Loading…

Design Recommendations for Gate Security Systems and Health Status: A Systematic Review

Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance....

Full description

Saved in:
Bibliographic Details
Published in:IEEE access 2023, Vol.11, p.131508-131520
Main Authors: Almuhaideb, Abdullah M., Elhussein, Mariam, Osman, Reem, AlHolyal, Fatema, AlGhamdi, Leena, Al-Ismail, Majd, Alawami, Maram, Kadour, Zainab, Zagrouba, Rachid
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13
cites cdi_FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13
container_end_page 131520
container_issue
container_start_page 131508
container_title IEEE access
container_volume 11
creator Almuhaideb, Abdullah M.
Elhussein, Mariam
Osman, Reem
AlHolyal, Fatema
AlGhamdi, Leena
Al-Ismail, Majd
Alawami, Maram
Kadour, Zainab
Zagrouba, Rachid
description Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance. Most research proposes designs based on their recommended authentication scheme without providing general guidance on constructing these systems. This study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to conduct a systematic literature review, focusing on recent smart gate research. Studies published between 2016 and 2023 are analyzed and evaluated to identify their main components and authentication schemes. A total of 52 studies published in various journals and conferences are collected. After conducting the review, three main design themes are identified: smartphones, tags, and biometrics. These themes are the focal point of the study. Of all the designs, 66% consider using only one-factor authentication. These designs primarily rely on biometric-based methods. During the COVID-19 crisis, some designs used biometric authorization instead of identity authentication to incorporate health status, with a focus on detecting whether the person wore a face mask and had a normal body temperature. Furthermore, the review reveals that most studies disregard the system's hardware components and focus on authorization. Additionally, only 25% of the studies conduct an implementation for their design and produce results evaluating their performance. The study concludes that a successful smart gate design must consider and balance cost, usability, and security. Furthermore, health status needs to be verified as an additional layer of protection after determining the existing authentication requirements.
doi_str_mv 10.1109/ACCESS.2023.3335115
format article
fullrecord <record><control><sourceid>proquest_doaj_</sourceid><recordid>TN_cdi_doaj_primary_oai_doaj_org_article_9c914ec6dd814010ac2336a40b2c7a40</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10323492</ieee_id><doaj_id>oai_doaj_org_article_9c914ec6dd814010ac2336a40b2c7a40</doaj_id><sourcerecordid>2896028239</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13</originalsourceid><addsrcrecordid>eNpNUcFKJDEQDaKgjH7B7iHgecYklaQ7extGVwVBsF32GNLpareHmY4mmV3m7zfag1iXKl7Ve_XgEfKNswXnzFwtV6ubplkIJmABAIpzdUTOBNdmDgr08Zf5lFyktGal6gKp6oz8vsY0vIz0CX3YbnHsXB7CmGgfIr11GWmDfheHvKfNPmXcJurGjt6h2-Q_tMku79IPujwsC9cXpb8D_jsnJ73bJLw49Bn59fPmeXU3f3i8vV8tH-ZeMpPnWqrW61YD07VHDd6AUuhdK5RzUgopa-drBANVrzvt-0opxrGr6hY1Rw4zcj_pdsGt7Wscti7ubXCD_QBCfLEuFlsbtMYbLtHrrqu5ZJw5LwC0k6wVviqtaF1OWq8xvO0wZbsOuzgW-1bURjNRi2JkRmC68jGkFLH__MqZfQ_EToHY90DsIZDC-j6xBkT8wgAB0gj4D5hEhfw</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2896028239</pqid></control><display><type>article</type><title>Design Recommendations for Gate Security Systems and Health Status: A Systematic Review</title><source>IEEE Xplore Open Access Journals</source><creator>Almuhaideb, Abdullah M. ; Elhussein, Mariam ; Osman, Reem ; AlHolyal, Fatema ; AlGhamdi, Leena ; Al-Ismail, Majd ; Alawami, Maram ; Kadour, Zainab ; Zagrouba, Rachid</creator><creatorcontrib>Almuhaideb, Abdullah M. ; Elhussein, Mariam ; Osman, Reem ; AlHolyal, Fatema ; AlGhamdi, Leena ; Al-Ismail, Majd ; Alawami, Maram ; Kadour, Zainab ; Zagrouba, Rachid</creatorcontrib><description>Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance. Most research proposes designs based on their recommended authentication scheme without providing general guidance on constructing these systems. This study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to conduct a systematic literature review, focusing on recent smart gate research. Studies published between 2016 and 2023 are analyzed and evaluated to identify their main components and authentication schemes. A total of 52 studies published in various journals and conferences are collected. After conducting the review, three main design themes are identified: smartphones, tags, and