Skip to main content

2017 | Supplement | Buchkapitel

Prototyping Minimal Footprint NFC-Based User Access Control System for IoT Applications

verfasst von : Martin Stusek, Jiri Pokorny, Krystof Zeman, Jaroslav Hajek, Pavel Masek, Jiri Hosek

Erschienen in: Distributed Computer and Communication Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

User access control systems have become a standard part of security systems in many consumer as well as industrial applications. The majority of these systems utilize tokens to gain an access into restricted areas such as buildings, garages, and workplaces. They are available in different shapes and sizes, but their communication interface often utilizes NFC technology ensuring compatibility throughout a variety of distinct tokens. Main goal of this paper is to share most important hands-on experience acquired during the development of NFC-based user access control system with minimal deployment footprint. Common handheld/wearable devices like smartphones or smartwatches have been used to eliminate the need for another item to be carried by a user. In our Android-based implementation, users are authenticated via server application and their accounts can be managed by the user interface called Locker. Further, MySQL database acts as a storage for user data and for authentication purposes as well.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alattar, M., Achemlal, M.: Host-based card emulation: development, security, and ecosystem impact analysis. In: 2014 IEEE International Conference on High Performance Computing and Communications, 2014 IEEE 6th International Symposium on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Systems (HPCC, CSS, ICESS), pp. 506–509, August 2014 Alattar, M., Achemlal, M.: Host-based card emulation: development, security, and ecosystem impact analysis. In: 2014 IEEE International Conference on High Performance Computing and Communications, 2014 IEEE 6th International Symposium on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Systems (HPCC, CSS, ICESS), pp. 506–509, August 2014
2.
Zurück zum Zitat Alliance, S.C.: Host card emulation (HCE) 101. A Smart Card Alliance Mobile and NFC Council White Paper (2014) Alliance, S.C.: Host card emulation (HCE) 101. A Smart Card Alliance Mobile and NFC Council White Paper (2014)
3.
Zurück zum Zitat Armando, A., Merlo, A., Verderame, L.: Trusted host-based card emulation. In: 2015 International Conference on High Performance Computing and Simulation (HPCS), pp. 221–228. IEEE (2015) Armando, A., Merlo, A., Verderame, L.: Trusted host-based card emulation. In: 2015 International Conference on High Performance Computing and Simulation (HPCS), pp. 221–228. IEEE (2015)
4.
Zurück zum Zitat Basyari, R.S., Nasution, S.M., Dirgantara, B.: Implementation of host card emulation mode over android smartphone as alternative ISO 14443A for Arduino NFC shield. In: 2015 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), pp. 160–165. IEEE (2015) Basyari, R.S., Nasution, S.M., Dirgantara, B.: Implementation of host card emulation mode over android smartphone as alternative ISO 14443A for Arduino NFC shield. In: 2015 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), pp. 160–165. IEEE (2015)
6.
Zurück zum Zitat Cope, P., Campbell, J., Hayajneh, T.: An investigation of bluetooth security vulnerabilities. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–7, January 2017 Cope, P., Campbell, J., Hayajneh, T.: An investigation of bluetooth security vulnerabilities. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–7, January 2017
7.
Zurück zum Zitat Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wireless Pers. Commun. 71(3), 2259–2294 (2013)CrossRef Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wireless Pers. Commun. 71(3), 2259–2294 (2013)CrossRef
9.
Zurück zum Zitat Ensworth, J.F., Reynolds, M.S.: Ble-backscatter: ultralow-power IoT nodes compatible with bluetooth 4.0 low energy (BLE) smartphones and tablets. IEEE Trans. Microw. Theory Tech. (2017) Ensworth, J.F., Reynolds, M.S.: Ble-backscatter: ultralow-power IoT nodes compatible with bluetooth 4.0 low energy (BLE) smartphones and tablets. IEEE Trans. Microw. Theory Tech. (2017)
