Journal on Communications ›› 2020, Vol. 41 ›› Issue (6): 80-87.doi: 10.11959/j.issn.1000-436x.2020115

• Papers • Previous Articles     Next Articles

Mimic defense authentication method for physical access control

Qinglei ZHOU,Shaohuan BAN(),Yingjie HAN,Feng FENG   

  1. School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China
  • Revised:2020-05-01 Online:2020-06-25 Published:2020-07-04
  • Supported by:
    The National Key Research and Development Program of China(2016YFB0800100);“Public Security Risk Prevention and Control and Emergency Technical Equipment” Key Special Fund

Abstract:

To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.

Key words: access control, QR code, heterogeneous redundancy, mimic defense

CLC Number: 

No Suggested Reading articles found!