An efficient access control scheme for smart campus

被引:0
作者
Niu, Yiru [1 ]
Jiang, Hong [2 ]
Tian, Bo [3 ]
Xiang, Hong [3 ]
Liu, Yiming [1 ]
Xia, Xiaofeng [3 ]
Zhao, Yue [1 ]
机构
[1] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
[2] 30 Res Inst China Elect Technology Grp Corp, Chengdu, Peoples R China
[3] Chongqing Univ, Sch Big Data & Software Engn, Chongqing, Peoples R China
关键词
identity authentication; access control; radio frequency identification (RFID); policy conflict detection; USER AUTHENTICATION; PROTOCOL;
D O I
10.4108/eai.21-3-2022.173712
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the great concern of our country and the continuous development of the epidemic, the development of smart campus is getting faster and faster, the safety of teachers and students becomes more and more important. To ensure the safety of users, the first step is to control at the doors. Usually, the access control method is used in computer system to protect the documents and data, few people use it at doors, but it's a very effective way to improve safety. So we design a two-factor authentication protocol to verity the user's identity, and improve the attribute-based access control (ABAC) model to fit the smart campus. We analyze the protocol theoretically and verify its security. Compare with others, our scheme can be more efficient and safer.
引用
收藏
页数:7
相关论文
共 12 条
  • [1] An anonymous authenticated key-agreement scheme for multi-server infrastructure
    Akram, Muhammad Arslan
    Ghaffar, Zahid
    Mahmood, Khalid
    Kumari, Saru
    Agarwal, Kadambri
    Chen, Chien-Ming
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2020, 10 (01)
  • [2] [Anonymous], 2018, Overall framework of smart campus, P1
  • [3] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [4] A secure authenticated and key exchange scheme for fog computing
    Chen, Chien-Ming
    Huang, Yanyu
    Wang, King-Hang
    Kumari, Saru
    Wu, Mu-En
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (09) : 1200 - 1215
  • [5] Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography
    Choi, Younsung
    Lee, Donghoon
    Kim, Jiye
    Jung, Jaewook
    Nam, Junghyun
    Won, Dongho
    [J]. SENSORS, 2014, 14 (06) : 10081 - 10106
  • [6] [江泽涛 Jiang Zetao], 2018, [计算机科学, Computer Science], V45, P197
  • [7] Li Rongrong, 2016, Telecom Science, V2, P164
  • [8] A novel conflict detection method for ABAC security policies
    Liu, Gang
    Pei, Wenxian
    Tian, Yumin
    Liu, Chen
    Li, Shancang
    [J]. JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2021, 22 (22)
  • [9] Vijayalakshmi K., 2021, 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), P1273, DOI 10.1109/ICICCS51141.2021.9432162
  • [10] Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks
    Wazid, Mohammad
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Conti, Mauro
    Jo, Minho
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01): : 269 - 282