Access control system using beacon-based indoor location data pattern analysis
-
https://doi.org/10.14419/ijet.v7i2.12.11316
Received date: April 9, 2018
Accepted date: April 9, 2018
Published date: April 3, 2018
-
IPS, Beacon, Indoor Position, Security Control System, Pattern Analysis -
Abstract
Background/Objectives: With the development of IT, accidents of industrial secret leakage have occurred more than before. Such accidents are mostly caused by insiders.
Methods/Statistical analysis: An existing access control system uses RFID and NFC tag. The system saves only the final location information in DB. For the reason, it is hard to track a user’s location data in real time. However, a beacon-based access control system saves a user’s location information in DB in real time. By analyzing the location information of DB, it is possible to track a user.
Findings: Beacons are used for determining a user’s location. The determined location information is converted into location data which is saved into DB. The location data is converted into coordinates. The converted coordinate data is analyzed for understanding a user’s behavior pattern. In the pattern analysis, if a user takes an abnormal behavior, policy-based response is performed. The user behavior pattern analysis system proposed in this study is able to respond to an accident in real time. Therefore, it is expected to contribute to reducing the number of industrial secret leakage accidents caused by insiders.
Improvements/Applications: This study designs a model that analyzes behavior pattern by using the indoor location data of a user based on beacon.
-
References
- Seok Lee, Yanghoon Kim, An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage,The Journal of Society for e-Business Studies,2015, May 20(2), pp. 27-36.
- Min-Seong Kang, HyukIm, Hyo-Jung Jun, Tae-Sung Kim,Necessity and Expectation for an Identification Scheme in IoT Service: Cases in South Korea, Indian Journal of Science and Technology, 2016, June, 9(24).
- Heung Ki Ahn,Trend and Forecast for the Confidential Information Leakage Prevention of Industries and PersonalPrivacyProtec-tion,COMMUNICATIONS OF THE KOREA INFORMATION SCIENCE SOCIETY,2007, July, 25(8), pp.42-47.
- Mun-Jeong Kang, Sae-Hong Cho, Jung-Wan Hong,Study on Estab-lishing Growth Strategy System for Pre World Class Compa-nies,Indian Journal of Science and Technology,2016, July, 9(26).
- Kang Woo Park, Present conditions and outlook of access control system and smart card solution,Korean criminological review,2012, September,pp.129-160.
- CheolukLee,Current status and prospects of the access control sys-tem and smart card solutions, The Magazine of the IEEK,2009, Oc-tober,36(10), pp.40-48.
- M. V. Shyla,Computational Analysis of Optimal SensorPosition in Indoor Environment,Indian Journal of Science and Technolo-gy,2015, March, 8(5), pp.454-459.
- Ji-yong Lim, Am-suk Oh, Gwan-Hyung Kim,A Development of Access Management System Server Based on Smartphone,Proceedings of the Korean Society of Computer Infor-mation Conference,2015, July, 23(2), PP.325-326.
- K. Mohan, M. Aramudhan,Ontology based Access Control Model for Healthcare System in Cloud Computing, Indian Journal of Sci-ence and Technology, 2015, May, 8(S9), pp.213-217.
- young Hyun Kim, Suk-Ho Lee, A Method for Stable Indoor Posi-tioningusing Beacons,Indian Journal of Science and Technolo-gy,2015,October, 8(26).
- Sung Sin Hwang, Ki-Hyung Kim, Kangseok Kim,An Authentica-tion Mechanism based on QR Code in Gate control Sys-tem,Proceedings of Symposium of the Korean Institute of communi-cations and InformationSciences ,2015, June, pp.644-645.
- Jae-Gwang Lee,Jae-Kwang Lee, Jae-Pil Lee, Enu-Su Mo,Jun-Hyun Lee,Young-Gil Park, Design of access control system based on bea-con and heterogeneous,Internatiof Conference on Convergence Technology, 2015, January, 5(1), pp.410-411.
-
Downloads
-
How to Cite
Gwang Lee, J., Pil Lee, J., Su Mo, E., Hyeon Lee, J., su Yoon, K., & Kwang Lee, J. (2018). Access control system using beacon-based indoor location data pattern analysis. International Journal of Engineering and Technology, 7(2.12), 325-328. https://doi.org/10.14419/ijet.v7i2.12.11316
