浏览全部资源
扫码关注微信
郑州大学信息工程学院,河南 郑州 450001
[ "周清雷(1962- ),男,河南新乡人,博士,郑州大学教授、博士生导师,主要研究方向为信息安全、自动机理论及计算复杂性理论" ]
[ "班绍桓(1996- ),男,河南永城人,郑州大学硕士生,主要研究方向为信息安全" ]
[ "韩英杰(1976- ),女,黑龙江密山人,郑州大学讲师,主要研究方向为信息安全、自动机与模型检测等" ]
[ "冯峰(1990- ),男,河南新乡人,郑州大学硕士生,主要研究方向为信息安全和高性能计算" ]
网络出版日期:2020-06,
纸质出版日期:2020-06-25
移动端阅览
周清雷, 班绍桓, 韩英杰, 等. 针对物理访问控制的拟态防御认证方法[J]. 通信学报, 2020,41(6):80-87.
Qinglei ZHOU, Shaohuan BAN, Yingjie HAN, et al. Mimic defense authentication method for physical access control[J]. Journal on communications, 2020, 41(6): 80-87.
周清雷, 班绍桓, 韩英杰, 等. 针对物理访问控制的拟态防御认证方法[J]. 通信学报, 2020,41(6):80-87. DOI: 10.11959/j.issn.1000-436x.2020115.
Qinglei ZHOU, Shaohuan BAN, Yingjie HAN, et al. Mimic defense authentication method for physical access control[J]. Journal on communications, 2020, 41(6): 80-87. DOI: 10.11959/j.issn.1000-436x.2020115.
针对传统物理访问控制系统的认证方法易受攻击的安全问题,基于拟态防御技术及其动态异构冗余架构(DHR)原理,以移动端二维码为接口、以动态口令为内核设计了一种拟态防御认证方法。首先,构建认证服务器的执行体池;然后,利用由输入分发代理、选调器和表决器等功能模块组成的中心控制器,实现从执行体池中动态调度异构冗余执行体;最后,表决器对异构冗余执行体输出进行多模裁决决定认证结果。实验结果表明,对比传统物理访问控制系统的认证方法,所提认证方法具有更高的安全性和可靠性。此外,所提认证方法能与其他认证方法组合使用。
To address the security problem of the vulnerability of the authentication methods of traditional physical access control systems
a mimic defense authentication method was designed based on the principle of mimic defense technique and its dynamic heterogeneous redundant architecture (DHR)
using mobile 2D code as the interface and dynamic password as the core.First
the actuator pool of the authentication server was constructed.Then
a central controller consisting of functional modules such as input distribution agent
selector and voter was used to dynamically schedule heterogeneous redundant actuators from the actuator pool.Finally
a multimode ruling on the heterogeneous redundant actuator output to determine the authentication result was made by the voter.The experimental results show that the proposed authentication method has higher security and reliability compared to the traditional physical access control system authentication method
and at the same time
it can be used in combination with other authentication methods.
贾铁军 , 侯丽波 , 宋少婷 , 等 . 网络安全实用技术 [M ] . 北京 : 清华大学出版社 , 2011 .
JIA T J , HOU L B , SONG S T , et al . Practical network security technology [M ] . Beijing : Tsinghua University PressPress , 2011 .
李小燕 . 网络可信身份认证技术演变史及发展趋势研究 [J ] . 网络空间安全 , 2018 , 9 ( 11 ): 6 - 18 .
LI X Y . Study on evolution history and development trend of network trusted identity authentication technology [J ] . Information Security and Technology , 2018 , 9 ( 11 ): 6 - 18 .
常玲 , 赵蓓 , 薛姗 , 等 . 基于网络安全的身份认证技术研究 [J ] . 电信工程技术与标准化 , 2019 , 32 ( 2 ): 37 - 42 .
CHANG L , ZHAO P , XUE S , et al . Research on identity authentication technology in network security [J ] . Telecom Engineering Technics and Standardization , 2019 , 32 ( 2 ): 37 - 42 .
安迪 , 杨超 , 姜奇 , 等 . 一种新的基于指纹与移动端协助的口令认证方法 [J ] . 计算机研究与发展 , 2016 , 53 ( 10 ): 2400 - 2411 .
AN D , YANG C , JIANG Q , et al . A new password authentication method based on fingerprint and mobile phone assistance [J ] . Journal of Computer Research and Development , 2016 , 53 ( 10 ): 2400 - 2411 .
