Access control system using beacon-based indoor location data pattern analysis
-
2018-04-03 https://doi.org/10.14419/ijet.v7i2.12.11316 -
IPS, Beacon, Indoor Position, Security Control System, Pattern Analysis -
Abstract
Background/Objectives: With the development of IT, accidents of industrial secret leakage have occurred more than before. Such acci-dents are mostly caused by insiders.
Methods/Statistical analysis: An existing access control system uses RFID and NFC tag. The system saves only the final location in-formation in DB. For the reason, it is hard to track a user’s location data in real time. However, a beacon-based access control system saves a user’s location information in DB in real time. By analyzing the location information of DB, it is possible to track a user.
Findings: Beacons are used for determining a user’s location. The determined location information is converted into location data which is saved into DB. The location data is converted into coordinates. The converted coordinate data is analyzed for understanding a user’s behavior pattern. In the pattern analysis, if a user takes an abnormal behavior, policy-based response is performed. The user behavior pattern analysis system proposed in this study is able to respond to an accident in real time. Therefore, it is expected to contribute to reducing the number of industrial secret leakage accidents caused by insiders.
Improvements/Applications: This study designs a model that analyzes behavior pattern by using the indoor location data of a user based on beacon.Â
-
References
[1] Seok Lee, Yanghoon Kim, An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage,The Journal of Society for e-Business Studies,2015, May 20(2), pp. 27-36.
[2] Min-Seong Kang, HyukIm, Hyo-Jung Jun, Tae-Sung Kim,Necessity and Expectation for an Identification Scheme in IoT Service: Cases in South Korea, Indian Journal of Science and Technology, 2016, June, 9(24).
[3] Heung Ki Ahn,Trend and Forecast for the Confidential Information Leakage Prevention of Industries and PersonalPrivacyProtection,COMMUNICATIONS OF THE KOREA INFORMATION SCIENCE SOCIETY,2007, July, 25(8), pp.42-47.
[4] Mun-Jeong Kang, Sae-Hong Cho, Jung-Wan Hong,Study on Establishing Growth Strategy System for Pre World Class Companies,Indian Journal of Science and Technology,2016, July, 9(26).
[5] Kang Woo Park, Present conditions and outlook of access control system and smart card solution,Korean criminological review,2012, September,pp.129-160.
[6] CheolukLee,Current status and prospects of the access control system and smart card solutions, The Magazine of the IEEK,2009, October,36(10), pp.40-48.
[7] M. V. Shyla,Computational Analysis of Optimal SensorPosition in Indoor Environment,Indian Journal of Science and Technology,2015, March, 8(5), pp.454-459.
[8] Ji-yong Lim, Am-suk Oh, Gwan-Hyung Kim,A Development of Access Management System Server Based on Smartphone,Proceedings of the Korean Society of Computer Information Conference,2015, July, 23(2), PP.325-326.
[9] K. Mohan, M. Aramudhan,Ontology based Access Control Model for Healthcare System in Cloud Computing, Indian Journal of Science and Technology, 2015, May, 8(S9), pp.213-217.
[10] young Hyun Kim, Suk-Ho Lee, A Method for Stable Indoor Positioningusing Beacons,Indian Journal of Science and Technology,2015,October, 8(26).
[11] Sung Sin Hwang, Ki-Hyung Kim, Kangseok Kim,An Authentication Mechanism based on QR Code in Gate control System,Proceedings of Symposium of the Korean Institute of communications and InformationSciences ,2015, June, pp.644-645.
[12] Jae-Gwang Lee,Jae-Kwang Lee, Jae-Pil Lee, Enu-Su Mo,Jun-Hyun Lee,Young-Gil Park, Design of access control system based on beacon and heterogeneous,Internatiof Conference on Convergence Technology, 2015, January, 5(1), pp.410-411.
-
Downloads
-
How to Cite
Gwang Lee, J., Pil Lee, J., Su Mo, E., Hyeon Lee, J., su Yoon, K., & Kwang Lee, J. (2018). Access control system using beacon-based indoor location data pattern analysis. International Journal of Engineering & Technology, 7(2.12), 325-328. https://doi.org/10.14419/ijet.v7i2.12.11316Received date: 2018-04-09
Accepted date: 2018-04-09
Published date: 2018-04-03