Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identity for Industrial Internet of Things Critical Infrastructure Protection

Authors

  • Joseph Kalunga University of Zambia
  • Simon Tembo University of Zambia
  • Jackson Phiri University of Zambia

DOI:

https://doi.org/10.31695/IJASRE.2020.33940

Keywords:

Physical Security hardening Access Control, Biometrics, Mobile phone identity, Industrial IoT Security, Critical infrastructure protection, Authentication &identification

Abstract

This paper details the development of an access control mechanism based on fingerprint biometrics and mobile phone International Mobile Equipment Identity (IMEI) modalities for the industrial internet of thing (Industrial IoT) Critical Infrastructure (CI) protection. The idea behind this study is to harden physical security through human identification and authentication processes to Smart CI places such as buildings, military bases, hospitals, airports and other important infrastructure. Fingerprint and mobile phone IMEI are very recognized and accepted identities hence used in police criminal investigation and legal community. Other uses of mobile phone identities include e-medicine, mobile banking, mobile money and remote machine operation. The main objective of this study is to develop a prototype application for authentication and identification of legitimate Industrial IoT human entities/objects based on the mentioned two identities as opposed to traditional knowledge (password, phrase or personal identification number (PIN) etc.,) and possession (token, smart card, identity card etc.,) based Access Control instruments.  To achieve this, the study based on eXtreme programming methodology was conducted using visual studio 2010 on DotNet framework 4.0 with C# object oriented programming language. The backend database employed was MySQL open-source Relational database management system (RDMBS). The research produced a number of key results include the development of fingerprint biometric and mobile phone IMEI human identity security layers (modules) and many others. The developed prototype application performance was evaluated by enrolled some fingerprints, IMEI and captured related individual personal information. The result indicated 99.999% accuracy levels. In conclusion, the study shows that the integration of fingerprint and mobile phone IMEI identities in access control roles can improve the security of the Industrial IoT institution and alleviate problems associated with traditional identity authentication methods.

References

J. Kalunga, “INTEGRATING FINGERPRINT BIOMETRICS SYSTEM INTO THE MILITARY POLICE DATABASE,” University of Zambia, 2015.

E. Ferrara, “Detecting criminal organizations in mobile phone networks,” no. November 2017, 2014,

South University, “Fighting Crime with Mobile Technology,” CRIMINAL JUSTICE, 2016. [Online]. Available: https://www.southuniversity.edu/news-and-blogs/2016/08/fighting-crime-with-mobile-technology-137309#:~:text=Crimes Using Cell Phones,every day on mobile devices. [Accessed: 06-Nov-2020].

G. Lampropoulos, K. Siakas, and T. Anastasiadis, “Internet of Things (IoT) in Industry: Contemporary Application Domains, Innovative Technologies and Intelligent Manufacturing,” Int. J. Adv. Sci. Res. Eng., vol. 4, no. 10, pp. 109–118, 2018.

U. P. D. Ani, H. M. He, and A. Tiwari, “Review of cybersecurity issues in industrial critical infrastructure : manufacturing in perspective,” J. Cyber Secur. Technol., vol. 1, no. 1, pp. 32–74, 2017, doi: 10.1080/23742917.2016.1252211.

J. Kalunga and S. Tembo, “Development of Fingerprint Biometrics Verification and Vetting Management System,” Am. J. Bioinforma. Res., vol. 6, no. 3, pp. 99–112, 2016.

R. Belguechi, E. Cherrier, V. Alimi, P. Lacharme, and C. Rosenberger, “An Overview on Privacy Preserving Biometrics,” Recent Appl. Biometrics, no. July, 2011, doi: 10.5772/19338.

V. Patel, “Airport Passenger Processing Technology : A Biometric Airport Journey AIRPORT PASSENGER PROCESSING TECHNOLOGY : A BIOMETRIC AIRPORT JOURNEY by A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Cybersecuri,” 2018.

R. V Yampolskiy, Taxonomy of Behavioural Biometrics, no. January. 2009.

Umberto Bacchi, “Landmark UK court ruling finds police use of facial recognition unlawful,” Reuter, 2020. [Online]. Available: https://www.reuters.com/article/us-britain-tech-privacy-idUSKCN2572B8. [Accessed: 23-Nov-2020].

C. Burt, “Legal issues around facial biometrics use examined in U.S., Canada, and UK,” Feb 3, 2020, 2020. [Online]. Available: https://www.biometricupdate.com/202002/legal-issues-around-facial-biometrics-use-examined-in-u-s-canada-and-uk. [Accessed: 23-Sep-2020].

W. Yang, S. Wang, J. Hu, G. Zheng, and C. Valli, “Security and accuracy of fingerprint-based biometrics: A review,” Symmetry (Basel)., vol. 11, no. 2, 2019..

J. Kalunga, S. Tembo, and J. Phiri, “Industrial Internet of Things Common Concepts , Prospects and Software Requirements,” vol. 9, no. 1, pp. 1–11, 2020.

T. Dudziak, “eXtreme Programming An Overview,” 2000.

K. Dragerengen, “Access Control in Critical Infrastructure Control Rooms using Continuous Authentication and Face Recognition,” no. June, 2018.

S. Singh and S. V. A. V. Prasad, “Techniques and challenges of face recognition: A critical review,” Procedia Comput. Sci., vol. 143, pp. 536–543, 2018, doi: 10.1016/j.procs.2018.10.427.

A. Baina, A. Abou, E. Kalam, and Y. Deswarte, “Chapter 14 COLLABORATIVE ACCESS CONTROL FOR CRITICAL INFRASTRUCTURES,” vol. 290, pp. 189–201.

S. Etigowni, D. J. Tian, and K. Butler, “CPAC : Securing Critical Infrastructure with Cyber-Physical Access Control,” pp. 139–152.

L. Bormane, J. Gržibovska, S. Bērziša, and J. Grabis, “Impact of Requirements Elicitation Processes on Success of Information System Development Projects,” Inf. Technol. Manag. Sci., vol. 19, no. 1, pp. 57–64, 2017.

S. Bell and S. Morse, “Rich pictures: A means to explore the ‘sustainable mind’?,” Sustain. Dev., vol. 21, no. 1, pp. 30–47, 2013.

H. Boyes, B. Hallaq, J. Cunningham, and T. Watson, “The industrial internet of things ( IIoT ): An analysis framework,” vol. 101, no. April, pp. 1–12, 2018.

D. M. L. Storisteanu, T. L. Norman, A. Grigore, and A. B. Labrique, “Can biometrics beat the developing world’s challenges?,” Biometric Technol. Today, vol. 2016, no. 11, pp. 5–9, 2016.

G. Association, “MOBILE IDENTITY ENABLING THE,” IDENTITY, no. IDENTITY, 2020.

M. S. Obaidat, I. Traore, and I. Woungang, Biometric-Based Physical and Cybersecurity Systems, no. October. 2018.

A. S. Chaudhari, G. K. Patnaik, and S. S. Patil, “Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept,” Inform. Econ., vol. 18, no. 1/2014, pp. 17–26, 2014.

I. M. Alsaadi, “Physiological Biometric Authentication Systems Advantages Disadvantages And Future Development A Review,” Int. J. Sci. Technol. Res., vol. 4, no. 8, pp. 285–289, 2015.

C. S. Koong, T. I. Yang, and C. C. Tseng, “A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices,” Sci. World J., vol. 2014, 2014.

A. A. Mehta and A. A. Mehta, “Study of Fingerprint Patterns in Type Ii Diabetes Mellitus,” Int. J. Anat. Res., vol. 3, no. 2, pp. 1046–1048, 2015.

J. a. Unar, W. C. Seng, and A. Abbasi, “A review of biometric technology along with trends and prospects,” Pattern Recognit., vol. 47, no. 8, pp. 2673–2688, 2014.

B. Biometrics, A. Alzubaidi, and J. Kalita, “Authentication of Smartphone Users Using,” pp. 1–32, 2015.

A. Lanitis, “A survey of the effects of aging on biometric identity verification A Survey of the Effects of Aging on Biometric Identity Verification,” no. January 2010, 2014.

N. Sarfraz, “Adermatoglyphia: Barriers to Biometric Identification and the Need for a Standardized Alternative,” Cureus, vol. 11, no. 2, 2019.

N. Nguyen, “Chokepoint: Regulating US student mobility through biometrics,” Polit. Geogr., vol. 46, pp. 1–10, 2015.

Chris Britton & Roberts. S Seiner, “Data Management and Context Modeling,” : DATAVERSITY Education, LLC, 01-Jan-2007.

GeeksForGeens, “Unified Modeling Language (UML) | Activity Diagrams,” GeeksForGeens, 2018. [Online]. Available: https://www.geeksforgeeks.org/unified-modeling-language-uml-activity-diagrams/. [Accessed: 10-Sep-2020].

M. I. Aririguzo, F. P. Nekede, and F. P. Nekede, “Mobile phone registration for a developing econom y: gains and constraints,” vol. 3, no. 3, pp. 44–52, 2016.

P. Subashini and S. Jansi, “Optimal Thinning Algorithm for detection of FCD in MRI Images,” vol. 2, no. 9, pp. 1–7, 2011.

F. Zhao and X. Tang, “Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction,” no. April, 2007, doi: 10.1016/j.patcog.2006.09.008.

GSMA, “Opportunities and Use Cases for Edge Computing in the IoT,” 2018. [Online]. Available: https://www.gsma.com/iot/wp-content/uploads/2018/11/IoT-Edge-Opportunities-c.pdf. [Accessed: 22-Nov-2020].

Downloads

How to Cite

Joseph Kalunga, Simon Tembo, & Jackson Phiri. (2020). Development of Access Control Mechanism Based on Fingerprint Biometrics and Mobile Phone Identity for Industrial Internet of Things Critical Infrastructure Protection . International Journal of Advances in Scientific Research and Engineering (IJASRE), ISSN:2454-8006, DOI: 10.31695/IJASRE, 6(12), 15–34. https://doi.org/10.31695/IJASRE.2020.33940

Issue

Section

Articles