A Simple Security Architecture for Smart Water Management System

Abstract Water scarcity and water stress issues have become clear threat to the global population. This makes water management a critical aspect to ensure sustainable water. An efficient water management system requires thousands of constraint devices (sensors and/or actuators) to be deployed across the water distribution network to enable near-real time monitoring and control of the water grid components. Security at both the device and network level is critical to the operation of such a system. Although several IT security controls have developed over the past few decades, they cannot be used directly with such constraint devices. This is due to their limited resources and unique requirements. However, some of these techniques can be adapted and used with these constraint devices. In this paper, we propose security architecture for smart water management systems, the architecture leverages existing security solutions and design patterns

[1]  Zubair A. Baig,et al.  An Analysis of Smart Grid Attacks and Countermeasures , 2013, J. Commun..

[2]  Adnan M. Abu-Mahfouz,et al.  Smart water meter system for user-centric consumption measurement , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).

[3]  Seokjun Lee,et al.  Security Architecture Model for Smart Grid Communication Systems , 2013, 2013 International Conference on IT Convergence and Security (ICITCS).

[4]  Philip R. Page,et al.  Real-time Dynamic Hydraulic Model for Potable Water Loss Reduction , 2016 .

[5]  Gerhard P. Hancke,et al.  Multi-level infrastructure of interconnected testbeds of large-scale wireless sensor networks (MI2T-WSN) , 2012 .

[6]  Xiaohui Liang,et al.  Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.

[7]  Adnan M. Abu-Mahfouz,et al.  A key distribution scheme using elliptic curve cryptography in wireless sensor networks , 2016, 2016 IEEE 14th International Conference on Industrial Informatics (INDIN).

[8]  Andrzej Duda,et al.  OSCAR: Object security architecture for the Internet of Things , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[9]  Georg Carle,et al.  A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.

[10]  Joon Ha Kim,et al.  Smart water grid: the future water management platform , 2015 .

[11]  Carel P. Kruger,et al.  Wireless sensor networks testbed: ASNTbed , 2013, 2013 IST-Africa Conference & Exhibition.