MOBILE ACCESS CONTROL SYSTEM BASED ON RFID TAGS AND FACIAL INFORMATION
DOI:
https://doi.org/10.20998/2079-0023.2020.02.12Keywords:
access control system, RFID tags, NFC, mobile access control, security, person identificationAbstract
RFID tagssee a widespread use in modern security systems, including home intercoms, access control cards, contactless credit cards, biometric passports. Here we focus on a single application, namely access control systems. Currently they have either high cost or low security guarantees. Hence, the developments focusing on improving access control security while lowering the cost is a rapidly developing field. The purpose of this work is to create an alternative access control scheme, where card scanners are replaced with passive RFID tags, and all of the communication is done via user’s smartphone Wi-Fi. Based on the analysis of existing approaches to the development of access control systems, it was concluded that use of mobile systems is the most promising due to their expandability and presence of a large number of sensors, such as NFC, camera etc. In the proposed model RFID tags are mounted near a turnstile or a smart door. Tag reading and programming is done via NFC chip directly on an Android or iOS mobile device, which allows for a significant price cut for such a system implementation. A detailed description of a tag writing procedure with the data required to perform it is provided. To enhance security, together with smartphone-based authorization we require the user to provide his photograph while entering a secure gate. The photograph is then displayed on a monitoring dashboard side-by-side with his registration picture, so that the two can then be matched against each other. The developed client-server application offers administrative system used to configure gate access policies and monitor entrances with filters by access time, user and gate. Besides that, we propose a mobile application that allows gate registration and serves as a door unlock key. The access control model that we suggest reduces installation costs required, as it is fully wireless and uses cheap autonomous RFID-tags as its main component. We expect the presented application to be easy in adaptation to customer needs and to existing security systems.References
Zashchita informatsii. Kontrol' dostupa. Uchot rabochego vremeni [Information Protection. Access Control. Time Tracking]. Available at: http://www.ualock.kiev.ua/index.htm (accessed 23.10. 20).
Sistemy bezopasnosti PERCo [PERCo Security Systems]. Available at: https://www.perco.ru/ (accessed 23.10.20).
Mobil'nyy dostup — ispol'zovaniye smartfona v sistemakh kontrolya dostupa [Mobile access - using a smartphone in access control systems]. Available at: https://habr.com/ru/company/intems/blog/433872/ (accessed 12.10.20).
Karty kontrolya dostupa [Access Control Cards]. Available at: http://www.techportal.ru/glossary/karti-kontrolya-dostupa.html (accessed 12.10.20).
Kail K., Williams C., Kail R. Access control system with RFID and biometric facial recognition. U.S. Patent No. 11/790,385. 2007.
Farooq, Umar, et al. RFID based security and access control system. International Journal of Engineering and Technology 6.4 (2014): 309. doi: 10.7763/IJET.2014.V6.718
NFC Compatibility. Available at: https://www.shopnfc.com/en/content/7-nfc-compatibility (accessed 12.10.20).
NFC Tag Specs – Tag NFC. Available at: https://www.tagnfc.com/en/info/11-nfc-tags-specs (accessed 12.10.20).
NFC basics. Available at: https://developer.android.com/guide/topics/connectivity/nfc/nfc (accessed 13.10.20).
What is GUID? Available at: http://guid.one/guid (accessed 24.11.20).
Core NFC | Apple Developer Documentation. Available at: https://developer.apple.com/documentation/corenfc (accessed 23.10.20).
Adding Support for Background Tag Reading | Apple Developer Documentation. Available at: https://developer.apple.com/documentation/corenfc/adding_support_ for_background_tag_reading (accessed 23.10.20).
Allowing Apps and Websites to Link to Your Content | Apple Developer Documentation. Available at: https://developer.apple.com/documentation/xcode/allowing_apps_an d_websites_to_link_to_your_content (accessed 23.10.20).
Khabarlak K., Koriashkina L. Fast Facial Landmark Detection and Applications: A Survey //ResearchGate preprint. – 2020. doi: 10.13140/RG.2.2.32735.07847
Real-time ASP.NET with SignalR | .NET. Available at: https://dotnet.microsoft.com/apps/aspnet/signalr (accessed 23.10.20).
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2020 Bulletin of National Technical University "KhPI". Series: System Analysis, Control and Information TechnologiesAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).