Implementation of Integrated Authentication Service using Blockchain and One Time QR Code for Access Control in U-city Environment
AUTHORS
Jai Yong Kim,Dept of Computer Science, Univ. of Maryland
Yong Hoon Jung,Dept of Computer Science, Univ. of Maryland
Dae Seung Yang,BaaSLAB
Moon-Seog Jun,Dept. of Computing in Soongsil University
ABSTRACT
This paper proposes an integrated user authentication system that can be used for access control in U-city environment. The proposed integrated authentication system issues an EID capable of acting as an electronic ID to a user based on a smartphone, and verifies and verifies the access to a building or a specific space using the issued EID. Unlike the user authentication using a smart card, it can be used in on / off-line environment because authentication service is provided in web service environment. Based on the issued EID, one-time authentication information is used in the authentication process in the form of One Time QRcode to provide a secure authentication process from security breaches such as retransmission attacks. In addition, the security and security of the network and computing environment have been improved because the user's authentication information is issued and verified in a blockchain-based decentralized system rather than the existing centralized system.
KEYWORDS
U-city, ICT, User Authentication, SSO, Block Chain
REFERENCES
[1] Caragliu A and Del Bo C, “Smart cities in Europe,” 「Series Research Memoranda」, Dept. of Economics and Business administration and Econometrics, Amsterdam Univ, (2009).
[2] Del Bo C and Florio M, “Infrastructure and growth in the European Union: an empirical analysis at the regional level in a spatial framework,” Departmental Working Papers, No.37, Dept. of Economics, Milan Univ, (2008).
[3] Jun-Cheol Park. “A Secure Single Sign-On Scheme across Multiple Allied Websites using Smartphones”. Journal of Security Engineering, Vol.14, No.3, pp.189-204. (2017).
[4] NIST. "FIPS Publication186-1: Digital Signature Standard (DS-S)" . November (2008)
[5] NIST."Interfaces for Personal Identity Verification ". Special Publication800-73-3, (2010)
[6] Rob Philpott, Sampath Srinivas, John Kemp, UAF Architectural Overview. Version v1.0-rd-20140209, FIDO Alliance, February (2014).
[7] Sampath Srinivas, Dirk Balfanz, Eric Tiffany, Universal 2nd Factor(U2F) Overview. Versionv 1.0-rd-20140209, FIDOAlliance, February (2014).
[8] Security Technology Research Team, “Comparison of Changes and Characteristics of Identity Information Management Types”, Security Research Department, Financial Security Agency, (2017).03
[9] Kim, Chul-Jin, “An Online Voting System based on Ethereum Block-Chain for Enhancing Reliability”. Journal of the Korea Academia-Industrial, Vol.19, No.4, pp.563-570. (2018). [DOI: 10.5762/KAIS.2018.19.4.563](CrossRef)(Google Scholar)
[10] Seon-Keun Lee. “A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment”. Journal of the Korea Academia-Industrial, Vol.19, No.3, pp.1-7. (2018). [DOI: 10.5762/KAIS.2018.19.3.1](CrossRef)(Google Scholar)
[11] Yong-Joon Lee, Taeyeol Jeon, “A Finger print Authentication Model of ERM System using Private Key Escrow Management Server”. Journal of the Korea Academia-Industrial, Vol.20, No.6, pp.1-8. (2019). [DOI: 10.5762/KAIS.2019.20.6.1](CrossRef)(Google Scholar)
[12] Jae-Wook Heo, Jeong-Ho Kim, Moon-Seog Jun., “Design and Implementation of Blockchain Network Based on Domain Name System”. Journal of the Korea Academia-Industrial, Vol.20, No.5, pp.36-46. (2019). [DOI: 10.5762/KAIS.2019.20.5.36](CrossRef)(Google Scholar)
[13] Sang Guk Moon, Min Sun Kim, Hyun Joo Kim. “Design of an Integrated University Information Service Model Based on Block Chain”. Journal of the Korea Academia-Industrial, Vol.20, No.2, pp.43-50. (2019) [DOI: 10.5762/KAIS.2019.20.2.43](CrossRef)(Google Scholar)