Implications For Privacy: Smart Sensor Network In Singapore

Case 1: Deploying network of cameras and smart sensors

The part of the Smart Nation Plan of the Singapore Government has been the deploying a network of smart sensors and cameras at various places. They have also been implementing a sensor box series acting as the Wi-Fi hotspot across the city.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The report has discussed what has been seen as the implication of the privacy of the Smart Sensor Network of Singapore Government. This is estimated to permit the introducing of the heterogeneous network where the smart phone and the other devices can switch seamlessly between the WiFi and mobile data.

The report has analyzed the plan from the perspective of the visitor and the resident at Singapore in both the cases. Further it discusses the sharing of sensitive information through mobile and use of digital identity. It also considers the steps for ensuring the privacy and security of the digital identity.

The transport has been an undeniable perfect case for the strategy of “living laboratory”. Singapore has been at the cutting edge of self-governing vehicle testing. The nation has opened the streets for the self-driving buses and cars. The small-scale trails of the transports started at Nanyang Technological University three years back. This has more currently when the “MIT turn off nuTonomy” begun testing self-ruling cabs on the lanes of the cities (Vanolo, 2014). These efforts were implemented simply with an arrangement for a full-measure automated transport serving NTU as declared. There have been various efforts beyond the self-driving vehicles.

The sensors have been at the core of the Smart Nation, and the administration has been utilizing them to track its transport fleets. By crunching information, it was ready to recognize the problem areas and define answers for work around them. By recognizing where more transports were required this activity has just brought about a ninety percent lessening in crowdedness. It has also diminished waiting times on prevalent administrations three to five minutes. The subsequent stage after this has been the private transport.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Singapore comprised of the taxed cars utilizing an electronic street toll-accumulation system for over ten years. However following the cycle of that framework, in 2020, is estimated to be considerably more far reaching. It requires an administration-mandated satellite-navigation in all the vehicles (Neirotti et al., 2014). The framework would silently control where an auto is at any particular time, opening an abundance of information for analysis. The authorities had the capacity to control the movement conditions across the country, from volume to normal speed. This has been featuring blockage and problems with the street design. This level of the traffic checking, knowing precisely, where each car over the road was at any given time has been exceptional.

At Singapore, a large number of sensors have been introduced for watching every apartment. In the organizations with privately owned businesses, the authorities could quantify the waste production, energy draw and the water usage in the real time. The last one has been the main problem for the island. This has been in spite of the fact that making progress towards the water independence has been still importing several billions of gallons of water from the neighboring Malaysia every year (Ojo, Curry & Janowski, 2014).

Perspective of the visitor

As the part of this pilot, Singapore has likewise made decisive steps toward environmental friendliness, with another vacuum waste-management administration framework, solar power panels and water-recovery endeavors. Through brilliant applications, the sensors furnished the inhabitants with input on their conduct, helping them to utilize lesser water and electricity and many more. This has been driving down family unit costs.

The legislature aggregated this information, utilizing examination and the computer simulations for enhancing the designing, plan and upkeep of public housing domains. In this way the programs profiting both the people and the nation as a whole has repeated itself all through the Smart Nation’s effective activities. As it came to human services, the Smart Nation has focused on diminishing that burden. For as long as two years, Singapore has been trying an EMS or “Elderly Monitoring System” (Bhati, Hansen & Chan, 2017). This was a noninvasive program that utilized sensors on the entryways and inside rooms for monitoring development. In the event that there has been an absence of movement or the system identified other incidents, the observer, be it a relative or any expert, has been alarmed instantly.

About a few years on from the commencement of the project of Smart City, the city of Singapore has turned into a center point of development. The board of government now has given the open get to access information for anybody (Lim & Mack, 2017). Hence the trend-setters could make utilization of it to make administrations and items that improve the social and monetary esteem of Singapore. This has given rise to new applications, like for example, the App&Town. This is the application that goes about as a guide from the purpose of departure to the visitor’s goal and utilizing the metropolitan transport administrations. The application has been offering the best courses and showed where the closest stop or station has been In addition it included the exhorting when the visitor ought to get on and off. The city has a strong establishment of fiber-optic link inside it spreading over a few hundred kilometers over the city (Angelidou, 2014). This broad network was started about three decades of years prior when the city associated two metropolitan structures with the earliest fiber technologies.

