An efficient access control scheme for smart campus

Authors

  • Yiru Niu Science and Technology on Communication Security Laboratory
  • Hong Jiang China Electronics Technology Group Corporation (China) image/svg+xml
  • Bo Tian Chongqing University image/svg+xml
  • Hong Xiang Chongqing University image/svg+xml
  • Yiming Liu Science and Technology on Communication Security Laboratory
  • Xiaofeng Xia Chongqing University image/svg+xml
  • Yue Zhao Science and Technology on Communication Security Laboratory

DOI:

https://doi.org/10.4108/eai.21-3-2022.173712

Keywords:

identity authentication, access control, radio frequency identification (RFID), policy conflict detection

Abstract

With the great concern of our country and the continuous development of the epidemic, the development of smart campus is getting faster and faster, the safety of teachers and students becomes more and more important. To ensure the safety of users, the first step is to control at the doors. Usually, the access control method is used in computer system to protect the documents and data, few people use it at doors, but it’s a very effective way to improve safety. So we design a two-factor authentication protocol to verity the user’s identity, and improve the attribute-based access control (ABAC) model to fit the smart campus. We analyze the protocol theoretically and verify its security. Compare with others, our scheme can be more efficient and safer.

References

State Administration for Market Regulation standardization Committee of China. “Overall framework of smart campus”. Beijing: Standards press of china, 2018: 1-2.

Sravani Challa, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar et al., “An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks”. Computers & Electrical Engineering. 2018; 69: 534-554.

Rongrong Li, Jiantao Kou, Gang Dong, Liangrui Tang. “A security authentication scheme in RFID system for smart park”. Telecom Science. 2016; 2:164-169.

Gang Liu, Wenxian Pei, Yumin Tian, Chen Liu et al., “A novel conflict detection method for ABAC security policies”. Journal of Industrial Information Integration. 2021; 22.

X. Wang et al., “Expression Tree-based Policy Conflict Detection Algorithm”. 2021 International Conference on Networking and Network Applications (NaNA), 2021, p.

- 366.

K. Vijayalakshmi et al., “Identifying Considerable Anomalies and Conflicts in ABAC Security Policies”. 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021, p. 1273-1280.

Y. Zhao et al., “A Security Access Control Scheme of Smart Community under Epidemic Situation”. 2021 6th International Conference on Communication, Image and Signal Processing (CCISP), 2021. p. 85-89.

Zetao Jiang, Zhen Xie, Qi Wang, Wenhui Zhang. “ABAC Static Policy Conflict and Redundancy Detection Algorithm Based on Mask Key”. Computer Science. 2018; 2:197-202.

M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, M. Jo. “Design of secure user authenticated key management protocol for generic IoT networks”. IEEE Internet of Things Journal. 2018; 5: 269-282.

Y. Choi, D. Lee, S. Kim, J. Jung, J. Nam, and D. Won, “Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography”. Sensors. 2014; 14: 10081-10106.

Chen C.M., Huang Y., Wang K.H., Kumari S., Wu M.E. “A secure authenticated and key exchange scheme for fog computing”. Enterprise Information Systems. 2020; 4: 1-16.

Akram M.A., Ghaffar Z., Mahmood K., Kumari S., Agarwal K., Chen C.M. “An anonymous authenticated key-agreement scheme for multi-server infrastructure”. Human-Centric Computing and Information Sciences. 2020; 10: 1-18.

Downloads

Published

21-03-2022

How to Cite

1.
Niu Y, Jiang H, Tian B, Xiang H, Liu Y, Xia X, Zhao Y. An efficient access control scheme for smart campus. EAI Endorsed Scal Inf Syst [Internet]. 2022 Mar. 21 [cited 2024 Dec. 23];9(6):e5. Available from: https://publications.eai.eu/index.php/sis/article/view/349