Abstract
The goal of Smart City concept is improvement of life quality for citizens and guests of a city. This improvement can be achieved using digital technologies. The implementation of digital technologies allows decreasing usage of resources. All of these provide better ecology, safety, and comfortable life in town. When implementing digital technologies, some risks become lower, but others become more critical, especially concerns for risks of information security. Are modern information technologies ready to be implemented in smart cities from a security point of view? The important part of a security system is access control process. The access control process used data collected from identification and authentication process. In the chapter, the overview and analysis of different identification technologies is provided. All technologies are separated into three main categories depending on object identification object – users of cloud services, infrastructure of a Smart City, and physical identification of citizens and transport. Each part of chapter deals not only with brief overview of a technology, but also with analysis of information security threats and risks.
References
Ahmed, M. E., & Kim, H. (2017, April). DDoS attack mitigation in internet of things using software defined networking. In 2017 IEEE Third International Conference on Big Data Computing Service and Applications (BigDataService) (pp. 271–276). IEEE.
Aman, M. N., Chua, K. C., & Sikdar, B. (2017). Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet of Things Journal, 4(5), 1327–1340.
Arora, S. (2008). National e-ID card schemes: A European overview. Information Security Technical Report, 13(2), 46–53. https://doi.org/10.1016/j.istr.2008.08.002.
Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.
Blazquez, A., Tsiatsis, V., & Vandikas, K. (2015, May). Performance evaluation of OpenID connect for an IoT information marketplace. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring) (pp. 1–6). IEEE.
Brian, A. L. A., Arockiam, L., & Malarchelvi, P. D. S. K. (2014). An IOT based secured smart library system with NFC based book tracking. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), 11(5):18–21.
Bursztein, E., Malyshev, A., Pietraszek, T., & Thomas, K. (2016, October). Picasso: Lightweight device class fingerprinting for web clients. In Proceedings of the 6th workshop on security and privacy in smartphones and mobile devices (pp. 93–102). https://doi.org/10.1145/2994459.2994467.
Céspedes, S., Taha, S., & Shen, X. (2013). A multihop-authenticated proxy mobile IP scheme for asymmetric VANETs. IEEE Transactions on Vehicular Technology, 62(7), 3271–3286.
Chae, C. J., Choi, K. N., Choi, K., Yae, Y. H., & Shin, Y. (2015). The extended authentication protocol using E-mail authentication in OAuth 2.0 protocol for secure granting of user access. Servir, 16(1), 21–28.
Chan, A. C. F., & Zhou, J. (2014). Cyber–physical device authentication for the smart grid electric vehicle ecosystem. IEEE Journal on Selected Areas in Communications, 32(7), 1509–1517.
Chen, D., Zhang, N., Qin, Z., Mao, X., Qin, Z., Shen, X., & Li, X. Y. (2016). S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet of Things Journal, 4(1), 88–100.
Chim, T. W., Yiu, S. M., Hui, L. C., & Li, V. O. (2011, October). PASS: Privacy-preserving authentication scheme for smart grid network. In 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm) (pp. 196–201). IEEE.
Chim, T. W., Yiu, S. M., Li, V. O., Hui, L. C., & Zhong, J. (2014). PRGA: Privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid. IEEE Transactions on Dependable and Secure Computing, 12(1), 85–97.
Cho, M., Kim, T., Kim, I. J., & Lee, S. (2020). Relational deep feature learning for heterogeneous face recognition. arXiv preprint arXiv:2003.00697.
Choi, Y., Lee, Y., Moon, J., & Won, D. (2017). Security enhanced multi-factor biometric authentication scheme using bio-hash function. PLoS One, 12(5).
Chu, F., Zhang, R., Ni, R., & Dai, W. (2013, September). An improved identity authentication scheme for internet of things in heterogeneous networking environments. In 2013 16th International Conference on Network-Based Information Systems (pp. 589–593). IEEE.
Chung, Y., Choi, S., Lee, Y., Park, N., & Won, D. (2016). An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653.
