RFID AND FACE RECOGNITION BASED ACCESS CONTROL SYSTEM
1Kenward Dzvifu, 2T Chakavarika Department of Information Security & Assurance, Harare Institute of Technology, Zimbabwe
1kenwarddzvifu@gmail.com
2ttchaka@gmail.com
School of Information Science and Technology, Harare Institute of Technology, Zimbabwe
ABSTRACT— The Radio frequency identification (RFID) technology has been broadly adopted in access control systems. This technology is based on the use of a card or tag and has some major drawback or weaknesses that is anyone could get access when he or she steals the card. In this particular paper, the RFID technology is combined or integrated with facial recognition (biometric) technology to make sure that the granted access matches the user ID on the
…show more content…
The RFID technology consists of three key elements: RFID tags, RFID readers, and a back-end database server to identify information. The RFID tag stores its particular ID and some application data for RFID readers thus the tag contains electronically stored information which is used for access control system. The major advantage of using the RFID tag is that it allows convenience contactless access. However, the traditional RFID-based access control system identifies an individual only by means of his or her RFID card that is anyone who presents a registered RFID card will pass the authentication even he/she is not the genuine card holder or owner. Moreover, there are many RFID attacks which are:
• Sniffing - this is reading data from a RFID chips without being given a permission;
• Spoofing - this is the cloning of information from one chip to another
• Tracking - this involves the tracking of goods or services without acknowledging the owner.
• Denial of Service - this involves the jamming of RFID signals to block its normal
The RFID system mainly includes three parts: reader, antenna, and RFID tag, as shown. Because of the uniqueness of the RFID tag, the reader can locate and
As RFID technology evolves and becomes less expensive, there will be an increase in the number of companies and vendors using the technology. Eventually, new applications will be developed and these systems may even be able to solve common or unique problems associated with business in today’s market.
As we can see now RFID technology is becoming very popular around the world. However, in my opinion, I would like to say that RFID tags pose a risk to personal privacy. RFID tags easily to be stolen by hackers. They could steal your personal information such as your credit card or your passports. For example, now in some states of the U.S, the government allows the citizen to use RFID passports. However, many citizen still disagree to apply RFID passports because they think it contains many issued such as it is vulnerable to wireless attack by hackers (it can be read up to 30 feet away and copying without permission from the RFID owner). In addition, it is even more dangerous when the RFID passports can contain information that is corresponding to the photo of the RFID tags owner. So just think what will happen if someone hack your passports and what they can do with its information from that RFID passport? Therefore, even RFID tags is becoming popular and can be the next generation technology in the real world, but now, in my opinion, I would like to say that RFID still contains many problem that can harm to personal privacy.
I performed my alarm assignment on the Westport Building of John Jay College, located at 500 W 56th St, New York, NY 10019. After observing the building during business hours, I noticed that the access control system that is in place is accurate and efficient. However, there could be measures taking to make it better and less likely to be defeated. The Westport Building of John Jay College uses credentials such as identification cards to gain access into the building. Access control credentials usually come in the form of cards or fob that can hang on your keychain. The most common credentials are Radio Frequency Identification (RFID) cards. RFID cards can be read from a distance. In some cases, they do not have to be removed from your pocket in order to be used. The most common RFID cards use a format developed by HID Corporation and is incorporated into products from a variety of manufacturers. Since Westport is an educational
Another study was conducted on the privacy impact of RFID tags used in medical facilities. The primary concern here is that RFID tags can be used by an unauthorized user. The perpetrator can solicit private information or gain access to medical history records of a patient. Juels (06) offered a novel access control mechanism. A technical solution that involved the use of encryption and symmetric key was suggested.
First and foremost the RFID IC or (Radio Frequency Identification Chip) is a tag, label, or card that can exchange data with the reader using its built in antenna and its IC (Integrated circuit ). There are a numerous amount of different things that helps tie this chip tie together, such as your personal ID, Medical history , bank information, and all of the other information government wants to know about you. The chip is inserted by doctors in one of your hands right between your index finger and you thumb they say it take no longer than thirty seconds to a minute.
The RFID technology consists of three kinds of tags i.e. active RFID tags, passive RFID tags, and battery
For this policy paper I have chosen Radio frequency identification (RFID) technology. RFID is able to provide a lot of advantages in the supply chain management, health care system, government operations. RIFD uses electronic magnetic fields for automatically identifying and tracking the tags attached with the objects. The tags contain electronic information. The RFID devices consist of an antenna which emits a radio signals for activating a tag and read and write the electronic data to those. The technology is able to provide a lot of advantages to the users but there are several ethical considerations associated with the use of this technology. Mostly the ethical issues are associated
Radio frequency identification (RFID) can be loosely linked all the way back to WW2 as a method of tracking allied planes versus enemy fighters during aerial combat (Roberti, 2005). In the PBSC class MAN4504, this technology was worshiped as a way to ring up an entire cart of groceries with one simple hovering swipe over top of all the merchandise contained within the cart. However, control freak school officials have recently gotten the idea that the RFID system might be amply used as a way to keep track of students. But, the problem with this somewhat big-brotherish type of philosophy is that it can, indeed, be construed as an invasion of privacy. If one is at all familiar with the Constitution that our
Over the years Radio Frequency Identification (RFID) has started to become an important factor in not only healthcare but banking, identification, and many more. RFID for the most part has been implemented in the day to day functions in healthcare. The aim of RFID in healthcare is to lower cost and time of common task, all while being able to efficiently manage staff, patients, and inventory in the hospital. In regards to real time location and authentication systems, RFID can use this to track patients, documents, equipment and/or wait room activity. From the security aspect, RFID can be used to control access to equipment and certain locations inside of a hospital. This paper will discuss those functions, as well as how
RFID technology is not only used at gas stations, restaurants, and department but also at
RFID, or radio frequency identification, is the new system that is replacing the use of barcodes. RFID tags allow users to more quickly obtain information from the object that the RFID tag
Abstract— Unauthorized and uncertified small sea going fishing crafts are being used for criminal activities in the coastal areas. Using this uncertified crafts illegal benefit provided by the government also is availed by the crooked persons. RFID is a forthcoming technology which provides promising opportunities for the implementation of new services in vessel monitoring and secure authentication. Radio Frequency Identification (RFID) is an inclusive wireless system which transmits unique identity code using radio waves. This technology is mainly used to identify objects attached with tags and it consists of a reader, tag and wireless channel. The reader and the tag both have a microchip and an antenna is there to perform handshaking mechanism when they both communicate. A tamper evident Automated Security Registration plate (ASRP) using RFID tag is designed here to provide secure
With the passage of time and extreme advancement in the technology the field of automatic identification has come up with great potential. There are different methods to do this. The most commonly used methods are Universal Product Code UPC and Optical Character Recognition OCR. OCR has limited the use of UPC but Optical Character Recognition has also different deficiencies which ultimately lead towards another technique called as Radio Frequency Identification also termed as RFID. RFID is the most modern technique. RFID tags are readily available in the market. As the name RF suggests that RFID reader uses radio frequency for the identification of objects.
“RFID (Radio Frequency Identification) can be defined as an automatic identification technology which uses radio-frequency electromagnetic fields to identify objects carrying tags when they come close to a reader.” [2]