17 Oct 2022

44

Smart Card Technologies in the Access-Control Environment

Format: APA

Academic level: College

Paper type: Research Paper

Words: 2213

Pages: 7

Downloads: 0

Access control has been defined as the technique of confirming that individuals are who they claim to be and that they possess the requisite rights to physically access a place or computerized systems that contain various data (Martin, 2019; Space and Naval Warfare Systems Center Atlantic, 2015). Access control involves two processes, authentication and authorization. In physical locations such as airports and military defenses, access control helps to increase the physical security of the location by keeping away terrorists, thieves or other persons who might have malicious intentions. In computerized systems, access control helps to improve the security of the stored data such as financial, health or personal information. With cybercriminals and other cyber actors being in the roam, access control helps to prevent data breaches. 

Increased security challenges within the physical and data security environments have made organizations and institutions to review their security protocols continually. The security challenges include the 9/11 attack and the massive data breaches that have been experienced by various organizations over the years. Smartcard technologies are amongst the earliest access control technologies that were adopted to combat the growing security threats. Initially, the smartcard technologies utilized microprocessors that stored the user data and users would input their passwords when the cards were put in readers to access data systems or physical locations (Mohammed et al., 2004). With smartcards being prone to theft and passwords being hacked, there was a need for more enhanced measures. One of the responses to these developments was the adoption of multi-factor authentication techniques. The techniques include passwords, badges and user identification numbers and PINs, amongst others (Guennouni et al., 2019; Taherdoost, 2011). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Biometric technologies were also used to complement the access control techniques. Various biometric technologies were used in combination with smartcards to improve the security of systems. Enhanced technologies saw the biometric technologies become integrated into smartcard technologies. The integration of biometric technologies into smartcard technologies is still a developing field with promising outcomes. The results of such developments have enhanced access control technologies. 

Literature Review 

Smartcard technologies involve the use of smartcards that have encrypted data that is stored in microprocessors. In access control environments, users use the smartcards to gain access to physical locations or system databases. The access rights are granted through the input of passwords. The smartcards can be contact, must be physically put into card readers or contactless, use bar codes or stripes that can be detected by readers without inserting the smartcard (Smart Card Alliance, 2011). The disadvantages of smartcards include being prone to theft and hacking of passwords, thus allowing unauthorized users to access systems or restricted locations. 

Biometrics involves the use of human biological features to authenticate if users are whom they claim to be and in the context of access control, grant or deny them access rights. The human behavioral or physical features are pre-recorded during enrolment, and during the access request, a comparison of the pre-recorded and the current information is made to check whether a match occurs (Guennouni et al., 2019; Space and Naval Warfare Systems Center Atlantic, 2015). A match helps in the identification of the user; hence access rights are given. Otherwise, access is denied. Biometric technologies offer the advantage of ensuring only authorized users acquire access rights since the physiological and behavioral features cannot be stolen (Adegun et al., 2014). 

Thus, the integration of smartcard technologies and biometric technologies presents significant benefits in the access control environment. The combination of smartcard technologies with biometric technologies makes it almost impossible to replicate the smartcard. This is because the smartcard contains a person’s unique physiological or behavioral features. The combination enables a more robust verification and authentication process when trying to access systems or physical locations (Smart Card Alliance, 2011). The most crucial benefit of this combination is the enhanced security within the access control environment (Sumant and Chawan, 2010). The integration also increases the efficiency of the authentication process. Smartcard technologies are also easily upgradable and can allow the addition of more biometric features, thus improving the usability of the smartcard. 

The combination of smartcard and biometric technologies has already found utilization in various access control environments in the world. The utilizations include a Canadian Airport Restricted Area Identification card that uses fingerprints, iris and facial data integrated into a smartcard for the airport employees (Smart Card Alliance, 2011). The US Department of Defense Common Access Card uses biometrics encrypted in a smartcard to regulate access to DoD computers, networks and various facilities amongst the various members of DOD. 

Biometric Technologies Used Alongside Smartcard Technologies in the Access Control Environment 

Facial Recognition Technology 

Cameras are used to capture facial images. The technology uses thermal or video imaging techniques to capture photographic images of the patterns, shape and orientation of various facial features (Space and Naval Warfare Systems Center Atlantic, 2015). The captured features are used to create a mathematical model that is used to search for a match with the reference template that was created during enrolment. The technology is considered non-intrusive as it does not make any physical contact with an individual (Boodoo et al., 2010). Consequently, it has received a high acceptance rate among users. It also can store facial images of non-authorized users who try to access a location. The facial recognition technology is vital in complementing other technologies such as login names and the smartcard. The facial recognition system helps in verification of the details captured through the smartcard. A match with the reference template leads to granting of access rights while a non-match leads to denial. The technology is only useful where there is uniform light, such as indoors, so that quality images are captured. 

