Loading…
Design Recommendations for Gate Security Systems and Health Status: A Systematic Review
Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance....
Saved in:
Published in: | IEEE access 2023, Vol.11, p.131508-131520 |
---|---|
Main Authors: | , , , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13 |
---|---|
cites | cdi_FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13 |
container_end_page | 131520 |
container_issue | |
container_start_page | 131508 |
container_title | IEEE access |
container_volume | 11 |
creator | Almuhaideb, Abdullah M. Elhussein, Mariam Osman, Reem AlHolyal, Fatema AlGhamdi, Leena Al-Ismail, Majd Alawami, Maram Kadour, Zainab Zagrouba, Rachid |
description | Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance. Most research proposes designs based on their recommended authentication scheme without providing general guidance on constructing these systems. This study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to conduct a systematic literature review, focusing on recent smart gate research. Studies published between 2016 and 2023 are analyzed and evaluated to identify their main components and authentication schemes. A total of 52 studies published in various journals and conferences are collected. After conducting the review, three main design themes are identified: smartphones, tags, and biometrics. These themes are the focal point of the study. Of all the designs, 66% consider using only one-factor authentication. These designs primarily rely on biometric-based methods. During the COVID-19 crisis, some designs used biometric authorization instead of identity authentication to incorporate health status, with a focus on detecting whether the person wore a face mask and had a normal body temperature. Furthermore, the review reveals that most studies disregard the system's hardware components and focus on authorization. Additionally, only 25% of the studies conduct an implementation for their design and produce results evaluating their performance. The study concludes that a successful smart gate design must consider and balance cost, usability, and security. Furthermore, health status needs to be verified as an additional layer of protection after determining the existing authentication requirements. |
doi_str_mv | 10.1109/ACCESS.2023.3335115 |
format | article |
fullrecord | <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_9c914ec6dd814010ac2336a40b2c7a40</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10323492</ieee_id><doaj_id>oai_doaj_org_article_9c914ec6dd814010ac2336a40b2c7a40</doaj_id><sourcerecordid>2896028239</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13</originalsourceid><addsrcrecordid>eNpNUcFKJDEQDaKgjH7B7iHgecYklaQ7extGVwVBsF32GNLpareHmY4mmV3m7zfag1iXKl7Ve_XgEfKNswXnzFwtV6ubplkIJmABAIpzdUTOBNdmDgr08Zf5lFyktGal6gKp6oz8vsY0vIz0CX3YbnHsXB7CmGgfIr11GWmDfheHvKfNPmXcJurGjt6h2-Q_tMku79IPujwsC9cXpb8D_jsnJ73bJLw49Bn59fPmeXU3f3i8vV8tH-ZeMpPnWqrW61YD07VHDd6AUuhdK5RzUgopa-drBANVrzvt-0opxrGr6hY1Rw4zcj_pdsGt7Wscti7ubXCD_QBCfLEuFlsbtMYbLtHrrqu5ZJw5LwC0k6wVviqtaF1OWq8xvO0wZbsOuzgW-1bURjNRi2JkRmC68jGkFLH__MqZfQ_EToHY90DsIZDC-j6xBkT8wgAB0gj4D5hEhfw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2896028239</pqid></control><display><type>article</type><title>Design Recommendations for Gate Security Systems and Health Status: A Systematic Review</title><source>IEEE Xplore Open Access Journals</source><creator>Almuhaideb, Abdullah M. ; Elhussein, Mariam ; Osman, Reem ; AlHolyal, Fatema ; AlGhamdi, Leena ; Al-Ismail, Majd ; Alawami, Maram ; Kadour, Zainab ; Zagrouba, Rachid</creator><creatorcontrib>Almuhaideb, Abdullah M. ; Elhussein, Mariam ; Osman, Reem ; AlHolyal, Fatema ; AlGhamdi, Leena ; Al-Ismail, Majd ; Alawami, Maram ; Kadour, Zainab ; Zagrouba, Rachid</creatorcontrib><description>Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance. Most research proposes designs based on their recommended authentication scheme without providing general guidance on constructing these systems. This study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to conduct a systematic literature review, focusing on recent smart gate research. Studies published between 2016 and 2023 are analyzed and evaluated to identify their main components and authentication schemes. A total of 52 studies published in various journals and conferences are collected. After conducting the review, three main design themes are identified: smartphones, tags, and biometrics. These themes are the focal point of the study. Of all the designs, 66% consider using only one-factor authentication. These designs primarily rely on biometric-based methods. During the COVID-19 crisis, some designs used biometric authorization instead of identity authentication to incorporate health status, with a focus on detecting whether the person wore a face mask and had a normal body temperature. Furthermore, the review reveals that most studies disregard the system's hardware components and focus on authorization. Additionally, only 25% of the studies conduct an implementation for their design and produce results evaluating their performance. The study concludes that a successful smart gate design must consider and balance cost, usability, and security. Furthermore, health status needs to be verified as an additional layer of protection after determining the existing authentication requirements.