scholarly journals Multidevice Authentication with Strong Privacy Protection

2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Jan Hajny ◽  
Petr Dzurenda ◽  
Lukas Malina

Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels. Yet these systems have often very poor cryptographic protection. User identifiers and keys can be easily eavesdropped on and counterfeited. The privacy-preserving features are almost missing in these systems. To improve this state, we propose a novel cryptographic scheme based on efficient zero-knowledge proofs and Boneh-Boyen signatures. The proposed scheme is provably secure and provides the full set of privacy-enhancing features, that is, the anonymity, untraceability, and unlinkability of users. Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices. This feature is particularly important in applications for controlling access to dangerous sites where the presence of protective equipment is checked during each access control session. Besides the full cryptographic specification, we also show the results of our implementation on devices commonly used in access control applications, particularly the smart cards and embedded verification terminals. By avoiding costly operations on user devices, such as bilinear pairings, we were able to achieve times comparable to existing systems (around 500 ms), while providing significantly higher security, privacy protection, and features for RFID multidevice authentication.

2019 ◽  
Vol 15 (2) ◽  
pp. 23-28
Author(s):  
Evgeny A. Godovnikov ◽  
Anatoliy V. Shicelov ◽  
Ruslan T. Usmanov

This article discusses the design of a physical access control system for an enterprise with various methods of authentication and user identification. A review of existing solutions in the design of physical access control systems was conducted. In the course of the work, a system design was proposed, and its components were described in detail.


Author(s):  
S. Chague ◽  
B. Droit ◽  
O. Boulanov ◽  
S. N. Yanushkevich ◽  
V. P. Shmerko ◽  
...  

2014 ◽  
Vol 718 ◽  
pp. 143-149 ◽  
Author(s):  
Michal Balog ◽  
Erik Szilágyi ◽  
Dávid Marton

Our aim is to deal with the application of RFID technology in real conditions. Increasing interest in Radio Frequency Identification and related numerous applications for increasing automation in information systems has become an area of ​​interest public transportation applications. The reason for the application of RFID technology is tracking entrance/exit of vehicles to or from the parking area. The main expected benefits arising out of the introduction of this system is considered to maximize efficiency in payments to external carriers parking operator for services related to the use of the bus park for a period of time.


Author(s):  
Obed Persie Appiah-Kubi ◽  
Kafui Kwesi Agyeman ◽  
Frederick Ampah Clement ◽  
Harold Awuley Quaye

The Kwame Nkrumah University of Science and Technology (KNUST) and the University of Ghana (UG) have embraced the use of electronic tags to grant users access to their campuses via electronic vehicle access-control gates. This introduction has not only granted or denied users entry into the university community, but has helped increase security, monitored movement of vehicles, kept records, reduced the rate of vehicle theft and unnecessary traffic jams. That notwithstanding, there are some challenges. This study focused on analysing the existing vehicular accesscontrol systems in both universities and the challenges faced with the use of the systems. The qualitative research method and the descriptive research design were employed in the study. In all, one hundred and forty (140) users of the access-control systems: seventy (70) from each university, were selected for interview using the convenience, snowball, and purposive sampling techniques. The findings of the study showed that out of the 140 respondents, fifty-four (54) respondents representing 39% indicated they have encountered one or more of these challenges: system authentication failure, delay in system operation, interrupted power supply, tag abuse and/or theft. These are coupled with challenges of the safety of the equipment adapted. In this regard, this paper resulted in a clear picture of the technology adopted by the two institutions, their pros and cons, as well as user friendliness and sustainability. This is followed by constructive recommendations regarding sustainable components for the vehicular access-control systems such as improvement in the bio data reading technology, more active chips, energy efficiency, and more effective but durable systems. This is expected to improve the institutional/employee security of such institutions as wells provide information on the RFID technology, its use and challenges to other institutions who are yet to embrace the system.


Author(s):  
Svetlana N. Yanushkevich ◽  
Oleg Boulanov ◽  
Adrian Stoica ◽  
Vlad P. Shmerko

Sign in / Sign up

Export Citation Format

Share Document