scholarly journals Threshold-Based Location-Aware Access Control

2011 ◽  
Vol 2 (3) ◽  
pp. 22-37 ◽  
Author(s):  
Roel Peeters ◽  
Dave Singelée ◽  
Bart Preneel

Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of or fewer compromised user’s devices, with being an adjustable threshold number. It removes the single point of failure in the system, as access is granted when one carries any set of user’s devices. Additionally it supports user-centered management, since users can alter the set of personal devices and can adjust the security parameters of the access control scheme towards their required level of security and reliability.

Author(s):  
Roel Peeters ◽  
Dave Singelée ◽  
Bart Preneel

Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of (t-1) or fewer compromised user’s devices, with t being an adjustable threshold number. It removes the single point of failure in the system, as access is granted when one carries any set of t user’s devices. Additionally it supports user-centered management, since users can alter the set of personal devices and can adjust the security parameters of the access control scheme towards their required level of security and reliability.


2018 ◽  
Vol 51 (3-4) ◽  
pp. 182-188
Author(s):  
Shanmugasundaram Singaravelan ◽  
Ramaiah Arun ◽  
Dhiraviyam Arun Shunmugam ◽  
Raja Veeman Vivek ◽  
Dhanushkodi Murugan

The rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection (PS-ACS). In the PS-ACS scheme, we divide users into private domain (PRD) and public domain (PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption (KAE) and the Improved Attribute-based Signature (IABS) respectively. In PUD, we construct new multi-authority cipher text policy attribute-based encryption (CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users’ privacy in cloud-based services


2013 ◽  
Vol 385-386 ◽  
pp. 1705-1707
Author(s):  
Tzer Long Chen ◽  
Yu Fang Chung ◽  
Jian Mao Hong ◽  
Jeng Hong Jhong ◽  
Chin Sheng Chen ◽  
...  

It is important to notice that the access control mechanism has been widely applied in various areas, such as on-line video systems, wireless network, and electronic documents. We propose an access control mechanism which is constructed based on two mathematical fundamentals: Lagrange interpolation and ElGamal algorithm. We conduct performance analysis to compare the efficiency of our proposed scheme with that of several related published schemes in both key generation phase and key derivation phase. Our new scheme is proven to be more efficient. It is shown, as expected, a more efficient scheme provides relatively less security and a more secure scheme is relatively less efficient for private keys of the same size.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5438
Author(s):  
Santiago Figueroa-Lorenzo ◽  
Javier Añorga Benito ◽  
Saioa Arrizabalaga

Security is the main challenge of the Modbus IIoT protocol. The systems designed to provide security involve solutions that manage identity based on a centralized approach by introducing a single point of failure and with an ad hoc model for an organization, which handicaps the solution scalability. Our manuscript proposes a solution based on self-sovereign identity over hyperledger fabric blockchain, promoting a decentralized identity from which both authentication and authorization are performed on-chain. The implementation of the system promotes not only Modbus security, but also aims to ensure the simplicity, compatibility and interoperability claimed by Modbus.


2014 ◽  
Vol 696 ◽  
pp. 157-160
Author(s):  
Bao Hua Zhao ◽  
Xiao Ping Wang

In this paper, combining the existing dynamic access control model based on trust with the dynamic measurement technique, we propose a dynamic access control scheme based on credibility. By the simulation test, the mechanism can prevent the malicious behavior of malicious nodes.


Author(s):  
N. V. Buzhinskaya ◽  
E. S. Vaseva ◽  
R. N. Iskandarov ◽  
N. V. Shubina

Objectives. The aim of the study is to select methods and means for the effective modernization of the security system existing in the enterprise.Method. It is proposed to improve the access control mode using the access control system based on ARDUINO microcontrollers. To highlight the functions of the system and the requirements for it were built UML-diagrams. On the basis of these diagrams, the balls have developed a schematic electrical diagram of the hardware of the system with an indication of all its elements. At the next stage, an algorithm was proposed for the operation of the hardware of the access control system. The implementation of a part of the algorithm for information exchange between the device and the information system is shown in the form of a sketch using the example of packet transmission over an Ethernet network using the TCP protocol. An intuitive interface has been developed for interaction between the access control system and the end user. The necessary information is stored in a database created in a Microsoft SQL Server environment.Result. The developed system was tested at the enterprise by means of sketches and a multimeter. Test results allow us to conclude that the system is ready for implementation. Conclusion. The article describes one of the methods for upgrading the existing access control system through a more user-friendly interface and the addition of entry/exit functions.Acknowledgments. The work was commissioned by the company LLC «Kalinin Baranchinsky Electromechanical Plant».


Sign in / Sign up

Export Citation Format

Share Document