Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study
Abstract
:1. Introduction and Scope
1.1. Applications of Wearables
1.2. Structure of This Manuscript
2. Background and Motivation
2.1. Related Historical Overview
2.2. Market-Available Professional Products
2.3. Proposed Model
- Obtaining video content made available by the proprietary sources (team players, opponents, referees, hockey gates, main cameras, etc.);
- Accessing general information related to the club (history, events, players, etc.);
- Monitoring critical information (warnings, evacuation plans, etc.);
- Advertisements and promotions (closest fast-food venue, order of a drink, taxi, etc.).
- Mass spectators (purchased their personal ticket; have access to a personalized set of AR-based services; are main producers and consumers of data; have the possibility for on-demand content acquisition; engage into direct interactions);
- Support personnel (broadly includes technical, medical, maintenance, advertising, and other specialists with access to their specific and AR-based data; access detailed information on players/spectators);
- Competing teams (including players and coaches with data possibly affecting tactics and strategy of the team; the requirement of long-term protection against misuse of such more dynamic and context-oriented information).
3. Security Context in Public Events with Wearable Intelligence
- The notion of close proximity between several wearable and carriable devices, which can be mobile;
- Higher dynamics of personal user environment, where the components in the user “personal cloud” depend on the situation and where particular devices may often (de-)associate in real time;
- Tighter constraints on the available processing capabilities and energy supply of contemporary wearables as a result of their reduced form-factor and functionality.
3.1. Proximity
3.2. Dynamics
3.3. Constraints
4. Implementation of the Target Scenario
4.1. General Application Requirements
4.2. Candidate Connectivity Solutions
4.3. Scenario Details and Simulation Description
4.4. Key Performance Metrics
5. Selected Numerical Results
- The PL map allows for predicting the levels of transmit power required for the path-based denial-of-service attacks, such as jamming [85]. By doing so, the detection of potential malicious activity becomes more straightforward.
- The users with the lowest RX power are also vulnerable to the distributed denial-of-service attack. The PL value allows for deriving a lower bound on the throughput, which can compromise such (edge) nodes [86].
- Even though general mobility levels in this mass system are considered to remain low, the PL map allows for addressing the moments of a possible handover between the access points, thus outlining the risk zone of rogue access points [87].
6. Authentication Methods for Massive Content Delivery
6.1. Proposed Authentication Method for the Mass Event
- The organizer provides its services to the customers in an anonymized way. To achieve anonymity in relation to the service provider (stadium administration), the following addition to the authentication protocol could be utilized:
- −
- −
- Certificate authority in the modified scheme is represented by the private key generator (PKG);
- −
- The secret key is not directly “connected” to a unique user , but rather links with the ticket number and/or the seat number, and the event parameters (name, date, time, etc.). The is to be obtained by the PKG with the use of any ID-based key generation protocol.
- At the signature verification stage , the event-organizing company requires only the ticket number and the event parameters. Therefore, it is not necessary for a user to provide any personal information (for realizing the verification procedure) directly to the event organizers. However, the authority may still obtain these data if necessary.
- In cases of, for example, Public Protection and Disaster Relief (PPDR) [95] or mass riots during the event, the administration has an opportunity to acquire the data on each user and forward it to the dedicated security units.
