Abstract [eng] |
This thesis of Master studies the characteristics of access control systems over Bluetooth authentication model. First part describes Bluetooth technology development, standards, system architecture, benefits, application possibilities. In this part the most focus is on the spreading of Bluetooth technology and Bluetooth enabled devices adaptation to access control authentication model. Here are analyzed steps device takes to establish a connection with another device. Also described data stored in the device which are used for authentication: Bluetooth MAC, mobile device IMEI and Sim card data. Other authors suggested authentication mechanics are introduced. Second part contains detailed description about created access control authentication system based on Bluetooth technology. This model differs from others by its authentication security level. It contains hard to forge authentication tags. So access control system is created based on that model, which trace user direction of movement and incident time. In part of experimental study system throughput and use of server recourses given different amount of users are analyzed. During the experiment is determined that system can qualitatively maintain to seven connected users at a time. If more users is required to maintain, Bluetooth set-top must be connected to enchance control system authentication time. |