A keyless facility access control system with wireless enabled personal devices

Nowadays, wireless personal devices, such as cell phones and Personal Data Assistants (PDAs), have gradually taken an important part of our daily lives. With two-factor authentication, the wireless personal devices can be further promoted to more security demanding and mission-critical applications, such as e-commerce, home surveillance, and medical monitoring, etc. Facility access is one of applications that have demonstrated a tremendous market potential for replacing the conventional physical key approach. In this paper, we present a novel keyless facility access control system by using wireless personal devices, where the devices serve as a second authentication factor to assure security. The proposed system is not only cost-efficient, but also capable of mitigating security threats existing in the traditional key control system. Furthermore, the proposed authentication protocol is featured in two different authentication processes for the first time and subsequent accesses by using a one-time authentication mechanism based on one-way hash chain while considering the resource constraints of the wireless personal devices and E-lock. Finally, a role-based access control (RBAC) system is adopted to reduce the complexity of key maintenance.

[1]  Bart Preneel,et al.  Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks , 2005, SPC.

[2]  Sylvia L. Osborn,et al.  The role graph model , 1996, RBAC '95.

[3]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[4]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[5]  Zhenfu Cao A threshold key escrow scheme based on public key cryptosystem , 2001 .

[6]  Qiang Huang,et al.  Secure data forwarding in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[7]  Zhenfu Cao,et al.  Provably secure robust threshold partial blind signature , 2006, Science in China Series F: Information Sciences.

[8]  Adi Shamir,et al.  PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.