通信学报 ›› 2020, Vol. 41 ›› Issue (6): 80-87.doi: 10.11959/j.issn.1000-436x.2020115

• 学术论文 • 上一篇    下一篇

针对物理访问控制的拟态防御认证方法

周清雷,班绍桓(),韩英杰,冯峰   

  1. 郑州大学信息工程学院,河南 郑州 450001
  • 修回日期:2020-05-01 出版日期:2020-06-25 发布日期:2020-07-04
  • 作者简介:周清雷(1962- ),男,河南新乡人,博士,郑州大学教授、博士生导师,主要研究方向为信息安全、自动机理论及计算复杂性理论|班绍桓(1996- ),男,河南永城人,郑州大学硕士生,主要研究方向为信息安全|韩英杰(1976- ),女,黑龙江密山人,郑州大学讲师,主要研究方向为信息安全、自动机与模型检测等|冯峰(1990- ),男,河南新乡人,郑州大学硕士生,主要研究方向为信息安全和高性能计算
  • 基金资助:
    国家重点研发计划基金资助项目(2016YFB0800100);“公共安全风险防控与应急技术装备”重点专项基金资助项目

Mimic defense authentication method for physical access control

Qinglei ZHOU,Shaohuan BAN(),Yingjie HAN,Feng FENG   

  1. School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China
  • Revised:2020-05-01 Online:2020-06-25 Published:2020-07-04
  • Supported by:
    The National Key Research and Development Program of China(2016YFB0800100);“Public Security Risk Prevention and Control and Emergency Technical Equipment” Key Special Fund

摘要:

针对传统物理访问控制系统的认证方法易受攻击的安全问题,基于拟态防御技术及其动态异构冗余架构(DHR)原理,以移动端二维码为接口、以动态口令为内核设计了一种拟态防御认证方法。首先,构建认证服务器的执行体池;然后,利用由输入分发代理、选调器和表决器等功能模块组成的中心控制器,实现从执行体池中动态调度异构冗余执行体;最后,表决器对异构冗余执行体输出进行多模裁决决定认证结果。实验结果表明,对比传统物理访问控制系统的认证方法,所提认证方法具有更高的安全性和可靠性。此外,所提认证方法能与其他认证方法组合使用。

关键词: 访问控制, QR码, 异构冗余, 拟态防御

Abstract:

To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.

Key words: access control, QR code, heterogeneous redundancy, mimic defense

中图分类号: 

No Suggested Reading articles found!