Abstract
User access control systems have become a standard part of security systems in many consumer as well as industrial applications. The majority of these systems utilize tokens to gain an access into restricted areas such as buildings, garages, and workplaces. They are available in different shapes and sizes, but their communication interface often utilizes NFC technology ensuring compatibility throughout a variety of distinct tokens. Main goal of this paper is to share most important hands-on experience acquired during the development of NFC-based user access control system with minimal deployment footprint. Common handheld/wearable devices like smartphones or smartwatches have been used to eliminate the need for another item to be carried by a user. In our Android-based implementation, users are authenticated via server application and their accounts can be managed by the user interface called Locker. Further, MySQL database acts as a storage for user data and for authentication purposes as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alattar, M., Achemlal, M.: Host-based card emulation: development, security, and ecosystem impact analysis. In: 2014 IEEE International Conference on High Performance Computing and Communications, 2014 IEEE 6th International Symposium on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Systems (HPCC, CSS, ICESS), pp. 506–509, August 2014
Alliance, S.C.: Host card emulation (HCE) 101. A Smart Card Alliance Mobile and NFC Council White Paper (2014)
Armando, A., Merlo, A., Verderame, L.: Trusted host-based card emulation. In: 2015 International Conference on High Performance Computing and Simulation (HPCS), pp. 221–228. IEEE (2015)
Basyari, R.S., Nasution, S.M., Dirgantara, B.: Implementation of host card emulation mode over android smartphone as alternative ISO 14443A for Arduino NFC shield. In: 2015 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), pp. 160–165. IEEE (2015)
Coenen, M.: NFC in Android (2014). http://nfc-forum.org/wp-content/uploads/2014/03/Android-NFC-Forum-Developer-Spotlight-2.pdf
Cope, P., Campbell, J., Hayajneh, T.: An investigation of bluetooth security vulnerabilities. In: 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1–7, January 2017
Coskun, V., Ozdenizci, B., Ok, K.: A survey on near field communication (NFC) technology. Wireless Pers. Commun. 71(3), 2259–2294 (2013)
Developers, A.: Accountmanager (2017). https://developer.android.com/reference/android/accounts/AccountManager.html
Ensworth, J.F., Reynolds, M.S.: Ble-backscatter: ultralow-power IoT nodes compatible with bluetooth 4.0 low energy (BLE) smartphones and tablets. IEEE Trans. Microw. Theory Tech. (2017)
Haataja, K., Toivanen, P.: Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures. IEEE Trans. Wireless Commun. 9(1), 384–392 (2010)
ISO/IEC: Identification cards - integrated circuit cards - part 4: Organization, security and commands for interchange. Standard, International Organization for Standardization, Switzerland, August 2014
ISO/IEC: Identification cards - contactless integrated circuit cards - proximity cards - part 4: Transmission protocol. Standard, International Organization for Standardization, Switzerland, June 2016
Misra, S.: A very simple user access control technique through smart device authentication using bluetooth communication. In: 2014 International Conference on Electronics, Communication and Instrumentation (ICECI), pp. 1–4. IEEE (2014)
Morsalin, S., Islam, A.M.J., Rahat, G.R., Pidim, S.R.H., Rahman, A., Siddiqe, M.A.B.: Machine-to-machine communication based smart home security system by NFC, fingerprint, and PIR sensor with mobile android application. In: 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), pp. 1–6, September 2016
Prudanov, A., et al.: A trial of yoking-proof protocol in RFID-based smart-home environment. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2016. CCIS, vol. 678, pp. 25–34. Springer, Cham (2016). doi:10.1007/978-3-319-51917-3_3
Scarfone, K., Padgette, J.: Guide to bluetooth security. NIST Spec. Publ. 800(2008), 121 (2008)
Shobha, N.S.S., Aruna, K.S.P., Bhagyashree, M.D.P., Sarita, K.S.J.: NFC and NFC payments: a review. In: 2016 International Conference on ICT in Business Industry Government (ICTBIG), pp. 1–7, November 2016
Tabet, N.E., Ayu, M.A.: Analysing the security of NFC based payment systems. In: 2016 International Conference on Informatics and Computing (ICIC), pp. 169–174, October 2016
Acknowledgments
Research described in this paper was financed by the National Sustainability Program under grant LO1401. For the research, infrastructure of the SIX Center was used. This research was funded by the Technology Agency of Czech Republic project No. TF02000036. The publication was financially supported by the Ministry of Education and Science of the Russian Federation (the Agreement number 02.a03.21.0008).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Stusek, M., Pokorny, J., Zeman, K., Hajek, J., Masek, P., Hosek, J. (2017). Prototyping Minimal Footprint NFC-Based User Access Control System for IoT Applications. In: Vishnevskiy, V., Samouylov, K., Kozyrev, D. (eds) Distributed Computer and Communication Networks. DCCN 2017. Communications in Computer and Information Science, vol 700. Springer, Cham. https://doi.org/10.1007/978-3-319-66836-9_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-66836-9_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-66835-2
Online ISBN: 978-3-319-66836-9
eBook Packages: Computer ScienceComputer Science (R0)