Smart City Reference Model: Interconnectivity for On-Demand User to Service Authentication
نویسندگان
چکیده مقاله:
The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implementation incorporates findings from an empirical study and lessons learned from research projects. The elaborated ecosystem enables service request roaming between different parties across system boundaries. The paper presents a feasible centralized architecture, introduces involved parties and parts of a developed message protocol. Why a contracting mechanism is indispensable for request roaming is also outlined. The model’s feasibility is demonstrated by means of a current electric mobility use case: providing access to foreign charging infrastructure without multiple registrations. This work contributes to simplify the data exchange between service platforms to improve Smart City solutions and to support travelers with intelligent mobility applications.
منابع مشابه
Biometric Based User Authentication Using Smart Card
Remote user authentication is one of the major issues in the rapid growing internet era. In this paper we propose a biometric based remote user authentication scheme using smart cards. The existing methods failed to be safe in remote user authentication as the secret values in either end of the communication could be guessed by the intruder. In our scheme we introduce an addition security at th...
متن کاملAn Improvement on Remote User Authentication Schemes Using Smart Cards
In 2010, Yeh et al. proposed two robust remote user authentication schemes using smart cards; their claims were such that their schemes defended against ID-theft attacks, reply attacks, undetectable on-line password guessing attacks, off-line password guessing attacks, user impersonation attack, server counterfeit attack and man-in-the-middle attack. In this paper, we show that Yeh et al.’s sch...
متن کاملApplicability of Smart Cards to Network User Authentication
This paper addresses security issues associated with authenticating users to system services in distributed information systems. Its focus is the presentation of an approach for augmenting the Kerberos network user identification and authentication protocol through the integration of emerging smart card technology. Our conclusions indicate that the security of Kerberos-based network authenticat...
متن کاملSupplemental Biometric User Authentication for Digital-Signature Smart Cards
This paper specifies how biometric verification methods can be applied in addition to PIN verification on digital-signature smart cards in compliance with established smart-card standards. After successful PIN verification, multiple digital signatures can be created; each signature creation, however, is preceded by biometric verification.
متن کاملRemote Authentication Dial In User Service (RADIUS)
Remote Authentication Dial In User Service (RADIUS) Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is ...
متن کاملSmart Authentication for Smart Phones
since past few years there has been a remarkable rise in the popularity of touch screen mobile phone devices. With respect to the data and information that can be stored on the mobiles as well as mobiles are nowadays are also used for accessing mail and connecting to social media, it is necessary to ensure the security of the data and information that is stored on the mobiles. User authenticati...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 3 شماره 1
صفحات 1126- 1142
تاریخ انتشار 2016-05
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
کلمات کلیدی برای این مقاله ارائه نشده است
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023