Abstract

This article researched the security and application of smart locks in Internet of Things environments in the domain of computer and engineer science and symmetry. Smart locks bring much convenience for users. However, most smart lock systems are cloud-based and it is problematic managing and enforcing the permissions of an authorized device if the device is offline. Moreover, most smart lock systems lack fine-grained access control and cascading removal of permissions. In this paper, we leverage attribute-based access control mechanisms to manage the access of visitors with different identities. We use identity-based encryption to verify the identity of the visitor. In our proposed system, the administrator uses the policy set in the smart lock to implement access control on the device side, which reduces the dependence of access control on the server. We set attributes such as role, time, date, and location to have fine-grained control over access to different permissions and roles that might appear in the house. And the scheme provides the cascading delete function while providing the group access function. Our solution considers multiple roles in the home as well as hierarchical management issues, and improves the applicability of the smart lock system in complex residential and commercial situations. In the experimental section, we show that our system can be applied to premises with many different inhabitant identities.

Highlights

  • We investigate the limitation of existing smart lock systems, and design a fine-grained access control mechanism for multiple environment attributes; We introduced identity-based encryption to verify the identity of the visitor, which makes our scheme safe for different types of smart locks; Compared with the existing mechanism, our scheme is more suitable for smart lock systems

  • We described some of the challenges and shortcomings of current smart lock systems, and designed an attribute-based access control mechanism to solve these problems

  • The current problems with smart lock systems are that they cannot cope with malicious users being disconnected to avoid revoking privileges and that they lack fine-grained access control over multiple identities of users in complex homes

Read more

Summary

State of the Art

The Internet of Things is increasingly influencing our daily life These intelligent devices, which brings many conveniences to our life, creating security, privacy, and other risks, e.g., in smart voice assistants [1], the Internet of vehicles [2], and smart homes [3,4,5]. We are aware that simpler locks exist, which are off-line and lack integration with other systems, using simple keypads, fingerprint locks, and smart card tokens These types of locks replace a key with an alternate mechanism but remain unintelligent, relying on manual human configuration and management and having no means to dynamically update access conditions, e.g., physically pre-programmed with a common PIN that everyone uses or still having a user collect a configured card

Motivation and Contribution
Organization
Smart Locks with Biometric Authentication
System Architecture
Adversarial Model
Diversity of Identity
System Overview
Identity-Based Cryptographic Authentication
Processing of Access Requests
Attribute Settings
System Model
Strategy Model
User Request and Access Control Policy Evaluation
Evaluation of Policy Sets
Experimental Results and Analysis
Experimental User Settings
Fine-Grained Access Control Experiments
Cascading Deletion of Hierarchical Permissions
Stress Tests in the Face of Malicious Attacks
Management Stress Tests in Large Apartment Situations
Products Comparison
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.