ABSTRACT
Access control is the process of protecting resources by allowing or rejecting access to particular resources. It is an integral part of physical security systems and protects resources from unauthorized use. Over the past decade, there has been a huge demand and need for more sophisticated and secure access technologies. Scientists are developing cutting edge technologies to fulfill the requirements for secure access control experiences. Access control systems, using the latest biometric technologies such as fingerprint, facial recognition, iris recognition, DNA, and signature recognition have offered a higher level of security than the conventional systems. Biometrics plays a vital role in the identification and authentication phase of access control. Every biometric system has weaknesses and benefits. The system success depends on selecting the proper type of biometric modality to use and understanding how it affects system performance, cost, and limitations. Fingerprint holds the first place according to its popularity but facial recognition and iris recognition continue to grow for its accuracy and are considered as the future of biometric recognition. Besides biometric technology, other future possibilities for secure access control are- mobile access control, cloud-based security, and multi-factor authentication. This paper presents access control components, functions, and types. The aim of the paper is to discuss and analyze the latest biometric access control to secure sensitive information. This paper also provides an overview of access control, discusses the latest biometric technology, and presents the future trend of access control.
- Alper Kerman, Oliver Borchert, Scott Rose, and Allen Tan, 2020. Implementing a zero trust architecture. National Institute of Standards and Technology, 2020, pp.17-17.Google Scholar
- Htoo Aung Maw, Hannan Xiao, Bruce Christianson, and James A. Malcolm. 2014. A survey of access control models in wireless sensor networks. Journal of Sensor and Actuator Networks, 3(2), pp.150-180.Google ScholarCross Ref
- Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, pp.146-164.Google Scholar
- Md L. Ali, Kutub Thakur, and Muath A. Obaidat. 2022. A Hybrid Method for Keystroke Biometric User Identification. Electronics, 11(17), p.2782.Google ScholarCross Ref
- Aafaf Ouaddah, Hajar Mousannif, Anas Abou Elkalam, and Abdellah Ait Ouahman. 2017. Access control in the Internet of Things: Big challenges and new opportunities. Computer Networks, 112, pp.237-262.Google ScholarDigital Library
- Md L. Ali, John V. Monaco, Charles C. Tappert, and Meikang Qiu. 2017. Keystroke biometric systems for user authentication. Journal of Signal Processing Systems, 86(2), pp.175-190.Google ScholarDigital Library
- Nataliya B Sukhai. 2004, October. Access control & biometrics. In Proceedings of the 1st annual conference on Information security curriculum development (pp. 124-127).Google ScholarDigital Library
- Md L. Ali and Charles C. Tappert. 2018, August. Pohmm/svm: A hybrid approach for keystroke biometric user authentication. In 2018 IEEE International Conference on Real-time Computing and Robotics (RCAR) (pp. 612-617). IEEE.Google Scholar
- Dean Povey. 1999, September. Optimistic security: a new access control paradigm. In Proceedings of the 1999 workshop on New security paradigms (pp. 40-45).Google ScholarDigital Library
- Younis A Younis, Kashif Kifayat, and Madjid Merabti. 2014. An access control model for cloud computing. Journal of Information Security and Applications, 19(1), pp.45-60.Google ScholarDigital Library
- Carl E. Landwehr. 1981. Formal models for computer security. ACM Computing Surveys (CSUR), 13(3), pp.247-278.Google ScholarDigital Library
- Di Vimercati De Capitani, Sabrina, Sara Foresti, Pierangela Samarati, and Sushil Jajodia. 2007. Access control policies and languages. International Journal of Computational Science and Engineering, 3(2), pp.94-102.Google Scholar
- Anil K. Jain and Ajay Kumar. 2010. Biometrics of next generation: An overview. Second generation biometrics, 12(1), pp.2-3.Google Scholar
- Sharifah Mumtazah Syed Ahmad, Borhanuddin Mohd Ali, and Wan Azizun Wan Adnan. 2012. Technical issues and challenges of biometric applications as access control tools of information security. International journal of innovative computing, information and control, 8(11), pp.7983-7999.Google Scholar
- Vincent C. Hu, David Ferraiolo, and D. Richard Kuhn. 2006. Assessment of access control systems. Gaithersburg, MD, USA: US Department of Commerce, National Institute of Standards and Technology.Google Scholar
- Md Liakat Ali, John V. Monaco, and Charles C. Tappert. 2017, October. Biometric studies with hidden Markov model and its extension on short fixed-text input. In 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) (pp. 258-264). IEEE.Google Scholar
- Mark Ciampa, 2021. CompTIA security+ guide to network security fundamentals. Cengage Learning.Google Scholar
- NordPass, Top 200 most common password, Retrieved December 27, 2022 from https://nordpass.com/most-common-passwords-list/.Google Scholar
- David Kim and Michael G. Solomon. 2021. Fundamentals of information systems security. Jones & Bartlett Learning.Google Scholar
- Ramaswamy Palaniappan and Kenneth Revett. 2014. PIN generation using EEG: a stability study. International Journal of Biometrics, 6(2), pp.95-106.Google ScholarDigital Library
- Michael Gips, Access Control Trends in 2022: The Future of Access Control, Retrieved December 27, 2022 from https://www.swiftlane.com/blog/the-future-of-access-control/.Google Scholar
- Future Market Insights, Contactless Biometrics Technology Market, Retrieved December 27, 2022 from https://www.futuremarketinsights.com/reports/contactless-biometrics-technology-market.Google Scholar
- Marketsandmarkets, Facial Recognition Market, Retrieved December 27, 2022 from https://www.marketsandmarkets.com/Market-Reports/facial-recognition-market-995.html.Google Scholar
- Scot Sturges, The ever-Evolving Trends of Access Control, Various Challenges are driving new technology adaptions for traditional access control, Security Infowatch, June 12, 2022. Retrieved December 27, 2022 from https://www.securityinfowatch.com/access-identity/access-control/article/21268269/the-everevolving-trends-of-access-control.Google Scholar
- Tansu Alpcan and Tamer Basar. 2004, December. A game theoretic analysis of intrusion detection in access control systems. In 2004 43rd IEEE Conference on Decision and Control (CDC)(IEEE Cat. No. 04CH37601) (Vol. 2, pp. 1568-1573). IEEE.Google ScholarCross Ref
Index Terms
- Access Control, Biometrics, and the Future
Recommendations
Multi-factor biometrics for authentication: a false sense of security
MM&Sec '10: Proceedings of the 12th ACM workshop on Multimedia and securityMulti-factor biometric authentications have been proposed recently to strengthen security and/or privacy of biometric systems in addition to enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply ...
An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsRole-based access control (RBAC) is a widely-used protocol to design and build an access control for providing the system security regarding authorization. Even though in the context of internet resources access, the authentication and access control ...
Design of Remote Biometrics Authentication System to Access Public Services from Remote Area
ICONETSI '20: Proceedings of the 2020 International Conference on Engineering and Information Technology for Sustainable IndustryBiometrics is already popularly used on various applications for authentication, especially authentication using smartphone. Various smartphone applications are developed to authenticating the users using biometrics modality, such as face, fingerprint ...
Comments