Integrasi Fingerprint Biometric Authentication Tersentralisasi untuk Pencegahan Room Access Violations Menggunakan Metode RBAC pada Security Systems

Maulana, Nico (2023) Integrasi Fingerprint Biometric Authentication Tersentralisasi untuk Pencegahan Room Access Violations Menggunakan Metode RBAC pada Security Systems. Other thesis, Institut Teknologi Sepuluh Nopember.

[thumbnail of 10311910000081-Undergraduate_Thesis.pdf] Text
10311910000081-Undergraduate_Thesis.pdf - Accepted Version
Restricted to Repository staff only until 1 September 2025.

Download (10MB) | Request a copy

Abstract

Pembatasan akses area dan ruangan dalam sistem keamanan perusahaan sangat penting untuk dibangun. Tujuannya adalah menjaga keamanan area perusahaan dan mencegah masalah keamanan terkait akses area. Sistem pembatasan akses ruangan berguna sebagai upaya Food Defence untuk mencegah tindakan berkaitan dengan aspek Food Fraud dan Bio Vigilance yang dapat merugikan perusahaan. Masalah yang sering muncul adalah pelanggaran akses ruangan, baik dari stakeholder internal maupun pihak eksternal. Sebagai contoh, pernah ditemukan benda tajam yaitu silet di dalam produk tanpa diketahui pelakunya, yang mengakibatkan tuntutan hukum dari pelanggan. Dalam sistem yang dibangun, menggunakan metode Role-Based Access Control (RBAC). Metode ini memastikan setiap individu memiliki otoritas untuk mengakses ruangan sesuai hirarki organisasi. Data Biometric fingerprint setiap individu dikumpulkan dan diatur dalam Access group & level yang berpedoman pada hirarki perusahaan. Fingerprint authentication digunakan untuk memverifikasi identitas pengguna yang berwenang. Mesin otentikasi Fingerprint dipasang pada pintu-pintu ruangan yang memiliki kerentanan. Seluruh mesin otentikasi Fingerprint diintegrasikan ke server menggunakan konsep Distributed Access Control System (DACS) agar dapat dilakukan pemantauan akses terpusat dengan komunikasi protokol TCP/IP. Proses manajemen keamanan dan pengaturan otorisasi dilakukan pada perangkat lunak yang dapat mengelola dan memantau lalu-lintas akses secara Real-time. Hal tersebut bertujuan untuk mendeteksi pelanggaran Room access violations. Hasil uji pada Proyek Akhir ini, Data Fingerprint setiap individu disimpan dalam Database server perusahaan. Pada proses kecepatan otentikasi (Read) memiliki rata-rata 2,49 detik dan proses kecepatan pembacaan Fingerprint baru (Write) memiliki rata-rata 3,12 detik. Pada pengujian Role access memiliki akurasi 100% sesuai dengan skenario Access group & level yang ditentukan. Pada pengujian otentikasi kondisi sidik jari berbeda, akurasi sebesar 70% untuk sidik jari luka dan 100% untuk jari normal. Pada pengujian analisis False Acceptance Rate (FAR) & False Rejection Rate (FRR) untuk mengetahui jumlah kesalahan otentikasi, tidak melebihi nilai Threshold yang telah ditentukan yaitu FAR 1% dan FRR 5%. Pada pengujian monitoring, sistem merekam data lalu-lintas akses, seperti pelanggaran,status pintu dan aktivitas di seluruh area akses. Dengan demikian, sistem mampu mencegah upaya violation access yang dilakukan oleh pelaku pelanggaran
=====================================================================================================================================
Restricting access to areas and rooms within a company's security system is crucial to establish. The aim is to maintain the security of the company's premises and prevent security issues related to area access. Room access restriction systems serve as Food Defense measures to prevent actions related to Food Fraud and Bio Vigilance that could harm the company. One common issue is the violation of room access, both by internal stakeholders and external parties. For instance, a sharp object, namely a razor blade, was once found inside a product without the knowledge of the perpetrator, resulting in legal claims from customers. In the established system, Role-Based Access Control (RBAC) method is employed. This method ensures that each individual has the authority to access rooms based on the organizational hierarchy. Biometric fingerprint data of each individual is collected and organized into Access groups and levels, following the company's hierarchy. Fingerprint authentication is used to verify the identities of authorized users. Fingerprint authentication devices are installed on vulnerable room doors. All fingerprint authentication devices are integrated into the server using the Distributed Access Control System (DACS) concept, allowing centralized access monitoring through TCP/IP communication protocol. Security management and authorization settings are performed using software that can manage and monitor access traffic in real-time. This is done to detect Room access violations. In this Final Project's testing phase, individual fingerprint data is stored in the company's Database server. In the authentication process (Read), the average speed is 2.49 seconds, while the process of reading new fingerprints (Write) has an average speed of 3.12 seconds. In Role access testing, the accuracy is 100% according to the specified Access groups and levels scenario. In the fingerprint authentication testing with different finger conditions, the accuracy is 70% for injured fingerprints and 100% for normal ones. In the False Acceptance Rate (FAR) and False Rejection Rate (FRR) analysis testing to determine the number of authentication errors, it does not exceed the predetermined thresholds of 1% for FAR and 5% for FRR. In the monitoring testing, the system records access traffic data, such as violations, door status, and activities throughout the access area. Consequently, the system is capable of preventing access violation attempts committed by offenders

Item Type: Thesis (Other)
Uncontrolled Keywords: Security Management System,Fingerprint Biometric,Authorized Access, Role Based Access Control, Dashboard Monitoring, Distributed Access Control
Subjects: T Technology > T Technology (General) > T58.6 Management information systems
T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK3070 Automatic control
T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK5105.585 TCP/IP (Computer network protocol)
T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7882.B56 Biometric identification
Divisions: Faculty of Vocational > 36304-Automation Electronic Engineering
Depositing User: Nico Maulana
Date Deposited: 30 Aug 2023 03:30
Last Modified: 30 Aug 2023 03:30
URI: http://repository.its.ac.id/id/eprint/101647

Actions (login required)

View Item View Item