6.2. Framework Security Analysis
7. Conclusions
Acknowledgments
Author Contributions
Conflicts of Interest
References
- Barfield, W. Fundamentals of Wearable Computers and Augmented Reality; CRC Press: Boca Raton, FL, USA, 2015; ISBN 9781138749313. [Google Scholar]
- Billinghurst, M.; Busse, D. Rapid Prototyping for Wearables: Concept Design and Development for head-and wrist-mounted Wearables (Smart Watches and Google Glass). In Proceedings of the 9th International Conference on Tangible, Embedded, and Embodied Interaction, Stanford, CA, USA, 16–19 January 2015; ACM: New York, NY, USA, 2015; pp. 505–508. [Google Scholar]
- Xu, C.; Zhao, F.; Guan, J.; Zhang, H.; Muntean, G.M. QoE-driven user-centric VoD services in urban multihomed P2P-based vehicular networks. IEEE Trans. Veh. Technol. 2013, 62, 2273–2289. [Google Scholar] [CrossRef]
- Chaouchi, H.; Laurent-Maknavicius, M. Wireless and Mobile Networks Security; John Wiley & Sons: Hoboken, NJ, USA, 2013; ISBN 9780470611883. [Google Scholar] [CrossRef]
- Malina, L.; Hajny, J.; Fujdiak, R.; Hosek, J. On perspective of security and privacy-preserving solutions in the Internet of Things. Comput. Netw. 2016, 102, 83–95. [Google Scholar] [CrossRef]
- Wearable.com. Wearables Are Only Secure until They Become Worthwhile Hacking. Available online: http://www.wareable.com/wearable-tech/ (accessed on 15 May 2017).
- Wearable Technologies. On Perspective of Security and Privacy-Preserving Solutions in the Internet of Things. Available online: https://www.wearable-technologies.com/2016/06/the-new-wave-of-wearables-is-transforming-the-world-of-soccer/ (accessed on 15 May 2017).
- Case, M.A.; Burwick, H.A.; Volpp, K.G.; Patel, M.S. Accuracy of smartphone applications and wearable devices for tracking physical activity data. JAMA 2015, 313, 625–626. [Google Scholar] [CrossRef] [PubMed]
- Motorola, Connected Law Enforcement Officer. Available online: https://www.motorolasolutions.com/en_us/solutions/law-enforcement/connected-law-enforcement-officer.html (accessed on 15 May 2017).
- Arbia, D.B.; Alam, M.M.; Attia, R.; Hamida, E.B. Behavior of wireless body-to-body networks routing strategies for public protection and disaster relief. In Proceedings of the 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Abu Dhabi, UAE, 19–21 October 2015; pp. 117–124. [Google Scholar]
- Chaouchi, H. The Internet of Things: Connecting Objects; John Wiley & Sons: Hoboken, NJ, USA, 2013; ISBN 9781118600146. [Google Scholar] [CrossRef]
- LifeHack. 10 Ways that Wearable Technology Can Positively Change the World. Available online: http://www.lifehack.org/509376/preventing-unwanted-intrusions-your-mobile-devices (accessed on 13 April 2017).
- Samsung Newsroom. Samsung Australia Introduces brainBAND to Help Tackle Concussion Head on. Available online: https://news.samsung.com/global/samsung-australia-introduces-brainband-to-help-tackle-concussion-head-on (accessed on 15 May 2017).
- IDC Research. IDC Forecasts Worldwide Shipments of Wearables to Surpass 200 Million in 2019, Driven by Strong Smartwatch Growth. Available online: https://www.idc.com/getdoc.jsp?containerId=prUS40846515 (accessed on 15 May 2017).
- Castellet, A. What If Devices Take Command: Content Innovation Perspectives for Smart Wearables in the Mobile Ecosystem. Int. J. Handheld Comput. Res. (IJHCR) 2016, 7, 16–33. [Google Scholar] [CrossRef]
- Zhou, J.; Cao, Z.; Dong, X.; Lin, X. Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions. IEEE Wirel. Commun. 2015, 22, 136–144. [Google Scholar] [CrossRef]
- Alam, M.M.; Hamida, E.B. Surveying wearable human assistive technology for life and safety critical applications: Standards, challenges and opportunities. Sensors 2014, 14, 9153–9209. [Google Scholar] [CrossRef] [PubMed]
- Hasan, R.; Khan, R. A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud. In Proceedings of the 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA, 10–14 June 2016; Volume 1, pp. 823–828. [Google Scholar]
- Small Business Trends. Can Wearable Technology Threaten the Cyber Security of Your Business? Available online: https://www.idc.com/getdoc.jsp?containerId=prUS40846515 (accessed on 15 May 2017).
