scholarly journals Design of physical access control system with integrated wireless authentication

2019 ◽  
Vol 15 (2) ◽  
pp. 23-28
Author(s):  
Evgeny A. Godovnikov ◽  
Anatoliy V. Shicelov ◽  
Ruslan T. Usmanov

This article discusses the design of a physical access control system for an enterprise with various methods of authentication and user identification. A review of existing solutions in the design of physical access control systems was conducted. In the course of the work, a system design was proposed, and its components were described in detail.

2019 ◽  
Vol 11 (3) ◽  
pp. 929-943 ◽  
Author(s):  
Euripides G. M. Petrakis ◽  
Filippos Antonopoulos ◽  
Stelios Sotiriadis ◽  
Nik Bessis

Author(s):  
Dominik Gruntz ◽  
Christof Arnosti ◽  
Marco Hauri

Purpose The purpose of this paper is to present a smartphone-based physical access control system in which the access points are not directly connected to a central authorization server, but rather use the connectivity of the mobile phone to authorize a user access request online by a central access server. The access points ask the mobile phone whether a particular user has access or not. The mobile phone then relays such a request to the access server or presents an offline ticket. One of the basic requirements of our solution is the independence from third parties like mobile network operators, trusted service managers and handset manufacturers. Design/methodology/approach The authentication of the smartphone is based on public key cryptography. This requires that the private key is stored in a secure element or in a trusted execution environment to prevent identity theft. However, due to the intended independence from third parties, subscriber identity module (SIM)-based secure elements and embedded secure elements (i.e. separate hardware chips on the handset) were not an option and only one of the remaining secure element architectures could be used: host card emulation (HCE) or a microSD-based secure element. Findings This paper describes the implementation of such a physical access control system and discusses its security properties. In particular, it is shown that the HCE approach cannot solve the relay attack under conservative security assumptions and an implementation based on a microSD secure element is presented and discussed. Moreover, the paper also describes an offline solution which can be used if the smartphone is not connected to the access server. In this case, an access token is sent to the access point in response to an access request. These tokens are renewed regularly and automatically whenever the smartphone is connected. Originality/value In this paper, a physical access control system is presented which operates as fast as existing card-based solutions. By using a microSD-based secure element (SE), the authors were able to prevent the software relay attack. This solution is not restricted to microSD-based SEs, it could also be implemented with SIM-based or embedded secure elements (with the consequence that the solution depends on third parties).


2013 ◽  
Vol 427-429 ◽  
pp. 2795-2799
Author(s):  
Long Fan ◽  
He Huang ◽  
Wei Kang

In traditional role-based access control (Role Based Access Control, RBAC), proposed the role and user-groups based on access control with context-aware (Role and Group Based Access Control with Context, RGBACC) model. RGBACC can do unified functional management to users, and can dynamically change the user's permission by the information from application environment in the context of access and security-related .This article RGBACC model applied to the actual document access control system, and the system design and implementation of a detailed description.


2021 ◽  
Vol 92 ◽  
pp. 07009
Author(s):  
Martin Boroš ◽  
Filip Lenko ◽  
Andrej Velas

Research background: The research, which is the subject of the paper, is based on the global expansion of the use of electronic access control systems using biometric data for user verification. Due to the globalization of products from foreign markets to Slovakia, there is a competition between suppliers. The disadvantage is that organizations that are considering procuring an electronic access control system focus their attention only on its price. Globalization and global use have neglected the skills gap between European, American, and Asian markets. Purpose of the article: The paper will aim to point out, through a case study, the financial and functional differences of electronic access control systems. In the case study, a comparison of three different systems with the possibility of procurement on the European, American, and Asian markets will be performed on the building - administrative building. Methods: The article will mainly use methods such as the global method and the optimization model of the financial plan. As well as a case study, the cooperation of achieved results and analysis of possibilities of foreign markets. Findings & Value added: The results achieved by the paper will be globally usable in the conditions of European countries. These will be the conclusions of a case study that will point to the appropriateness of choosing an electronic access control system using biometric features in a standard office building. We can also consider the creation of a project budget usable for organizations as one of the added values.


Sign in / Sign up

Export Citation Format

Share Document