovation, cars, vitality, human services, and transport frameworks.
38
R. Arun Sekar and S. Sasipriya
3.6 Case Study on “Smart Cities” in India 3.6.1 New Delhi New Delhi has been proposed as the province’s first smart city in request to decongest the national capital. This zone is proposed to consist of world-class framework, green innovation and latest water preservation procedures, worldwide instructive and wellbeing foundations, stimulation offices, etc.
3.6.2 Key Factors ICT • Wi-Fi/WiMAX, worldwide network Condition • District cooling framework • Integrated utility channel arrangement Vitality • Uninterrupted and exceptionally solid power supply • Domestic gas dissemination Transportation • • • • • •
Multimodular vehicle center point Real-time travel reaction Interactive guides Transit hub Automatic vehicle area and following Vehicle discharge observing
3.6.3 Difficulties for Smart Cities in India India is as of now falling earnestly behind on maintaining its urban regions for an assortment of reasons that range from congestion and clog to low quality and terribly insufficient foundation bringing about dirty and rotting living environs. Subsequently, there are various difficulties in retrofitting and, in any event, growing new brilliant cities. The most conspicuous one is:
3 Impact and Prerequisite of Smart Cities
39
3.6.3.1 Poor Governance There is a need to build up a common plan vision between various government bodies to facilitate proficient usage. At last, there is likewise a solid need to guarantee that those in the government are reasonably prepared for: (a) Rapid reactions to the ongoing issues (b) Adaptability and inventiveness to advancing requests of residents Consequently, the administration needs to continually develop to adjust to the changing needs and react to its residents, in this manner making them responsible and straightforward simultaneously. Urban India has thick and exceptionally populated microcosms of diverse populace bunches characterized based on religion, standing, network, societal position, occupations, causes, convictions, and so on. What’s more, most enormous urban areas have half or a greater amount of their populace staying in ghettos. Savvy urban areas should have the option to consider these different customer bunches while guaranteeing that their protection and security are not settled on. Further, all administrations also, foundation must be reasonable for all segments of the populace and these urban areas ought not to become gated networks implied for an advantaged part.
3.6.4 Opportunities for Smart Cities in India Given the way that the Indian economy is as a rule progressively driven by profoundly talented administrations, for example, Information Technology (IT), telecom, designing, and information administrations, there is a huge potential to use and build up accessible human capital and abilities for brooding future developments. Furthermore, the political will and duty of the focal government vow to acquire large-scale changes to help the shrewd urban communities’ activities.
3.7 Conclusion ICT is the fundamental framework for all smart cities. There is no confinement on the coordinated efforts and developments that can be received crosswise over different offices and with various partners. ICT empowers the city and the administration to get support from the residents and incorporate their contributions to the forms. By broadening network interest, it not just enables the residents, it additionally enables them to build up a sense of responsibility for cities. Thus, smart urban area activities would bring about manageable and flourishing Indian urban areas – new and old, if actualized appropriately with dynamic inclusion of all things considered.
40
R. Arun Sekar and S. Sasipriya
References 1. S. Alawadhi, A. Aldama-Nalda, H. Chourabi, J.R. Gil-Garcia, S. Leung, S. Mellouli, T. Nam, T.A. Pardo, H.J. Scholl, S. Walker, Building understanding of smart city initiatives. Lect. Notes Comput. Sci. 7443, 40–53 (2012) 2. R.G. Hollands, Will the real smart city please stand up? City 12(3), 303–320 (2008). https:// doi.org/10.1080/13604810802479126 3. T. Nam, T.A. Pardo, Conceptualizing smart city with dimensions of technology, people, and institutions, in Proceedings of the 12th Annual International Digital Government Research Conference on Digital Government Innovation in Challenging Times – Dg.o 11, (2011). https://doi.org/10.1145/2037556.2037602 4. C. Harrison et al., Foundations for smarter cities. IBM J. Res. Dev. 54(4), 1–16 (2010). https:// doi.org/10.1147/jrd.2010.2048257 5. D. Ballas, What makes a ‘Happy City’? Cities 32(1), S39–S50 (2013) 6. M. Batty et al., Smart cities of the future. Eur. Phys. J. Spec. Top. 214, 481–518 (2012) 7. D. Washburn et al., Helping CIOs Understand “Smart City” Initiatives: Defining the Smart City, Its Drivers, and the Role of the CIO (Forrester Research, Cambridge, MA, 