4th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness

Research Article

A Keyless Facility Access Control System with Wireless Enabled Personal Devices

  • @INPROCEEDINGS{10.1145/1577222.1577283,
        author={Chenxi Zhang and Xiaodong Lin and Xiaoting Sun and Pin-Han Ho},
        title={A Keyless Facility Access Control System with Wireless Enabled Personal Devices},
        proceedings={4th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and  Robustness},
        publisher={ACM},
        proceedings_a={QSHINE},
        year={2007},
        month={8},
        keywords={Wireless Mesh Network (WMN) Security Access Control Key Management  Security},
        doi={10.1145/1577222.1577283}
    }
    
  • Chenxi Zhang
    Xiaodong Lin
    Xiaoting Sun
    Pin-Han Ho
    Year: 2007
    A Keyless Facility Access Control System with Wireless Enabled Personal Devices
    QSHINE
    ACM
    DOI: 10.1145/1577222.1577283
Chenxi Zhang1,*, Xiaodong Lin1,*, Xiaoting Sun2,*, Pin-Han Ho1,*
  • 1: Electrical and Computer Engineering University of Waterloo, Canada
  • 2: Computer Science University of Waterloo, Canada
*Contact email: c14zhang@engmail.uwaterloo.ca, xdlin@bbcr.uwaterloo.ca, x7sun@cs.uwaterloo.ca, pinhan@bbcr.uwaterloo.ca

Abstract

Nowadays, wireless personal devices, such as cell phones and Personal Data Assistants (PDAs), have gradually taken an important part of our daily lives. With two-factor authen- tication, the wireless personal devices can be further pro- moted to more security demanding and mission-critical ap- plications, such as e-commerce, home surveillance, and med- ical monitoring, etc. Facility access is one of applications that have demonstrated a tremendous market potential for replacing the conventional physical key approach. In this pa- per, we present a novel keyless facility access control system by using wireless personal devices, where the devices serve as a second authentication factor to assure security. The proposed system is not only cost-e±cient, but also capa- ble of mitigating security threats existing in the traditional key control system. Furthermore, the proposed authentica- tion protocol is featured in two di®erent authentication pro- cesses for the ¯rst time and subsequent accesses by using a one-time authentication mechanism based on one-way hash chain while considering the resource constraints of the wire- less personal devices and E-lock. Finally, a role-based access control (RBAC) system is adopted to reduce the complexity of key maintenance.