Skip to main content

eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security

  • Conference paper
  • First Online:
Cloud Infrastructures, Services, and IoT Systems for Smart Cities (IISSC 2017, CN4IoT 2017)

Abstract

The European regulation eIDAS introduces in EU States interoperable public digital identity systems whose native application is secure authentication on online services. In this paper, we try to offer an enhanced view of the potential benefits that such systems can have in our physical environments. Indeed, cities have seen a dramatic increase in the number of violent acts and crimes. The possibility of monitoring people access to physical critical places is certainly an important issue because this gives the possibility to deny the access to dangerous people, to find the offender of a crime, and, in general, to track suspicions activities. In this paper, we show how to exploit an eIDAS-compliant public digital identity system to meet the above requirements, thus offering a concrete solution with high level of interoperability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The currently standardized biometrics used for this type of identification system are facial recognition, fingerprint recognition, and iris recognition. Biometric identification is adopted in many countries: for example, in USA, beginning on April 1, 2016, the electronic passport contains relevant biometric information [17].

References

  1. Buccafurri, F., Lax, G., Nocera, A., Ursino, D.: Discovering missing me edges across social networks. Inform. Sci. 319, 18–37 (2015)

    Article  MathSciNet  Google Scholar 

  2. Jara, A.J., Genoud, D., Bocchi, Y.: Big data in smart cities: from poisson to human dynamics. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops, AINA 2014 Workshops, Victoria, BC, Canada, 13–16 May 2014, pp. 785–790 (2014)

    Google Scholar 

  3. Anttiroiko, A., Valkama, P., Bailey, S.J.: Smart cities in the new service economy: building platforms for smart services. AI Soc. 29(3), 323–334 (2014)

    Article  Google Scholar 

  4. Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Comparing twitter and facebook user behavior: privacy and other aspects. Comput. Hum. Behav. 52, 87–95 (2015)

    Article  Google Scholar 

  5. European Union: Regulation EU No 910/2014 of the European Parliament and of the Council, 23 July 2014. http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX%3A32014R0910&from=EN

  6. European Union: Regulation EU No 910/2014 of the European Parliament and of the Council, 23 July 2014. http://ec.europa.eu/growth/tools-databases/tris/en/index.cfm/search/?trisaction=search.detail&year=2014&num=295&dLang=EN

  7. Leitold, H.: Challenges of eID interoperability: the STORK project. In: Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IFIP AICT, vol. 352, pp. 144–150. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20769-3_12

    Chapter  Google Scholar 

  8. Cuijpers, C., Schroers, J.: eidas as guideline for the development of a pan European eid framework in futureid. In: Open Identity Summit 2014. vol. 237, pp. 23–38. Gesellschaft für Informatik (2014)

    Google Scholar 

  9. Edwards, A., Hughes, G., Lord, N.: Urban security in Europe: translating a concept in public criminology. Europ. J. Criminol. 10(3), 260–283 (2013)

    Article  Google Scholar 

  10. Zhang, R., Shi, J., Zhang, Y., Zhang, C.: Verifiable privacy-preserving aggregation in people-centric urban sensing systems. IEEE J. Sel. Areas Commun. 31(9), 268–278 (2013)

    Article  Google Scholar 

  11. Krontiris, I., Freiling, F.C., Dimitriou, T.: Location privacy in urban sensing networks: research challenges and directions (security and privacy in emerging wireless networks). IEEE Wirel. Commun. 17(5) (2010)

    Google Scholar 

  12. Niu, B., Zhu, X., Chi, H., Li, H.: Privacy and authentication protocol for mobile RFID systems. Wireless Pers. Commun. 77(3), 1713–1731 (2014)

    Article  Google Scholar 

  13. Forget, A., Chiasson, S., Biddle, R.: Towards supporting a diverse ecosystem of authentication schemes. In: Symposium on Usable Privacy and Security (Soups) (2014)

    Google Scholar 

  14. Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1), 383–396 (2013)

    Article  Google Scholar 

  15. Habibi, M.H., Aref, M.R.: Security and privacy analysis of song-mitchell RFID authentication protocol. Wireless Pers. Commun. 69(4), 1583–1596 (2013)

    Article  Google Scholar 

  16. Wikipedia: Security Assertion Markup Language – Wikipedia, The Free Encyclopedia (2016). https://en.wikipedia.org/w/index.php?title=Security_Assertion_Markup_Language&oldid=747644307

  17. Security, H.J.H.: Visa Waiver Program Improvement and Terrorist Travel Prevention (2016). https://www.congress.gov/bill/114th-congress/house-bill/158/text

  18. Miller, B.A., Bisdikian, C.: Bluetooth Revealed: The Insider’s Guide to an Open Specification for Global Wireless Communication. Prentice Hall PTR, New Jersey (2001)

    Google Scholar 

  19. Bluetooth, S.: Bluetooth Specification (2017). https://www.bluetooth.com/specifications/bluetooth-core-specification

  20. Soon, T.J.: Qr code. Synth. J. 2008, 59–78 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gianluca Lax .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A. (2018). eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security. In: Longo, A., et al. Cloud Infrastructures, Services, and IoT Systems for Smart Cities. IISSC CN4IoT 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 189. Springer, Cham. https://doi.org/10.1007/978-3-319-67636-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67636-4_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67635-7

  • Online ISBN: 978-3-319-67636-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics