eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security

  • Francesco Buccafurri
  • Gianluca Lax
  • Serena Nicolazzo
  • Antonino Nocera
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 189)

Abstract

The European regulation eIDAS introduces in EU States interoperable public digital identity systems whose native application is secure authentication on online services. In this paper, we try to offer an enhanced view of the potential benefits that such systems can have in our physical environments. Indeed, cities have seen a dramatic increase in the number of violent acts and crimes. The possibility of monitoring people access to physical critical places is certainly an important issue because this gives the possibility to deny the access to dangerous people, to find the offender of a crime, and, in general, to track suspicions activities. In this paper, we show how to exploit an eIDAS-compliant public digital identity system to meet the above requirements, thus offering a concrete solution with high level of interoperability.

Keywords

Urban security Public digital identity eIDAS SPID Critical environments Physical access control 

References

  1. 1.
    Buccafurri, F., Lax, G., Nocera, A., Ursino, D.: Discovering missing me edges across social networks. Inform. Sci. 319, 18–37 (2015)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Jara, A.J., Genoud, D., Bocchi, Y.: Big data in smart cities: from poisson to human dynamics. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops, AINA 2014 Workshops, Victoria, BC, Canada, 13–16 May 2014, pp. 785–790 (2014)Google Scholar
  3. 3.
    Anttiroiko, A., Valkama, P., Bailey, S.J.: Smart cities in the new service economy: building platforms for smart services. AI Soc. 29(3), 323–334 (2014)CrossRefGoogle Scholar
  4. 4.
    Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Comparing twitter and facebook user behavior: privacy and other aspects. Comput. Hum. Behav. 52, 87–95 (2015)CrossRefGoogle Scholar
  5. 5.
    European Union: Regulation EU No 910/2014 of the European Parliament and of the Council, 23 July 2014. http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX%3A32014R0910&from=EN
  6. 6.
    European Union: Regulation EU No 910/2014 of the European Parliament and of the Council, 23 July 2014. http://ec.europa.eu/growth/tools-databases/tris/en/index.cfm/search/?trisaction=search.detail&year=2014&num=295&dLang=EN
  7. 7.
    Leitold, H.: Challenges of eID interoperability: the STORK project. In: Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IFIP AICT, vol. 352, pp. 144–150. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-20769-3_12 CrossRefGoogle Scholar
  8. 8.
    Cuijpers, C., Schroers, J.: eidas as guideline for the development of a pan European eid framework in futureid. In: Open Identity Summit 2014. vol. 237, pp. 23–38. Gesellschaft für Informatik (2014)Google Scholar
  9. 9.
    Edwards, A., Hughes, G., Lord, N.: Urban security in Europe: translating a concept in public criminology. Europ. J. Criminol. 10(3), 260–283 (2013)CrossRefGoogle Scholar
  10. 10.
    Zhang, R., Shi, J., Zhang, Y., Zhang, C.: Verifiable privacy-preserving aggregation in people-centric urban sensing systems. IEEE J. Sel. Areas Commun. 31(9), 268–278 (2013)CrossRefGoogle Scholar
  11. 11.
    Krontiris, I., Freiling, F.C., Dimitriou, T.: Location privacy in urban sensing networks: research challenges and directions (security and privacy in emerging wireless networks). IEEE Wirel. Commun. 17(5) (2010)Google Scholar
  12. 12.
    Niu, B., Zhu, X., Chi, H., Li, H.: Privacy and authentication protocol for mobile RFID systems. Wireless Pers. Commun. 77(3), 1713–1731 (2014)CrossRefGoogle Scholar
  13. 13.
    Forget, A., Chiasson, S., Biddle, R.: Towards supporting a diverse ecosystem of authentication schemes. In: Symposium on Usable Privacy and Security (Soups) (2014)Google Scholar
  14. 14.
    Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1), 383–396 (2013)CrossRefGoogle Scholar
  15. 15.
    Habibi, M.H., Aref, M.R.: Security and privacy analysis of song-mitchell RFID authentication protocol. Wireless Pers. Commun. 69(4), 1583–1596 (2013)CrossRefGoogle Scholar
  16. 16.
    Wikipedia: Security Assertion Markup Language – Wikipedia, The Free Encyclopedia (2016). https://en.wikipedia.org/w/index.php?title=Security_Assertion_Markup_Language&oldid=747644307
  17. 17.
    Security, H.J.H.: Visa Waiver Program Improvement and Terrorist Travel Prevention (2016). https://www.congress.gov/bill/114th-congress/house-bill/158/text
  18. 18.
    Miller, B.A., Bisdikian, C.: Bluetooth Revealed: The Insider’s Guide to an Open Specification for Global Wireless Communication. Prentice Hall PTR, New Jersey (2001)Google Scholar
  19. 19.
    Bluetooth, S.: Bluetooth Specification (2017). https://www.bluetooth.com/specifications/bluetooth-core-specification
  20. 20.
    Soon, T.J.: Qr code. Synth. J. 2008, 59–78 (2008)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  • Francesco Buccafurri
    • 1
  • Gianluca Lax
    • 1
  • Serena Nicolazzo
    • 1
  • Antonino Nocera
    • 1
  1. 1.DIIESUniversity Mediterranea of Reggio CalabriaReggio CalabriaItaly

Personalised recommendations