An automatic physical access control system based on hand vein biometric identification

2015 ◽  
Vol 61 (3) ◽  
pp. 320-327 ◽  
Author(s):  
Yiding Wang ◽  
Wei Xie ◽  
Xiaojie Yu ◽  
Lik-Kwan Shark
2019 ◽  
Vol 15 (2) ◽  
pp. 23-28
Author(s):  
Evgeny A. Godovnikov ◽  
Anatoliy V. Shicelov ◽  
Ruslan T. Usmanov

This article discusses the design of a physical access control system for an enterprise with various methods of authentication and user identification. A review of existing solutions in the design of physical access control systems was conducted. In the course of the work, a system design was proposed, and its components were described in detail.


2019 ◽  
Vol 11 (3) ◽  
pp. 929-943 ◽  
Author(s):  
Euripides G. M. Petrakis ◽  
Filippos Antonopoulos ◽  
Stelios Sotiriadis ◽  
Nik Bessis

Author(s):  
Dominik Gruntz ◽  
Christof Arnosti ◽  
Marco Hauri

Purpose The purpose of this paper is to present a smartphone-based physical access control system in which the access points are not directly connected to a central authorization server, but rather use the connectivity of the mobile phone to authorize a user access request online by a central access server. The access points ask the mobile phone whether a particular user has access or not. The mobile phone then relays such a request to the access server or presents an offline ticket. One of the basic requirements of our solution is the independence from third parties like mobile network operators, trusted service managers and handset manufacturers. Design/methodology/approach The authentication of the smartphone is based on public key cryptography. This requires that the private key is stored in a secure element or in a trusted execution environment to prevent identity theft. However, due to the intended independence from third parties, subscriber identity module (SIM)-based secure elements and embedded secure elements (i.e. separate hardware chips on the handset) were not an option and only one of the remaining secure element architectures could be used: host card emulation (HCE) or a microSD-based secure element. Findings This paper describes the implementation of such a physical access control system and discusses its security properties. In particular, it is shown that the HCE approach cannot solve the relay attack under conservative security assumptions and an implementation based on a microSD secure element is presented and discussed. Moreover, the paper also describes an offline solution which can be used if the smartphone is not connected to the access server. In this case, an access token is sent to the access point in response to an access request. These tokens are renewed regularly and automatically whenever the smartphone is connected. Originality/value In this paper, a physical access control system is presented which operates as fast as existing card-based solutions. By using a microSD-based secure element (SE), the authors were able to prevent the software relay attack. This solution is not restricted to microSD-based SEs, it could also be implemented with SIM-based or embedded secure elements (with the consequence that the solution depends on third parties).


Sign in / Sign up

Export Citation Format

Share Document