The fiber network has been providing ninety percent fiber-to-the-home coverage now and fills in as the backbone for coordinated city frameworks. The fiber network has filled in as an immediate connects to the Internet for the visitors and residents of Singapore. The city drew on the fiber framework to give WiFi connections around it (Jin et al., 2014). Since four years the quantity of hotspots has risen more than sixty percent at a greatest distance of about 100 meters from point to point. The quantity of WiFi clients has multiplied twice in this time.

The new computerized transport stops transformed the waiting for transports into an intuitive experience. This includes the upgrades on transport area, the USB charging stations, the free WiFi, and the devices to enable visitors to download applications to enable them to be aware of the city.

Perspective of the resident

The Smart City framework has been working with the proper controls. Thus the residents have been appreciating a more lovely residence. However there have been many things to be said about when they fall flat, or more awful still, when they get hacked.  The foundation of the issue with pernicious Smart City hacking is the way that sensors regularly gather the “raw” information and after that only pass that on. Investigations have been performed on the information at its purpose of start, so subsequently; the residents have been depending on that information source. This has been being accurate before the residents move that information onwards for examination (Watts & Purnell, 2016). However, the possibility that any malicious hacker were to change that raw information has been kept in mind. The users of this data streams would begin to perform investigation on the erroneous information that could be moved into change and improvement panning for urban IT foundation in this present reality.

The Smart City innovation has conveyed to the table the civil argument of individual protection, uncovered framework and conceivably individual information to computer breakdowns and hackings (Roche, 2014). The more information the urban areas could gather, the less demanding it has been to aggregate an itemized scenario of the lives of residents that make up the city, directly down towards the individual level.

Throughout the following couple of decades, it is estimated to end up being the standard for every newly created city. This is to experience reevaluation of customary framework to turn into a noticeably Smart City. Each part of city life has been reshaped by a wide marginal flow of information and communication (Watts & Purnell, 2016).

There has been various data and privacies that are not expected to be shared from the phone. First of all the password and the TouchID of the phone have to be protected well. Setting the password is the most critical thing the visitor could do to protect their phones. This is the simple yet successful technique for making an obstruction between the data on their phone and any individual who may hack it, in the occasion that it has been stolen or lost (Zubizarreta, Seravalli & Arrizabalaga, 2015). The Touch ID in some phones gives the most innovatively propelled unique mark security. The genuine picture of the unique finger impression is not put away anyplace, and is rather changed over to a numerical portrayal of a unique finger impression that could not be figured out into one.

Apart from this, keeping other private passwords, the financial and the other personal data safe and shielded from the external intruders has been a need for the people. However it has been undeniably basic for the visitors, businessman and the common people to consider the information protection and utilize sound practices for keeping their sensitive individual data protected and secure (Dameri, 2017). There has been a plenitude of data out there for families, consumers and people on ensuring passwords, satisfactorily securing computers, laptops, and cell phones from the hacking programmers, malware, and different dangers. These are the best practices for utilizing the Internet securely. However, there has been so much data that it is anything but difficult to get confounded, especially in case people are not technically knowledgeable.

Case 2: Deploying the series of sensor boxes to act as the WiFi hotspots

The trusting of the connection between a digital identity and the real identity initially expects somebody for validating their identity. This has been used to demonstrate the identity that they have been the same person. Once settled, utilizing a computerized identity has been including some sort of validation. This has been an approach to validate that it has been the same person when they have been utilizing digital connections like the Internet (Anthopoulos, 2015). The more important the digital identity has been the more work is required to approve it and set up secure confirmation.

For instance, one could set up the webmail with no approval of their personality other than an email address. Then after that email deliver is used along with password or a secret key to give verification. For something more important, similar to mobile phone services, the transporter ensures them to know the identity and where to send the messages or bills (Angelidou, 2015).

