IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 12    
Website: http://www.ijser.org
scirp IJSER >> Volume 2, Issue 12, December 2011
Admission Control and Performance Evaluation for Distributed Door Entry Wireless Networks
Full Text(PDF, 3000)  PP.  
Author(s)
Wael Hosny Fouad Aly, Haytham Aboulabbas, Moustafa H. Aly, Hossam Eldin Moustafa
KEYWORDS
Wireless Networks, Embedded system, access control, authentication, radio frequency identification (RFID), ZigBee, XMOS
ABSTRACT
In this paper, we propose a novel smart access control system for large enterprises. The proposed system performs the following functions: (1) limits access to secured areas in a given physical facility only to authorized users, (2)provides authorized users with configurable and differentiated access rights to the same premises based on their assigned credibility and time-schedules, (3) maintains centralized event logs with date/time stamp for all users that have granted access to the system, and (4) keeps track of all their movement activities across the premises, allowing for further analysis of their behaviour during working hours. All of these functions are mainly intended to: (1) be carried out automatically and wirelessly with neither human intervention nor slowing down the organization's workflow, (2) avoid installation cost overhead,(3) minimize the running cost, (4) simplify system repairs and shorten it downtime, and (5) allow for future upgrades with almost little or no hardware changes along with slight firmware code modifications. The proposed system is implemented as a prototype model that presents both the hardware and the firmware aspects of the design. The built prototype shows success of the proposed system and hence it is promising for physical implementation in real systems at larger scales.
References
[1] Committee on National Security Systems, “National Information Assurance (IA) Glossary,” CNSS Instruction No. 4009,http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf, viewed September 2011

[2] Access Control & Security Systems Integration, “Reports Show Electronic Access Control, Biometric Sales To Grow,” July 2007, http://securitysolutions.com/news/electronics-sales-grow, viewed September 2011.

[3] Iman Morsi, Yasser Elsherief, and Amr El Zawawi, “A Security System and Employees Performance Evaluation Using RFID Sensors and Fuzzy Logic,” Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, 2009. COMPUTATIONWORLD '09, Page(s): 597-602, DOI 10.1109/ComputationWorld.2009.112, 2009.

[4] Wang Yanyan, Zhao Xiaofeng, Wu Yaohua, and XuPeipei, “The research of RFID middleware’s data management model,” IEEE International Conference on Automation and Logistics, 2008, ICAL2008, Page(s): 2565 – 2568, DOI 10.1109/ICAL.2008.4636602.

[5] Zoghi B., Porter J., Jung Y., Thompson S., and Fink, Rainer, “Wireless Sensor Monitoring CombinedWith RFID Networks,” International Journal of Modern Engineering Conference, June 2006.

[6] Erick C. Jones, and Christopher A. Chung, “RFID in Logistics: A Practical Introduction,” CRC, Cleveland, OH, 2007.

[7] Landt J., “The history of RFID,” IEEE Potentials, 2005, Vol. 24, No. 4, Page(s): 8 – 11, DOI 10.1109/MP.2005.1549751.

[8] V. Daniel Hunt, Albert Puglia, and Mike Puglia, “RFID-A Guide to Radio Frequency Identification,” JohnWiley & Sons, 2007.

[9] B. Öztay, S. Baysan, and F. Akpinar, “Radio frequency identification (RFID) in hospitals,” Technovation, 2009, Vol. 29, No. 9, Page(s): 618-624.

[10] A. Nambiar, “RFID Technology: A Review of its Applications,” Proceedings of the World Congress on Engineering and Computer Science, WCECS 2009,Vol II,ISBN:978-988-18210-2-7, October 20-22, 2009, San Francisco, CA, USA.

[11] O. Shoewu, and O. Badejo, “Radio frequency identification technology: development, application, and security issues,” The Pacific Journal of Science and Technology, 2006, Vol. 2, No. 2,Page(s): 144-152.

[12] Savi Technologies, “Active and Passive RFID: Two Distinct But Complementary Technologies for Real-Time Supply Chain Visibility,” SAVI Technologies White Paper, 2002.

[13] Lionel M. Ni, Yunhao Liu, Yiu Cho Lau, and Abhishek P. Patil, “LANDMARC: indoor location sensing using active RFID,” Wireless Networks, 2004, Vol. 10, No. 6, Page(s): 701-710.

[14] Fagui Liu, Yang Zou, and Wenhui Liao, “Standard System Framework of RFID Application in Logistics,” Third International Symposium on Intelligent Information Technology Application, 2009, IITA 2009, Page(s): 44-47, DOI 10.1109/IITA.2009.288.