- Ometov, A.; Orsino, A.; Militano, L.; Araniti, G.; Moltchanov, D.; Andreev, S. A novel security-centric framework for D2D connectivity based on spatial and social proximity. Comput. Netw. 2016, 107, 327–338. [Google Scholar] [CrossRef]
- Galinina, O.; Pyattaev, A.; Johnsson, K.; Turlikov, A.; Andreev, S.; Koucheryavy, Y. Assessing system-level energy efficiency of mmwave-based wearable networks. IEEE J. Sel. Areas Commun. 2016, 34, 923–937. [Google Scholar] [CrossRef]
- Kerr, D.; Butler-Henderson, K.; Sahama, T. Security, Privacy, and Ownership Issues with the Use of Wearable Health Technologies. In Managing Security Issues and the Hidden Dangers of Wearable Technologies; IGI Global: Hershey, PA, USA, 2016; p. 161. [Google Scholar]
- Islam, S.R.; Kwak, D.; Kabir, M.H.; Hossain, M.; Kwak, K.S. The Internet of Things for health care: A comprehensive survey. IEEE Access 2015, 3, 678–708. [Google Scholar] [CrossRef]
- Levine, J.A. The Baetylus Theorem—The central disconnect driving consumer behavior and investment returns in Wearable Technologies. Technol. Invest. 2016, 7, 59. [Google Scholar] [CrossRef] [PubMed]
- Simsek, M.; Aijaz, A.; Dohler, M.; Sachs, J.; Fettweis, G. 5G-enabled tactile internet. IEEE J. Sel. Areas Commun. 2016, 34, 460–473. [Google Scholar] [CrossRef]
- Moor Insights & Strategy. Wearables Have a Long Way to Go to Be Mass Consumer Markets. Available online: http://www.moorinsightsstrategy.com/wearables-have-a-long-way-to-go-to-be-mass-consumer-markets/ (accessed on 15 May 2017).
- Schneegass, S.; Olsson, T.; Mayer, S.; van Laerhoven, K. Mobile Interactions Augmented by Wearable Computing: A Design Space and Vision. Int. J. of Mob. Hum. Comput. Interact. (IJMHCI) 2016, 8, 104–114. [Google Scholar] [CrossRef]
- Wearable.com. From Pigeons to Pebbles: How Wearable Tech Has Evolved over the Centuries. Available online: http://www.moorinsightsstrategy.com/wearables-have-a-long-way-to-go-to-be-mass-consumer-markets/ (accessed on 15 May 2017).
- Gastin, P.B.; McLean, O.; Spittle, M.; Breed, R.V. Quantification of tackling demands in professional Australian football using integrated wearable athlete tracking technology. J. Sci. Med. Sport 2013, 16, 589–593. [Google Scholar] [CrossRef] [PubMed]
- Coutts, A.J. Evolution of football match analysis research. J. Sports Sci. 2014, 32, 1829–1830. [Google Scholar] [CrossRef] [PubMed]
- Alhonsuo, M.; Hapuli, J.; Virtanen, L.; Colley, A.; Häkkilä, J. Concepting wearables for ice-hockey youth. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, Copenhagen, Denmark, 24–27 August 2015; ACM: New York, NY, USA, 2015; pp. 944–946. [Google Scholar]
- Honey, S.K.; Cavallaro, R.H.; Hill, D.B.; Heinzmann, F.J.; Phillips, A.C.; Guthart, H.; Burns, A.A.; Rino, C.L.; Evans, P.C. Electromagnetic Transmitting Hockey Puck. U.S. Patent 5,564,698, 15 October 1996. [Google Scholar]
- Lerer, S.J.; Tieniber, E.B.; Smith, J.M. Building a Wireless Ice Hockey Personnel Management System; Senior Design Project: Philadelphia, PA, USA, 2010. [Google Scholar]
- Cavallaro, R. The FoxTrax hockey puck tracking system. IEEE Comput. Graph. Appl. 1997, 17, 6–12. [Google Scholar] [CrossRef]
- Wearable Technologies Magazine. Wearables for Icehockey. Available online: https://www.wearable-technologies.com/2016/09/wearables-for-icehockey/ (accessed on 15 May 2017).
