Skip to main content
Erschienen in: Wireless Personal Communications 1/2017

26.04.2016

IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices

verfasst von: Thong-Yun Teh, Yik-Shu Lee, Zi-Yik Cheah, Ji-Jian Chin

Erschienen in: Wireless Personal Communications | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In large organizations, handling personnel authorization for access to various sites within the building has always proved to be a challenge for security departments. In this work, we develop a prototype that utilizes an identity-based identification scheme to provide access control for incoming and outgoing personnel from the building, as well as their activities within. Our prototype is built using open-source web technology as well as mobile app support for personal smart phones. The novelty lies in the application of an identity-based identification scheme as a crucial component to ensure that no third party malicious observers, or even observers disguised as honest users trying to break the system, will be able to learn anything about the authentication processes of other users. We also reveal the running time for our various mobile applications for both the registration and identification process and show that they are competitive to that of previous work done in identity-based identification simulation experiments in the past. Lastly, as proof of concept, we demonstrate our prototype with a Nuvton electromagnetic door lock that communicates with the verification process on the server.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil Pairing. Asiacrypt 2001. LNCS (Vol. 2248, pp. 514–532). Heidelberg: Springer. Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil Pairing. Asiacrypt 2001. LNCS (Vol. 2248, pp. 514–532). Heidelberg: Springer.
2.
Zurück zum Zitat Chin, J.-J., Anada, H., & Tan, S.-Y. (2015).Reset-secure identity-based identification schemes without pairings. To appear at ProvSec 2015, LNCS. Heidelberg: Springer. Chin, J.-J., Anada, H., & Tan, S.-Y. (2015).Reset-secure identity-based identification schemes without pairings. To appear at ProvSec 2015, LNCS. Heidelberg: Springer.
3.
Zurück zum Zitat Chin, J.-J., Tan, S.-Y., Kam, Yvonne, H.-S., & Leong, C.-H. (2014). Implementation of identity-based and certificateless identification on Andriod platform. Cryptology 2014. UPM Press, Universiti Putra Malaysia, pp. 205–215. Chin, J.-J., Tan, S.-Y., Kam, Yvonne, H.-S., & Leong, C.-H. (2014). Implementation of identity-based and certificateless identification on Andriod platform. Cryptology 2014. UPM Press, Universiti Putra Malaysia, pp. 205–215.
4.
Zurück zum Zitat Fujioka, A., Saito, T., & Xagawa, K. (2012). Applicability of OR-proof techniques to hierarchical identity-based identification. CANS 2012, LNCS 7712 (pp. 169–184). Heidelberg: Springer. Fujioka, A., Saito, T., & Xagawa, K. (2012). Applicability of OR-proof techniques to hierarchical identity-based identification. CANS 2012, LNCS 7712 (pp. 169–184). Heidelberg: Springer.
5.
Zurück zum Zitat Kurosawa, K., & Heng, S.-H. (2004). From Digital Signatures to Identity-Based Identification. PKC 2004. LNCS (Vol. 2947, pp. 248–261). Heidelberg: Springer. Kurosawa, K., & Heng, S.-H. (2004). From Digital Signatures to Identity-Based Identification. PKC 2004. LNCS (Vol. 2947, pp. 248–261). Heidelberg: Springer.
6.
Zurück zum Zitat Kurosawa, K., & Heng, S.-H. (2005). Identity-based identification without random oracles. ICCSA 2005. LNCS (Vol. 3481, pp. 603–613). Heidelberg: Springer. Kurosawa, K., & Heng, S.-H. (2005). Identity-based identification without random oracles. ICCSA 2005. LNCS (Vol. 3481, pp. 603–613). Heidelberg: Springer.
7.
Zurück zum Zitat Pedersen, T. P. (1991). Non-interactive and information-theoretic secure verifiable secret sharing. Crypto 1991. LNCS (Vol. 576, pp. 129–140). Heidelberg: Springer. Pedersen, T. P. (1991). Non-interactive and information-theoretic secure verifiable secret sharing. Crypto 1991. LNCS (Vol. 576, pp. 129–140). Heidelberg: Springer.
8.
Zurück zum Zitat Shamir, A. (1985). Identity-based cryptosystem and signature schemes. Advances in Cryptology Crypto 84. Shamir, A. (1985). Identity-based cryptosystem and signature schemes. Advances in Cryptology Crypto 84.
9.
Zurück zum Zitat Tan, S.-Y., Swee-Huay, H., & Bok-Min, G. (2010). Java Implementation for pairing-based cryptosystems. ICCSA 2010. LNCS (Vol. 6019, pp. 188–198). Heidelberg: Springer. Tan, S.-Y., Swee-Huay, H., & Bok-Min, G. (2010). Java Implementation for pairing-based cryptosystems. ICCSA 2010. LNCS (Vol. 6019, pp. 188–198). Heidelberg: Springer.
Metadaten
Titel
IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices
verfasst von
Thong-Yun Teh
Yik-Shu Lee
Zi-Yik Cheah
Ji-Jian Chin
Publikationsdatum
26.04.2016
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-016-3320-y

Weitere Artikel der Ausgabe 1/2017

Wireless Personal Communications 1/2017 Zur Ausgabe