Dalal, N., & Triggs, B. (2005, June). Histograms of oriented gradients for human detection. In 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05) (Vol. 1, pp. 886–893). IEEE. https://doi.org/10.1109/CVPR.2005.177.
Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
DeCusatis, C., Liengtiraphan, P., Sager, A., & Pinelli, M. (2016, November). Implementing zero trust cloud networks with transport access control and first packet authentication. In 2016 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 5–10). https://doi.org/10.1109/SmartCloud.2016.22.
Deng, H., Wang, W., & Peng, C. (2018, October). CEIVE: Combating caller ID spoofing on 4G Mobile phones via Callee-only inference and verification. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (pp. 369–384). https://doi.org/10.1145/3241539.3241573.
Dolev, S., Krzywiecki, Ł., Panwar, N., & Segal, M. (2016). Vehicle authentication via monolithically certified public key and attributes. Wireless Networks, 22(3), 879–896.
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228–258.
Dubey, A., Vohra, D., Vachhani, K., & Rao, A. (2016, August). Demonstration of vulnerabilities in GSM security with USRP B200 and open-source penetration tools. In 2016 22nd Asia-Pacific Conference on Communications (APCC) (pp. 496–501). https://doi.org/10.1109/APCC.2016.7581461.
Durairaj, M., & Muthuramalingam, K. (2018). A new authentication scheme with elliptical curve cryptography for internet of things (IoT) environments. International Journal of Engineering and Technology, 7, 119–124.
Eckersley, P. (2010, July). How unique is your web browser? In International Symposium on Privacy Enhancing Technologies Symposium (pp. 1–18). Berlin/Heidelberg: Springer. https://doi.org/10.1007/978-3-642-14527-8_1.
El-Hajj, M., Chamoun, M., Fadlallah, A., & Serhrouchni, A. (2017a, October). Analysis of authentication techniques in internet of things (IoT). In 2017 1st Cyber Security in Networking Conference (CSNet) (pp. 1–3). IEEE.
El-Hajj, M., Chamoun, M., Fadlallah, A., & Serhrouchni, A. (2017b, December). Taxonomy of authentication techniques in Internet of Things (IoT). In 2017 IEEE 15th Student Conference on Research and Development (SCOReD) (pp. 67–71). IEEE.
Emerson, S., Choi, Y. K., Hwang, D. Y., Kim, K. S., & Kim, K. H. (2015, October). An OAuth based authentication mechanism for IoT networks. In 2015 International Conference on Information and Communication Technology Convergence (ICTC) (pp. 1072–1074). IEEE.
Fan, K., Gong, Y., Liang, C., Li, H., & Yang, Y. (2016). Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks, 9(16), 3095–3104.
Fan, K., Song, P., & Yang, Y. (2017). ULMAP: Ultralightweight NFC mutual authentication protocol with pseudonyms in the tag for IoT in 5G. Mobile Information Systems, 2017.
Fleuret, F., & Geman, D. (2001). Coarse-to-fine face detection. International Journal of Computer Vision, 41(1-2), 85–107. https://doi.org/10.1023/A:1011113216584.
Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011, April). Towards a light-weight message authentication mechanism tailored for smart grid communications. In 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 1018–1023). IEEE.
Fu, A., Lan, S., Huang, B., Zhu, Z., & Zhang, Y. (2012). A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks. IEEE Communications Letters, 16(11), 1744–1747.
Gope, P., & Hwang, T. (2016). A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics, 63(11), 7124–7132.
Gope, P., Lee, J., & Quek, T. Q. (2018). Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Transactions on Information Forensics and Security, 13(11), 2831–2843.
Grassi, P., Garcia, M., & Fenton, J. (2017). NIST special publication 800-63-3 digital identity guidelines. Los Altos: National Institute of Standards and Technology.
Haddad, Z. J., Taha, S., & Saroit, I. A. (2017). Anonymous authentication and location privacy preserving schemes for LTE-A networks. Egyptian Informatics Journal, 18(3), 193–203.