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3335115</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Biometrics ; Biometrics (access control) ; Body temperature ; COVID-19 ; Face recognition ; Hardware ; health and safety ; Internet of Medical Things ; Internet of Things ; iris ; Literature reviews ; Logic gates ; Medical services ; Mobile applications ; Performance evaluation ; Security ; Security systems ; Smart healthcare ; Smart phones ; Systematics</subject><ispartof>IEEE access, 2023, Vol.11, p.131508-131520</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13</citedby><cites>FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13</cites><orcidid>0009-0006-5612-5728 ; 0000-0001-5080-3029 ; 0000-0001-6165-3214 ; 0000-0002-2004-5324</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10323492$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Almuhaideb, Abdullah M.</creatorcontrib><creatorcontrib>Elhussein, Mariam</creatorcontrib><creatorcontrib>Osman, Reem</creatorcontrib><creatorcontrib>AlHolyal, Fatema</creatorcontrib><creatorcontrib>AlGhamdi, Leena</creatorcontrib><creatorcontrib>Al-Ismail, Majd</creatorcontrib><creatorcontrib>Alawami, Maram</creatorcontrib><creatorcontrib>Kadour, Zainab</creatorcontrib><creatorcontrib>Zagrouba, Rachid</creatorcontrib><title>Design Recommendations for Gate Security Systems and Health Status: A Systematic Review</title><title>IEEE access</title><addtitle>Access</addtitle><description>Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance. Most research proposes designs based on their recommended authentication scheme without providing general guidance on constructing these systems. This study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to conduct a systematic literature review, focusing on recent smart gate research. Studies published between 2016 and 2023 are analyzed and evaluated to identify their main components and authentication schemes. A total of 52 studies published in various journals and conferences are collected. After conducting the review, three main design themes are identified: smartphones, tags, and biometrics. These themes are the focal point of the study. Of all the designs, 66% consider using only one-factor authentication. These designs primarily rely on biometric-based methods. During the COVID-19 crisis, some designs used biometric authorization instead of identity authentication to incorporate health status, with a focus on detecting whether the person wore a face mask and had a normal body temperature. Furthermore, the review reveals that most studies disregard the system's hardware components and focus on authorization. Additionally, only 25% of the studies conduct an implementation for their design and produce results evaluating their performance. The study concludes that a successful smart gate design must consider and balance cost, usability, and security. Furthermore, health status needs to be verified as an additional layer of protection after determining the existing authentication requirements.</description><subject>Authentication</subject><subject>Biometrics</subject><subject>Biometrics (access control)</subject><subject>Body temperature</subject><subject>COVID-19</subject><subject>Face recognition</subject><subject>Hardware</subject><subject>health and safety</subject><subject>Internet of Medical Things</subject><subject>Internet of Things</subject><subject>iris</subject><subject>Literature reviews</subject><subject>Logic gates</subject><subject>Medical services</subject><subject>Mobile applications</subject><subject>Performance evaluation</subject><subject>Security</subject><subject>Security systems</subject><subject>Smart healthcare</subject><subject>Smart phones</subject><subject>Systematics</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUcFKJDEQDaKgjH7B7iHgecYklaQ7extGVwVBsF32GNLpareHmY4mmV3m7zfag1iXKl7Ve_XgEfKNswXnzFwtV6ubplkIJmABAIpzdUTOBNdmDgr08Zf5lFyktGal6gKp6oz8vsY0vIz0CX3YbnHsXB7CmGgfIr11GWmDfheHvKfNPmXcJurGjt6h2-Q_tMku79IPujwsC9cXpb8D_jsnJ73bJLw49Bn59fPmeXU3f3i8vV8tH-ZeMpPnWqrW61YD07VHDd6AUuhdK5RzUgopa-drBANVrzvt-0opxrGr6hY1Rw4zcj_pdsGt7Wscti7ubXCD_QBCfLEuFlsbtMYbLtHrrqu5ZJw5LwC0k6wVviqtaF1OWq8xvO0wZbsOuzgW-1bURjNRi2JkRmC68jGkFLH__MqZfQ_EToHY90DsIZDC-j6xBkT8wgAB0gj4D5hEhfw</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Almuhaideb, Abdullah M.