ABSTRACT
In pervasive environments managing people access control to physical places through their digital identity and simple, uniform, non-invasive yet secure mechanisms, is certainly an important issue. We face this problem by proposing a new secure one-time-password approach with peculiar features of efficiency making it very suitable for the considered application. This aspect is indeed particularly important in pervasive setting, where portable devices are used at any time and anywhere, making the power consumption aspect strongly critical.
- F. Buccafurri and G. Lax. A low power number-generation scheme for secure authentication. Technical Report 02, CS-Laboratory, DIMET, Univ. of Reggio Calabria, 2008, available from authors.Google Scholar
- ECMA. ECMA-182: Data Interchange on 12,7,mm 48-Track Magnetic Tape Cartridges - DLT1 Format. Dec. 1992.Google Scholar
- N. Haller. The s/key one-time password system. In Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 151--157, 1994.Google Scholar
- N. Haller, C. Metz, P. Nesser, and M. Straw. A one-time password system. RFC 2289, February 1998. Google ScholarDigital Library
- J. R. Hill. A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev., 9(2):40--60, 1979. Google ScholarDigital Library
- L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770--772, Nov. 1981. Google ScholarDigital Library
- D. L. McDonald, R. J. Atkinson, and C. Metz. One-time passwords in everything (opie): Experiences with building and using strong authentication. In Proceedings of the 5th USENIX UNIX Security Symposium, 1995. Google ScholarDigital Library
- W. Peterson. Error-correcting codes. M.I.T. Press and John Wiley & Sons, 1961.Google Scholar
- R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communication of ACM., 21(2):120--126, 1978. Google ScholarDigital Library
- A. Rubin and N. Wright. Off-line generation of limited-use credit card numbers. In Proceedings of the Fifth International Conference on Financial Cryptography, pages 165--175, 2001. Google ScholarDigital Library
- A. D. Rubin. Independent one-time passwords. In USENIX Journal of Computer Systems, 1996. Google ScholarDigital Library
Index Terms
- A pervasive identification service for physical access control
Recommendations
Practical deniable authentication for pervasive computing environments
Pervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two ...
Secure Physical Access Control with Strong Cryptographic Protection
ICETE 2015: Proceedings of the 12th International Joint Conference on e-Business and Telecommunications - Volume 4This paper is focused on the area of physical access control systems (PACs), particularly on the systems for
building access control. We show how the application of modern cryptographic protocols, namely the cryptographic
proofs of knowledge, can ...
A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
In pervasive computing environments, the users can get access to the services from the service providers in a highly desirable way. But the security of the user's authentication is a challenging field. Pervasive computing environments must provide the ...
Comments