2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing
A Personalized Access Control Based on IoT Jae J. Jang, Jaekun Moon, Im Y. Jung School of Electronics Engineering, Kyungpook National University 80 Daehakro Bukgu, Daegu, 702-701, Republic of Korea {jaejin, jaekun34}@knu.ac.kr,
[email protected] Abstract—A personalized access control based on IoT is proposed to improve the unflexible access control. The access control using digital doorlock is designed for the persons who have normal cognitive function because it requires persons to memorize some secret numbers. It is not easy for the weak persons in cognitive function such as the mentally handicapped, the young children and the old people, to adapt to the doorlock. There need their guardians or the 2nd method using a physical thing with equal function of key to get into the important space such as home. However, the physical thing is no more than another object for the weak persons in cognitive function to keep in mind. In addition, social engineering attacks including shoulder surfing increase. This paper addresses the problem of the legacy access control and improves it based on IoT technology.
A new access control based on IoT was designed considering the following cases. 1) Sometimes, normal persons have a difficulty in remembering the secret numbers temporarily. 2) It is difficult for the mentally handicapped persons, the old people, and the children to keep something (whatever) in mind. It happens once in a while that they go out accidentally during their guardians unaware of it and do not come into home because they cannot remember the secret numbers of door or do not have the key. In this case, any kind neighbor cannot help them. 3) Because social engineering attacks including shoulder surfing or key copying increase, an enhanced scheme is required to reinforce the security of the legacy access control.
Keywords— IoT; Personalized Access Control; Security Enhancement; Flexibility; Convenience
B. A Personalized Access Control based in IoT Fig 1 shows the proposed scheme. Some device such as SoSp-based Router (SoSpR) [4] or IoT Gateway [5] which has IoT communication interfaces such as Bluetooth, Zigbee or Wi-Fi, and public network communication interface connected to Internet is equipped in the door. The device attached at the door has small memory to keep some information. There is a log storage to keep the records of In/Out events checked by the door as shown in Fig. 2. The log storage communicates with the door periodically to collect the records and to check whether the door operates normally or not. If persons would get into home by passing the door, they should register their belongings with IoT communication interfaces at the door. Then, the IoT communication interfaces at the door communicate with the same types of interfaces attached in various belongings registered of the persons. An event is defined by the registration of the belongings, the pair of the belongings’ going out and coming into home (Out/In). If the owners’ movements should be notified to a pre-defined supervisor, the belongings’ movements are informed to him/her so as to know the owners’ movements indirectly.
I. INTRODUCTION The access control using digital doorlock or physical key is designed for the normal persons who do not have the problem in cognitive function. Especially, the digital doorlock became widespread because it has been accepted as an efficient and safe means for access control. However, it is not rare that the mentally handicapped persons, the old people, the children, even the normal persons, have difficulty in memorizing the secret numbers or carrying the keys at all times. On the other hands, social engineering attacks including shoulder surfing [1] or key copying increase. The digital doorlock or physical key itself is no longer safe method. To address both the inconvenience for the persons with intellectual disability and the security issue, an improved access control is needed. The access control should be flexible and secure. In this paper, an access control scheme based on IoT is proposed. The proposed scheme provides a flexible access control by considering personal characteristics as well as the security issue of the legacy access control using digital doorlock.
The door separates its inner part and its outer one. When a belonging went out, the door checks the belonging comes closer in its outer part.
II. AN ACCESS CONTROL BASED ON IOT
For the cases stated in section II.A, whether the persons who are to get into home are authorized or not is pre-checked by detecting their belongings with IoT communication interfaces.
A. Problem Space The proposed scheme focuses on the flexible design of access control using digital doorlock considering personal characteristics.
1) and 3) If a normal person goes out and comes back, the door checks whether his/her belongings come back and the secret numbers tried are correct. In ordinary day, his/her In/Out
This work was supported by the IT R&D program of MSIP/IITP. [10041145, Self-Organizing Software platform (SoSp) for Welfare Devices]
978-1-4673-9376-8/15 $31.00 © 2015 IEEE DOI 10.1109/PRDC.2015.36
317
Fig.1. An Access Control based on IoT Log Storage Device ID1
Alarm1
Event11
Register11
Time11
Event12
Out12
Time12
Event13
Out13
Time13
In12
Time12
Door Device ID2
Alarm2
Event21 Event22 Device ID3
Register21 Out22
Device ID1 Time21 Time22
Device ID2
Register31
Device ID3
Time31
Out13
Time13
Alarm2
Event22
Alarm3
Event31
Alarm1
Event13
Out22
Time22
Alarm3
Fig.2. Information for IoT Devices' In/Out in Log Storage and in Door
and enhance the security feature of the legacy access control using digital doorlock. The remote control by the supervisor can set the doorlock locked or unlocked as defined way. The In/Out patterns according to persons are analyzed at the log storage with the event records. The patterns are checked at every In/Out event and the secret numbers entered are compared. Any abnormal situation is notified to the predefined persons.
patterns are analyzed with the event records at the log storage. When there is a problem in their belongings or the secret numbers, his/her In/Out is checked with his/her ordinary pattern such as the time slot of In/Out and his/her belongings. If this situation does not belong to his/her normal pattern, it is notified to the supervisor immediately. For a long trip, the supervisor can set the door locked so that any try does not open the door.
If the camera is equipped together, the proposed scheme would be more effective and secure.
2) The In/Out events of the weak person in intellectual function can be checked by their belongings. If the owner of the belonging is the weak person in cognitive function, his/her going out is notified to his/her guardian. When the owner comes back home in the pre-defined time, the door is open for him/her. This situation is also notified to his/her guardian. If he/she goes out with their guardian, the notification is not generated. The old people are often forgetful. Their belongings can be the indicators of their presences. In addition, their behavior pattern analyzed at In/Out events can be used. The supervisor can decide whether they set the door open for the old people or not.
REFERENCES [1]
[2]
[3] [4]
III. CONCLUSION The proposed scheme, a personalized access control based on IoT, can help the weak people in intellectual function to come back home without key or memorizing secret numbers,
[5]
318
G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955. (references) M. Kumar, T. Garfinkel, D. Boneh and T. Winograd, “Reducing Shoulder-surfing by Using Gaze-based Password Entry,” Proceedings of SOUPS '07, pp. 13-19, 2007. V. Roth, K. Richter, and R. Freidinger, “A PIN-Entry Method Resilient Against Shoulder Surfing,” Proceedings of CCS'04, pp. 234-245, 2004. D. Lee et al., “Self-Organized Sofrware Platform (SOSp)-based Mobile Chronic Disease Management With Agent-based HL7 Interface, " International Jounal of Bio-Science and Bio-Technology, Vol. 5, No. 1. 2013. Q. Zhu et al, “IoT Gateway: Bridging Wireless Sensor Networks into Internet of Things,” Proceedings of EUC'10, pp. 347-352, 2010