Risk adaptive hybrid RFID access control system

被引:6
作者
Al-Zewairi, Malek [1 ]
Alqatawna, Ja'far [2 ]
Atoum, Jalal [1 ]
机构
[1] Princess Sumaya Univ Technol, King Hussein Fac Comp Sci, Amman 11941, Jordan
[2] Univ Jordan, King Abdullah Sch Informat Technol 2, Amman 11942, Jordan
关键词
risk adaptive; access control; RFID; security;
D O I
10.1002/sec.1303
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dynamic environments pose a challenge for traditional access control models where permissions are granted or revoked merely based on predefined and static access policies making them incapable of dynamically adapting to changing conditions. Risk adaptive access control models have been gaining more attention in the research community as an alternative approach to overcome the limitations of traditional access control models. Radio Frequency Identification (RFID) is an emerging technology widely utilized in both physical and logical access control systems because of its contactless nature, low cost, high read/ write speed and long distance operation. Serverless RFID system architecture offers better availability assurance and lower implementation cost, while access rights management is easier in server-based architecture. In this study, we continue to build on our previous research on the privacy and security of RFID access control systems without a backend database in order to overcome its limitations. We propose a hybrid design for a risk adaptive RFID access control system; that is, dynamically alternating between two access control modes, online (server-based) and offline (serverless), to adapt to the level of risk depending on rule-based risk scenarios and current risk value. The proposed design combines features of both serverless and risk adaptive access control systems. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3826 / 3835
页数:10
相关论文
共 25 条
[1]   Towards the realisation of context-risk-aware access control in pervasive computing [J].
Ahmed, Ali ;
Zhang, Ning .
TELECOMMUNICATION SYSTEMS, 2010, 45 (2-3) :127-137
[2]  
Al-Zewairi M., 2011, PRIVACY SECURITY RFI, P272
[3]   Overriding of access control in XACML [J].
Alqatawna, Ja'far ;
Rissanen, Erik ;
Sadighi, Babak .
EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, :87-+
[4]   An adaptive risk management and access control framework to mitigate insider threats [J].
Baracaldo, Nathalie ;
Joshi, James .
COMPUTERS & SECURITY, 2013, 39 :237-254
[5]  
Benssalah M, 2014, SECURITY COMM N 0101
[6]  
Bijon KZ, 2013, IEEE CONF COMM NETW, P462, DOI 10.1109/CNS.2013.6682761
[7]  
Chen C., 2010, 2010 14 INT C COMP S, P110, DOI [10.1109/CSCWD.2010, DOI 10.1109/CSCWD.2010]
[8]  
Cheng X., 2013, CIRCUITS SYS INPRESS, P1, DOI DOI 10.1039/X0XX00000X
[9]  
Cole P.H., 2008, Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
[10]  
Han S, 2007, LECT NOTES COMPUT SC, V4864, P623