You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enhancing the physical security system of the company's access control using RFID
- Dividing into two aspects: Human and equipment access control
■ TEAM MEMBERS
NAME
University
Cheongjun Kim
Chung-Ang University
Jaehyun Shin
Chung-Ang University
Myoungjin Oh
Chung-Ang University
Sangyeop Park
Chung-Ang University
Seunghyeon Lee
Chung-Ang University
Uichan Kim
Chung-Ang University
Zhongyuan Hu
Purdue University
■ Project Introduction
▣ The project is part of the IITP Summer Program, and Korean universities & Purdue university participated together.
▣ The members consist of 6 Chung-Ang University students and 1 Purdue University student.
▣ This project's goal is to improve physical security with RFID systems and ensure that assets can be managed safely and efficiently.
It has the following advantages:
1. The research strengthens the management of equipment and personnel in various companies
This can make the use of the equipment and people become clearer so that the management becomes more convenient.
It also reduces the possibility of theft and loss.
Even if theft and loss occur, liability can be found from the person who used the equipment.
2. The technology of security level based on RFID will classify the safety level according to the characteristics of different equipment.
Using the classification of security level, it will become more convenient to manage equipment.
In addition, it can have a more precise concept for future buying of equipment.
3. Based on the function of collecting information through RFID, epidemiological investigation can be carried out.
Through the time information stored when people pass the system, tracing the movement becomes effective.
■ Project Differentiation
In this project, RFID systems were used to design an access control system that considered both human and physical security.
This access control system protected information through hash algorithms. Also, the salting technique was applied when generating hash values to prevent vulnerabilities in existing hash functions such as Brute Force and Rainbow table attack.
In addition, security levels were applied to classify assets so that registered assets could be managed more efficiently.
■ Project Implementation
1. Environment setting
The system is implemented with Python, and utilizes Google Cloud Firestore.
There should be a JSON file contatining the key to access to the Firebase.
Libraries including firebase-admin 5.0.1.
MF RFID readers and MF 13.56MHz RFID tags are used for the project.
2. Process of the project
The system works through this process when UID is entered.
The information is protected using SHA3-256 with salt. And Each UID has different salt value.
3. User management
When UID is entered, system checks if user has permission, and records entry-time, exit-time.
If user loses his or her card, he or she can report the loss by entering the name and password.
DB schema for user
UID
Entry_time
Exit_time
Name
Password
UID-1
Entry_time-1
Exit_time-1
Name-1
Password-1
UID-2
Entry_time-2
Exit_time-2
Name-2
Password-2
...
...
...
...
...
UID-n
Entry_time-n
Exit_time-n
Name-n
Password-n
4. Material management
When UID is entered, system checks if UID is already registered, and checks the due-date.
Security level of the RFID tag is calculated with UID value mod 4 + 1.
The security level division can reduce the amount of computation in the Database.