Hamidi, H. (2019). An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Future Generation Computer Systems, 91, 434–449.
Hammi, M. T., Livolant, E., Bellot, P., Serhrouchni, A., & Minet, P. (2017, June). A lightweight mutual authentication protocol for the IoT. In International Conference on Mobile and Wireless Technology (pp. 3–12). Singapore: Springer.
Hern, A. (2017). Hacking risk leads to recall of 500,000 pacemakers due to patient death fears. The Guardian, 31.
Huth, C., Zibuschka, J., Duplys, P., & Güneysu, T. (2015, April). Securing systems on the Internet of Things via physical properties of devices and communications. In 2015 Annual IEEE Systems Conference (SysCon) Proceedings (pp. 8–13). IEEE.
Ijaz, S., Shah, M. A., Khan, A., & Ahmed, M. (2016). Smart cities: A survey on security concerns. International Journal of Advanced Computer Science and Applications, 7(2), 612–625.
Jan, M. A., Khan, F., Alam, M., & Usman, M. (2019). A payload-based mutual authentication scheme for internet of things. Future Generation Computer Systems, 92, 1028–1039.
Jansen, W. A., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. Gaithersburg: U.S. Department of Commerce, National Institute of Standards and Technology.
Ji, C., Kim, J., Lee, J. Y., & Hong, M. (2015, October). Review of one-time signatures for multicast authentication in smart grid. In 2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT) (pp. 1–4). IEEE.
Jose, A. C., Malekian, R., & Ye, N. (2016). Improving home automation security; integrating device fingerprinting into smart home. IEEE Access, 4, 5776–5787. https://doi.org/10.1109/ACCESS.2016.2606478.
Kokoulin, A. N., Tur, A. I., Yuzhakov, A. A., & Knyazev, A. I. (2019, January). Hierarchical convolutional neural network architecture in distributed facial recognition system. In 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 258–262). IEEE. https://doi.org/10.1109/EIConRus.2019.8656727.
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2012, October). A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In 37th Annual IEEE Conference on Local Computer Networks-Workshops (pp. 956–963). IEEE.
Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2013). DTLS based security and two-way authentication for the internet of things. Ad Hoc Networks, 11(8), 2710–2723.
Kumar, P., Lee, S. G., & Lee, H. J. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625–1647.
Kumar, A., Prakash, A., Sharma, S., & Jyoti, K. (2015, September). Vehicle authentication and message hiding protocol for vehicle to vehicle communication. In 2015 1st international conference on next generation computing technologies (NGCT) (pp. 383-387). IEEE.
Kumari, S., Li, X., Wu, F., Das, A. K., Arshad, H., & Khan, M. K. (2016). A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems, 63, 56–75.
Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510.
Lai, C., Li, H., Liang, X., Lu, R., Zhang, K., & Shen, X. (2014a). CPAL: A conditional privacy-preserving authentication with access linkability for roaming service. IEEE Internet of Things Journal, 1(1), 46–57.
Lai, C., Li, H., Lu, R., Jiang, R., & Shen, X. (2014b, June). SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks. In 2014 IEEE International Conference on Communications (ICC) (pp. 1011–1016). IEEE.
Lai, C., Lu, R., Zheng, D., Li, H., & Shen, X. S. (2016). GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Computer Networks, 99, 66–81.
Lalli, M., & Graphy, G. S. (2017, July). Prediction based dual authentication model for VANET. In 2017 International Conference on Computing Methodologies and Communication (ICCMC) (pp. 693–699). IEEE.
Lee, J. Y., Lin, W. C., & Huang, Y. H. (2014, May). A lightweight authentication protocol for internet of things. In 2014 International Symposium on Next-Generation Electronics (ISNE) (pp. 1–2). IEEE.
Li, Q., & Cao, G. (2011). Multicast authentication in the smart grid with one-time signature. IEEE Transactions on Smart Grid, 2(4), 686–696.
Li, W., & Mitchell, C. J. (2016, July). Analysing the security of Google’s implementation of OpenID connect. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 357–376). Cham: Springer.
