skip to main content
10.1145/1387269.1387281acmconferencesArticle/Chapter ViewAbstractPublication PagesicpsConference Proceedingsconference-collections
short-paper

A pervasive identification service for physical access control

Published:06 July 2008Publication History

ABSTRACT

In pervasive environments managing people access control to physical places through their digital identity and simple, uniform, non-invasive yet secure mechanisms, is certainly an important issue. We face this problem by proposing a new secure one-time-password approach with peculiar features of efficiency making it very suitable for the considered application. This aspect is indeed particularly important in pervasive setting, where portable devices are used at any time and anywhere, making the power consumption aspect strongly critical.

References

  1. F. Buccafurri and G. Lax. A low power number-generation scheme for secure authentication. Technical Report 02, CS-Laboratory, DIMET, Univ. of Reggio Calabria, 2008, available from authors.Google ScholarGoogle Scholar
  2. ECMA. ECMA-182: Data Interchange on 12,7,mm 48-Track Magnetic Tape Cartridges - DLT1 Format. Dec. 1992.Google ScholarGoogle Scholar
  3. N. Haller. The s/key one-time password system. In Proceedings of the ISOC Symposium on Network and Distributed System Security, pages 151--157, 1994.Google ScholarGoogle Scholar
  4. N. Haller, C. Metz, P. Nesser, and M. Straw. A one-time password system. RFC 2289, February 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. R. Hill. A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev., 9(2):40--60, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770--772, Nov. 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. L. McDonald, R. J. Atkinson, and C. Metz. One-time passwords in everything (opie): Experiences with building and using strong authentication. In Proceedings of the 5th USENIX UNIX Security Symposium, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Peterson. Error-correcting codes. M.I.T. Press and John Wiley & Sons, 1961.Google ScholarGoogle Scholar
  9. R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communication of ACM., 21(2):120--126, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Rubin and N. Wright. Off-line generation of limited-use credit card numbers. In Proceedings of the Fifth International Conference on Financial Cryptography, pages 165--175, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. D. Rubin. Independent one-time passwords. In USENIX Journal of Computer Systems, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A pervasive identification service for physical access control

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICPS '08: Proceedings of the 5th international conference on Pervasive services
          July 2008
          202 pages
          ISBN:9781605581354
          DOI:10.1145/1387269

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 6 July 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate23of34submissions,68%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader