Skip to main content

Technology: Person Identification

  • Living reference work entry
  • First Online:
Handbook of Smart Cities

Abstract

The goal of Smart City concept is improvement of life quality for citizens and guests of a city. This improvement can be achieved using digital technologies. The implementation of digital technologies allows decreasing usage of resources. All of these provide better ecology, safety, and comfortable life in town. When implementing digital technologies, some risks become lower, but others become more critical, especially concerns for risks of information security. Are modern information technologies ready to be implemented in smart cities from a security point of view? The important part of a security system is access control process. The access control process used data collected from identification and authentication process. In the chapter, the overview and analysis of different identification technologies is provided. All technologies are separated into three main categories depending on object identification object – users of cloud services, infrastructure of a Smart City, and physical identification of citizens and transport. Each part of chapter deals not only with brief overview of a technology, but also with analysis of information security threats and risks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Ahmed, M. E., & Kim, H. (2017, April). DDoS attack mitigation in internet of things using software defined networking. In 2017 IEEE Third International Conference on Big Data Computing Service and Applications (BigDataService) (pp. 271–276). IEEE.

    Google Scholar 

  • Aman, M. N., Chua, K. C., & Sikdar, B. (2017). Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet of Things Journal, 4(5), 1327–1340.

    Google Scholar 

  • Arora, S. (2008). National e-ID card schemes: A European overview. Information Security Technical Report, 13(2), 46–53. https://doi.org/10.1016/j.istr.2008.08.002.

    Article  MathSciNet  Google Scholar 

  • Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15), 2787–2805.

    MATH  Google Scholar 

  • Blazquez, A., Tsiatsis, V., & Vandikas, K. (2015, May). Performance evaluation of OpenID connect for an IoT information marketplace. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring) (pp. 1–6). IEEE.

    Google Scholar 

  • Brian, A. L. A., Arockiam, L., & Malarchelvi, P. D. S. K. (2014). An IOT based secured smart library system with NFC based book tracking. International Journal of Emerging Technology in Computer Science & Electronics (IJETCSE), 11(5):18–21.

    Google Scholar 

  • Bursztein, E., Malyshev, A., Pietraszek, T., & Thomas, K. (2016, October). Picasso: Lightweight device class fingerprinting for web clients. In Proceedings of the 6th workshop on security and privacy in smartphones and mobile devices (pp. 93–102). https://doi.org/10.1145/2994459.2994467.

  • Céspedes, S., Taha, S., & Shen, X. (2013). A multihop-authenticated proxy mobile IP scheme for asymmetric VANETs. IEEE Transactions on Vehicular Technology, 62(7), 3271–3286.

    Google Scholar 

  • Chae, C. J., Choi, K. N., Choi, K., Yae, Y. H., & Shin, Y. (2015). The extended authentication protocol using E-mail authentication in OAuth 2.0 protocol for secure granting of user access. Servir, 16(1), 21–28.

    Google Scholar 

  • Chan, A. C. F., & Zhou, J. (2014). Cyber–physical device authentication for the smart grid electric vehicle ecosystem. IEEE Journal on Selected Areas in Communications, 32(7), 1509–1517.

    Google Scholar 

  • Chen, D., Zhang, N., Qin, Z., Mao, X., Qin, Z., Shen, X., & Li, X. Y. (2016). S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet of Things Journal, 4(1), 88–100.

    Google Scholar 

  • Chim, T. W., Yiu, S. M., Hui, L. C., & Li, V. O. (2011, October). PASS: Privacy-preserving authentication scheme for smart grid network. In 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm) (pp. 196–201). IEEE.

    Google Scholar 

  • Chim, T. W., Yiu, S. M., Li, V. O., Hui, L. C., & Zhong, J. (2014). PRGA: Privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid. IEEE Transactions on Dependable and Secure Computing, 12(1), 85–97.

    Google Scholar 

  • Cho, M., Kim, T., Kim, I. J., & Lee, S. (2020). Relational deep feature learning for heterogeneous face recognition. arXiv preprint arXiv:2003.00697.

