Towards a reliable smart city through formal verification and network analysis

Abstract With the immense increase of population density, many challenges facing organizations and governments. Thus, it has become mandatory to turn up our cities to be intelligent by introducing IoT and smart grids to build smart buildings, smart communication technologies, smart healthcare systems, smart transportation, etc. Smart cities guarantee the healthy living of indoor inhabitants by sensing, processing and controlling all possible indoor-outdoor measures. In this paper, we develop a framework that systematically builds a reliable and secure Smart City Model (SCM) to be integrated then exploited by the building information model (BIM). SCM encloses both physical and digital models which highlight smart buildings in particular. First, the proposed solution identifies and models SCM components including their appropriate architectures that are responsible for communication, extension, information flow, and protection. To ensure SCM functional and security requirements, we develop a sound hybrid approach that relies on formal methods and network analysis. Uppaal model checker is used to verify the satisfiability of the smart city requirements whereas Cooja is deployed to simulate the connectivity and the communication coverage of the developed SCM. The obtained results, in Uppaal, showed that the different implemented scenarios are satisfying the functional correctness and security policies. Moreover, the simulation through Cooja showed that how different obstacles and positions of nodes affect the communication coverage and the energy consumption regarding the deployed nodes. Experimentally, the effectiveness of the developed framework has been shown through practical scenarios that are difficult to model and analyze.

[1]  Ramjee Prasad,et al.  Impact of 5G Technologies on Smart City Implementation , 2018, Wireless Personal Communications.

[2]  Fadi Al-Turjman,et al.  A Novel Security Model for Cooperative Virtual Networks in the IoT Era , 2018, International Journal of Parallel Programming.

[3]  Samir Ouchani,et al.  Ensuring the Functional Correctness of IoT through Formal Modeling and Verification , 2018, MEDI.

[4]  Xavier Masip-Bruin,et al.  A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration , 2018, ACM Comput. Surv..

[5]  Victor I. Chang,et al.  NMCDA: A framework for evaluating cloud computing services , 2018, Future Gener. Comput. Syst..

[6]  Stephen H. Hallett,et al.  Towards evaluation design for smart city development , 2019 .

[7]  Marijn Janssen,et al.  A Unified Smart City Model (USCM) for Smart City Conceptualization and Benchmarking , 2016, Int. J. Electron. Gov. Res..

[8]  Taewon Kang,et al.  Practical Simplified Indoor Multiwall Path-Loss Model , 2020, 2020 20th International Conference on Control, Automation and Systems (ICCAS).

[9]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[10]  Muhannad Quwaider,et al.  Performance evaluation and enhancement of VLAN via wireless networks using OPNET modeler , 2020, ArXiv.

[11]  Andrea Zanella,et al.  Long-range communications in unlicensed bands: the rising stars in the IoT and smart city scenarios , 2015, IEEE Wireless Communications.

[12]  Yassine Sadqi,et al.  A New Mutuel Kerberos Authentication Protocol for Distributed Systems , 2017, Int. J. Netw. Secur..

[13]  Rajesh Gupta,et al.  Brick : Metadata schema for portable smart building applications , 2018, Applied Energy.

[14]  Kyungbaek Kim,et al.  Design and implementation of intrusion detection system using convolutional neural network for DoS detection , 2018, ICMLSC '18.

[15]  Akis Kokkinis,et al.  On the Realistic Radio and Network Planning of IoT Sensor Networks , 2019, Sensors.

[16]  Helena Rifà-Pous,et al.  Attack Classification Schema for Smart City WSNs , 2017, Sensors.

[17]  Evangelos Theodoridis,et al.  SmartSantander: IoT experimentation over a smart city testbed , 2014, Comput. Networks.

[18]  Eirini Anthi,et al.  Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment , 2019 .

[19]  Z. Allam,et al.  Redefining the Smart City: Culture, Metabolism and Governance , 2018, Smart Cities.

[20]  Joeri de Ruiter,et al.  Analysis of DTLS Implementations Using Protocol State Fuzzing , 2020, USENIX Security Symposium.

[21]  Jens Bo Holm-Nielsen,et al.  A Comprehensive Review on Renewable Energy Development, Challenges, and Policies of Leading Indian States With an International Perspective , 2020, IEEE Access.

[22]  D. S. Vijayan,et al.  Automation systems in smart buildings: a review , 2020 .

[23]  M. K. Anser Impact of energy consumption and human activities on carbon emissions in Pakistan: application of STIRPAT model , 2019, Environmental Science and Pollution Research.

[24]  Bhagya Nathali Silva,et al.  Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities , 2018 .

[25]  Paul P. Maglio,et al.  Data-Driven Understanding of Smart Service Systems Through Text Mining , 2018, Service Science.

[26]  Pavlo Skladannyi,et al.  ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE , 2019 .

[27]  Kim-Kwang Raymond Choo,et al.  A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks , 2020, IEEE Access.

[28]  Amir Masoud Rahmani,et al.  Reliability and high availability in cloud computing environments: a reference roadmap , 2018, Human-centric Computing and Information Sciences.

[29]  Weihua Duan,et al.  Smart City Concepts and Dimensions , 2019, ICIT.

[30]  V Anantha Narayanan,et al.  An Overview of Security in CoAP: Attack and Analysis , 2019, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS).

[31]  Yasir Mehmood,et al.  Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.

[32]  C. Toh Security for smart cities , 2020, IET Smart Cities.

[33]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[34]  Yunzhe Li,et al.  The design of hardware firewall based on Acorn RISC Machine , 2021 .

[35]  Xiaohui Liang,et al.  Security and Privacy in Smart City Applications: Challenges and Solutions , 2017, IEEE Communications Magazine.

[36]  Helen D. Karatza,et al.  Performance evaluation of cloud-based log file analysis with Apache Hadoop and Apache Spark , 2017, J. Syst. Softw..

[37]  Felix Klaedtke,et al.  A Security Architecture for 5G Networks , 2018, IEEE Access.

[38]  Bayan Mahdi Sabbar,et al.  An overview on wireless sensor networks and finding optimal location of nodes , 2019, Periodicals of Engineering and Natural Sciences (PEN).

[39]  Subhas Mukhopadhyay,et al.  WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings , 2015, Sensors.

[40]  Yeqiong Song,et al.  Using Cooja for WSN Simulations: Some New Uses and Limits , 2016, EWSN.

[41]  Sherif El-Kassas,et al.  Limited Proxying for Content Filtering Based on X.509 Proxy Certificate Profile , 2018, SecITC.

[42]  Thomas Morris,et al.  On the Edge Realtime Intrusion Prevention System for DoS Attack , 2018 .

[43]  M. Destek,et al.  Renewable, non-renewable energy consumption, economic growth, trade openness and ecological footprint: Evidence from organisation for economic Co-operation and development countries , 2020, Journal of Cleaner Production.

[44]  Min Zhang,et al.  Architecture Design of Datacenter for Cloud English Education Platform , 2019, Int. J. Emerg. Technol. Learn..

[45]  Leila Ben Saad,et al.  Simulation of the RPL Routing Protocol for IPv6 Sensor Networks: two cases studies , 2011 .

[46]  Simon Elias Bibri,et al.  The eco-city and its core environmental dimension of sustainability: green energy technologies and their integration with data-driven smart solutions , 2020, Energy Inform..

[47]  Yang Yu,et al.  Technology of short-distance wireless communication and its application based on equipment support , 2018 .

[48]  Didier Lime,et al.  TCTL Model Checking Lower/Upper-Bound Parametric Timed Automata Without Invariants , 2018, FORMATS.

[49]  Sajjad Hussain Chauhdary,et al.  A Novel Framework and Enhanced QoS Big Data Protocol for Smart City Applications , 2018, Sensors.

[50]  Arif Mahmud,et al.  Simulation and Comparison of RPL, 6LoWPAN, and CoAP Protocols Using Cooja Simulator , 2018, IJCCI.

[51]  Catherine A. Meadows,et al.  Model Checking Security Protocols , 2018, Handbook of Model Checking.

[52]  Jin Kwak,et al.  Smart card-based secure authentication protocol in multi-server IoT environment , 2017, Multimedia Tools and Applications.

[53]  Ansari Saleh Ahmar,et al.  Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA , 2019, ArXiv.

[54]  Hiroyuki Koga,et al.  Simulation Study of Low Latency Network Architecture Using Mobile Edge Computing , 2017, IEICE Trans. Inf. Syst..

[55]  Nitin Naik,et al.  Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP , 2017, 2017 IEEE International Systems Engineering Symposium (ISSE).

[56]  Saraju P. Mohanty,et al.  Everything You Wanted to Know About Smart Cities , 2016, IEEE Consumer Electron. Mag..

[57]  Alireza Ejlali,et al.  Objective function: A key contributor in Internet of Things primitive properties , 2018, 2018 Real-Time and Embedded Systems and Technologies (RTEST).

[58]  Sajeeb Saha,et al.  Application specific tunneling protocol selection for Virtual Private Networks , 2017, 2017 International Conference on Networking, Systems and Security (NSysS).

[59]  Tuan Anh Nguyen,et al.  A Hierarchical Modeling and Analysis Framework for Availability and Security Quantification of IoT Infrastructures , 2020 .