A Highly Secure Authentication Module for Smart Door Lock with Temporary Key Function

Dongkun Hou, Shiyuan Cheng, Jie Zhang, Yuji Dong, Jieming Ma, Xiaohui Zhu, Ka Lok Man

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

2 Citations (Scopus)

Abstract

A significant feature of smart door lock systems is the Temporary Key Function (TKF) for visitors. However, existing TKFs in smart door lock systems in use are either vulnerable to attacks or inconvenient for use. This paper thereby proposes elliptic curve cryptography (ECC)-based innovative authentication module for smart door lock systems which enables highly secure and convenient TKF. Based on the authentication module, two protocols are designed for the host and visitor respectively to unlock the door lock system. Security features for the two protocols are verified via Gong Needham Yahalom (GNY) logic. Besides, the proposed prototypes are realized, and the simulation experiments are carried out to study the performance of the protocols. The results show that our scheme is secure and efficient.

Original languageEnglish
Title of host publicationProceedings - 2022 International Conference on Cyberworlds, CW 2022
EditorsYuriko Takeshima, Alexei Sourin, Haoran Xie, Christophe Rosenberger, Olga Sourina, Kazunori Miyata
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages228-235
Number of pages8
ISBN (Electronic)9781665468145
DOIs
Publication statusPublished - 2022
Event2022 International Conference on Cyberworlds, CW 2022 - Kanazawa, Japan
Duration: 27 Sept 202229 Sept 2022

Publication series

NameProceedings - 2022 International Conference on Cyberworlds, CW 2022

Conference

Conference2022 International Conference on Cyberworlds, CW 2022
Country/TerritoryJapan
CityKanazawa
Period27/09/2229/09/22

Keywords

  • Access Control
  • Elliptic Curve
  • Smart Door Lock
  • Temporary Key

Fingerprint

Dive into the research topics of 'A Highly Secure Authentication Module for Smart Door Lock with Temporary Key Function'. Together they form a unique fingerprint.

Cite this