Implementation of Password-based Key Derivation Function for Authentication Scheme in Patrolling System

被引:0
|
作者
Saputra, Laurentius Kuncoro Probo [1 ]
Raharjo, Willy Sudiarto [1 ]
机构
[1] Univ Kristen Duta Wacana, Informat Dept, Yogyakarta, Indonesia
关键词
patrolling system; dynamic QR code; key derivation function; authentication process;
D O I
10.1109/conmedia46929.2019.8981844
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Outsourced security guards are often used by building owners or companies to help them maintain security. Problems arise from complaints about how companies can monitor surveillance activities in real-time and reliably. Supervisors must be able to know with certainty who is the security guard on duty. Therefore, an authentication process to oversee the work of security officers is needed in the patrolling system. The authentication system required the security guards to come to the location to read the QR code on the display device. The QR code was dynamically and only a valid account in an android application could verify the codes. QR code information was generated using key derivation function based on shift schedule information and security guard account number. The authentication process used PBKDF2. The resulting system consisted of a QR code viewer device and an Android mobile application. The QR code displayed the information that was sent by the server. This information was been unreadable by humans and it changed periodically according to the shift schedule and who is in charge of the inspection location. Based on the active account, the Android application could verify whether the QR code is valid or not for the account. If valid, the system recorded that the location has been monitored by a valid security guard.
引用
收藏
页码:31 / 35
页数:5
相关论文
共 50 条
  • [31] PASTA: PASsword-based Threshold Authentication
    Agrawal, Shashank
    Miao, Peihan
    Mohassel, Payman
    Mukherjee, Pratyay
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2042 - 2059
  • [32] On Unlinkability of Password-Based Anonymous Authentication
    Shin, SeongHan
    Kobara, Kazukuni
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (06) : 1320 - 1324
  • [33] A Protocol to Strengthen Password-Based Authentication
    Sandoval, Itzel Vazquez
    Stojkovski, Borce
    Lenzini, Gabriele
    [J]. EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2018, 2018, 11263 : 38 - 46
  • [34] An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
    Ashok Kumar Das
    Bezawada Bruhadeshwar
    [J]. Journal of Medical Systems, 2013, 37
  • [35] A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2013, 71 (03) : 1977 - 1988
  • [36] A strong password-based remote mutual authentication with key agreement scheme on elliptic curve cryptosystem for portable devices
    Li, Xuelei
    Wen, Fengtong
    Cui, Shenjun
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (02): : 217 - 222
  • [37] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [38] A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS
    Chen, Bae-Ling
    Kuo, Wen-Chung
    Wuu, Lih-Chyau
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (01): : 53 - 59
  • [39] An efficient client-client password-based authentication scheme with provable security
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (02): : 1002 - 1022
  • [40] Secure password-based authentication scheme with anonymous identity without smart cards
    The Key Laboratory of Aerospace Information Security and Trust Computing, School of Computer, Wuhan University, Wuhan 430072, China
    不详
    不详
    [J]. Tongxin Xuebao, 2008, 10 (70-75):