- NHL, Player, Puck Tracking Coming to World Cup. Available online: https://www.nhl.com/news/nhl-to-use-player-puck-tracking-at-world-cup/c-281359780/ (accessed on 15 May 2017).
- FWD. The World’s First Advanced Sensor for Hockey sticks. Available online: http://www.quattriuum.com/en/powershot (accessed on 15 May 2017).
- Huffpost. Wearing to Win: Wearable Technology in Sport. Available online: http://www.huffingtonpost.com/advertising-week/wearing-to-win-wearable-t_b_12455882.html (accessed on 15 May 2017).
- Engadget. How Fox Sports Is Bringing Augmented Reality to NFL Games. Available online: https://www.engadget.com/2016/09/26/how-fox-sports-is-bringing-augmented-reality-to-nfl-games/ (accessed on 15 May 2017).
- Adidas. Let’s Get Fit in a Smart Way. Available online: http://www.micoach.com/start (accessed on 15 May 2017).
- Statsports. Delighted to Work with 10 International Clients at EURO 2016. Available online: http://statsports.com (accessed on 15 May 2017).
- PerformBetter. Catapult OptimEye G5 Goalkeeper Monitoring System. Available online: http://performbetter.co.uk/product/catapult-optimeye-g5-goalkeeper-monitoring-system/ (accessed on 15 May 2017).
- Gastin, P.B.; Mclean, O.C.; Breed, R.V.; Spittle, M. Tackle and impact detection in elite Australian football using wearable microsensor technology. J. Sports Sci. 2014, 32, 947–953. [Google Scholar] [CrossRef] [PubMed]
- Ecouterre. Under Armour’s Biometric Compression Shirt. Available online: http://www.ecouterre.com/under-armours-biometric-compression-shirt-tracks-broadcasts-athletic-performance-video/ zephyr-under-armour-e39-shirt-2/ (accessed on 15 May 2017).
- ShotTracker. Unleash Your Game. Available online: http://shottracker.com (accessed on 15 May 2017).
- Lapinski, M.; Berkson, E.; Gill, T.; Reinold, M.; Paradiso, J.A. A distributed wearable, wireless sensor system for evaluating professional baseball pitchers and batters. In Proceedings of the International Symposium on Wearable Computers (ISWC), Linz, Austria, 4–7 September 2009; pp. 131–138. [Google Scholar]
- Michahelles, F.; Schiele, B. Sensing and monitoring professional skiers. IEEE Pervasive Comput. 2005, 4, 40–45. [Google Scholar] [CrossRef]
- Ghasemzadeh, H.; Loseu, V.; Jafari, R. Wearable coach for sport training: A quantitative model to evaluate wrist-rotation in golf. J. Ambient Intell. Smart Environ. 2009, 1, 173–184. [Google Scholar] [CrossRef]
- Ozcan, K.; Mahabalagiri, A.K.; Casares, M.; Velipasalar, S. Automatic fall detection and activity classification by a wearable embedded smart camera. IEEE J. Emerg. Sel. Top. Circuits Syst. 2013, 3, 125–136. [Google Scholar] [CrossRef]
- Oracle Corporation. Data Masking Best Practices. Available online: http://www.oracle.com/us/products/database/data-masking-best-practices-161213.pdf (accessed on 15 May 2017).
