Skip to main content
Log in

IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In large organizations, handling personnel authorization for access to various sites within the building has always proved to be a challenge for security departments. In this work, we develop a prototype that utilizes an identity-based identification scheme to provide access control for incoming and outgoing personnel from the building, as well as their activities within. Our prototype is built using open-source web technology as well as mobile app support for personal smart phones. The novelty lies in the application of an identity-based identification scheme as a crucial component to ensure that no third party malicious observers, or even observers disguised as honest users trying to break the system, will be able to learn anything about the authentication processes of other users. We also reveal the running time for our various mobile applications for both the registration and identification process and show that they are competitive to that of previous work done in identity-based identification simulation experiments in the past. Lastly, as proof of concept, we demonstrate our prototype with a Nuvton electromagnetic door lock that communicates with the verification process on the server.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Boneh, D., Lynn, B., & Shacham, H. (2001). Short signatures from the Weil Pairing. Asiacrypt 2001. LNCS (Vol. 2248, pp. 514–532). Heidelberg: Springer.

  2. Chin, J.-J., Anada, H., & Tan, S.-Y. (2015).Reset-secure identity-based identification schemes without pairings. To appear at ProvSec 2015, LNCS. Heidelberg: Springer.

  3. Chin, J.-J., Tan, S.-Y., Kam, Yvonne, H.-S., & Leong, C.-H. (2014). Implementation of identity-based and certificateless identification on Andriod platform. Cryptology 2014. UPM Press, Universiti Putra Malaysia, pp. 205–215.

  4. Fujioka, A., Saito, T., & Xagawa, K. (2012). Applicability of OR-proof techniques to hierarchical identity-based identification. CANS 2012, LNCS 7712 (pp. 169–184). Heidelberg: Springer.

  5. Kurosawa, K., & Heng, S.-H. (2004). From Digital Signatures to Identity-Based Identification. PKC 2004. LNCS (Vol. 2947, pp. 248–261). Heidelberg: Springer.

  6. Kurosawa, K., & Heng, S.-H. (2005). Identity-based identification without random oracles. ICCSA 2005. LNCS (Vol. 3481, pp. 603–613). Heidelberg: Springer.

  7. Pedersen, T. P. (1991). Non-interactive and information-theoretic secure verifiable secret sharing. Crypto 1991. LNCS (Vol. 576, pp. 129–140). Heidelberg: Springer.

  8. Shamir, A. (1985). Identity-based cryptosystem and signature schemes. Advances in Cryptology Crypto 84.

  9. Tan, S.-Y., Swee-Huay, H., & Bok-Min, G. (2010). Java Implementation for pairing-based cryptosystems. ICCSA 2010. LNCS (Vol. 6019, pp. 188–198). Heidelberg: Springer.

  10. Smartphone Statistics by Pew Research. Retrieved April 3, 2015 from http://www.pewinternet.org/2011/07/11/smartphone-adoption-and-usage/

  11. Smartphone Platform Statistics by International Data Corporation (IDC). Retrieved April 3, 2015 from http://www.idc.com/prodserv/smartphone-os-market-share.jsp

Download references

Acknowledgments

This work was supported by the Fundamental Research Grant Scheme by The Ministry of Education, Malaysia and has won a Silver Medal at the ITEX 2015 exhibition.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ji-Jian Chin.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Teh, TY., Lee, YS., Cheah, ZY. et al. IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices. Wireless Pers Commun 94, 127–144 (2017). https://doi.org/10.1007/s11277-016-3320-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-016-3320-y

Keywords

Navigation