基于智能手机的spics认证授权协议

Faisal Karim Bhutta, Abdul Ghafoor, Shizra Sultan
{"title":"基于智能手机的spics认证授权协议","authors":"Faisal Karim Bhutta, Abdul Ghafoor, Shizra Sultan","doi":"10.1109/HONET.2012.6421448","DOIUrl":null,"url":null,"abstract":"Nowadays smart-phone is becoming multi-purpose device because it has more processing power at affordable cost. The usage of smart-phone is growing and being used for various personal and business activities. Therefore it can be used as authenticator in physical access control system. But due to its openness, organizations are very much concerned about the security, reliability and privacy of the user's credentials. In this paper, we have described a security protocol for smart-phones which are used for identity verification, authentication and authorization in physical access control system (PACS). The designed authentication protocol is an extension of two-factor authentication FIPS-196 protocol and provides symmetric key based single-sign-on mechanism to achieve efficiency. For authorization, we have used XACML standard for creating and evaluating policies and included pass-code feature in the protocol to ensure the presence of the mobile owner. Furthermore, the implementation of our designed protocol transparently handles the security credentials and is easy to use by the ordinary people. We have verified our protocol by using automated security protocol verification tool, Scyther and have verified that our protocol provides protection against man-in-the-middle attack, replay attack and secrecy of the user's credentials.","PeriodicalId":334187,"journal":{"name":"High Capacity Optical Networks and Emerging/Enabling Technologies","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Smart phone based authentication and authorization protocol for SPACS\",\"authors\":\"Faisal Karim Bhutta, Abdul Ghafoor, Shizra Sultan\",\"doi\":\"10.1109/HONET.2012.6421448\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays smart-phone is becoming multi-purpose device because it has more processing power at affordable cost. The usage of smart-phone is growing and being used for various personal and business activities. Therefore it can be used as authenticator in physical access control system. But due to its openness, organizations are very much concerned about the security, reliability and privacy of the user's credentials. In this paper, we have described a security protocol for smart-phones which are used for identity verification, authentication and authorization in physical access control system (PACS). The designed authentication protocol is an extension of two-factor authentication FIPS-196 protocol and provides symmetric key based single-sign-on mechanism to achieve efficiency. For authorization, we have used XACML standard for creating and evaluating policies and included pass-code feature in the protocol to ensure the presence of the mobile owner. Furthermore, the implementation of our designed protocol transparently handles the security credentials and is easy to use by the ordinary people. We have verified our protocol by using automated security protocol verification tool, Scyther and have verified that our protocol provides protection against man-in-the-middle attack, replay attack and secrecy of the user's credentials.\",\"PeriodicalId\":334187,\"journal\":{\"name\":\"High Capacity Optical Networks and Emerging/Enabling Technologies\",\"volume\":\"72 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"High Capacity Optical Networks and Emerging/Enabling Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HONET.2012.6421448\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"High Capacity Optical Networks and Emerging/Enabling Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HONET.2012.6421448","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

如今,智能手机正成为多用途设备,因为它具有更强的处理能力,而且价格合理。智能手机的使用正在增长,并被用于各种个人和商业活动。因此,它可以作为物理门禁系统中的认证器。但是由于它的开放性,组织非常关心用户凭证的安全性、可靠性和隐私性。本文描述了一种用于物理访问控制系统(PACS)中身份验证、认证和授权的智能手机安全协议。所设计的认证协议是对双因素认证FIPS-196协议的扩展,并提供了基于对称密钥的单点登录机制来实现效率。对于授权,我们使用了XACML标准来创建和评估策略,并在协议中包含了密码特性,以确保移动设备所有者的存在。此外,我们设计的协议的实现透明地处理安全凭证,并且易于普通用户使用。我们通过使用自动安全协议验证工具Scyther验证了我们的协议,并验证了我们的协议提供了针对中间人攻击,重放攻击和用户凭证保密的保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Smart phone based authentication and authorization protocol for SPACS
Nowadays smart-phone is becoming multi-purpose device because it has more processing power at affordable cost. The usage of smart-phone is growing and being used for various personal and business activities. Therefore it can be used as authenticator in physical access control system. But due to its openness, organizations are very much concerned about the security, reliability and privacy of the user's credentials. In this paper, we have described a security protocol for smart-phones which are used for identity verification, authentication and authorization in physical access control system (PACS). The designed authentication protocol is an extension of two-factor authentication FIPS-196 protocol and provides symmetric key based single-sign-on mechanism to achieve efficiency. For authorization, we have used XACML standard for creating and evaluating policies and included pass-code feature in the protocol to ensure the presence of the mobile owner. Furthermore, the implementation of our designed protocol transparently handles the security credentials and is easy to use by the ordinary people. We have verified our protocol by using automated security protocol verification tool, Scyther and have verified that our protocol provides protection against man-in-the-middle attack, replay attack and secrecy of the user's credentials.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信