Popescu-Bodorin et al., 2022 - Google Patents
A New Way of Collecting Traffic Data Inside a Smart City Based on IoT Devices and Communication Protocols Designed for Preserving Perfect AnonymityPopescu-Bodorin et al., 2022
- Document ID
- 2921742629445487697
- Author
- Popescu-Bodorin N
- Nagy M
- Publication year
- Publication venue
- International Conference on Computers Communications and Control
External Links
Snippet
The basic schemes of new, generic, anonymity-preserving, radio frequency based IoT devices and communication protocols are presented here. Their usage is illustrated in the particular context of avoiding traffic jams in Smart Cities, while also exemplifying traffic data …
- 238000004891 communication 0 title abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11462036B2 (en) | Automated semantic inference of visual features and scenes | |
US20230185895A1 (en) | Cascade convolutional neural network | |
Kinoshita et al. | Privacy enhanced active RFID tag | |
Minch | Location privacy in the era of the internet of things and big data analytics | |
Fan et al. | Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV | |
Verma et al. | Security and privacy in smart city applications and services: Opportunities and challenges | |
Kumagai et al. | Sensors and sensibility | |
Kim et al. | Role of blockchain technology in IoT applications | |
Patel et al. | Internet of things security: challenges, advances, and analytics | |
Das et al. | Design of a secure blockchain-based toll-tax collection system | |
Rashid et al. | A survey on social-physical sensing: An emerging sensing paradigm that explores the collective intelligence of humans and machines | |
Yasirandi et al. | Security document for smart parking gate based on common criteria framework | |
Popescu-Bodorin et al. | A New Way of Collecting Traffic Data Inside a Smart City Based on IoT Devices and Communication Protocols Designed for Preserving Perfect Anonymity | |
Popescu-Bodorin¹ et al. | A New Way of Collecting Traffic Data Inside a Smart City Based on IoT Devices | |
Jaafar et al. | Blockchain and Artificial Intelligence-based Solution to Enhance the Privacy in Digital Identity and IoT | |
Zainuddin et al. | A comprehensive analysis of IoT security and privacy in smart city applications | |
Anitha et al. | Cloud-based secured QR code for self-service access control system at resort and hotels | |
Rutledge et al. | Defining the internet of devices: Privacy and security implications | |
Kitchin | Spatial big data and the era of continuous geosurveillance | |
Reyes-Menendez et al. | Cybersecurity and the Internet of Things: Anticipating the Leverage of Cyber Crimes with Interconnected Devices | |
Kannan et al. | A secured IoT parking system based on smart sensor communication with two-step user verification | |
Nunes et al. | A taxonomy on privacy and confidentiality | |
Bispo et al. | Access Control System Integrated with RFID and NFC-Enabled Smartphone Technologies | |
Kumar et al. | Automated check-post on cloud using bigdata analysis with web service security | |
Srivastava et al. | Pivotal role of cyber security in Internet of Things-based smart cities: An analytical framework for safe smart cities |