- Olshannikova, E.; Ometov, A.; Koucheryavy, Y.; Olsson, T. Visualizing Big Data with augmented and virtual reality: challenges and research agenda. J. Big Data 2015, 2, 22. [Google Scholar] [CrossRef]
- Hathaway, D.H.; Meyer, P.J. Video Image Stabilization and Registration. U.S. Patent 6,459,822, 29 May 2002. [Google Scholar]
- Cernea, D.; Mora, S.; Perez, A.; Ebert, A.; Kerren, A.; Divitini, M.; de La Iglesia, D.G.; Otero, N. Tangible and wearable user interfaces for supporting collaboration among emergency workers. In Proceedings of the International Conference on Collaboration and Technology, Raesfeld, Germany, 16–19 September 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 192–199. [Google Scholar]
- Billinghurst, M.; Kato, H. Collaborative mixed reality. In Proceedings of the First International Symposium on Mixed Reality, Berlin, Germany, 9–11 March 1999; pp. 261–284. [Google Scholar]
- Kfir, Z.; Wool, A. Picking virtual pockets using relay attacks on contactless smartcard. In Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), Athens, Greece, 5–9 September 2005; pp. 47–58. [Google Scholar]
- Newsome, J.; Shi, E.; Song, D.; Perrig, A. The sybil attack in sensor networks: Analysis & defenses. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, 27–27 April 2004; pp. 259–268. [Google Scholar]
- Cremers, C.; Rasmussen, K.B.; Schmidt, B.; Capkun, S. Distance hijacking attacks on distance bounding protocols. In Proceedings of the 11th International Conference on Parallel and Distributed Systems (ICPADS’05) Symposium on Security and Privacy, San Francisco, CA, USA, 20–23 May 2012; pp. 113–127. [Google Scholar]
- Orsino, A.; Moltchanov, D.; Gapeyenko, M.; Samuylov, A.; Andreev, S.; Militano, L.; Araniti, G.; Koucheryavy, Y. Direct Connection on the Move: Characterization of User Mobility in Cellular-Assisted D2D Systems. IEEE Veh. Technol. Mag. 2016, 11, 38–48. [Google Scholar] [CrossRef]
- Leister, W.; Hamdi, M.; Abie, H.; Poslad, S. An evaluation scenario for adaptive security in eHealth. In Proceedings of the Fourth International Conference on Performance, Safety and Robustness in Complex Systems and Applications, Nice, France, 23–27 February 2014; Volume 2327. [Google Scholar]
- Li, M.; Yu, S.; Guttman, J.D.; Lou, W.; Ren, K. Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. (TOSN) 2013, 9, 18. [Google Scholar] [CrossRef]
- Singelée, D.; Preneel, B. Location privacy in wireless personal area networks. In Proceedings of the 5th ACM Workshop on Wireless Security, Los Angeles, CA, USA, 29 September 2006; ACM: New York, NY, USA, 2006; pp. 11–18. [Google Scholar]
- Militano, L.; Orsino, A.; Araniti, G.; Nitti, M.; Atzori, L.; Iera, A. Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems. Comput. Netw. 2016, 111, 141–151. [Google Scholar] [CrossRef]
- Wei, J. How Wearables Intersect with the Cloud and the Internet of Things: Considerations for the developers of wearables. IEEE Consum. Electron. Mag. 2014, 3, 53–56. [Google Scholar] [CrossRef]
- Paul, G.; Irvine, J. Privacy implications of wearable health devices. In Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, 9–11 September 2014; ACM: New York, NY, USA, 2014; p. 117. [Google Scholar]
- Krause, A.; Ihmig, M.; Rankin, E.; Leong, D.; Gupta, S.; Siewiorek, D.; Smailagic, A.; Deisher, M.; Sengupta, U. Trading off prediction accuracy and power consumption for context-aware wearable computing. In Proceedings of the 9th IEEE International Symposium on Wearable Computers (ISWC’05), Osaka, Japan, 18–21 October 2005; pp. 20–26. [Google Scholar]
- Yilmaz, O.N.; Wang, Y.P.E.; Johansson, N.A.; Brahmi, N.; Ashraf, S.A.; Sachs, J. Analysis of ultra-reliable and low-latency 5G communication for a factory automation use case. In Proceedings of the International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 1190–1195. [Google Scholar]
- Brahmi, N.; Yilmaz, O.N.; Helmersson, K.W.; Ashraf, S.A.; Torsner, J. Deployment Strategies for Ultra-Reliable and Low-Latency Communication in Factory Automation. In Proceedings of the Globecom Workshops (GC Wkshps), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
- Semkin, V.; Solomitckii, D.; Naderpour, R.; Andreev, S.; Koucheryavy, Y.; Raisanen, A.V. Characterization of Radio Links at 60 GHz Using Simple Geometrical and Highly Accurate 3D Models. IEEE Trans. Veh. Technol. 2016. [Google Scholar] [CrossRef]
- National Science Foundation. NSF Follow-on Workshop on Ultra-Low Latency Wireless Networks. Available online: http://inlab.lab.asu.edu/nsf/files/WorkshopReport-2.pdf (accessed on 15 May 2017).