2010) 8. C. Klein, G. Kaefer, From smart homes to smart cities: opportunities and challenges from an industrial perspective, in Next Generation Teletraffic and Wired/Wireless Advanced Networking Lecture Notes in Computer Science, (Springer, Berlin/Heidelberg), pp. 260–260 (2008). https://doi.org/10.1007/978-3-540-85500-2_24 9. A. Ghaffarian Hoseini, N. Dahlan, U. Berardi, A. Ghaffarian Hoseini, N. Makaremi, Sustainable energy performances of green buildings: A review of current theories, implementations and challenges. Renew. Sustain. Energy Rev. 25, 1–17 (2013) 10. G. Hancke et al., The role of advanced sensing in smart cities. Sensors 13(1), 393–425 (2012). https://doi.org/10.3390/s130100393 11. P. Liu, Z. Peng, in Smart Cities in China, IEEE Computer Society Digital Library (2013). http://doi.ieeecomputersociety.org/10.1109/MC.2013.149 12. H. Chourabi et al., Understanding smart cities: an integrative framework, in 45th Hawaii International Conference on System Sciences, (2012) 13. J. Belissent, The Key To Being A Smart City Is Good Governance: “Smart Governance”Forrester, 10 July 2017, go.forrester.com/blogs/11-05-15-the_key_to_being_a_smart_city_is_good_governance_smart_governance/.
Chapter 4
Secure and Efficient Data Sharing Scheme in Cloud for Protecting Data in Smart Cities P. Chinnasamy and V. Praveena
4.1 Introduction Thanks to the availability of scalability, elasticity, mobility, pay-per-use and computing resources to users, cloud computing has gradually evolved [1]. In particular, enterprises should provide the cloud with high computing and resources at a low cost. Providers of cloud infrastructure provide different business models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) [2, 18].The cloud have been built for different service models, that is, Rackspace, Amazon web services and Terremark are IaaS systems. Whereas Google app engine and Microsoft Azure are PaaS, Salesforce CRM and Godaddy is SaaS [3, 4, 18]. Then the cloud service providers have provided three deployment models: public, private and hybrid. The public cloud makes it easy for the general public to access systems and software such as Google App Engine, Microsoft Windows Azure and Amazon EC2. Likewise, private cloud allows applications within an organization to be available. Because of its private nature, it provides increased security such as Eucalyptus, Openstack, Open nebula and CloudStack. The hybrid model is a combination of public and private clouds, for example, Microsoft Azure and VMware vCloud. Cloud infrastructure is more impressive and secure than personal computing tools, but it is still amazing with internal threats and external threats, which may leak sensitive data from customers [5]. The loss of sensitive data, however, poses many security concerns, as opposed to the public cloud’s wide adaptability. Information owners may have to encrypt their data before uploading to the cloud to prevent uninvited disclosure of sensitive information [6]. The client guarantees data protection, that no knowledge about customer data is obtained from the cloud server. The data will always be encrypted before being saved in the P. Chinnasamy · V. Praveena (*) Department of Information Technology, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India © Springer Nature Switzerland AG 2021 F. Al-Turjman, N. Gowthaman (eds.), Advanced Controllers for Smart Cities, EAI/Springer Innovations in Communication and Computing, https://doi.org/10.1007/978-3-030-48539-9_4
41
42
P. Chinnasamy and V. Praveena
cloud. Users perform key management, encryption and decryption processes to ensure data security [7]. Based on its attributes, a hidden key will be given to the Attribute Based Encryption (ABE) client. CP-ABE (chiphertext policy attribute dependent encryption) is a promising cryptographic method that enables cloud storage systems to monitor fine-grained data access [8]. If its attributes follow the access criteria, the ciphertext can be decrypted by a client. Most of the latest CP-ABE schemes are designed to generate users’ private keys with their master secrets by one or more trusted authorities [9]. The key escrow problem is embedded in such that any ciphertext addressed to users can be decrypted by the trusted authority. The key escrow issue is integrated in so that the trusted authority can decrypt any ciphertext addressed to users. The cloud service provider has typically been semi- trusted. The data owner stores their sensitive data and to share their data to authorized users. The third party service provider to capture some sensitive information of client’s data. Thus, we provide secure authentication method to store and share the data is not disclosure to the service providers. Compared to existing techniques, this model has provide a unique feature by providing the security to third party service providers and ensure the data confidentiality.