[15] Dong-Liang Wu, Ng, W.W.Y.,Yeung, D.S.,and Hai-Lan Ding, “A brief survey on current RFID applications,” International Conference on Machine Learning and Cybernetics, 2009, Page(s): 2330 – 2335, DOI 10.1109/ICMLC.2009.5212147.

[16] Pala, Z., and Inanc, N., “Smart Parking Applications Using RFID Technology,”Proceedings of the First Annual RFID Eurasia Conference, 2007, Page(s): 1-3, DOI 10.1109/RFIDEURASIA.2007.4368108.

[17] A. Reza, and T. Geok, “Investigation of Indoor Location Sensing via RFID Reader Network Utilizing Grid Covering Algorithm,” Wireless Personal Communications, 2009, Vol. 49, No. 1, Page(s): 67-80.

[18] Drew Gislason, “ZigBee Wireless Networking,” Newnes,USA, 2008, ISBN-10: 0750685972,ISBN-13: 978-0750685979.

[19] Patrick Kinney, “ZigBee Technology: Wireless Control That Simply Works,” Communications Design Conference, October 2, 2003.

[20] SajdlOndrej, BradacZdenek, Fiedler Petr, and HyncicaOndrej, ""ZigBee Technology and Device Design,"" International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006, ICNICONSMCL'06, Page(s): 129.

[21] Robert Faludi, “Building Wireless Sensor Networks,” O’Reilly Media, Inc., USA, 2011, ISBN: 978-0-596-80773-3.

[22] ZigBee-Alliance, ZigBee specification, www.ZigBee.org, 2006.

[23] WheelerA., “Commercial Applications of Wireless Sensor Networks Using ZigBee,” IEEE Communications Magazine, 2007, Vol. 45, Issue 4, Page(s): 70-77, DOI 10.1109/MCOM.2007.343615.

[24] Ivan Howitt, andJose A. Gutierrez, IEEE 802.15.4 standard on low rate-wireless personal area network coexistence issues, IEEE, 2003, Page(s): 1481-1486,www.ieee.org.

[25] Ed Callaway, Paul Gorday, Lance Hester, Jose A. Gutierrez, Marco Naeve, Bob Heile, and VenkatBahl, “Home Networking with IEEE 802.15.4: A Developing Standard for Low-Rate Wireless Personal Area Networks,” IEEE Communications Magazine, 2002, Vol. 40, No. 8, Page(s): 70-77.

[26] Chaitanya S. Misal, “Analysis of Power Consumption of an End Device in a ZigBee Mesh Network,” University of North Carolina, Raleigh-Durham, NC, 2007, http://coe.uncc.edu/~jmconrad/GradStudents/Thesis_Misal.pdf, viewed September 2011.

[27] JaejoonCho, and Sunshin An, “An Adaptive Beacon Scheduling Mechanism Using Power Control in Cluster-Tree WPANs,” International Journal of Wireless Personal Communications, 2009, Vol. 50, No. 2, Page(s): 143-160, DOI: 10.1007/s11277-008-9581-3.

[28] Peter Bishop, “A Customizable Microcontroller as a Tradeoff between Microcontroller, DSP, FPGA and ASIC Technologies,” Atmel Corporation White Paper, 2009, http://www.atmel.com/dyn/resources/prod_documents/11002.pdf, viewed October 2011.

[29] ALTERA, “FPGA vs. DSP Design Reliability and Maintenance,” ALTERA Corporation White Paper, 2007, http://www.altera.com/literature/wp/wp-01023.pdf, viewed October 2011.

[30] XMOS Ltd, “XMOS Technology Whitepaper,” XMOS Ltd White Paper, 2010, https://www.xmos.com/download/public/XMOS-Technology-Whitepaper%281.0%29.pdf, viewed October 2011.

[31] XMOS Ltd, “A Programmable Revolution: A Compelling Alternative to Low Cost FPGAs,” XMOS Ltd White Paper, 2010, https://www.xmos.com/download/public/XMOS-vs-FPGA-Whitepaper%281.0%29.pdf, viewed October 2011.

[32] XMOS Ltd, http://www.xmos.com, viewed October 2011.

[33] XMOS Ltd, XCore Processor, http://www.xmos.com/technology/xcore, Viewed October 2011.