</creator><creator>Elhussein, Mariam</creator><creator>Osman, Reem</creator><creator>AlHolyal, Fatema</creator><creator>AlGhamdi, Leena</creator><creator>Al-Ismail, Majd</creator><creator>Alawami, Maram</creator><creator>Kadour, Zainab</creator><creator>Zagrouba, Rachid</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0009-0006-5612-5728</orcidid><orcidid>https://orcid.org/0000-0001-5080-3029</orcidid><orcidid>https://orcid.org/0000-0001-6165-3214</orcidid><orcidid>https://orcid.org/0000-0002-2004-5324</orcidid></search><sort><creationdate>2023</creationdate><title>Design Recommendations for Gate Security Systems and Health Status: A Systematic Review</title><author>Almuhaideb, Abdullah M. ; Elhussein, Mariam ; Osman, Reem ; AlHolyal, Fatema ; AlGhamdi, Leena ; Al-Ismail, Majd ; Alawami, Maram ; Kadour, Zainab ; Zagrouba, Rachid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Authentication</topic><topic>Biometrics</topic><topic>Biometrics (access control)</topic><topic>Body temperature</topic><topic>COVID-19</topic><topic>Face recognition</topic><topic>Hardware</topic><topic>health and safety</topic><topic>Internet of Medical Things</topic><topic>Internet of Things</topic><topic>iris</topic><topic>Literature reviews</topic><topic>Logic gates</topic><topic>Medical services</topic><topic>Mobile applications</topic><topic>Performance evaluation</topic><topic>Security</topic><topic>Security systems</topic><topic>Smart healthcare</topic><topic>Smart phones</topic><topic>Systematics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Almuhaideb, Abdullah M.</creatorcontrib><creatorcontrib>Elhussein, Mariam</creatorcontrib><creatorcontrib>Osman, Reem</creatorcontrib><creatorcontrib>AlHolyal, Fatema</creatorcontrib><creatorcontrib>AlGhamdi, Leena</creatorcontrib><creatorcontrib>Al-Ismail, Majd</creatorcontrib><creatorcontrib>Alawami, Maram</creatorcontrib><creatorcontrib>Kadour, Zainab</creatorcontrib><creatorcontrib>Zagrouba, Rachid</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Almuhaideb, Abdullah M.</au><au>Elhussein, Mariam</au><au>Osman, Reem</au><au>AlHolyal, Fatema</au><au>AlGhamdi, Leena</au><au>Al-Ismail, Majd</au><au>Alawami, Maram</au><au>Kadour, Zainab</au><au>Zagrouba, Rachid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Design Recommendations for Gate Security Systems and Health Status: A Systematic Review</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023</date><risdate>2023</risdate><volume>11</volume><spage>131508</spage><epage>131520</epage><pages>131508-131520</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance. Most research proposes designs based on their recommended authentication scheme without providing general guidance on constructing these systems. This study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to conduct a systematic literature review, focusing on recent smart gate research. Studies published between 2016 and 2023 are analyzed and evaluated to identify their main components and authentication schemes. A total of 52 studies published in various journals and conferences are collected. After conducting the review, three main design themes are identified: smartphones, tags, and biometrics. These themes are the focal point of the study. Of all the designs, 66% consider using only one-factor authentication. These designs primarily rely on biometric-based methods. During the COVID-19 crisis, some designs used biometric authorization instead of identity authentication to incorporate health status, with a focus on detecting whether the person wore a face mask and had a normal body temperature. Furthermore, the review reveals that most studies disregard the system's hardware components and focus on authorization. Additionally, only 25% of the studies conduct an implementation for their design and produce results evaluating their performance. The study concludes that a successful smart gate design must consider and balance cost, usability, and security. Furthermore, health status needs to be verified as an additional layer of protection after determining the existing authentication requirements.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3335115</doi><tpages>13</tpages><orcidid>https://orcid.org/0009-0006-5612-5728</orcidid><orcidid>https://orcid.org/0000-0001-5080-3029</orcidid><orcidid>https://orcid.org/0000-0001-6165-3214</orcidid><orcidid>https://orcid.org/0000-0002-2004-5324</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2023, Vol.11, p.131508-131520 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_doaj_primary_oai_doaj_org_article_9c914ec6dd814010ac2336a40b2c7a40 |
source | IEEE Xplore Open Access Journals |
subjects | Authentication Biometrics Biometrics (access control) Body temperature COVID-19 Face recognition Hardware health and safety Internet of Medical Things Internet of Things iris Literature reviews Logic gates Medical services Mobile applications Performance evaluation Security Security systems Smart healthcare Smart phones Systematics |
title | Design Recommendations for Gate Security Systems and Health Status: A Systematic Review |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T11%3A50%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Design%20Recommendations%20for%20Gate%20Security%20Systems%20and%20Health%20Status:%20A%20Systematic%20Review&rft.jtitle=IEEE%20access&rft.au=Almuhaideb,%20Abdullah%20M.&rft.date=2023&rft.volume=11&rft.spage=131508&rft.epage=131520&rft.pages=131508-131520&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3335115&rft_dat=%3Cproquest_doaj_%3E2896028239%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2896028239&rft_id=info:pmid/&rft_ieee_id=10323492&rfr_iscdi=true |