Abstract
Recently the information and network technologies have been applied to the urban environment. We call this type of a city a ubiquitous-city, or shortly a U-City. Security is an important factor to the success of U-City, by protecting citizen’s private date and by preventing malicious attack to the urban facilities. This paper proposes a U-City Integrated Authentication System (UCIAS), which is a unified authentication model installed in a U-City using the ubiquitous role-based access control protocol—the modified version of the original RBAC protocol. The strong point of UCIAS is fast response time, enhanced scalability and reduced workload, which come from the fact that UCIAS rapidly re-authenticates user inter-domain movements without generating a whole dataset again. We built a simple analytic tool to evaluate UCIAS and the results support our assertion.
Similar content being viewed by others
References
Akyidiz, I. F., & Wang, W. (2002). A dynamic location management scheme for next-generation multitier PCS systems. IEEE Transactions on Wireless Communications, 1(1), 178–189.
Chadwick, D. W., & Otenko, A. (2003). The PERMIS X.509 role based privilege management infrastructure. Future Generation Computer System, 19(2), 277–289.
Chang, H. B., Ma, J., Loke, S. W., Zimmermann, H.-D., & Li, Z. (2011). Intelligent ubiquitous IT policy and its industrial services. Journal of Intelligent Manufacturing, 23(4), 913–915.
Dutta, N., & Misra, I. S. (2011). Fluid flow and random walk mobility model for wireless mobile network research: A review. Journal Advanced Materials Research, 403–408(5), 4486–4494.
Fugkeaw, S., Manpanpanich, P., & Juntapremjitt, S. (2009). Achieving DRBAC authorization in multi-trust domains with MAS architecture and PMI. Lecture Notes in Computer Science.
Guo, X., Chen, C., Du, J., & Li, X. (2008). Design of a cross-domain privilege management prototype system, IEEE.
Jung, C., Shin, Y., Shin, D. H. & Nah, Y. (2009). Study of Security Reference Model of U-City Integrated Operating Center. MMACTEE’09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering.
Kang, S.-Y., Park, J. H., Khan, M. K., & Kwak, J. (2009). Study on the common criteria methodology for secure ubiquitous environment construction. Journal of Intelligent Manufacturing, 23(4), 933–939.
Lee, D.-G., Park, H.-U., & Lee, I.-Y. (2006). Authentication for single/multiple domain using attribute. Ministry of Information and Communication (MIC), Institute for Information Technology Advancement (IITA).
Lee, S.-H. (2006). A method of active IP allocation for secure authentication on the U-City network. Ph. D. Dissertation, Soongsil University.
Ling, A. P. A., & Masao, M. (2011). Selection of model in developing information security criteria for smart grid security system. Journal of Convergence, 2(1), 39–46.
Lopez, J., Montenegro, J. A., & Vivas, J. L. (2005). Specification and design of advanced authentication and authorization services. Computer Standards & Interfaces, 27(5), 467–478.
Luo, H., & Shyu, M.-L. (2011). Quality of service provision in mobile multimedia—A survey. Human-centric Computing and Information Sciences, 1, 5.
Mani Anand, K. P., & Narayanasamy, P. (2008). Converged PKI-based authorization, authentication management and delegation for an E-business. Proceedings The First International Conference on Distributed Framework and Applications, USM, Penang, Malaysia, 121–125.
Nabhen, R., Jamhour, E., & Maziero, C. (2003). RBPIM: A PCIM-based framework for RBAC. 28th Annual IEEE international conference on local computer network.
Oh, J., & Oh, S. (2011). Some aspects of the ubiquitous services on the U-City implementation. In 2011 International conference mobile IT convergence (ICMIC).
Park, J. H., & Lee, D. G. (2007). PIS-CC RBAC: Patient information service based on CC-RBAC in next generation hospital considering ubiquitous intelligent environment. In Multimedia and ubiquitous engineering international conference MUE ’07.
Polito, S. G., & Schulzrinne, H. (2007). Authentication and authorization method in multi-domain, multi-provider networks. In 3rd NGI conference next-generate internet networks (pp. 174–181).
Shin, D.-H. (2009). Ubiquitous city: Urban technologies, urban infrastructure and urban informatics. Journal of Information Science, 35(5), 515–526.
Wang, X., Sang, Y., Liu, Y., & Luo, Y. (2011). Considerations on security and trust measurement for virtualized environment. Journal of Convergence, 2(2), 19–24.
Zhang, D. Y., Cao, X., Wang, L., & Zeng, Y. (2011). Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection. Journal of Intelligent Manufacturing, 23(4), 1351–1364.
Zhu, X., Fang, Y., & Wang, Y. (2009). How to secure multi-domain wireless mesh networks. Computer Science Wireless Networks, 16(5), 1215–1222.
Author information
Authors and Affiliations
Corresponding author
Additional information
This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the Convergence-ITRC (Convergence Information Technology Research Center) support program (NIPA-2012 C6150-1101-0004) supervised by the NIPA (National IT Industry Promotion Agency).
Rights and permissions
About this article
Cite this article
Jang, JS., Lim, HM. Ubiquitous-City Integrated Authentication System (UCIAS). J Intell Manuf 25, 347–355 (2014). https://doi.org/10.1007/s10845-014-0877-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10845-014-0877-8