    Google Scholar 

  • Choi, Y., Lee, Y., Moon, J., & Won, D. (2017). Security enhanced multi-factor biometric authentication scheme using bio-hash function. PLoS One, 12(5).

    Google Scholar 

  • Chu, F., Zhang, R., Ni, R., & Dai, W. (2013, September). An improved identity authentication scheme for internet of things in heterogeneous networking environments. In 2013 16th International Conference on Network-Based Information Systems (pp. 589–593). IEEE.

    Google Scholar 

  • Chung, Y., Choi, S., Lee, Y., Park, N., & Won, D. (2016). An enhanced lightweight anonymous authentication scheme for a scalable localization roaming service in wireless sensor networks. Sensors, 16(10), 1653.

    Google Scholar 

  • Dalal, N., & Triggs, B. (2005, June). Histograms of oriented gradients for human detection. In 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05) (Vol. 1, pp. 886–893). IEEE. https://doi.org/10.1109/CVPR.2005.177.

  • Das, M. L. (2009). Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.

    Google Scholar 

  • DeCusatis, C., Liengtiraphan, P., Sager, A., & Pinelli, M. (2016, November). Implementing zero trust cloud networks with transport access control and first packet authentication. In 2016 IEEE International Conference on Smart Cloud (SmartCloud) (pp. 5–10). https://doi.org/10.1109/SmartCloud.2016.22.

  • Deng, H., Wang, W., & Peng, C. (2018, October). CEIVE: Combating caller ID spoofing on 4G Mobile phones via Callee-only inference and verification. In Proceedings of the 24th Annual International Conference on Mobile Computing and Networking (pp. 369–384). https://doi.org/10.1145/3241539.3241573.

  • Dolev, S., Krzywiecki, Ł., Panwar, N., & Segal, M. (2016). Vehicle authentication via monolithically certified public key and attributes. Wireless Networks, 22(3), 879–896.

    Google Scholar 

  • Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(2), 228–258.

    Google Scholar 

  • Dubey, A., Vohra, D., Vachhani, K., & Rao, A. (2016, August). Demonstration of vulnerabilities in GSM security with USRP B200 and open-source penetration tools. In 2016 22nd Asia-Pacific Conference on Communications (APCC) (pp. 496–501). https://doi.org/10.1109/APCC.2016.7581461.

  • Durairaj, M., & Muthuramalingam, K. (2018). A new authentication scheme with elliptical curve cryptography for internet of things (IoT) environments. International Journal of Engineering and Technology, 7, 119–124.

    Google Scholar 

  • Eckersley, P. (2010, July). How unique is your web browser? In International Symposium on Privacy Enhancing Technologies Symposium (pp. 1–18). Berlin/Heidelberg: Springer. https://doi.org/10.1007/978-3-642-14527-8_1.

    Chapter  Google Scholar 

  • El-Hajj, M., Chamoun, M., Fadlallah, A., & Serhrouchni, A. (2017a, October). Analysis of authentication techniques in internet of things (IoT). In 2017 1st Cyber Security in Networking Conference (CSNet) (pp. 1–3). IEEE.

    Google Scholar 

  • El-Hajj, M., Chamoun, M., Fadlallah, A., & Serhrouchni, A. (2017b, December). Taxonomy of authentication techniques in Internet of Things (IoT). In 2017 IEEE 15th Student Conference on Research and Development (SCOReD) (pp. 67–71). IEEE.

    Google Scholar 

  • Emerson, S., Choi, Y. K., Hwang, D. Y., Kim, K. S., & Kim, K. H. (2015, October). An OAuth based authentication mechanism for IoT networks. In 2015 International Conference on Information and Communication Technology Convergence (ICTC) (pp. 1072–1074). IEEE.

    Google Scholar 

  • Fan, K., Gong, Y., Liang, C., Li, H., & Yang, Y. (2016). Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks, 9(16), 3095–3104.

    Google Scholar 

  • Fan, K., Song, P., & Yang, Y. (2017). ULMAP: Ultralightweight NFC mutual authentication protocol with pseudonyms in the tag for IoT in 5G. Mobile Information Systems, 2017.

