Page 51 - Institute Quaterly 5 Final
P. 51

there is no exchanging of access cards between people. This is   the other near the phone that is being impersonated; the
             especially beneficial for site visitors, where an access card may   reader and phone will believe they are talking to each other
             pass between many different people during the       and perform the authentication.
             course of a day.
                                                                 Choosing an intelligent access control system that uses
             Does Bluetooth technology leave you                 algorithms to detect this happening can mitigate the risk of
             vulnerable?                                         these attacks, as can requiring two-factor authentication at the
             Mobile access control utilises Bluetooth Low Energy (BLE) for   reader.
             communication to access control card readers from mobile
             phones. A mobile access control system utilising a strong   We use our access cards as staff ID. How
             authentication method will ensure the communication is secure  will we identify people on site?
             and cannot be used by anybody ‘sniffing’ the communications   A combined staff ID and access card can present security risks.
             to get access by replay attacks or other methods.   If someone were to misplace their card, it is easy for the person
             Authentication methods like a public key-based credential will   who found it to identify which organisation it belongs to and
             keep communication secure between the reader and device.   use it to gain unauthorised access to the building. Separate staff
             The reader will send a random string of data to the phone and,   ID and access credentials can mitigate this risk, with mobile
             using a private key securely stored in the phone’s key store,   credentials negating the need for staff to carry two cards.
             the phone will sign the data and send it back to the reader.   Mobile reader technology can also be used to verify whether
             The reader will use the public key to validate that the digital   someone is authorised to be in a particular area on site. Using
             signature is correct and, if so, will open the door. As a different   a mobile reader, a security operator can read an individual’s
             random string of data is sent to the phone every time, there is   credentials, verify their identity against the staff photo on file,
             no risk of unauthorised entry via replay attacks.   and confirm if they have the authority to be in a certain area.
                                                                 Not all of our staff have a suitable mobile device. Does that
             The risk of a relay attack, or man in the middle attack, can   mean they can’t get into the building?
             also be mitigated. In a relay attack, an attacker will attempt to
             impersonate a person’s credentials using two devices to ‘relay’   Moving to mobile credentials doesn’t have to be an all or
             the messages from the door and a person’s phone, using an   nothing solution. It’s not uncommon for sites operating mobile
             app they’ve written on two wirelessly connected devices, like   access technology to offer staff the choice between a mobile or
             mobile phones. One device will be held near the reader and   card credential to ensure no-one is excluded.
   46   47   48   49   50   51   52   53   54   55   56