WP Description
WP leader | Oberthur (FR) |
---|---|
Partners | GTO, CEA-LETI, Worldline, Oberthur, STM, Tlabs, IMA, Tyndall, Tyco, IT, IPCB, Beyond Vision |
Objectives | The objectives of the tasks are the following: • User Identification/authentication (biometry, 2FA) • Anonymity preserving secure transaction models and algorithms • User privacy protection and personal cloud • Anonymous, authentic and untraceable attributes principles suitable with wearable device constraints and user’s experience • Shared attributes (collection and publication of the user’s attributes) management under the user’s agreement • Energy/power consumption efficient security algorithms • Open system with distributed and independent Key Management System Wearable devices pose a great challenge in terms of security and privacy. First, personal data gathered by man-held objects must be securely stored and transferred. Second, the information must be only accessed by authorized users. Not authorized entities should not be able to get or even infer any user-related information. Confidentiality, anonymity, non-traceability, Integrity and fast authentication are a must, in order to ensure that the personal data generated, stored and transmitted by devices is delivered to legitimate end users and not corrupted or disclosed and even correlated. Privacy by design is also a must when the information is sensitive such as health related data or electronic money movements, that could allow outsiders to profile user activities. The protection of the privacy have become a more challenging due to the communications between wearable devices linked to the user and the Smart-City infrastructure. Any uncontrolled information leaks or transfer of large data constants can be correlated for disclosing the identity or private information relative to the user. Previous research on this field has highlighted numerous security and privacy protection issues asking for specific and novel procedures. For example, the usual cryptography principles as a Public Key Infrastructure can no longer be used as universal solution and new KMS systems must be implemented. To achieve security and privacy, reliable, hence strong and complex, security mechanisms should be provided in order to protect sensitive information like health-related profiles or credit card credentials. Moreover, these mechanisms must ensure device interoperability and energy efficiency. |
WP Tasks
Task ID | Task description |
---|---|
T6.1 | User Identification / authentication |
T6.2 | User anonymity and user privacy |
T6.3 | Shared attributes and cognitive authentication |
T6.4 | Energy Efficiency |