A Study on the Security Algorithm for Contexts in Smart Cities

Recently, a great number of smart devices associated with their users exist within Smart City. Users are constantly moving around within Smart City according to their plans and consequently receive various network services from hosting devices adjacent. Currently, there are numbers of different type...

Full description

Saved in:
Bibliographic Details
Main Authors: Hoon Ko, Kitae Bae, Sang Heon Kim, Kyung Jin An
Format: Article
Language:English
Published: Wiley 2014-06-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2014/102051
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832547914356883456
author Hoon Ko
Kitae Bae
Sang Heon Kim
Kyung Jin An
author_facet Hoon Ko
Kitae Bae
Sang Heon Kim
Kyung Jin An
author_sort Hoon Ko
collection DOAJ
description Recently, a great number of smart devices associated with their users exist within Smart City. Users are constantly moving around within Smart City according to their plans and consequently receive various network services from hosting devices adjacent. Currently, there are numbers of different types of security algorithms related to those activities; moreover, under such complexity of digital environment including various network devices and users, selective and customised services need to be provided for suitable purposes. However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. Conventionally, every service including different servers, network, and users employs the same security algorithm so that sensitive information could be traced and revealed by using counter tracing method. Therefore, this paper investigates tailored smart security algorithm, which is taking into account scenarios within smart cities. Consequently, users are able to be protected under tailored security modules based on circumstances of network, smart devices, and types of services.
format Article
id doaj-art-5352ddda4cf14e189c418d7b59ce337f
institution Kabale University
issn 1550-1477
language English
publishDate 2014-06-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-5352ddda4cf14e189c418d7b59ce337f2025-02-03T06:42:59ZengWileyInternational Journal of Distributed Sensor Networks1550-14772014-06-011010.1155/2014/102051102051A Study on the Security Algorithm for Contexts in Smart CitiesHoon Ko0Kitae Bae1Sang Heon Kim2Kyung Jin An3 Department of Informatics, Faculty of Science, J. E. Purkinje University, Ceske Mladeze 8, 400 96 Usti nad Labem, Czech Republic Department of New Media, Korean German Institute of Technology, 661 Deungchon-dong, Gangseo-gu, Seoul 157-033, Republic of Korea Department of Global Culture & Contents, Graduate School, Hankuk University of Foreign Studies, 107 Imun-ro, Dongdaemun-gu, Seoul 130-791, Republic of Korea Department of Environmental Planning, Konkuk University, 120 Neungdong-ro, Gwangjin-gu, Seoul 143-701, Republic of KoreaRecently, a great number of smart devices associated with their users exist within Smart City. Users are constantly moving around within Smart City according to their plans and consequently receive various network services from hosting devices adjacent. Currently, there are numbers of different types of security algorithms related to those activities; moreover, under such complexity of digital environment including various network devices and users, selective and customised services need to be provided for suitable purposes. However, the provided services are to be secured and well protected. Each customised service usually keeps tailored security policy and algorithm. Conventionally, every service including different servers, network, and users employs the same security algorithm so that sensitive information could be traced and revealed by using counter tracing method. Therefore, this paper investigates tailored smart security algorithm, which is taking into account scenarios within smart cities. Consequently, users are able to be protected under tailored security modules based on circumstances of network, smart devices, and types of services.https://doi.org/10.1155/2014/102051
spellingShingle Hoon Ko
Kitae Bae
Sang Heon Kim
Kyung Jin An
A Study on the Security Algorithm for Contexts in Smart Cities
International Journal of Distributed Sensor Networks
title A Study on the Security Algorithm for Contexts in Smart Cities
title_full A Study on the Security Algorithm for Contexts in Smart Cities
title_fullStr A Study on the Security Algorithm for Contexts in Smart Cities
title_full_unstemmed A Study on the Security Algorithm for Contexts in Smart Cities
title_short A Study on the Security Algorithm for Contexts in Smart Cities
title_sort study on the security algorithm for contexts in smart cities
url https://doi.org/10.1155/2014/102051
work_keys_str_mv AT hoonko astudyonthesecurityalgorithmforcontextsinsmartcities
AT kitaebae astudyonthesecurityalgorithmforcontextsinsmartcities
AT sangheonkim astudyonthesecurityalgorithmforcontextsinsmartcities
AT kyungjinan astudyonthesecurityalgorithmforcontextsinsmartcities
AT hoonko studyonthesecurityalgorithmforcontextsinsmartcities
AT kitaebae studyonthesecurityalgorithmforcontextsinsmartcities
AT sangheonkim studyonthesecurityalgorithmforcontextsinsmartcities
AT kyungjinan studyonthesecurityalgorithmforcontextsinsmartcities