10.
Zurück zum Zitat Haataja, K., Toivanen, P.: Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. IEEE Trans. Wireless Commun. 9(1), 384–392 (2010)CrossRef Haataja, K., Toivanen, P.: Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. IEEE Trans. Wireless Commun. 9(1), 384–392 (2010)CrossRef
11.
Zurück zum Zitat ISO/IEC: Identification cards - integrated circuit cards - part 4: Organization, security and commands for interchange. Standard, International Organization for Standardization, Switzerland, August 2014 ISO/IEC: Identification cards - integrated circuit cards - part 4: Organization, security and commands for interchange. Standard, International Organization for Standardization, Switzerland, August 2014
12.
Zurück zum Zitat ISO/IEC: Identification cards - contactless integrated circuit cards - proximity cards - part 4: Transmission protocol. Standard, International Organization for Standardization, Switzerland, June 2016 ISO/IEC: Identification cards - contactless integrated circuit cards - proximity cards - part 4: Transmission protocol. Standard, International Organization for Standardization, Switzerland, June 2016
13.
Zurück zum Zitat Misra, S.: A very simple user access control technique through smart device authentication using bluetooth communication. In: 2014 International Conference on Electronics, Communication and Instrumentation (ICECI), pp. 1–4. IEEE (2014) Misra, S.: A very simple user access control technique through smart device authentication using bluetooth communication. In: 2014 International Conference on Electronics, Communication and Instrumentation (ICECI), pp. 1–4. IEEE (2014)
14.
Zurück zum Zitat Morsalin, S., Islam, A.M.J., Rahat, G.R., Pidim, S.R.H., Rahman, A., Siddiqe, M.A.B.: Machine-to-machine communication based smart home security system by NFC, fingerprint, and PIR sensor with mobile android application. In: 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pp. 1–6, September 2016 Morsalin, S., Islam, A.M.J., Rahat, G.R., Pidim, S.R.H., Rahman, A., Siddiqe, M.A.B.: Machine-to-machine communication based smart home security system by NFC, fingerprint, and PIR sensor with mobile android application. In: 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pp. 1–6, September 2016
15.
Zurück zum Zitat Prudanov, A., et al.: A trial of yoking-proof protocol in RFID-based smart-home environment. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2016. CCIS, vol. 678, pp. 25–34. Springer, Cham (2016). doi:10.1007/978-3-319-51917-3_3 CrossRef Prudanov, A., et al.: A trial of yoking-proof protocol in RFID-based smart-home environment. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2016. CCIS, vol. 678, pp. 25–34. Springer, Cham (2016). doi:10.​1007/​978-3-319-51917-3_​3 CrossRef
16.
Zurück zum Zitat Scarfone, K., Padgette, J.: Guide to bluetooth security. NIST Spec. Publ. 800(2008), 121 (2008) Scarfone, K., Padgette, J.: Guide to bluetooth security. NIST Spec. Publ. 800(2008), 121 (2008)
17.
Zurück zum Zitat Shobha, N.S.S., Aruna, K.S.P., Bhagyashree, M.D.P., Sarita, K.S.J.: NFC and NFC payments: a review. In: 2016 International Conference on ICT in Business Industry Government (ICTBIG), pp. 1–7, November 2016 Shobha, N.S.S., Aruna, K.S.P., Bhagyashree, M.D.P., Sarita, K.S.J.: NFC and NFC payments: a review. In: 2016 International Conference on ICT in Business Industry Government (ICTBIG), pp. 1–7, November 2016
18.
Zurück zum Zitat Tabet, N.E., Ayu, M.A.: Analysing the security of NFC based payment systems. In: 2016 International Conference on Informatics and Computing (ICIC), pp. 169–174, October 2016 Tabet, N.E., Ayu, M.A.: Analysing the security of NFC based payment systems. In: 2016 International Conference on Informatics and Computing (ICIC), pp. 169–174, October 2016
Metadaten
Titel
Prototyping Minimal Footprint NFC-Based User Access Control System for IoT Applications
verfasst von
Martin Stusek
Jiri Pokorny
Krystof Zeman
Jaroslav Hajek
Pavel Masek
Jiri Hosek
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-66836-9_3