Development of a Secure Access Control System Based on Two-Factor Authentication Using Face Recognition and OTP SMS-Token | IEEE Conference Publication | IEEE Xplore

Development of a Secure Access Control System Based on Two-Factor Authentication Using Face Recognition and OTP SMS-Token


Abstract:

The access control system is an important security feature to protect assets from being accessed illegally. One of the security techniques for access control is the use o...Show More

Abstract:

The access control system is an important security feature to protect assets from being accessed illegally. One of the security techniques for access control is the use of biometrics, such as facial recognition, which is currently widely applied. The ease and uniqueness of everyone's face are the distinct advantages of this technique. However, like biometric factors in general, facial recognition also has a weakness against spoofing attacks where someone can cheat the system using an undercover method. In order to overcome these spoofing attacks, two factors are required to ensure the authenticity of the user. In this research, we designed and implemented a secure access control system based on two-factor authentication using facial recognition and SMS-token OTP to avoid spoofing attacks and to meet our own needs and avoid reliance on proprietary products. Based on the results of our research, the design scheme was successfully implemented so that it is secured to apply.
Date of Conference: 19-20 November 2020
Date Added to IEEE Xplore: 22 February 2021
ISBN Information:
Conference Location: Jakarta, Indonesia

I. Introduction

Access control is a security feature that controls how a user and the system communicate and interact with other systems and resources. Access control protects the system and resources from unauthorized access and can be a component that participates in determining the level of authorization after the authentication procedure is successfully completed [1]. Access control is an important requirement of any information system to protect data and resources against access and modification of data from unauthorized users [2].

Contact IEEE to Subscribe

References

References is not available for this document.