Li, D., Aung, Z., Williams, J. R., & Sanchez, A. (2012, January). Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis. In 2012 IEEE PES Innovative Smart Grid Technologies (ISGT) (pp. 1–8). IEEE.
Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2013). An efficient merkle-tree-based authentication scheme for smart grid. IEEE Systems Journal, 8(2), 655–663.
Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.
Lyu, C., Gu, D., Zeng, Y., & Mohapatra, P. (2015). PBA: Prediction-based authentication for vehicle-to-vehicle communications. IEEE Transactions on Dependable and Secure Computing, 13(1), 71–83.
Mahmood, K., Chaudhry, S. A., Naqvi, H., Shon, T., & Ahmad, H. F. (2016). A lightweight message authentication scheme for Smart Grid communications in power sector. Computers & Electrical Engineering, 52, 114–124.
Maresch, D., & Gartner, J. (2018). Make disruptive technological change happen: The case of additive manufacturing. Technological Forecasting and Social Change, 155, 119216.
McAfee. (2017). McAfee Labs threats report: Technical report. Santa Clara: McAfee.
Mowery, K., & Shacham, H. (2012). Pixel perfect: Fingerprinting canvas in HTML5. In: Proceedings of W2SP (pp. 1–12).
Muhal, M. A., Luo, X., Mahmood, Z., & Ullah, A. (2018, August). Physical unclonable function based authentication scheme for smart devices in Internet of Things. In 2018 IEEE International Conference on Smart Internet of Things (SmartIoT) (pp. 160–165). IEEE.
Mukhopadhyay, D. (2016). PUFs as promising tools for security in Internet of things. IEEE Design & Test, 33(3), 103–115.
Mulazzani, M., Reschl, P., Huber, M., Leithner, M., Schrittwieser, S., Weippl, E., & Wien, F. C. (2013, May). Fast and reliable browser identification with JavaScript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP) (Vol. 5).
Nicanfar, H., Jokar, P., & Leung, V. C. (2011, November). Smart grid authentication and key management for unicast and multicast communications. In 2011 IEEE PES Innovative Smart Grid Technologies (pp. 1–8). IEEE.
Nicanfar, H., Jokar, P., Beznosov, K., & Leung, V. C. (2013). Efficient authentication and key management mechanisms for smart grid communications. IEEE Systems Journal, 8(2), 629–640.
Recordon, D., & Reed, D. (2006, November). OpenID 2.0: A platform for user-centric identity management. In Proceedings of the Second ACM Workshop on Digital Identity Management (pp. 11–16).
Rekik, M., Meddeb-Makhlouf, A., Zarai, F., & Obaidat, M. S. (2017, October). Improved dual authentication and key management techniques in vehicular ad hoc networks. In 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) (pp. 1133–1140). IEEE.
Roberts, B., Akkaya, K., Bulut, E., & Kisacikoglu, M. (2017, October). An authentication framework for electric vehicle-to-electric vehicle charging applications. In 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) (pp. 565–569). IEEE.
Roblek, V., Meško, M., & Krapež, A. (2016). A complex view of industry 4.0. Sage Open, 6(2). https://doi.org/10.1177/2158244016653987.
Ruby, M., Bolme, D. S., Brogan, J., Cornett III, D., Delgado, B., Jager, G., & Srinivas, N. (2020). The Mertens unrolled network (MU-net): A high dynamic range fusion neural network for through the windshield driver recognition. arXiv preprint arXiv:2002.12257.
Sbeyti, H., El Hage, B., & Fadlallah, A. (2016). Mobile user signature extraction based on user behavioural pattern (MUSEP). International Journal of Pervasive Computing and Communications, 12, 421–446.
Schmitt, C., Noack, M., & Stiller, B. (2016). TinyTO: Two-way authentication for constrained devices in the Internet of Things. In Internet of Things (pp. 239–258). Morgan Kaufmann.
Sevcik J, Svoboda P, Paduchova A (2014). Intelligent video surveillance system evaluation methods. International Journal of Systems Applications, Engineering & Development, 8.