4.1.1 Motivation and Justification The public cloud services to apply the development of smart cities. The smart city having the large sense of big data like smart infrastructure, smart healthcare, smart education etc. Data from smart cities is applied to the cloud that affects a lot of data security and privacy vulnerabilities. Data security issues include exposure of a person’s personal data and privacy concerns, including leakage of certain sensitive details such as user name, contact, etc. To overcome these issues, design a secure cloud data center to store their data and share the data depending on the kinds of applications that are run in the smart city.
4.1.2 Related Works Ke Han et al. [10] suggested an access control scheme based on attributes for secure cloud data sharing. The data owner wants to transfer the data to the cloud in an attribute-based access control scheme. The CP-ABE (chiphertext policy attribute dependent encryption) algorithm encrypts the data until the data holder is uploaded. They produce the secret parameters used by the secret attribute keys to upload, issue and revoke the data. The key attribute keys are created from key centers of authority (KACs). The key generation center (KGC) produces public and private keys. The encryption-based attribute is based on bilinear pairings and polynomial Lagrange. In the attribute-based access system, encryption and decryption times are fast. Qin Liu et al. [11] implemented a time-based proxy re-encoding scheme to protect the
4 Secure and Efficient Data Sharing Scheme in Cloud for Protecting Data in Smart…
43
data from an untrusted cloud server that allows the cloud service provider to automatically re-encode the data without exposing the PRE keys of the data owner. The cloud service provider’s TimePRE scheme and the malicious insiders are unable to recover data without permission from the data owner. Bilinear pairing proxy re- encryption, BDH parameter generator and BDH assumption. Depending on the access mechanism, every client provides access across a fixed period of time and the CSP to re-encode the ciphertext automatically based on their own time. Khan et al. [12] use the ElGammal Cryptosystem and the bilinear pairing to share confidential data in the cloud. Trustworthy third party acts as a proxy for the main operations of generation and re-encryption. The method also contains bilinear pairing’s mathematical complexities.
4.2 Contribution Motivated by [13] propose a ciphertext policy attribute-based hashing encryption. The secret keys of the user are in the CP before they are downloaded. The scheme CP-ABE-HK solves two forms of main escrow and backward secrecy issues. The aim of our work Is to suggest a protocol to provide a hashed key to address CP-ABE’s key escrow problem in cloud computing. The scheme will prevent the optimistic CP from obtaining the secret key of the client. Confidentiality of information and confidentiality can be assured. For the proposed system, we undertake and enforce extensive research. The implementation reveals that in terms of both computational complexity and space cost, the CP-ABE-HK scheme is efficient. The security of the CP-ABE-HK system is also shown under the model.
4.2.1 Groundworks 4.2.1.1 Access Structure Let’s be a group of parties {M1, ...., Mn}. If B, C: if B € A and B € C, then C € A, a subset A 2{M1, ..., Mn} is monotype. An access structure is a list A of {M1, ...., Mn} non-vacant subsets, that is, A {M1, ...., M2}\{}. In A, the sets are called sets of unauthorization. In our scheme, the attributes take on the role of the parties. 4.2.1.2 Bilinear Mapping Let G1 and GT be prime order p multiplicative cyclic groups. G1’s generator is g. The following properties are encountered by a bilinear mapping ê: G1 u G1 u GT:
44
P. Chinnasamy and V. Praveena
Bilinearity: For and x,y € G1 and a,b € Zp, it has
(
)
eˆ x a ,y b = eˆ ( x,y )
ab
Non-degeneracy: There exists x,y € G1 such that eˆ ( x,y ) ≠ 1 . Computability: For all x,y € G1, to compute eˆ ( x,y ) . 4.2.1.3 Weighted Access Tree Let L is denoted as an access tree, where S is described as a root node. The functions and terms of the access trees are defined as follows (Fig. 4.1). L is ax relationship node-specific tree. If x is a weighted attribute, the leaf node of the access tree will be represented. If x is a non-leaf node, the threshold gate is “AND,” “OR” and “n-of-m” (n