- Vannithamby, R.; Talwar, S. Towards 5G: Applications, Requirements and Candidate Technologies; John Wiley & Sons: Chichester, UK, 2016; ISBN 978-1-118-97983-9. [Google Scholar]
- Scopelliti, P.; Araniti, G.; Muntean, G.M.; Iera, A. Mobility-aware energy-quality trade-off for video delivery in dense heterogeneous networks. In Proceedings of the International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Nara, Japan, 1–3 June 2016; pp. 1–6. [Google Scholar]
- Andreev, S.; Pyattaev, A.; Johnsson, K.; Galinina, O.; Koucheryavy, Y. Cellular traffic offloading onto network-assisted device-to-device connections. IEEE Commun. Mag. 2014, 52, 20–31. [Google Scholar] [CrossRef]
- Daneshgaran, F.; Laddomada, M.; Mesiti, F.; Mondin, M.; Zanolo, M. Saturation throughput analysis of IEEE 802.11 in the presence of non ideal transmission channel and capture effects. IEEE Trans. Commun. 2008, 56, 1178–1188. [Google Scholar] [CrossRef]
- Chang, W.C.; Tseng, M.Y.; Iok-Kan, C.; Tseng, W.J.; Wu, J.L. Virtual Reality System and Method for Controlling Operation Modes of Virtual Reality System. U.S. Patent App. 14/943,721, 9 June 2016. [Google Scholar]
- Park, C.; Rappaport, T.S. Short-range wireless communications for next-generation networks: UWB, 60 GHz millimeter-wave WPAN, and ZigBee. IEEE Wirel. Commun. 2007, 14, 70–78. [Google Scholar] [CrossRef]
- Lawton, G. Wireless HD video heats up. Computer 2008, 12, 18–20. [Google Scholar] [CrossRef]
- Takinami, K.; Motozuka, H.; Urushihara, T.; Kobayashi, M.; Takahashi, H.; Masataka, I.; Sakamoto, T.; Morishita, Y.; Miyanaga, K.; Tsukizawa, T.; et al. A 60 GHz Hybrid Analog/Digital Beamforming Receiver with Interference Suppression for Multiuser Gigabit/s Radio Access. IEICE Trans. Electron. 2016, 99, 856–865. [Google Scholar] [CrossRef]
- Perahia, E.; Cordeiro, C.; Park, M.; Yang, L.L. IEEE 802.11ad: Defining the next generation multi-Gbps Wi-Fi. In Proceedings of the 7th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 9–12 January 2010; pp. 1–5. [Google Scholar]
- Daniels, R.C.; Murdock, J.N.; Rappaport, T.S.; Heath, R.W. 60 GHz wireless: Up close and personal. IEEE Microw. Mag. 2010, 11, 44–50. [Google Scholar] [CrossRef]
- Alipour, S.; Parvaresh, F.; Ghajari, H.; Donald, F.K. Propagation characteristics for a 60 GHz wireless body area network (WBAN). In Proceedings of the Military Communications Conference (MILCOM), San Jose, CA, USA, 31 October–3 November 2010; pp. 719–723. [Google Scholar]
- Cisco. Connected Stadium Wi-Fi Solution. Available online: http://www.cisco.com/c/dam/en_us/solutions/industries/docs/sports/c78-675063_dSheet.pdf (accessed on 15 May 2017).