周庆 , 黄党志 . 基于 Ising 模型的 QR 码加密算法 [J ] . 计算机应用 , 2013 , 33 ( 10 ): 2861 - 2864 .
ZHOU Q , HUANG D Z . Encryption algorithm for QR code based on Ising model [J ] . Journal of Computer Applications , 2013 , 33 ( 10 ): 2861 - 2864 .
韩林 , 张春海 , 徐建良 . 基于二维码的内外网物理隔离环境下的数据交换 [J ] . 计算机科学 , 2016 , 43 ( S2 ): 520 - 522 .
HAN L , ZHANG C H , XU J L . Data exchange based on QR code in physically isolated internal and external network environment [J ] . Computer Science , 2016 , 43 ( S2 ): 520 - 522 .
古晓艳 , 夏志强 . 基于二维码的高校教学设备管理系统的设计与实现 [J ] . 计算机科学 , 2017 , 44 ( S1 ): 523 - 525 .
GU X Y , XIA Z Q . Design and implementation of teaching equipment management system based on two-dimensional code [J ] . Computer Science , 2017 , 44 ( S1 ): 523 - 525 .
MOHAN P , CHELLIAH S . An authentication technique for accessing de-duplicated data from private cloud using one time password [J ] . International Journal of Information Security and Privacy , 2017 , 11 ( 2 ): 1 - 10 .
KAO Y , LUO G , LIN H , et al . Physical access control based on QR code [C ] // 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery . Piscataway:IEEE Press , 2011 : 285 - 288 .
于英政 . QR 二维码相关技术的研究 [D ] . 北京:北京交通大学 , 2014 .
YU Y Z . Research on related technologies of the QR 2-dimensional code [D ] . Beijing:Beijing Jiaotong University , 2014 .
邬江兴 . 网络空间拟态防御导论 [M ] . 北京 : 科学出版社 , 2017 .
WU J X . Introduction to cyberspace mimic defense [M ] . Beijing : Science PressPress , 2017 .
扈红超 , 陈福才 , 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 40 - 51 .
HU H C , CHEN F C , WANG Z P . Performance evaluations on DHR for cyberspace mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 40 - 51 .
ZHUANG R , DELOACH S A , OU X . Towards a theory of moving target defense [C ] // Proceedings of the First ACM Workshop on Moving Target Defense . New York:ACM Press , 2014 : 31 - 40 .
仝青 , 张铮 , 张为华 , 等 . 拟态防御 Web 服务器设计与实现 [J ] . 软件学报 , 2017 , 28 ( 4 ): 883 - 897 .
TONG Q , ZHANG Z , ZHANG W H , et al . Design and implementation of mimic defense Web server [J ] . Journal of Software , 2017 , 28 ( 4 ): 883 - 897 .
王禛鹏 , 扈红超 , 程国振 . 一种基于拟态安全防御的DNS框架设计 [J ] . 电子学报 , 2017 , 45 ( 11 ): 2705 - 2714 .
WANG Z P , HU H C , CHENG G Z . A DNS architecture based on mimic security defense [J ] . Acta Electronica Sinica , 2017 , 45 ( 11 ): 2705 - 2714 .
王禛鹏 , 扈红超 , 程国振 . MNOS:拟态网络操作系统设计与实现 [J ] . 计算机研究与发展 , 2017 , 54 ( 10 ): 2321 - 2333 .
WANG Z P , HU H C , CHENG G Z . Design and implementation of mimic network operating system [J ] . Journal of Computer Research and Development , 2017 , 54 ( 10 ): 2321 - 2333 .
马海龙 , 伊鹏 , 江逸茗 , 等 . 基于动态异构冗余机制的路由器拟态防御体系结构 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 29 - 42 .
MA H L , YI P , JIANG Y M , et al . Dynamic heterogeneous redundancy based router architecture with mimic defenses [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 29 - 42 .
OUELHADJ D , PETROVIC S . A survey of dynamic scheduling in manufacturing systems [J ] . Journal of Scheduling , 2009 , 12 ( 4 ):417.
刘勤让 , 林森杰 , 顾泽宇 . 面向拟态安全防御的异构功能等价体调度算法 [J ] . 通信学报 , 2018 , 39 ( 7 ): 188 - 198 .
LIU Q R , LIN S J , GU Z Y . Heterogeneous redundancies scheduling algorithm for mimic security defense [J ] . Journal on Communications , 2018 , 39 ( 7 ): 188 - 198 .
0
浏览量
740
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构