[34] Richard Terrill, XMOS Semiconductor, “Software-defined silicon: Why can't hardware be more like software?,” EETimes Design, 2008, http://www.eetimes.com/design/embedded/4007542/Software-defined-silicon-Why-can-t-hardware-be-more-like-software-?pageNumber=0, viewed October 2011.

[35] David May, XMOS Semiconductor, “Software defined silicon is way ahead, says XMOS founder,” ElectronicsWeekly.com, 2008, http://www.electronicsweekly.com/Articles/18/01/2008/42953/software-defined-silicon-is-way-ahead-says-xmos-founder.htm, viewed October 2011.

[36]

[37] David May, Ali Dixon, AyewinOung, and Henk Muller, “XS1 System Specification,” Version 1.3, XMOS Ltd, 2009, https://www.xmos.com/download/public/XS1-G-System-Specification%281.3%29.pdf, viewed October 2011.

[38]

[39] Peter Clarke, “XMOS fields software-defined silicon,” 2007, Retrieved (n.d.) from http://www.eetasia.com.

[40] Committee on National Security Systems, “National Information Assurance (IA) Glossary,” CNSS Instruction No. 4009, http://www.cnss.gov/Assets/pdf/cnssi_4009.pdf, viewed September 2011.

[41] S. D. Dissanayake, P. P. C. R. Karunasekara, D. D. Lakmanaarachchi, A. J. D. Rathnayaka, A. T. L. K. Samarasinghe, “Zigbee Wireless Vehicular Identification and Authentication System,” 4th International Conference on Information and Automation for Sustainability, 2008. ICIAFS 2008. Page(s): 257-260, DOI 10.1109/ICIAFS.2008.4783998, 2008.

[42] Wei J., Dan Y., Yan M., “A Tracking Algorithm in RFID Reader Network,”Frontier of Computer Science and Technology, 2006. FCST '06. Japan-China Joint Workshop, Fukushima, ISBN: 0-7695-2721-3, Page(s): 164-171, DOI 10.1109/FCST.2006.7, November 2006.

[43] Rieback M.R., Crispo B., Tanenbaum, A.S., “The Evolution of RFID Security,” Pervasive Computing, IEEE, Vol.5 (1), Page(s): 62-69, DOI 10.1109/MPRV.2006.17, March 2006.

[44] H. M. Tsai, C. Saraydar, T. Talty, M. Ames, A. Macdonald, O. K. Tonguz, “Zigbee-based intra-car wireless sensor network,”ICC ’07, IEEE International Conference, Page(s): 3965–3971, June 2007.

[45] ImanMorsi, Yasser Elsherief, Amr El Zawawi, “A Security System and Employees Performance Evaluation Using RFID Sensors and Fuzzy Logic,”Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns, 2009. COMPUTATIONWORLD '09, Page(s): 597-602, DOI 10.1109/ComputationWorld.2009.112, 2009.

[46] S. S. RiazAhamed, “The Role of ZigBee Technology in Future Data Communication System,”Journal of Theoretical and Applied Information Technology, Vol.5, No.2, 2009.

[47] StanislavSafaric, KresimirMalaric, “ZigBeewireless standard,” 48th International Symposium ELMAR-2006, Zadar, Croatia, 2006.

[48] Douglas Watt, 2009, “Programming XC on XMOS Devices,”XMOS Ltd, http://www.xmos.com/technology/xc, viewed September 2011.

[49] Wikipedia: The Free Encyclopedia, Wikimedia Foundation Inc., ""Bit banging,"" http://en.wikipedia.org/wiki/Bit-banging, viewed June 2011.

[50] Z. Wu, H. Chu, Y. Pan, X. Yang, “Bus priority control system based on wireless sensor network (WSN) and zigbee,”Vehicular Electronics and Safety, 2006. ICVES 2006. IEEE International Conference, Page(s): 148–151, Dec. 2006.

[51] XMOS Ltd, 2010, “A Programmable Revolution: A Compelling Alternative to Low Cost FPGAs,” https://www.xmos.com/download/public/XMOS-vs-FPGA-Whitepaper%281%29.pdf, viewed September 2011.

[52] XMOS Ltd, 2010, “XMOS Technology Whitepaper,” https://www.xmos.com/download/public/XMOS-Technology-Whitepaper%281%29.pdf,viewed September 2011.

[53] ZigBee Alliance, FAQ, “What is the advantage of the ZigBee solution over proprietary solutions?” http://www.zigbee.org/About/FAQ.aspx#28, viewed September 2011.

Untitled Page