Power
Access to reliable and inexpensive energy is a basic amenity in a city. In Canada, many municipalities’ energy services are provided by an arm’s length company owned by the municipality. These local utility companies typically own and operate low-voltage lines to deliver electricity, and in some cases engage in power generation, and provide conservation, and billing services to consumers. Municipalities are consumers of energy, as well, and need to manage their energy use. Municipal energy dealings can use technological tools to improve energy services for the community, reduce energy costs and power consumption, and improve the city’s environmental impact.
Problems, Applications, and Solutions: Street Lighting
Municipalities select and maintain street lighting to improve street safety for pedestrians and drivers. However, streetlights are generally effective to the extent that people are actively relying on them such as crossing the street after dark. Accordingly, electricity is often wasted on pre-determined static street lighting that is unseen and unused during overnight hours and sparsely populated areas. Modern lighting tools, such as LED lighting, are cheaper to operate than traditional streetlights, but still, much lighting is unnecessary. To reduce such consumption, municipalities are moving towards adaptive streetlights with networked controls that respond to objects in real-time.
Technologies
LED lighting with motion sensors – These LED lights include sensors that detect movements of people, vehicles, and animals and respond in real-time without manual or networked controls. These LED lights which are stand-alone have a range of 1-5-minute timeouts.
LED lighting with computer vision presence detection – These networked LED lights use video cameras and specific computer vision analysis to detect human presence in an area.
LED Light Intensity Control using Light Dependent Resistor (LDR) – The brightness of Street Lights is network controlled using LDR sensors. During daytime or at night, the LDR sensors sense the light intensity and programs the LED to either turn on or off. A dimming function can be incorporated to reduce energy consumption during off-peak hours on appropriate roadways or areas such as highways, downtown areas, or industrial zones.
Automatic LED Intensity Detection and Control using Passive Infrared (PIR) Sensor – The streetlights using PIR Sensor automatically turn on when the sensors detect the human body or heat radiation and turn off when there is no presence detected.
Central management network – A central control system can connect smart streetlight devices to allow the controller to control each luminaire and gather performance data and real-time fault monitoring. The network can use different network configurations depending on the service range and data carrying ability, such as cellular, low power wide area networks (LPWAN), power line carrier, or radio frequency.
Managing Liability Energy Issues
Privacy |
Issues. |
⚠️ Privacy issues may arise where intelligent streetlight solutions can identify an individual using computer vision presence. There is a potential for a greater vulnerability with a large network of connected devices because a single breached device may expose the entire network to unauthorized access. |
Managing Issues. |
✅ De-identify at the source. Many camera technologies allow for faces to be blurred at collection. |
✅ De-identify as soon as possible. Data collected should de-identify persons captured in the process during the collection of information. |
✅ Minimize data collection. This is the minimization of data collection to what is needed or required. Statistical data about optimal times for dimming lights will not require people’s personal information. |
✅ Follow good privacy practices. |
Security |
Issues. |
⚠️ Privacy and security work together. Protecting the privacy of individuals involves ensuring the security of the data collected. |
Managing Issues. |
✅ Many of the same solutions to privacy issues will address security issues: e.g., de-identify at source if possible, or as soon as possible if otherwise. Where personal information is collected, it should be held in a secure location. |
✅ Encryption. Encryption protects personal information by a process of scrambling data so that it can only be accessed with a unique decryption key which will translate the data back into its original readable form. There are several types of encryption algorithms to protect the actual personal information data as well as the channels of communication in which the data travels. |
✅ Authentication. This prevents unauthorized access to the network control of these technologies using processes that verify their clearance to access the data. The level of authentication should commensurate with the risks. Two-factor authentication offers an extra layer of security by requiring two pieces of information, making it more difficult for someone to gain unauthorized access. |
✅ Limit access to data. Physical, organization and technological measures to limit access to data should be in place to only allow access to those who need to handle the information. |
✅ Regular audits and security patches. Where city data is stored on cloud-based servers, the cloud platform should be subject to consistent audits and security patches, with a data recovery strategy in place. |
✅ Regular software updates. Most technologies have routine software updates to prevent hackers and eavesdroppers from loading malicious software that disrupts network data. Security assessments for software should look for risks and vulnerabilities to ensure security approaches are up-to-date, appropriate, and effective. |
✅ Maintenance of Hardware. This prevents a breach of the security parameters on hardware by hackers or thieves. Hardware devices that are identified to be compromised can be isolated until maintenance is performed. |
✅ Security platform. Establishing a security platform that analyzes data, searches for potential indicators of compromise with the capability of implementing security measures such as isolating affected devices. |
✅ Ensure that partners have adequate safeguards. All partners or contractors should have adequate safeguards depending on the sensitivity of the information in their control. |
✅ Follow sound procurement practices. |
Last updated