Skip to main content

Advertisement

Log in

Ubiquitous-City Integrated Authentication System (UCIAS)

  • Published:
Journal of Intelligent Manufacturing Aims and scope Submit manuscript

Abstract

Recently the information and network technologies have been applied to the urban environment. We call this type of a city a ubiquitous-city, or shortly a U-City. Security is an important factor to the success of U-City, by protecting citizen’s private date and by preventing malicious attack to the urban facilities. This paper proposes a U-City Integrated Authentication System (UCIAS), which is a unified authentication model installed in a U-City using the ubiquitous role-based access control protocol—the modified version of the original RBAC protocol. The strong point of UCIAS is fast response time, enhanced scalability and reduced workload, which come from the fact that UCIAS rapidly re-authenticates user inter-domain movements without generating a whole dataset again. We built a simple analytic tool to evaluate UCIAS and the results support our assertion.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  • Akyidiz, I. F., & Wang, W. (2002). A dynamic location management scheme for next-generation multitier PCS systems. IEEE Transactions on Wireless Communications, 1(1), 178–189.

    Google Scholar 

  • Chadwick, D. W., & Otenko, A. (2003). The PERMIS X.509 role based privilege management infrastructure. Future Generation Computer System, 19(2), 277–289.

    Google Scholar 

  • Chang, H. B., Ma, J., Loke, S. W., Zimmermann, H.-D., & Li, Z. (2011). Intelligent ubiquitous IT policy and its industrial services. Journal of Intelligent Manufacturing, 23(4), 913–915.

    Google Scholar 

  • Dutta, N., & Misra, I. S. (2011). Fluid flow and random walk mobility model for wireless mobile network research: A review. Journal Advanced Materials Research, 403–408(5), 4486–4494.

    Article  Google Scholar 

  • Fugkeaw, S., Manpanpanich, P., & Juntapremjitt, S. (2009). Achieving DRBAC authorization in multi-trust domains with MAS architecture and PMI. Lecture Notes in Computer Science.

  • Guo, X., Chen, C., Du, J., & Li, X. (2008). Design of a cross-domain privilege management prototype system, IEEE.

  • Jung, C., Shin, Y., Shin, D. H. & Nah, Y. (2009). Study of Security Reference Model of U-City Integrated Operating Center. MMACTEE’09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering.

  • Kang, S.-Y., Park, J. H., Khan, M. K., & Kwak, J. (2009). Study on the common criteria methodology for secure ubiquitous environment construction. Journal of Intelligent Manufacturing, 23(4), 933–939.

    Google Scholar 

  • Lee, D.-G., Park, H.-U., & Lee, I.-Y. (2006). Authentication for single/multiple domain using attribute. Ministry of Information and Communication (MIC), Institute for Information Technology Advancement (IITA).

  • Lee, S.-H. (2006). A method of active IP allocation for secure authentication on the U-City network. Ph. D. Dissertation, Soongsil University.

  • Ling, A. P. A., & Masao, M. (2011). Selection of model in developing information security criteria for smart grid security system. Journal of Convergence, 2(1), 39–46.

    Google Scholar 

  • Lopez, J., Montenegro, J. A., & Vivas, J. L. (2005). Specification and design of advanced authentication and authorization services. Computer Standards & Interfaces, 27(5), 467–478.

    Article  Google Scholar 

  • Luo, H., & Shyu, M.-L. (2011). Quality of service provision in mobile multimedia—A survey. Human-centric Computing and Information Sciences, 1, 5.

    Article  Google Scholar 

  • Mani Anand, K. P., & Narayanasamy, P. (2008). Converged PKI-based authorization, authentication management and delegation for an E-business. Proceedings The First International Conference on Distributed Framework and Applications, USM, Penang, Malaysia, 121–125.

  • Nabhen, R., Jamhour, E., & Maziero, C. (2003). RBPIM: A PCIM-based framework for RBAC. 28th Annual IEEE international conference on local computer network.

  • Oh, J., & Oh, S. (2011). Some aspects of the ubiquitous services on the U-City implementation. In 2011 International conference mobile IT convergence (ICMIC).

  • Park, J. H., & Lee, D. G. (2007). PIS-CC RBAC: Patient information service based on CC-RBAC in next generation hospital considering ubiquitous intelligent environment. In Multimedia and ubiquitous engineering international conference MUE ’07.

  • Polito, S. G., & Schulzrinne, H. (2007). Authentication and authorization method in multi-domain, multi-provider networks. In 3rd NGI conference next-generate internet networks (pp. 174–181).

  • Shin, D.-H. (2009). Ubiquitous city: Urban technologies, urban infrastructure and urban informatics. Journal of Information Science, 35(5), 515–526.

    Article  Google Scholar 

  • Wang, X., Sang, Y., Liu, Y., & Luo, Y. (2011). Considerations on security and trust measurement for virtualized environment. Journal of Convergence, 2(2), 19–24.

    Google Scholar 

  • Zhang, D. Y., Cao, X., Wang, L., & Zeng, Y. (2011). Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection. Journal of Intelligent Manufacturing, 23(4), 1351–1364.

    Google Scholar 

  • Zhu, X., Fang, Y., & Wang, Y. (2009). How to secure multi-domain wireless mesh networks. Computer Science Wireless Networks, 16(5), 1215–1222.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hyung-Min Lim.

Additional information

This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the Convergence-ITRC (Convergence Information Technology Research Center) support program (NIPA-2012 C6150-1101-0004) supervised by the NIPA (National IT Industry Promotion Agency).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jang, JS., Lim, HM. Ubiquitous-City Integrated Authentication System (UCIAS). J Intell Manuf 25, 347–355 (2014). https://doi.org/10.1007/s10845-014-0877-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10845-014-0877-8

Keywords

Navigation