Fingerprint Recognition Technology 

It is one of the oldest biometric technologies that has been used in the access control environment. It involves the capturing of the fingerprint features such as ridge patterns, which are unique to every individual (Space and Naval Warfare Systems Center Atlantic, 2015). A fingerprint scanner is used to capture these details, and a comparison is made with the already stored details for verification (Mahadik et al., 2009). Top-notch fingerprint scanners utilize temperature and humidity monitors besides the matching technology to ensure that the scanning is being done on live fingers, thus reducing incidences of spoofing (Ahmad et al., 2012). Fingerprint recognition technology is quite advantageous as it is quite affordable to collect fingerprints data. Fingerprints are also quite stable, thus offers high accuracy in identification and verification. The technology can be effectively used alongside smartcard technologies to increase the effectiveness of access control technologies (AYGÜN, 2015). This is achieved by having a fingerprint scanner alongside the card reader. 

Hand/Finger Geometry Recognition Technology 

The technology involves capturing the whole hand or finger (index and middle finger) geometrical properties, dimensions, using three-dimensional images (Space and Naval Warfare Systems Center Atlantic, 2015). The camera or reader captures details such as shape and length, and the detecting system looks for a match. Due to the likelihood of persons having identical hand/finger geometry, the technique is prone to spoofing attacks. Thus, it is not entirely useful in identification but in verification when used alongside other technologies such as smartcards or fingerprints. The technology has not experienced many developments in recent years but has been used for several years in access control to nuclear power sites. 

Vascular Pattern Recognition Technology 

The technology involves the detection of the geometry of the veins in areas such as hands, face, finger. It is an emergent biometric technology that has proved to be effective in identification and verification despite being a bit expensive (Space and Naval Warfare Systems Center Atlantic, 2015). The technology uses infrared scanning technologies that are capable of capturing the minutiae of the details. An infrared camera acts as a scanner and captures the geometry of the veins underneath the skin. Vein parts are unique to each person and do not vary through one’s lifespan, thus increasing the effectiveness of the technique. The veins of the required skin area are captured during enrolment, and the infrared images are transformed into binary images, which are then changed into algorithms in mathematical form for storage as reference plates. As one seeks access, the captured vein images are verified against the reference plate to check whether there is a match. Access is only granted if the matching criterion is satisfied. The technology can be deployed in high-security control areas due to its effectiveness. It has gained high acceptance rates amongst users due to its speed of relaying results (less than one second) and its non-intrusive nature. It is quite useful in complimenting smartcards and has been utilized in ATMs in Japan (Space and Naval Warfare Systems Center Atlantic, 2015). 

Iris Recognition Technology 

The technology is an effective method that can be used in the identification and verification of users in access control environments due to the uniqueness and stability of the human iris. The iris images can be captured from as far as 4 inches to 6 feet. A monochrome CCD camera is used to capture the image of the iris by utilizing both near-infrared and visible light (Space and Naval Warfare Systems Center Atlantic, 2015). A software program is used to change the eye image into an iris image that is transformed into mathematical expressions through demodulations and creates a reference template. An access request template is matched against the reference template in order to allow or deny access. The technology is flexible for use in different environments and also proves to be very reliable (Boodoo et al., 2010). It is proof to spoofing attacks. It is used in high-security areas such as in airport access and physical access to health records. The technology can be readily applied to complement smartcard technologies in areas where smart cards are already put in place. 

Voice Recognition Technology 

The technology relies on the uniqueness of human voices to identify users in access control environments. The technology captures the distinctness of the rhythm, tone and pitch in users (Space and Naval Warfare Systems Center Atlantic, 2015). Audio devices are used to record passphrases during enrolment, and a software device utilizes algorithms to create a secure voiceprint that is stored as a reference plate. The technology had previously been used in areas such as logical access to computer systems. However, developments in technology have seen the technology gain increased usage in physical access control, such as in warehouse inventory control. It is also used to enhance the security of confidential information. However, the utilization of the technology in a high-security situation remains limited. Consequently, the technology can be used together with the smart card technologies to complement each other. 

Signature Dynamics Recognition Technology 

The technology is dependent on the behavioral characteristics of the users as they are making their handwritten signatures. Signature dynamics rely on aspects such as shape, stroke, pen pressure and timing (Space and Naval Warfare Systems Center Atlantic, 2015). These concepts are unique to different users, and when slight variations occur, the changes can be tracked over time. During enrolment, the handwritten signature is captured using a digital tablet with a stylus. Several identical signatures are made, and the system may either create a single reference template or several. The technology is faced with various vulnerabilities, and hence its utilization in physical access control is limited. The vulnerabilities include differences in positions (sitting or standing) of making the signature, causing rejection of authentic users (Boodoo et al., 2010). The reference templates can be stored in a smartcard that the user identifies with as they seek access privilege. The integration of the signature references into a smartcard helps to complement the smartcard technologies. The system has high acceptance rates amongst users due to its existent utilization in areas such as banks. 

Future Trends in Smartcard and Biometrics in Access Control 

There are likely to be more developments in the area of integration of biometrics into smartcard technologies within the access control environment. Technological advancement is likely to give rise to more enhanced and mature technologies. The various biometric technologies will become increasingly adopted within various organizations as part of security measures. The different biometric technologies are also likely to be combined into a multi-factor authentication system within a smartcard (Harakannanavar et al., 2019). However, the issues of privacy and amongst users will not go away (Pato and Millett, 2010). The fear of identity theft in these technologies is an issue that organizations will have to deal with (Pandya, 2019). 

