Mimic defense authentication method for physical access control
To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobi...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2020-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020115/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539341129613312 |
---|---|
author | Qinglei ZHOU Shaohuan BAN Yingjie HAN Feng FENG |
author_facet | Qinglei ZHOU Shaohuan BAN Yingjie HAN Feng FENG |
author_sort | Qinglei ZHOU |
collection | DOAJ |
description | To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods. |
format | Article |
id | doaj-art-437ab06f5a1f4c6cb2f9048a7aded5d8 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2020-06-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-437ab06f5a1f4c6cb2f9048a7aded5d82025-01-14T07:19:06ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2020-06-0141808759734849Mimic defense authentication method for physical access controlQinglei ZHOUShaohuan BANYingjie HANFeng FENGTo address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020115/access controlQR codeheterogeneous redundancymimic defense |
spellingShingle | Qinglei ZHOU Shaohuan BAN Yingjie HAN Feng FENG Mimic defense authentication method for physical access control Tongxin xuebao access control QR code heterogeneous redundancy mimic defense |
title | Mimic defense authentication method for physical access control |
title_full | Mimic defense authentication method for physical access control |
title_fullStr | Mimic defense authentication method for physical access control |
title_full_unstemmed | Mimic defense authentication method for physical access control |
title_short | Mimic defense authentication method for physical access control |
title_sort | mimic defense authentication method for physical access control |
topic | access control QR code heterogeneous redundancy mimic defense |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020115/ |
work_keys_str_mv | AT qingleizhou mimicdefenseauthenticationmethodforphysicalaccesscontrol AT shaohuanban mimicdefenseauthenticationmethodforphysicalaccesscontrol AT yingjiehan mimicdefenseauthenticationmethodforphysicalaccesscontrol AT fengfeng mimicdefenseauthenticationmethodforphysicalaccesscontrol |