    Google Scholar 

  • Fleuret, F., & Geman, D. (2001). Coarse-to-fine face detection. International Journal of Computer Vision, 41(1-2), 85–107. https://doi.org/10.1023/A:1011113216584.

    Article  MATH  Google Scholar 

  • Fouda, M. M., Fadlullah, Z. M., Kato, N., Lu, R., & Shen, X. (2011, April). Towards a light-weight message authentication mechanism tailored for smart grid communications. In 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 1018–1023). IEEE.

    Google Scholar 

  • Fu, A., Lan, S., Huang, B., Zhu, Z., & Zhang, Y. (2012). A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks. IEEE Communications Letters, 16(11), 1744–1747.

    Google Scholar 

  • Gope, P., & Hwang, T. (2016). A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Transactions on Industrial Electronics, 63(11), 7124–7132.

    Google Scholar 

  • Gope, P., Lee, J., & Quek, T. Q. (2018). Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions. IEEE Transactions on Information Forensics and Security, 13(11), 2831–2843.

    Google Scholar 

  • Grassi, P., Garcia, M., & Fenton, J. (2017). NIST special publication 800-63-3 digital identity guidelines. Los Altos: National Institute of Standards and Technology.

    Google Scholar 

  • Haddad, Z. J., Taha, S., & Saroit, I. A. (2017). Anonymous authentication and location privacy preserving schemes for LTE-A networks. Egyptian Informatics Journal, 18(3), 193–203.

    Google Scholar 

  • Hamidi, H. (2019). An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Future Generation Computer Systems, 91, 434–449.

    Google Scholar 

  • Hammi, M. T., Livolant, E., Bellot, P., Serhrouchni, A., & Minet, P. (2017, June). A lightweight mutual authentication protocol for the IoT. In International Conference on Mobile and Wireless Technology (pp. 3–12). Singapore: Springer.

    Google Scholar 

  • Hern, A. (2017). Hacking risk leads to recall of 500,000 pacemakers due to patient death fears. The Guardian, 31.

    Google Scholar 

  • Huth, C., Zibuschka, J., Duplys, P., & Güneysu, T. (2015, April). Securing systems on the Internet of Things via physical properties of devices and communications. In 2015 Annual IEEE Systems Conference (SysCon) Proceedings (pp. 8–13). IEEE.

    Google Scholar 

  • Ijaz, S., Shah, M. A., Khan, A., & Ahmed, M. (2016). Smart cities: A survey on security concerns. International Journal of Advanced Computer Science and Applications, 7(2), 612–625.

    Google Scholar 

  • Jan, M. A., Khan, F., Alam, M., & Usman, M. (2019). A payload-based mutual authentication scheme for internet of things. Future Generation Computer Systems, 92, 1028–1039.

    Google Scholar 

  • Jansen, W. A., & Grance, T. (2011). Guidelines on security and privacy in public cloud computing. Gaithersburg: U.S. Department of Commerce, National Institute of Standards and Technology.

    Google Scholar 

  • Ji, C., Kim, J., Lee, J. Y., & Hong, M. (2015, October). Review of one-time signatures for multicast authentication in smart grid. In 2015 12th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT) (pp. 1–4). IEEE.

    Google Scholar 

  • Jose, A. C., Malekian, R., & Ye, N. (2016). Improving home automation security; integrating device fingerprinting into smart home. IEEE Access, 4, 5776–5787. https://doi.org/10.1109/ACCESS.2016.2606478.

    Article  Google Scholar 

  • Kokoulin, A. N., Tur, A. I., Yuzhakov, A. A., & Knyazev, A. I. (2019, January). Hierarchical convolutional neural network architecture in distributed facial recognition system. In 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) (pp. 258–262). IEEE. https://doi.org/10.1109/EIConRus.2019.8656727.

  • Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2012, October). A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In 37th Annual IEEE Conference on Local Computer Networks-Workshops (pp. 956–963). IEEE.