In order to do away with various fears and pertinent risks in these technological developments, governments will have to craft more strict legislation concerning the development and utilization of various technologies (Pato and Millett, 2010). Amazon’s face recognition technology is already facing challenges due to accusations of racial and gender discrimination in its detection system (Metz and Natasha, 2019). Governments are also likely to favor the production of the cards within their boundaries due to a lack of trust with other governments, which might spy on their nationals. 

Conclusion 

Despite the development of smartcard and biometric technologies several years ago, the combination of these technologies is proving to be a gamer changer in the access control environment. The integrations are offering enhanced security measures. Technological advancements have greatly aided the facial recognition and vascular pattern recognition technologies to provide very effective techniques in the access control environment. The fingerprint and iris recognition technologies continue to be stable methods for use in access control. However, the voice, signature and hand/finger geometry recognition technologies still require more technological advancements in order to offer more stable and reliable techniques within the access control environment. Conclusively, the smartcard and biometric technologies integration is a huge success in the access control environment. It allows the two techniques to complement each other. 

References 

Adegun, A., Adigun, A., & Asani, E. (2014). A Review of Trends of Authentication Mechanisms for Access Control.  Computing, Information Systems, Development Informatics & Allied Research Journal 5 (2). Retrieved 24 April 2020, from http://eprints.lmu.edu.ng/318/

Ahmad, S. M. S., Ali, B. M., & Adnan, W. A. W. (2012). Technical issues and challenges of biometric applications as access control tools of information security.  International journal of innovative computing, information and control 8 (11), 7983-7999. 

Asani, E. O. (2014). A REVIEW OF TRENDS OF AUTHENTICATION MECHANISMS FOR ACCESS CONTROL.  Computing, Information Systems, Development Informatics & Allied Research Journal 5 (2). 

AYGÜN, S. (2015).  Smart Card and Biometric Based General Purpose Access Control System Design  (Masters). Istanbul Technical University. 

Boodoo, N., Subramanian, R., & Baichoo, S. (2010). Trends in Biometric Technology.  University Of Mauritius Journal 16 . Retrieved 24 April 2020, from https://www.ajol.info/index.php/umrj/article/download/131120/120711

Guennouni, S., Mansouri, A., & Ahaitouf, A. (2019). Biometric Systems and Their Applications.  Visual Impairment And Blindness [Working Title] . https://doi.org/10.5772/intechopen.84845 

Harakannanavar, S. S., Renukamurthy, P. C., & Raja, K. B. (2019). Comprehensive Study of Biometric Authentication Systems, Challenges and Future Trends.  International Journal of Advanced Networking and Applications 10 (4), 3958-3968. 

Mahadik, S., Narayanan, K., Bhoir, D. V., & Shah, D. (2009, January). Access Control System using fingerprint recognition. In  Proceedings of the International Conference on Advances in Computing, Communication and Control  (pp. 306-311). 

Martin, J. (2019).  What is access control? A key component of data security . CSO Online. Retrieved 24 April 2020, from https://www.csoonline.com/article/3251714/what-is-access-control-a-key-component-of-data-security.html

Metz, C., & Singer, N. (2019). A I. Experts Question Amazon’s Facial-Recognition Technology . Nytimes.com. Retrieved 24 April 2020, from https://www.nytimes.com/2019/04/03/technology/amazon-facial-recognition-technology.html

Metz, C., & Singer, N. (2019). A I. Experts Question Amazon’s Facial-Recognition Technology . Nytimes.com. Retrieved 24 April 2020, from https://www.nytimes.com/2019/04/03/technology/amazon-facial-recognition-technology.html

Mohammed, L. A., Ramli, A. R., Prakash, V., & Daud, M. B. (2004). Smart card technology: Past, present, and future.  International Journal of The Computer, the Internet and Management 12 (1), 12-22. 

Pandya, J. (2019).  Hacking Our Identity: The Emerging Threats From Biometric Technology . Forbes. Retrieved 24 April 2020, from https://www.forbes.com/sites/cognitiveworld/2019/03/09/hacking-our-identity-the-emerging-threats-from-biometric-technology/#6c6690105682

Pato, J., & Millett, L. (2010).  Biometric recognition . National Academies Press. https://doi.org/10.17226/12720 

Smart Card Alliance. (2011). Smart Cards and Biometrics.  Available to: www. smartcardalliance. org

Space and Naval Warfare Systems Center Atlantic. (2015).  Access Control Technologies Handbook  [Ebook]. Retrieved 24 April 2020, from https://www.dhs.gov/sites/default/files/publications/ACT-HB_0915-508.pdf

Sumant, A. S., & Chawan, P. M. (2010, February). Smart cards and biometrics: the integration of two growing technologies. In  ICWET  (pp. 1019-1020). 

Taherdoost, H., Sahibuddin, S., & Jalaliyoon, N. (2011). Smart card security; Technology and adoption.  International Journal of Security 5 (2), 74-84. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Smart Card Technologies in the Access-Control Environment.
https://studybounty.com/smart-card-technologies-in-the-access-control-environment-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 437

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 112

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration