Research Article
A Keyless Facility Access Control System with Wireless Enabled Personal Devices
@INPROCEEDINGS{10.1145/1577222.1577283, author={Chenxi Zhang and Xiaodong Lin and Xiaoting Sun and Pin-Han Ho}, title={A Keyless Facility Access Control System with Wireless Enabled Personal Devices}, proceedings={4th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness}, publisher={ACM}, proceedings_a={QSHINE}, year={2007}, month={8}, keywords={Wireless Mesh Network (WMN) Security Access Control Key Management Security}, doi={10.1145/1577222.1577283} }
- Chenxi Zhang
Xiaodong Lin
Xiaoting Sun
Pin-Han Ho
Year: 2007
A Keyless Facility Access Control System with Wireless Enabled Personal Devices
QSHINE
ACM
DOI: 10.1145/1577222.1577283
Abstract
Nowadays, wireless personal devices, such as cell phones and Personal Data Assistants (PDAs), have gradually taken an important part of our daily lives. With two-factor authen- tication, the wireless personal devices can be further pro- moted to more security demanding and mission-critical ap- plications, such as e-commerce, home surveillance, and med- ical monitoring, etc. Facility access is one of applications that have demonstrated a tremendous market potential for replacing the conventional physical key approach. In this pa- per, we present a novel keyless facility access control system by using wireless personal devices, where the devices serve as a second authentication factor to assure security. The proposed system is not only cost-e±cient, but also capa- ble of mitigating security threats existing in the traditional key control system. Furthermore, the proposed authentica- tion protocol is featured in two di®erent authentication pro- cesses for the ¯rst time and subsequent accesses by using a one-time authentication mechanism based on one-way hash chain while considering the resource constraints of the wire- less personal devices and E-lock. Finally, a role-based access control (RBAC) system is adopted to reduce the complexity of key maintenance.