Abstract
The European regulation eIDAS introduces in EU States interoperable public digital identity systems whose native application is secure authentication on online services. In this paper, we try to offer an enhanced view of the potential benefits that such systems can have in our physical environments. Indeed, cities have seen a dramatic increase in the number of violent acts and crimes. The possibility of monitoring people access to physical critical places is certainly an important issue because this gives the possibility to deny the access to dangerous people, to find the offender of a crime, and, in general, to track suspicions activities. In this paper, we show how to exploit an eIDAS-compliant public digital identity system to meet the above requirements, thus offering a concrete solution with high level of interoperability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
The currently standardized biometrics used for this type of identification system are facial recognition, fingerprint recognition, and iris recognition. Biometric identification is adopted in many countries: for example, in USA, beginning on April 1, 2016, the electronic passport contains relevant biometric information [17].
References
Buccafurri, F., Lax, G., Nocera, A., Ursino, D.: Discovering missing me edges across social networks. Inform. Sci. 319, 18–37 (2015)
Jara, A.J., Genoud, D., Bocchi, Y.: Big data in smart cities: from poisson to human dynamics. In: 2014 28th International Conference on Advanced Information Networking and Applications Workshops, AINA 2014 Workshops, Victoria, BC, Canada, 13–16 May 2014, pp. 785–790 (2014)
Anttiroiko, A., Valkama, P., Bailey, S.J.: Smart cities in the new service economy: building platforms for smart services. AI Soc. 29(3), 323–334 (2014)
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A.: Comparing twitter and facebook user behavior: privacy and other aspects. Comput. Hum. Behav. 52, 87–95 (2015)
European Union: Regulation EU No 910/2014 of the European Parliament and of the Council, 23 July 2014. http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX%3A32014R0910&from=EN
European Union: Regulation EU No 910/2014 of the European Parliament and of the Council, 23 July 2014. http://ec.europa.eu/growth/tools-databases/tris/en/index.cfm/search/?trisaction=search.detail&year=2014&num=295&dLang=EN
Leitold, H.: Challenges of eID interoperability: the STORK project. In: Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IFIP AICT, vol. 352, pp. 144–150. Springer, Heidelberg (2011). doi:10.1007/978-3-642-20769-3_12
Cuijpers, C., Schroers, J.: eidas as guideline for the development of a pan European eid framework in futureid. In: Open Identity Summit 2014. vol. 237, pp. 23–38. Gesellschaft für Informatik (2014)
Edwards, A., Hughes, G., Lord, N.: Urban security in Europe: translating a concept in public criminology. Europ. J. Criminol. 10(3), 260–283 (2013)
Zhang, R., Shi, J., Zhang, Y., Zhang, C.: Verifiable privacy-preserving aggregation in people-centric urban sensing systems. IEEE J. Sel. Areas Commun. 31(9), 268–278 (2013)
Krontiris, I., Freiling, F.C., Dimitriou, T.: Location privacy in urban sensing networks: research challenges and directions (security and privacy in emerging wireless networks). IEEE Wirel. Commun. 17(5) (2010)
Niu, B., Zhu, X., Chi, H., Li, H.: Privacy and authentication protocol for mobile RFID systems. Wireless Pers. Commun. 77(3), 1713–1731 (2014)
Forget, A., Chiasson, S., Biddle, R.: Towards supporting a diverse ecosystem of authentication schemes. In: Symposium on Usable Privacy and Security (Soups) (2014)
Doss, R., Sundaresan, S., Zhou, W.: A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Netw. 11(1), 383–396 (2013)
Habibi, M.H., Aref, M.R.: Security and privacy analysis of song-mitchell RFID authentication protocol. Wireless Pers. Commun. 69(4), 1583–1596 (2013)
Wikipedia: Security Assertion Markup Language – Wikipedia, The Free Encyclopedia (2016). https://en.wikipedia.org/w/index.php?title=Security_Assertion_Markup_Language&oldid=747644307
Security, H.J.H.: Visa Waiver Program Improvement and Terrorist Travel Prevention (2016). https://www.congress.gov/bill/114th-congress/house-bill/158/text
Miller, B.A., Bisdikian, C.: Bluetooth Revealed: The Insider’s Guide to an Open Specification for Global Wireless Communication. Prentice Hall PTR, New Jersey (2001)
Bluetooth, S.: Bluetooth Specification (2017). https://www.bluetooth.com/specifications/bluetooth-core-specification
Soon, T.J.: Qr code. Synth. J. 2008, 59–78 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Buccafurri, F., Lax, G., Nicolazzo, S., Nocera, A. (2018). eIDAS Public Digital Identity Systems: Beyond Online Authentication to Support Urban Security. In: Longo, A., et al. Cloud Infrastructures, Services, and IoT Systems for Smart Cities. IISSC CN4IoT 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 189. Springer, Cham. https://doi.org/10.1007/978-3-319-67636-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-67636-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67635-7
Online ISBN: 978-3-319-67636-4
eBook Packages: Computer ScienceComputer Science (R0)