DEVELOPMENT OF ACCESS CONTROL SYSTEM BASED ON NODEMCU MICROCONTROLLER
Abstract
In the context of growing competition, and, consequently, the importance of information and telecommunication technologies, the task of ensuring the necessary level of security of computer networks is of particular importance. Vulnerabilities make a significant impact on network security. The article is devoted to the study of structural components for the implementation of access control and management system (ACSJ. A prototype of a competitive SDMS was developed and tested. The proposed solution can be implemented using any device that has a browser and the ability to connect to a wireless Wi-Fi network. The developed QMS has no analogues in the market of Kazakhstan. It is shown that a forged approach, unlike the existing ones, takes into account current trends in the total digitalization of business processes in the enterprise. Using minimal resources, enterprises can implement effective ACS in their protection zones of information resources.
About the Authors
B. AkhmetovKazakhstan
K. Zenkovich
Kazakhstan
References
1. Абрамов А. М. Системы управления доступом. [Текст]: учебн. пособ. / А. М. Абрамов, О. Ю. Никулин, А. И. Петрушин. - М.: «Оберег-РБ», 1998.
2. Ворона В. А. Системы контроля и управления доступом. [Текст]: учебн. пособ. / В. А. Ворона, В. А. Тихонов. - М.: Горячая линия «Телеком», 2010.
3. Гинце А. Новые технологии в СКУД [Текст] / А. Гинце // Системы безопасности. - 2005. - № 6. - С. 21.
4. Злотник Е. Touch Memory - новый электронный идентификатор [Текст] / Е. Злотник // Монитор. - 1994. - № 6. - С. 28-32.
5. Мальцев И. В. Системы контроля доступом[Текст] / И.В. Мальцев // Системы безопасности. - 1996. - № 1. - С. 43-45.
6. Akhmetov, B., Lakhno, V., Boiko, Y., & Mishchenko, A. (2017). Designing a decision support system for the weakly formalized problems in the provision of cybersecurity. Eastern-European Journal of Eenterprise Technologies, (1(2)), pp. 4-15.
7. Arendt, D. L., Burtner, R., Best, D. M., Bos, N. D., Gersh, J. R., Piatko, C. D., & Paul, C. L. (2015, October). Ocelot: user-centered design of a decision support visualization for network quarantine. In Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on (pp. 1-8). IEEE.
8. Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D., & Fernando, A. (2016, January). Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model. In Consumer Electronics (ICCE), 2016 IEEE International Conference on (pp. 502-503). IEEE.
9. de Carvalho, M. A., & Bandiera-Paiva, P. (2017, October). Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling. In Security Technology (ICCST), 2017 International Carnahan Conference on (pp. 1-8). IEEE.
10. Appel, M., Konigorski, U., & Walther, M. (2018). A Graph Metric for Model Predictive Control of Petri Nets. IFAC-PapersOnLine, 51 (2), pp. 254-259.
11. Gao, Z., Zhao, C., Shang, C., & Tan, C. (2017, October). The optimal control of mine drainage systems based on hybrid Petri nets. In Chinese Automation Congress (CAC), 2017 (pp. 78-83). IEEE.
12. Narayanan, M., & Cherukuri, A. K. (2018). Verification of Cloud Based Information Integration Architecture using Colored Petri Nets. International Journal of Computer Network and Information Security, 10 (2), 1.
13. Lakhno V. A., Tkach Y. N., Petrenko T. A., Zaitsev S. V., Bazylevych V. M. Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber attacks, Eastern-European Journal of Enterprise Technologies, No 6/9 (84), 2016, pp. 32-44.
14. Beketova G., Akhmetov B., Korchenko A., Lakhno V., Tereshuk A.. Cyber intelligence systems based on adaptive regression splines and logical procedures of attack recognition. Computer modelling and new technologies, Vol. 21, No. 2, 2017, pp. 7-16.
15. Lakhno V., Petrov Al., Petrov Ant. Development of a Support System for Managing the Cyber Security of Information and Communication Environment of Transport, Information Systems Architecture and Technology: 38th International Conference on Information Systems Architecture and Technology (ISAT 2017), Wroclaw, 17-19 September 2017 : proceedings, Wroclaw : Springer, 2017, pp. 113-127.
Review
For citations:
Akhmetov B., Zenkovich K. DEVELOPMENT OF ACCESS CONTROL SYSTEM BASED ON NODEMCU MICROCONTROLLER. Bulletin of Shakarim University. Technical Sciences. 2020;(4(92)):42-48. (In Russ.)