Access Control System Based on Radioelectronic Elements and the Internet of Things

Author(s):  
Kostiantyn Herasymenko ◽  
Olena Starkova ◽  
Danylo Bukhanko
2012 ◽  
Vol 532-533 ◽  
pp. 576-580
Author(s):  
Ke Chao Wang ◽  
Tian Tian Wang ◽  
Zong Fu Jia ◽  
Ming Kui Zong

Traditional access control system is relatively simple, low efficiency, small storage capacity, which can not meet the initiative, timeliness, and flexibility requirements of security technology in the Internet of Things. To solve this problem, this paper researches and designs the intelligent access control system based on Radio Frequency Identification (RFID) technology. The system consists of an access control management system and an access controller. The system can not only be used as the import and export of safety management, but also contribute to the internal order management, achieve effective control and management of access control region.


2015 ◽  
Vol 20 (5) ◽  
pp. 1763-1779 ◽  
Author(s):  
Jorge Bernal Bernabe ◽  
Jose Luis Hernandez Ramos ◽  
Antonio F. Skarmeta Gomez

2017 ◽  
pp. 507-526
Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.


Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.


Author(s):  
Pak Satanasaowapak ◽  
Witawat Kawseewai ◽  
Suchada Promlee ◽  
Anuwat Vilamat

This paper presents a residential access control system (RACs) using QR codes and the internet of things (IoT) to improve security and help house owners. The contribution of this paper is that it proposes two mechanisms in the authentication phase and the verification phase, respectively, to enhance residential access control. The main idea is using cryptography between smartphones and access control devices. The cryptography compares secret codes on the key server via the internet. The RACs can notify a user of the residential access status through the LINE application and show the statuses of devices through the network platform for the internet of everything (NETPIE) in real-time. We compare this system’s performance with that of the current access control methods in terms of security and access speed. The results show that this system has more security and has an access speed of 5.63 seconds. Moreover, this system is safer and more flexible than the comparative methods and suitable for contactless authentication.


2021 ◽  
Vol 1748 ◽  
pp. 042031
Author(s):  
Zheming Yang ◽  
Di Shao ◽  
Liangyong Qu ◽  
Mei Zhang

Sign in / Sign up

Export Citation Format

Share Document