An efficient access control scheme for smart campus
DOI:
https://doi.org/10.4108/eai.21-3-2022.173712Keywords:
identity authentication, access control, radio frequency identification (RFID), policy conflict detectionAbstract
With the great concern of our country and the continuous development of the epidemic, the development of smart campus is getting faster and faster, the safety of teachers and students becomes more and more important. To ensure the safety of users, the first step is to control at the doors. Usually, the access control method is used in computer system to protect the documents and data, few people use it at doors, but it’s a very effective way to improve safety. So we design a two-factor authentication protocol to verity the user’s identity, and improve the attribute-based access control (ABAC) model to fit the smart campus. We analyze the protocol theoretically and verify its security. Compare with others, our scheme can be more efficient and safer.
References
State Administration for Market Regulation standardization Committee of China. “Overall framework of smart campus”. Beijing: Standards press of china, 2018: 1-2.
Sravani Challa, Ashok Kumar Das, Vanga Odelu, Neeraj Kumar et al., “An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks”. Computers & Electrical Engineering. 2018; 69: 534-554.
Rongrong Li, Jiantao Kou, Gang Dong, Liangrui Tang. “A security authentication scheme in RFID system for smart park”. Telecom Science. 2016; 2:164-169.
Gang Liu, Wenxian Pei, Yumin Tian, Chen Liu et al., “A novel conflict detection method for ABAC security policies”. Journal of Industrial Information Integration. 2021; 22.
X. Wang et al., “Expression Tree-based Policy Conflict Detection Algorithm”. 2021 International Conference on Networking and Network Applications (NaNA), 2021, p.
- 366.
K. Vijayalakshmi et al., “Identifying Considerable Anomalies and Conflicts in ABAC Security Policies”. 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021, p. 1273-1280.
Y. Zhao et al., “A Security Access Control Scheme of Smart Community under Epidemic Situation”. 2021 6th International Conference on Communication, Image and Signal Processing (CCISP), 2021. p. 85-89.
Zetao Jiang, Zhen Xie, Qi Wang, Wenhui Zhang. “ABAC Static Policy Conflict and Redundancy Detection Algorithm Based on Mask Key”. Computer Science. 2018; 2:197-202.
M. Wazid, A. K. Das, V. Odelu, N. Kumar, M. Conti, M. Jo. “Design of secure user authenticated key management protocol for generic IoT networks”. IEEE Internet of Things Journal. 2018; 5: 269-282.
Y. Choi, D. Lee, S. Kim, J. Jung, J. Nam, and D. Won, “Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography”. Sensors. 2014; 14: 10081-10106.
Chen C.M., Huang Y., Wang K.H., Kumari S., Wu M.E. “A secure authenticated and key exchange scheme for fog computing”. Enterprise Information Systems. 2020; 4: 1-16.
Akram M.A., Ghaffar Z., Mahmood K., Kumari S., Agarwal K., Chen C.M. “An anonymous authenticated key-agreement scheme for multi-server infrastructure”. Human-Centric Computing and Information Sciences. 2020; 10: 1-18.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 EAI Endorsed Transactions on Scalable Information Systems
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.