Shao, J., Lin, X., Lu, R., & Zuo, C. (2015a). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.
Shao, J., Lu, R., Lin, X., & Zuo, C. (2015b, November). New threshold anonymous authentication for VANETs. In 2015 IEEE/CIC International Conference on Communications in China (ICCC) (pp. 1–6). IEEE.
Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169.
Su, K., Li, J., & Fu, H. (2011, September). Smart city and the applications. In 2011 international conference on electronics, communications and control (ICECC) (pp. 1028–1031). IEEE.
Sun, X., Men, S., Zhao, C., & Zhou, Z. (2015). A security authentication scheme in machine-to-machine home network service. Security and Communication Networks, 8(16), 2678–2686.
Tangade, S., & Manvi, S. S. (2016, November). Scalable and privacy-preserving authentication protocol for secure vehicular communications. In 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1–6). IEEE.
Turkanović, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks, 20, 96–112.
Tuyls, P., & Batina, L. (2006, February). RFID-tags for anti-counterfeiting. In Cryptographers’ track at the RSA Conference (pp. 115–131). Berlin/Heidelberg: Springer.
UNE EN 62676-4:2015. (2015). Video surveillance systems for use in security applications https://www.en-standard.eu/une-en-62676-4-2015-video-surveillance-systems-for-use-in-security-applications-part-4-application-guidelines-endorsed-by-aenor-in-may-of-2015/
Uruena, M., & Busquiel, C. (2010). Analysis of a privacy vulnerability in the openid authentication protocol. IEEE Multimedia Communications, Services and Security.
Waghmode, R., Gonsalves, R., & Ambawade, D. (2016, May). Security enhancement in group based authentication for VANET. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1436–1441). IEEE.
Wu, T. D. (1998, March). The secure remote password protocol. In Proceedings of the Internet Society Symposium on Network and Distributed System Security (Vol. 98, pp. 97–111).
Xu, H., Ding, J., Li, P., Zhu, F., & Wang, R. (2018). A lightweight RFID mutual authentication protocol based on physical unclonable function. Sensors, 18(3), 760.
Yang, K., Forte, D., & Tehranipoor, M. M. (2015, November). Protecting endpoint devices in IoT supply chain. In 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (pp. 351–356). IEEE.
Yang, L., Elisa, N., & Eliot, N. (2019). Privacy and security aspects of E-government in smart cities. In Smart cities cybersecurity and privacy (pp. 89–102). Elsevier.
Ye, N., Zhu, Y., Wang, R. C., Malekian, R., & Lin, Q. M. (2014). An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics & Information Sciences, 8, 1617–1624.
Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., & Qin, B. (2015). Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8), 2562–2574.
Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., & Hu, C. (2016). Distributed aggregate privacy-preserving authentication in VANETs. IEEE Transactions on Intelligent Transportation Systems, 18(3), 516–526.
Zhang, X., Gonnot, T., & Saniie, J. (2017). Real-time face detection and recognition in complex background. Journal of Signal and Information Processing, 8(2), 99–112. https://doi.org/10.4236/jsip.2017.82007.
Zhao, M., Yao, X., Liu, H., & Ning, H. (2016, October). Physical unclonable function based authentication protocol for unit IoT and ubiquitous IoT. In 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI) (pp. 179–184). IEEE.
Zhu, H., Lin, X., Zhang, Y., & Lu, R. (2015). Duth: A user-friendly dual-factor authentication for Android smartphone devices. Security and Communication Networks, 8(7), 1213–1222.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this entry
Cite this entry
Bezukladnikov, I., Kamenskih, A., Tur, A., Kokoulin, A., Yuzhakov, A. (2020). Technology: Person Identification. In: Augusto, J. (eds) Handbook of Smart Cities. Springer, Cham. https://doi.org/10.1007/978-3-030-15145-4_37-1
Download citation
DOI: https://doi.org/10.1007/978-3-030-15145-4_37-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-15145-4
Online ISBN: 978-3-030-15145-4
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering