期刊文献+

针对物理访问控制的拟态防御认证方法 被引量:4

Mimic defense authentication method for physical access control
下载PDF
导出
摘要 针对传统物理访问控制系统的认证方法易受攻击的安全问题,基于拟态防御技术及其动态异构冗余架构(DHR)原理,以移动端二维码为接口、以动态口令为内核设计了一种拟态防御认证方法。首先,构建认证服务器的执行体池;然后,利用由输入分发代理、选调器和表决器等功能模块组成的中心控制器,实现从执行体池中动态调度异构冗余执行体;最后,表决器对异构冗余执行体输出进行多模裁决决定认证结果。实验结果表明,对比传统物理访问控制系统的认证方法,所提认证方法具有更高的安全性和可靠性。此外,所提认证方法能与其他认证方法组合使用。 To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems,a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture(DHR),using mobile 2D code as the interface and dynamic password as the core.First,the actuator pool of the authentication server was constructed.Then,a central controller consisting of functional modules such as input distribution agent,selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally,a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method,and at the same time,it can be used in combination with other authentication methods.
作者 周清雷 班绍桓 韩英杰 冯峰 ZHOU Qinglei;BAN Shaohuan;HAN Yingjie;FENG Feng(School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China)
出处 《通信学报》 EI CSCD 北大核心 2020年第6期80-87,共8页 Journal on Communications
基金 国家重点研发计划基金资助项目(No.2016YFB0800100) “公共安全风险防控与应急技术装备”重点专项基金资助项目。
关键词 访问控制 QR码 异构冗余 拟态防御 access control QR code heterogeneous redundancy mimic defense
  • 相关文献

参考文献12

二级参考文献65

  • 1吉萌,余少华,詹翊春.双冗余结构路由器故障恢复模型与方案研究[J].通信学报,2006,27(6):21-28. 被引量:4
  • 2FLOTY L W. Bar codes[J]. Metal Finishing, 2002, 100(8) : 42 - 47.
  • 3KAO Y W, LUO G H, LIN H T, et al. Physical access control based on QR code[ C]/! Proceedings of the 2011 International Con- ference on Cyber - Enabled Distributed Computing and Knowledge Discovery. Washington, DC: IEEE Computer Society, 2011: 285- 288.
  • 4OH D S, KIM B H, LEE J K. A study on authentication system u- sing QR code for mobile cloud computing environment[ C]// Pro- ceedings of the 6th International Conference on Future Technology. Berlin: Springer, 2011:500-507.
  • 5CHUNAG J C, HU Y C, KO H J. A novel secret sharing technique using QR code[ J]. International Journal of Image Processing, 2010, 4(5) : 468 -475.
  • 6BARRERA J F, MIRA A, TORROBA R. Optical encryption and QR codes: Secure and noise-free information retrieval [ J]. Optics Express, 2013, 21(5): 5373-5287.
  • 7中国物品编码中心.QRCode二维码技术与应用[M].北京:中国标准出版社,2001.
  • 8HOU A L, YUAN F, YING G. QR code image detection using run-length coding[ C]// International Computer Science and Net- work Technology, Washington, DC: IEEE Computer Society, 2011: 2130-2134.
  • 9张志东.伊辛模型的研究进展简介[J].自然杂志,2008,30(2):94-98. 被引量:9
  • 10周楝淞,卿昱,谭平嶂,杨洁,庞飞.一种改进的基于标识的认证系统的实现[J].信息安全与通信保密,2009,31(2):61-63. 被引量:10

共引文献230

同被引文献48

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部