scholarly journals Blockchain based access control systems: State of the art and challenges

Author(s):  
Sara Rouhani ◽  
Ralph Deters
2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Javier Junquera-Sánchez ◽  
Carlos Cilleruelo ◽  
Luis De-Marcos ◽  
José-Javier Martinez-Herráiz

Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.


Cryptography ◽  
2020 ◽  
Vol 4 (2) ◽  
pp. 14
Author(s):  
Aysajan Abidin

As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be used. Until recently, all distance bounding protocols were based on classical cryptography and communication techniques. In this paper, we take a closer look at a recently proposed protocol by Jannati and Ardeshir-Larijani [Quantum Information Processing 2016, 18] to detect relay attacks using qubits. We first observe that the protocol has a weakness which allows an adversary to mount a successful attack on the protocol. We then propose a countermeasure to restore security and compare the fixed protocol with the state of the art.


Author(s):  
Sai Sree Laya Chukkapalli ◽  
Shaik Barakhat Aziz ◽  
Nouran Alotaibi ◽  
Sudip Mittal ◽  
Maanak Gupta ◽  
...  

2017 ◽  
Vol 7 (4) ◽  
pp. 1-24 ◽  
Author(s):  
Arindam Roy ◽  
Shamik Sural ◽  
Arun Kumar Majumdar ◽  
Jaideep Vaidya ◽  
Vijayalakshmi Atluri

Sign in / Sign up

Export Citation Format

Share Document