- Durgin, G.; Patwari, N.; Rappaport, T.S. An advanced 3D ray launching method for wireless propagation prediction. In Proceedings of the 47th Vehicular Technology Conference, Phoenix, AZ, USA, 4–7 May 1997; Volume 2, pp. 785–789. [Google Scholar]
- Peter, M.; Wisotzki, M.; Raceala-Motoc, M.; Keusgen, W.; Felbecker, R.; Jacob, M.; Priebe, S.; Kürner, T. Analyzing human body shadowing at 60 GHz: Systematic wideband MIMO measurements and modeling approaches. In Proceedings of the 6th European Conference on Antennas and Propagation (EUCAP), Prague, Czech Republic, 26–30 March 2012; pp. 468–472. [Google Scholar]
- RUCKUS Wireless, Inc. Deploying Very High Density Wi-Fi: Design and Configuration Guide for Stadiums; Best Practicies v1.0; RUCKUS Wireless, Inc.: Sunnyvale, CA, USA, 2012; p. 51. [Google Scholar]
- Anwar, R.W.; Bakhtiari, M.; Zainal, A.; Abdullah, A.H.; Qureshi, K.N. Security issues and attacks in wireless sensor network. World Appl. Sci. J. 2014, 30, 1224–1227. [Google Scholar] [CrossRef]
- Abdullah, N.F.; Goulianos, A.A.; Barratt, T.H.; Freire, A.G.; Berraki, D.E.; Armour, S.M.; Nix, A.R.; Beach, M.A. Path-loss and throughput prediction of IEEE 802.11ad systems. In Proceedings of the 81st Vehicular Technology Conference (VTC Spring), Glasgow, UK, 11–14 May 2015; pp. 1–5. [Google Scholar]
- Robert, J.M.; Barbeau, M. Rogue Access Point Detection in Wireless Networks. U.S. Patent 7,962,958, 14 June 2011. [Google Scholar]
- Chandra, S.; Paira, S.; Alam, S.S.; Sanyal, G. A comparative survey of symmetric and asymmetric key cryptography. In Proceedings of the International Conference on Electronics, Communication and Computational Engineering (ICECCE), Hosur, India, 17–18 November 2014; pp. 83–93. [Google Scholar]
- Gordon, S.D.; Katz, J.; Kumaresan, R.; Yerukhimovich, A. Authenticated broadcast with a partially compromised public-key infrastructure. Inf. Comput. 2014, 234, 17–25. [Google Scholar] [CrossRef]
- Liu, W.; Liu, H.; Wan, Y.; Kong, H.; Ning, H. The yoking-proof-based authentication protocol for cloud-assisted wearable devices. Pers. Ubiquitous Comput. 2016, 20, 469–479. [Google Scholar] [CrossRef]
- Prudanov, A.; Tkachev, S.; Golos, N.; Masek, P.; Hosek, J.; Fujdiak, R.; Zeman, K.; Ometov, A.; Bezzateev, S.; Voloshina, N.; et al. A Trial of Yoking-proof Protocol in RFID-based Smart-Home Environment. In Proceedings of the Distributed Computer and Communication Networks: Control, Computation, Communications (DCCN), Moscow, Russia, 21–25 November 2016. [Google Scholar]
- Papapostolou, A.; Chaouchi, H. Integrating RFID and WLAN for indoor positioning and IP movement detection. Wirel. Netw. 2012, 18, 861–879. [Google Scholar] [CrossRef]
- Chen, H.M.; Lo, J.W.; Yeh, C.K. An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 2012, 36, 3907–3915. [Google Scholar] [CrossRef] [PubMed]
- He, D.; Zeadally, S.; Kumar, N.; Lee, J.H. Anonymous authentication for wireless body area networks with provable security. IEEE Syst. J. 2016. [Google Scholar] [CrossRef]
