2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops) 2016
DOI: 10.1109/percomw.2016.7457096
|View full text |Cite
|
Sign up to set email alerts
|

Secure privacy preserving information beacons for public transportation systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…IoT has already enabled more effective monitoring, enhanced decision-making and effectiveness in sectors such as eHealth [ 10 , 11 ], smart cities [ 12 ], defense [ 13 , 14 ] and high-security applications [ 15 , 16 , 17 ], precision agriculture [ 18 ], transportation [ 19 , 20 , 21 ] or Industry 4.0 [ 22 , 23 , 24 ]. Current IoT systems are characterized by the use of resource-constrained electronic devices with reduced memory, limited communication capabilities, low computing power, and a high dependence on batteries.…”
Section: Related Workmentioning
confidence: 99%
“…IoT has already enabled more effective monitoring, enhanced decision-making and effectiveness in sectors such as eHealth [ 10 , 11 ], smart cities [ 12 ], defense [ 13 , 14 ] and high-security applications [ 15 , 16 , 17 ], precision agriculture [ 18 ], transportation [ 19 , 20 , 21 ] or Industry 4.0 [ 22 , 23 , 24 ]. Current IoT systems are characterized by the use of resource-constrained electronic devices with reduced memory, limited communication capabilities, low computing power, and a high dependence on batteries.…”
Section: Related Workmentioning
confidence: 99%
“…The evaluation of the impact is limited to a location heatmap illustrating a change in the distributions of occupants inside the area. In [14], the authors have implemented a BLE beacon prototype that adds a secure signature to the advertisement packet. They evaluated their solution in a tram maintenance shed to provide navigation instructions in a public transport context.…”
Section: Introductionmentioning
confidence: 99%
“…The security of the communication is considered in almost all devices, even though it is an aspect that still presents problems [71]. There are, however, solutions based on secure signatures [72]. …”
Section: Introductionmentioning
confidence: 99%