Skip to main content

A Role-Based Access Control System for Intelligent Buildings

  • Conference paper
  • First Online:
Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

Recent booming development of intelligent buildings has brought lots of opportunities and challenges to field of the existing building system, especially in the aspect of access control system. This paper proposes a new access control system for intelligent buildings using a role-based control mode and a cloud-based framework. It aims to improve the security, reduce the cost and simplify the administration. This paper also designs a security protocol to realize the secure communications within this system. In addition, the security properties of the proposed protocols are analyzed and verified using model checking tools. Finally, a prototypical system based on our framework is implemented and its performance is evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. He, X.-X.: Fingerprint access control in intelligent building application and implementation. Comput. Knowl. Technol. (2010)

    Google Scholar 

  2. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., et al.: Role-based access controls. Comput. Sci. 29(2), 38–47 (2003)

    Google Scholar 

  3. Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2), 85–106 (2000)

    Article  Google Scholar 

  4. Liu, Z., Zou, Z.: A survey of aeneral temporal RBAC studying. J. Chongqing Normal Univ. 26(3), 69–71 (2009)

    Article  Google Scholar 

  5. Song, L., Zhang, X., Lv, X.: The implementation of a new RBAC. Comput. Knowl. Technol. (2009)

    Google Scholar 

  6. Xue, N., Liang, L., Zhang, J., Huang, X.: An access control system for intelligent buildings. In: EAI International Conference on Mobile Multimedia Communications. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 11–17 (2016)

    Google Scholar 

  7. Maciel, H.S., Cardoso, I., Silva, D.F., et al.: An embedded access control system for restricted areas in smart buildings. In: International Multidisciplinary Conference on Computer and Energy Science, pp. 1–6 (2016)

    Google Scholar 

  8. Chang, Y.-F.: A flexible hierarchical access control mechanism enforcing extension policies. Secur. Commun. Netw. 8(2), 189–201 (2015)

    Article  MathSciNet  Google Scholar 

  9. Xu, R., Huang, X., Zhang, J., Lu, Y., Wu, G., Yan, Z.: Software defined intelligent building. Int. J. Inf. Secur. Priv. (IJISP) 9(3), 84–99 (2015)

    Article  Google Scholar 

  10. Xue, N., Huang, X., Zhang, J.: S2Net: a security framework for software defined intelligent building networks. In: The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016), Tianjin, China (2016)

    Google Scholar 

  11. Huang, X., Craig, P., Lin, H., Yan, Z.: SecIoT: a security framework for the internet of things. Secur. Commun. Netw. 9(16), 3083–3094 (2015)

    Article  Google Scholar 

  12. Huang, X., Fu, R., Chen, B., Zhang, T., Roscoe, A.W.: User interactive internet of things privacy preserved access control. In: The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), London, UK (2012)

    Google Scholar 

  13. Huang, X., He, Y., Hou, Y., Li, L., Sun, L., Zhang, S., Jiang, Y., Zhang, T.: Privacy of value-added context-aware service cloud. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom 2009. LNCS, vol. 5931, pp. 547–552. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10665-1_50

    Chapter  Google Scholar 

  14. Huang, X., Zhang, T., Hou, Y.: ID management among clouds. In: The First International Conference on Future Information Networks, Beijing, China, October 2009

    Google Scholar 

  15. Lowe, G., Dilloway, C., Mei, L.H.: Casper: a compiler for the analysis of security protocols. In: Computer Security Foundations Workshop IEEE Computer, vol. 6, pp. 18–30 (2009)

    Google Scholar 

  16. Bo, W., Li, M., Peng, X.P., Li, X., Huang, X.: A smart power system. In: International Conference on Mechanical Engineering and Intelligent Systems (2015)

    Google Scholar 

  17. Gao, C., Yu, Z., Wei, Y., Russell, S., Guan, Y.: A statistical indoor localization method for supporting location-based access control. Mob. Netw. Appl. 14(2), 253–263 (2009)

    Article  Google Scholar 

  18. Rodriguez, M.D., et al.: Location-aware access to hospital information and services. IEEE Trans. Inf. Technol. Biomed. Publ. IEEE Eng. Med. Biol. Soc. 8(4), 448–455 (2004)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by the XJTLU research development fund projects RDF140243 and RDF150246, as well as by the Suzhou Science and Technology Development Plan under grant SYG201516, and Jiangsu Province National Science Foundation under Grant BK20150376 and Grant BK20140404.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nian Xue .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Xue, N., Jiang, C., Huang, X., Liu, D. (2017). A Role-Based Access Control System for Intelligent Buildings. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_56

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_56

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics