Mimic defense authentication method for physical access control

To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobi...

Full description

Saved in:
Bibliographic Details
Main Authors: Qinglei ZHOU, Shaohuan BAN, Yingjie HAN, Feng FENG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2020-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020115/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539341129613312
author Qinglei ZHOU
Shaohuan BAN
Yingjie HAN
Feng FENG
author_facet Qinglei ZHOU
Shaohuan BAN
Yingjie HAN
Feng FENG
author_sort Qinglei ZHOU
collection DOAJ
description To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.
format Article
id doaj-art-437ab06f5a1f4c6cb2f9048a7aded5d8
institution Kabale University
issn 1000-436X
language zho
publishDate 2020-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-437ab06f5a1f4c6cb2f9048a7aded5d82025-01-14T07:19:06ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2020-06-0141808759734849Mimic defense authentication method for physical access controlQinglei ZHOUShaohuan BANYingjie HANFeng FENGTo address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020115/access controlQR codeheterogeneous redundancymimic defense
spellingShingle Qinglei ZHOU
Shaohuan BAN
Yingjie HAN
Feng FENG
Mimic defense authentication method for physical access control
Tongxin xuebao
access control
QR code
heterogeneous redundancy
mimic defense
title Mimic defense authentication method for physical access control
title_full Mimic defense authentication method for physical access control
title_fullStr Mimic defense authentication method for physical access control
title_full_unstemmed Mimic defense authentication method for physical access control
title_short Mimic defense authentication method for physical access control
title_sort mimic defense authentication method for physical access control
topic access control
QR code
heterogeneous redundancy
mimic defense
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020115/
work_keys_str_mv AT qingleizhou mimicdefenseauthenticationmethodforphysicalaccesscontrol
AT shaohuanban mimicdefenseauthenticationmethodforphysicalaccesscontrol
AT yingjiehan mimicdefenseauthenticationmethodforphysicalaccesscontrol
AT fengfeng mimicdefenseauthenticationmethodforphysicalaccesscontrol