    Google Scholar 

  • Kothmayr, T., Schmitt, C., Hu, W., Brünig, M., & Carle, G. (2013). DTLS based security and two-way authentication for the internet of things. Ad Hoc Networks, 11(8), 2710–2723.

    Google Scholar 

  • Kumar, P., Lee, S. G., & Lee, H. J. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12(2), 1625–1647.

    Google Scholar 

  • Kumar, A., Prakash, A., Sharma, S., & Jyoti, K. (2015, September). Vehicle authentication and message hiding protocol for vehicle to vehicle communication. In 2015 1st international conference on next generation computing technologies (NGCT) (pp. 383-387). IEEE.

    Google Scholar 

  • Kumari, S., Li, X., Wu, F., Das, A. K., Arshad, H., & Khan, M. K. (2016). A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Generation Computer Systems, 63, 56–75.

    Google Scholar 

  • Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510.

    Google Scholar 

  • Lai, C., Li, H., Liang, X., Lu, R., Zhang, K., & Shen, X. (2014a). CPAL: A conditional privacy-preserving authentication with access linkability for roaming service. IEEE Internet of Things Journal, 1(1), 46–57.

    Google Scholar 

  • Lai, C., Li, H., Lu, R., Jiang, R., & Shen, X. (2014b, June). SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks. In 2014 IEEE International Conference on Communications (ICC) (pp. 1011–1016). IEEE.

    Google Scholar 

  • Lai, C., Lu, R., Zheng, D., Li, H., & Shen, X. S. (2016). GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications. Computer Networks, 99, 66–81.

    Google Scholar 

  • Lalli, M., & Graphy, G. S. (2017, July). Prediction based dual authentication model for VANET. In 2017 International Conference on Computing Methodologies and Communication (ICCMC) (pp. 693–699). IEEE.

    Google Scholar 

  • Lee, J. Y., Lin, W. C., & Huang, Y. H. (2014, May). A lightweight authentication protocol for internet of things. In 2014 International Symposium on Next-Generation Electronics (ISNE) (pp. 1–2). IEEE.

    Google Scholar 

  • Li, Q., & Cao, G. (2011). Multicast authentication in the smart grid with one-time signature. IEEE Transactions on Smart Grid, 2(4), 686–696.

    Google Scholar 

  • Li, W., & Mitchell, C. J. (2016, July). Analysing the security of Google’s implementation of OpenID connect. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 357–376). Cham: Springer.

    Google Scholar 

  • Li, D., Aung, Z., Williams, J. R., & Sanchez, A. (2012, January). Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis. In 2012 IEEE PES Innovative Smart Grid Technologies (ISGT) (pp. 1–8). IEEE.

    Google Scholar 

  • Li, H., Lu, R., Zhou, L., Yang, B., & Shen, X. (2013). An efficient merkle-tree-based authentication scheme for smart grid. IEEE Systems Journal, 8(2), 655–663.

    Google Scholar 

  • Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security (TISSEC), 8(1), 41–77.

    Google Scholar 

  • Lyu, C., Gu, D., Zeng, Y., & Mohapatra, P. (2015). PBA: Prediction-based authentication for vehicle-to-vehicle communications. IEEE Transactions on Dependable and Secure Computing, 13(1), 71–83.

    Google Scholar 

  • Mahmood, K., Chaudhry, S. A., Naqvi, H., Shon, T., & Ahmad, H. F. (2016). A lightweight message authentication scheme for Smart Grid communications in power sector. Computers & Electrical Engineering, 52, 114–124.

    Google Scholar 

  • Maresch, D., & Gartner, J. (2018). Make disruptive technological change happen: The case of additive manufacturing. Technological Forecasting and Social Change, 155, 119216.

    Google Scholar 

  • McAfee. (2017). McAfee Labs threats report: Technical report. Santa Clara: McAfee.

    Google Scholar 

  • Mowery, K., & Shacham, H. (2012). Pixel perfect: Fingerprinting canvas in HTML5. In: Proceedings of W2SP (pp. 1–12).