- Fodor, G.; Parkvall, S.; Sorrentino, S.; Wallentin, P.; Lu, Q.; Brahmi, N. Device-to-device communications for national security and public safety. IEEE Access 2014, 2, 1510–1520. [Google Scholar] [CrossRef]
- Juels, A. “Yoking-proofs” for RFID tags. In Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, FL, USA, 14–17 March 2004; pp. 138–143. [Google Scholar]
- Scott, M.; Costigan, N.; Abdulwahab, W. Implementing cryptographic pairings on smartcards. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, Yokohama, Japan, 10–13 October 2006; Springer: Berlin, Germany, 2006; pp. 134–147. [Google Scholar]
- Lo, N.W.; Yeh, K.H. Anonymous coexistence proofs for RFID tags. J. Inf. Sci. Eng. 2010, 26, 1213–1230. [Google Scholar]
- Burmester, M.; De Medeiros, B.; Motta, R. Provably secure grouping-proofs for RFID tags. In Proceedings of the International Conference on Smart Card Research and Advanced Applications, London, UK, 8–11 September 2008; Springer: Berlin, Germany, 2008; pp. 176–190. [Google Scholar]
- Saito, J.; Sakurai, K. Grouping proof for RFID tags. In Proceedings of the 19th International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 28–30 March 2005; Volume 2, pp. 621–624. [Google Scholar]
- Weis, S.A.; Sarma, S.E.; Rivest, R.L.; Engels, D.W. Security and privacy aspects of low-cost radio frequency identification systems. In Security in Pervasive Computing; Springer: Berlin, Germany, 2004; pp. 201–212. [Google Scholar] [CrossRef]
- Liu, Y.; Qin, X.; Li, B.; Liu, L. Cryptanalysis of a Scalable Grouping-proof Protocol for RFID Tags. Int. J. Digit. Content Technol. its Appl. 2012, 6, 247. [Google Scholar] [CrossRef]
- Chen, C.L.; Wu, C.Y. Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 2012, 36, 2849–2864. [Google Scholar] [CrossRef] [PubMed]
Parameter | Value |
---|---|
Overall scenario size | 200 m × 160 m |
Scenario height | 40 m |
Ice ring size | 61 m × 37 m |
Number of receivers | 515 |
Number of transmitters | 1–3 |
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ometov, A.; Solomitckii, D.; Olsson, T.; Bezzateev, S.; Shchesniak, A.; Andreev, S.; Harju, J.; Koucheryavy, Y. Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study. J. Sens. Actuator Netw. 2017, 6, 5. https://doi.org/10.3390/jsan6020005
Ometov A, Solomitckii D, Olsson T, Bezzateev S, Shchesniak A, Andreev S, Harju J, Koucheryavy Y. Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study. Journal of Sensor and Actuator Networks. 2017; 6(2):5. https://doi.org/10.3390/jsan6020005
Chicago/Turabian StyleOmetov, Aleksandr, Dmitrii Solomitckii, Thomas Olsson, Sergey Bezzateev, Anna Shchesniak, Sergey Andreev, Jarmo Harju, and Yevgeni Koucheryavy. 2017. "Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study" Journal of Sensor and Actuator Networks 6, no. 2: 5. https://doi.org/10.3390/jsan6020005
APA StyleOmetov, A., Solomitckii, D., Olsson, T., Bezzateev, S., Shchesniak, A., Andreev, S., Harju, J., & Koucheryavy, Y. (2017). Secure and Connected Wearable Intelligence for Content Delivery at a Mass Event: A Case Study. Journal of Sensor and Actuator Networks, 6(2), 5. https://doi.org/10.3390/jsan6020005