Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- D1.2: Communication Infrastructure.
- D1.3: Wiki System.
- D8.3: Database on Identity Management Systems and ID Law in the EU.
- D8.5: Report on inter-disciplinary workshops.
- D9.1: A Specification for FIDIS Journal.
- D9.5: 1st FIDIS in-house Journal Issue.
- D15.2: FIDIS International Summer School.
- D15.4: Interdisciplinary FIDIS Doctorial Consortium.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D8.5: Report on inter-disciplinary workshops
Two major differences have been identified between mobile and fixed communication. The first one regards the area of identification and authentication requirements, while the second one is in the field of physical security. Other concepts that differentiate mobile user requirements relate to: (a) general restrictions on power consumption and for data input and visualisation due to the small size imposed on mobile devices; (b) the storing of confidential data on the mobile devices which could more easily be compromised; (c) the restrictions of a single user operating system dedicated to mobile devices; (d) adapting solutions to heterogeneous network conditions, which means that there are also legal considerations beyond technical ones so as to allow users to perform their tasks and receive their (subscribed) services seamlessly through heterogeneous connections in a trusted environment.
Two more issues emerged from this discussion: biometrics are unlikely to impact significantly mobile authentication solutions for the next 5, probably 10 years owing to the energy requirements and the reliability limitations that these currently demonstrate; and there needs to be action on raising awareness of the mobile user on the capabilities/limitations of mobile services at least until such time as legislation and appropriate enforcement would allow user protection.
Among the challenges that mobile systems have brought, an increased threat was identified of viruses now making their appearance in mobile systems (e.g. in mobile phones).
A need to increase the awareness of the users regarding the capability of their mobile devices was also identified, in order to mitigate the shortcomings / negative impacts of mobile communications.
Finally, it was suggested that a common solution for fixed and mobile communications could be reached, since it is difficult to provide solutions for each scenario (fixed and mobile). Also, if different solutions are adopted for the fixed and mobile environment, heterogeneity would be increased, which perhaps may create a greater problem.
Denis Royer | 4 / 7 |