    Google Scholar 

  • Muhal, M. A., Luo, X., Mahmood, Z., & Ullah, A. (2018, August). Physical unclonable function based authentication scheme for smart devices in Internet of Things. In 2018 IEEE International Conference on Smart Internet of Things (SmartIoT) (pp. 160–165). IEEE.

    Google Scholar 

  • Mukhopadhyay, D. (2016). PUFs as promising tools for security in Internet of things. IEEE Design & Test, 33(3), 103–115.

    Google Scholar 

  • Mulazzani, M., Reschl, P., Huber, M., Leithner, M., Schrittwieser, S., Weippl, E., & Wien, F. C. (2013, May). Fast and reliable browser identification with JavaScript engine fingerprinting. In Web 2.0 Workshop on Security and Privacy (W2SP) (Vol. 5).

    Google Scholar 

  • Nicanfar, H., Jokar, P., & Leung, V. C. (2011, November). Smart grid authentication and key management for unicast and multicast communications. In 2011 IEEE PES Innovative Smart Grid Technologies (pp. 1–8). IEEE.

    Google Scholar 

  • Nicanfar, H., Jokar, P., Beznosov, K., & Leung, V. C. (2013). Efficient authentication and key management mechanisms for smart grid communications. IEEE Systems Journal, 8(2), 629–640.

    Google Scholar 

  • Recordon, D., & Reed, D. (2006, November). OpenID 2.0: A platform for user-centric identity management. In Proceedings of the Second ACM Workshop on Digital Identity Management (pp. 11–16).

    Google Scholar 

  • Rekik, M., Meddeb-Makhlouf, A., Zarai, F., & Obaidat, M. S. (2017, October). Improved dual authentication and key management techniques in vehicular ad hoc networks. In 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA) (pp. 1133–1140). IEEE.

    Google Scholar 

  • Roberts, B., Akkaya, K., Bulut, E., & Kisacikoglu, M. (2017, October). An authentication framework for electric vehicle-to-electric vehicle charging applications. In 2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS) (pp. 565–569). IEEE.

    Google Scholar 

  • Roblek, V., Meško, M., & Krapež, A. (2016). A complex view of industry 4.0. Sage Open, 6(2). https://doi.org/10.1177/2158244016653987.

  • Ruby, M., Bolme, D. S., Brogan, J., Cornett III, D., Delgado, B., Jager, G., & Srinivas, N. (2020). The Mertens unrolled network (MU-net): A high dynamic range fusion neural network for through the windshield driver recognition. arXiv preprint arXiv:2002.12257.

    Google Scholar 

  • Sbeyti, H., El Hage, B., & Fadlallah, A. (2016). Mobile user signature extraction based on user behavioural pattern (MUSEP). International Journal of Pervasive Computing and Communications, 12, 421–446.

    Google Scholar 

  • Schmitt, C., Noack, M., & Stiller, B. (2016). TinyTO: Two-way authentication for constrained devices in the Internet of Things. In Internet of Things (pp. 239–258). Morgan Kaufmann.

    Google Scholar 

  • Sevcik J, Svoboda P, Paduchova A (2014). Intelligent video surveillance system evaluation methods. International Journal of Systems Applications, Engineering & Development, 8.

    Google Scholar 

  • Shao, J., Lin, X., Lu, R., & Zuo, C. (2015a). A threshold anonymous authentication protocol for VANETs. IEEE Transactions on Vehicular Technology, 65(3), 1711–1720.

    Google Scholar 

  • Shao, J., Lu, R., Lin, X., & Zuo, C. (2015b, November). New threshold anonymous authentication for VANETs. In 2015 IEEE/CIC International Conference on Communications in China (ICCC) (pp. 1–6). IEEE.

    Google Scholar 

  • Srinivas, J., Mukhopadhyay, S., & Mishra, D. (2017). Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks, 54, 147–169.

    Google Scholar 

  • Su, K., Li, J., & Fu, H. (2011, September). Smart city and the applications. In 2011 international conference on electronics, communications and control (ICECC) (pp. 1028–1031). IEEE.

