Smart City Reference Model: Interconnectivity for On-Demand User to Service Authentication

نویسندگان

  • Albayrak, Sahin Distributed Artificial Intelligence Laboratory, Technical University Berlin, Berlin, Germany
چکیده مقاله:

The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implementation incorporates findings from an empirical study and lessons learned from research projects. The elaborated ecosystem enables service request roaming between different parties across system boundaries. The paper presents a feasible centralized architecture, introduces involved parties and parts of a developed message protocol. Why a contracting mechanism is indispensable for request roaming is also outlined. The model’s feasibility is demonstrated by means of a current electric mobility use case: providing access to foreign charging infrastructure without multiple registrations. This work contributes to simplify the data exchange between service platforms to improve Smart City solutions and to support travelers with intelligent mobility applications.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Based User Authentication Using Smart Card

Remote user authentication is one of the major issues in the rapid growing internet era. In this paper we propose a biometric based remote user authentication scheme using smart cards. The existing methods failed to be safe in remote user authentication as the secret values in either end of the communication could be guessed by the intruder. In our scheme we introduce an addition security at th...

متن کامل

An Improvement on Remote User Authentication Schemes Using Smart Cards

In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s sch...

متن کامل

Applicability of Smart Cards to Network User Authentication

This paper addresses security issues associated with authenticating users to system services in distributed information systems. Its focus is the presentation of an approach for augmenting the Kerberos network user identification and authentication protocol through the integration of emerging smart card technology. Our conclusions indicate that the security of Kerberos-based network authenticat...

متن کامل

Supplemental Biometric User Authentication for Digital-Signature Smart Cards

This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card standards. After successful PIN verification, multiple digital signatures can be created; each signature creation, however, is preceded by biometric verification.

متن کامل

Remote Authentication Dial In User Service (RADIUS)

Remote Authentication Dial In User Service (RADIUS) Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is ...

متن کامل

Smart Authentication for Smart Phones

since past few years there has been a remarkable rise in the popularity of touch screen mobile phone devices. With respect to the data and information that can be stored on the mobiles as well as mobiles are nowadays are also used for accessing mail and connecting to social media, it is necessary to ensure the security of the data and information that is stored on the mobiles. User authenticati...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 3  شماره 1

صفحات  1126- 1142

تاریخ انتشار 2016-05

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

کلمات کلیدی برای این مقاله ارائه نشده است

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023