Stronger security is likewise accessible for higher esteem services or data utilizing two-factor confirmation. This has been requiring an individual computerized security device while the login or ID approval process takes place. These devices are normally in view of the smart-card innovation (Cocchia, 2014). This is the computer that includes upgraded security highlights like extraordinary features of security that are ascertained by the smart-card on-the-fly. They have been remarkable for every communication or login. On account of mobile phones, the special smart cards called SIMs inside the numerous mobile phones shield the endorser’s telephone number from fake utilize. They also help to scramble the calls to anticipate intrusion.

For Internet transactions the common business-to-business confirmation inclines toward greater security. The consumers on the other hand access to Web-based administrations tending towards the less secure username or password verification (Angelidou, 2015).

Thus the digital ID is genuinely and well established as a standout amongst the most significant trends of technology in the current world.

The steps that could be undertaken for privacy and security of the digital identity while operating the mobile devices in the current scenario are:

  • Emailing
  • Web Browsing
  • Cloud Services
  • File storing and archiving
  • Location data
  • Wireless services
  1. Emailing:

The email setup is to be revaluated. It must be accepted that all the “free” email and webmail administrations (Gmail and so on) are suspected. However, the trouble with email is that while there have been methods for keeping the substance of messages, the “metadata” that runs with the message can be extremely uncovering (Mulligan & Olsson, 2013). Moreover, there has been no chance to encrypt that, since it is required by the routing system of Internet. The advantage of email is that it is also accessible to most security administrations without any warrant.

  1. Web browsing:

Since the browsing has been presumably what the web clients do most, the program security and protection important to be considered. In case one gets troubled as his clickstream (the log of the visited sites) basically becomes the open property to the extent the security administrations are concerned. Hence one should think about utilizing unreservedly accessible instruments, for example, the Tor Browser. One advantage of it is that it helps in obscuring the clickstream (Lanza et al., 2015). Also, for ensuring against the incredibly audacious endeavors by business organizations to track the online conduct one should, at least, design the program. This must be with the goal that it repulses a significant number of these eventual visitors.

  1. Perspective of the visitor

    Cloud administrations:

The people need to maintain a strategic distance from all cloud administrations like the Dropbox, iCloud, Evernote, and so forth to make it advantageous.  The working presumption should be that anything put away on such systems is possibly accessible for the others. Also, the drawback is that if one entrust data to them, it is ensured to be encrypted.

  1. File storage and chronicling:

This deals with the increasing amount of individuals are investigating is running their very own cloud benefits. This has been done by utilizing items, like PogoPlug and Transporter that give Dropbox-sort offices (Hu et al., 2015). However the disadvantage is that this has been on the web associated drives that one claim and control.

  1. Location data:

The people must abstain from utilizing administrations. For example, this includes the FourSquare that need location information.

  1. Wireless administrations:

One must have the Bluetooth in their mobile phones. They must just switch it on when they unequivocally need to utilize it (Mulligan & Olsson, 2013).  However the disadvantage is that people must be careful with utilizing open Wi-Fi in broad public places.

Conclusion: 

The two case studies of Singapore have been providing an interesting epitome of the approach towards becoming a Smart City. There have been no other instances where the whole nation is changed under any careful plan of the Government. Hence it must be believed to be the unique approach in comparison to the other initiative of Smart Cities across the globe. Taken on the own, the above two initiatives have been small. However, all the sensors have come together to create a platform in the name of virtual Singapore. The data of the whole city has to be kept under a scale model. The flow of water, waste, electricity, movement of every car has been in one single place. After adding in the every output in all the security cameras, crowd-density noise, air-quality measurements and many more a breathing and living city is formed. This approaches at least scaled the modeling of one city. This has been the real dream that every city planners could be thinking of.

References:

Albino, V., Berardi, U., & Dangelico, R. M. (2015). Smart cities: Definitions, dimensions, performance, and initiatives. Journal of Urban Technology, 22(1), 3-21.

Angelidou, M. (2014). Smart city policies: A spatial approach. Cities, 41, S3-S11.

Angelidou, M. (2015). Smart cities: A conjuncture of four forces. Cities, 47, 95-106.

Anthopoulos, L. G. (2015). Understanding the smart city domain: A literature review. In Transforming city governments for successful smart cities (pp. 9-21). Springer International Publishing.

Bhati, A., Hansen, M., & Chan, C. M. (2017). Energy conservation through smart homes in a smart city: A lesson for Singapore households. Energy Policy, 104, 230-239.

Chapter 2: Cybercrime in cloud: Risks and responses in Hong Kong, Singapore [Book]. (2017). Safari. Retrieved 9 August 2017, from https://www.safaribooksonline.com/library/view/the-cloud-security/9780128017807/B9780128015957000021.xhtml

Cocchia, A. (2014). Smart and digital city: A systematic literature review. In Smart city (pp. 13-43). Springer International Publishing.

Dameri, R. P. (2017). Smart City Definition, Goals and Performance. In Smart City Implementation (pp. 1-22). Springer International Publishing.

Dameri, R. P., & Rosenthal-Sabroux, C. (2014). Smart city and value creation. In Smart City (pp. 1-12). Springer International Publishing.

Hu, M. C., Wu, C. Y., & Shih, T. (2015). Creating a new socio-technical regime in China: Evidence from the Sino-Singapore Tianjin Eco-City. Futures, 70, 1-12.

Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M. (2014). An information framework for creating a smart city through internet of things. IEEE Internet of Things Journal, 1(2), 112-121.

Khansari, N., Mostashari, A., & Mansouri, M. (2014). Impacting sustainable behavior and planning in smart city. International journal of sustainable land Use and Urban planning, 1(2).

Ko, R., & Choo, R. (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress.

Lanza, J., Sánchez, L., Muñoz, L., Galache, J. A., Sotres, P., Santana, J. R., & Gutiérrez, V. (2015). Large-scale mobile sensing enabled internet-of-things testbed for smart city services. International Journal of Distributed Sensor Networks, 2015.

Lau, Y. (2015). Cybercrime in cloud: Risks and responses in Hong Kong, Singapore. In Ko, R., & Choo, K.(Eds.). (2015). The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Waltham, MA: Syngress. 

Lim, C., & Mack, V. (2017). Science, Technology and Human Security-Getting Singapore Smart City-ready: MRT Disruptions as a Spur?.

Mulligan, C. E., & Olsson, M. (2013). Architectural implications of smart city business models: An evolutionary perspective. IEEE Communications Magazine, 51(6), 80-85.

Neirotti, P., De Marco, A., Cagliano, A. C., Mangano, G., & Scorrano, F. (2014). Current trends in Smart City initiatives: Some stylised facts. Cities, 38, 25-36.

Niculescu, A. I., & Wadhwa, B. (2015, April). Smart cities in South East Asia: Singapore concepts-an HCI4D perspective. In Proceedings of the ASEAN CHI Symposium’15 (pp. 20-23). ACM.

Ojo, A., Curry, E., & Janowski, T. (2014). Designing next generation smart city initiatives-harnessing findings and lessons from a study of ten smart city programs.

Ojo, A., Curry, E., Janowski, T., & Dzhusupova, Z. (2015). Designing next generation smart city initiatives: The SCID Framework. In Transforming city governments for successful smart cities (pp. 43-67). Springer International Publishing.

Roche, S. (2014). Geographic Information Science I: Why does a smart city need to be spatially enabled?. Progress in Human Geography, 38(5), 703-711.

Shichiyakh, R. A., Klyuchnikov, D. A., Balashova, S. P., Novoselov, S. N., & Novosyolova, N. N. (2016). Smart City as the Basic Construct of the Socio-economic Development of Territories. International Journal of Economics and Financial Issues, 6(1S).

Vanolo, A. (2014). Smartmentality: The smart city as disciplinary strategy. Urban Studies, 51(5), 883-898.

Watts, J. M., & Purnell, N. (2016). Singapore Is Taking the ‘Smart City’to a Whole New Level. The Wall Street J, 24.

Wenge, R., Zhang, X., Dave, C., Chao, L., & Hao, S. (2014). Smart city architecture: A technology guide for implementation and design challenges. China Communications, 11(3), 56-69.

Zubizarreta, I., Seravalli, A., & Arrizabalaga, S. (2015). Smart city concept: What it is and what it should be. Journal of Urban Planning and Development, 142(1), 04015005.