    Google Scholar 

  • Sun, X., Men, S., Zhao, C., & Zhou, Z. (2015). A security authentication scheme in machine-to-machine home network service. Security and Communication Networks, 8(16), 2678–2686.

    Google Scholar 

  • Tangade, S., & Manvi, S. S. (2016, November). Scalable and privacy-preserving authentication protocol for secure vehicular communications. In 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1–6). IEEE.

    Google Scholar 

  • Turkanović, M., Brumen, B., & Hölbl, M. (2014). A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks, 20, 96–112.

    Google Scholar 

  • Tuyls, P., & Batina, L. (2006, February). RFID-tags for anti-counterfeiting. In Cryptographers’ track at the RSA Conference (pp. 115–131). Berlin/Heidelberg: Springer.

    Google Scholar 

  • UNE EN 62676-4:2015. (2015). Video surveillance systems for use in security applications https://www.en-standard.eu/une-en-62676-4-2015-video-surveillance-systems-for-use-in-security-applications-part-4-application-guidelines-endorsed-by-aenor-in-may-of-2015/

  • Uruena, M., & Busquiel, C. (2010). Analysis of a privacy vulnerability in the openid authentication protocol. IEEE Multimedia Communications, Services and Security.

    Google Scholar 

  • Waghmode, R., Gonsalves, R., & Ambawade, D. (2016, May). Security enhancement in group based authentication for VANET. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1436–1441). IEEE.

    Google Scholar 

  • Wu, T. D. (1998, March). The secure remote password protocol. In Proceedings of the Internet Society Symposium on Network and Distributed System Security (Vol. 98, pp. 97–111).

    Google Scholar 

  • Xu, H., Ding, J., Li, P., Zhu, F., & Wang, R. (2018). A lightweight RFID mutual authentication protocol based on physical unclonable function. Sensors, 18(3), 760.

    Google Scholar 

  • Yang, K., Forte, D., & Tehranipoor, M. M. (2015, November). Protecting endpoint devices in IoT supply chain. In 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (pp. 351–356). IEEE.

    Google Scholar 

  • Yang, L., Elisa, N., & Eliot, N. (2019). Privacy and security aspects of E-government in smart cities. In Smart cities cybersecurity and privacy (pp. 89–102). Elsevier.

    Google Scholar 

  • Ye, N., Zhu, Y., Wang, R. C., Malekian, R., & Lin, Q. M. (2014). An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics & Information Sciences, 8, 1617–1624.

    Google Scholar 

  • Zhang, L., Hu, C., Wu, Q., Domingo-Ferrer, J., & Qin, B. (2015). Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. IEEE Transactions on Computers, 65(8), 2562–2574.

    MathSciNet  MATH  Google Scholar 

  • Zhang, L., Wu, Q., Domingo-Ferrer, J., Qin, B., & Hu, C. (2016). Distributed aggregate privacy-preserving authentication in VANETs. IEEE Transactions on Intelligent Transportation Systems, 18(3), 516–526.

    Google Scholar 

  • Zhang, X., Gonnot, T., & Saniie, J. (2017). Real-time face detection and recognition in complex background. Journal of Signal and Information Processing, 8(2), 99–112. https://doi.org/10.4236/jsip.2017.82007.

    Article  Google Scholar 

  • Zhao, M., Yao, X., Liu, H., & Ning, H. (2016, October). Physical unclonable function based authentication protocol for unit IoT and ubiquitous IoT. In 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI) (pp. 179–184). IEEE.

    Google Scholar 

  • Zhu, H., Lin, X., Zhang, Y., & Lu, R. (2015). Duth: A user-friendly dual-factor authentication for Android smartphone devices. Security and Communication Networks, 8(7), 1213–1222.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anton Kamenskih .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Bezukladnikov, I., Kamenskih, A., Tur, A., Kokoulin, A., Yuzhakov, A. (2020). Technology: Person Identification. In: Augusto, J. (eds) Handbook of Smart Cities. Springer, Cham. https://doi.org/10.1007/978-3-030-15145-4_37-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15145-4_37-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15145-4

  • Online ISBN: 978-3-030-15145-4

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics