Centralized Smart Card-Based Access Control System

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


A vital requirement for critical units in large institutions and companies such as the Exams and Records department of a University is restricted access. Such institutions usually take measures in the form of physical or knowledge-based tokens to control access to such restricted areas but several of them have failed over time and the fairly reliable ones are expensive to implement. This paper discusses and proposes the design of a centralized smart card-based security and surveillance system for a prototype property with the use of cost effective components and web-based applications. The design consists of three modules, the smart card and reader module, door controller module, the web and database module interfaced with a surveillance system. The surveillance system comprises a camera hoisted at a strategic point of the building. The camera sends monitored activities as video feeds to a server and subsequently saved in the database.
Copyright © 2013 Praise Worthy Prize - All rights reserved.


Security; Surveillance; Access Control; Card Reader

Full Text:



L. G. R. Prabhakar Telagarapu, D. Srinivasa Rao, P. Devi Pradeep, Analysis of Mobile User Identification Inside the Buildings, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (2), pp. 196-203.

P. Corcoran, C. Iancu, F. Callaly et al., "Biometric Access Control for Digital Media Streams in Home Networks," IEEE Transactions on Consumer Electronics, vol. 53, no. 3, pp. 917-925, 2007.

M. O. Derawi, H. Witte, S. McCallum et al., "Biometric Access Control using Near Field Communication and Smart Phones," in 5th IAPR International Conference on BIOMETRICS (ICB), 2012, pp. 490 - 497.

N. B. Sukhai, "Access Control & Biometrics," in InfoSecCD Conference'04, Kennesaw, GA, USA, 2004.

S. Ye, Y. Luo, J. Zhao et al., " Anonymous Biometric Access Control," EURASIP Journal on Information Security, 2009.

S. Hadlington, "Breadth of vision [CCTV system]," IEE Review, vol. 51, no. 1, pp. 38-42, 2005.

L. K. Lee, M. Zachariah, and P. Everett, "CCTV Camera Site Selection: A Field Experience," in 6th International Vehicle Navigation and Information Systems Conference (VNIS) In conjunction with the Pacific Rim TransTech Conference, 1995, pp. 21-27.

C. Norris, and M. McCahill, "CCTV: Beyond Penal Modernism," Br J Criminol, vol. 46, no. 1, pp. 97-118, January 2006, 2006.

J. H. Ratcliffe, T. Taniguchi, and R. B. Taylor, "The Crime Reduction Effects of Public CCTV Cameras: A Multi-Method Spatial Approach," 2009 Academy of Criminal Justice Sciences, Justice Quarterly, vol. 26, no. 4, pp. 746 - 770, December 2009, 2009.

R. Surette, "The Thinking Eye: Pros and Cons of Second Generation CCTV Surveillance Systems in Policing," An International Journal of Police Strategies & Management, vol. 28, no. 1, pp. 152-173, 2005.

P. E. Walters, "CCTV Operator Performance and System Design," in International Carnahan Conference on SECURITY TECHNOLOGY, 1993, pp. 32-37.

P. E. Walters, "CCTV Systems Thinking-systems Practice," in European Convention on SECURITY AND DETECTION, 1995, pp. 64 - 69.


  • There are currently no refbacks.

Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize