Welcome to Journal of Network Communications and Emerging Technologies (JNCET)


Volume 10, Issue 12, December (2020)                               Cover Page and Table of Contents

S.No Title & Authors Full Text
1 Designing a Securable Smart Home Access Control System using RFID Cards
Muhammet Baykara, Sherzad Abdullah
Abstract - The RFID Card Entry System describes a technique used to manage information and access for persons or visitors wishing to gain entrance through the main gate into a city house. This system has been designed as a web application connected to a database to maintain information regarding residents' or visitors' movement within a secured area to control entrance through the main gate before providing access to an individual house. It provides a security measure for the residents and can help minimize the risk of unauthorized access, increase safety, reduce theft and accidents, and secure sensitive information. The system can equally be used to control movement within a commercial organization. This study includes web application security clues and systems to prevent attackers from reaching highly classified information. This system is highly significant for controlling entrance through the main gate before providing access to an individual house, preventing the hackers from breaking through the security of the web application, and guaranteeing confidential data protection. This study's issue is that hackers/Intruders can easily penetrate any web application security via SQL injection (SQLI), brute force attack, cross-site scripting (XSS), and session hijacking. A brute-force attack in the web application is set to encrypt sensitive data such as username, password, and RFID card number. Therefore, to solve this problem and make the security of the database robust tremendously, the encryption of sensitive data must be utilized by advanced encryption standard (AES) algorithm, strong password policy, google captcha, prevent SQLI, reflect XSS, session hijacking. This system ensured that it could prevent those who intend to enter the main gate, lowers the hacking risk, and keep the data protected. The results also demonstrate that the proposed approach is straightforward and compelling to secure unauthorized procedures on electronic case data by encrypting classified information, which results in more powerful authentication to simplify the procedure of web application. Moreover, it helps web developers ignore and reduce the web application's high risks to minimize broken authentication risks and avoid leaving the login page.
Download





Publication Process

Accepted papers will be published online,upon receiving the final version from the authors in the upcoming issue.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: editor@jncet.org

Copyright

COPYRIGHT © EverScience Publications