biometrics. These themes are the focal point of the study. Of all the designs, 66% consider using only one-factor authentication. These designs primarily rely on biometric-based methods. During the COVID-19 crisis, some designs used biometric authorization instead of identity authentication to incorporate health status, with a focus on detecting whether the person wore a face mask and had a normal body temperature. Furthermore, the review reveals that most studies disregard the system's hardware components and focus on authorization. Additionally, only 25% of the studies conduct an implementation for their design and produce results evaluating their performance. The study concludes that a successful smart gate design must consider and balance cost, usability, and security. Furthermore, health status needs to be verified as an additional layer of protection after determining the existing authentication requirements.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3335115</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Authentication ; Biometrics ; Biometrics (access control) ; Body temperature ; COVID-19 ; Face recognition ; Hardware ; health and safety ; Internet of Medical Things ; Internet of Things ; iris ; Literature reviews ; Logic gates ; Medical services ; Mobile applications ; Performance evaluation ; Security ; Security systems ; Smart healthcare ; Smart phones ; Systematics</subject><ispartof>IEEE access, 2023, Vol.11, p.131508-131520</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13</citedby><cites>FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13</cites><orcidid>0009-0006-5612-5728 ; 0000-0001-5080-3029 ; 0000-0001-6165-3214 ; 0000-0002-2004-5324</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10323492$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,27633,27923,27924,27925,54933</link.rule.ids></links><search><creatorcontrib>Almuhaideb, Abdullah M.</creatorcontrib><creatorcontrib>Elhussein, Mariam</creatorcontrib><creatorcontrib>Osman, Reem</creatorcontrib><creatorcontrib>AlHolyal, Fatema</creatorcontrib><creatorcontrib>AlGhamdi, Leena</creatorcontrib><creatorcontrib>Al-Ismail, Majd</creatorcontrib><creatorcontrib>Alawami, Maram</creatorcontrib><creatorcontrib>Kadour, Zainab</creatorcontrib><creatorcontrib>Zagrouba, Rachid</creatorcontrib><title>Design Recommendations for Gate Security Systems and Health Status: A Systematic Review</title><title>IEEE access</title><addtitle>Access</addtitle><description>Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance. Most research proposes designs based on their recommended authentication scheme without providing general guidance on constructing these systems. This study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to conduct a systematic literature review, focusing on recent smart gate research. Studies published between 2016 and 2023 are analyzed and evaluated to identify their main components and authentication schemes. A total of 52 studies published in various journals and conferences are collected. After conducting the review, three main design themes are identified: smartphones, tags, and biometrics. These themes are the focal point of the study. Of all the designs, 66% consider using only one-factor authentication. These designs primarily rely on biometric-based methods. During the COVID-19 crisis, some designs used biometric authorization instead of identity authentication to incorporate health status, with a focus on detecting whether the person wore a face mask and had a normal body temperature. Furthermore, the review reveals that most studies disregard the system's hardware components and focus on authorization. Additionally, only 25% of the studies conduct an implementation for their design and produce results evaluating their performance. The study concludes that a successful smart gate design must consider and balance cost, usability, and security. Furthermore, health status needs to be verified as an additional layer of protection after determining the existing authentication requirements.</description><subject>Authentication</subject><subject>Biometrics</subject><subject>Biometrics (access control)</subject><subject>Body temperature</subject><subject>COVID-19</subject><subject>Face recognition</subject><subject>Hardware</subject><subject>health and safety</subject><subject>Internet of Medical Things</subject><subject>Internet of Things</subject><subject>iris</subject><subject>Literature reviews</subject><subject>Logic gates</subject><subject>Medical services</subject><subject>Mobile applications</subject><subject>Performance evaluation</subject><subject>Security</subject><subject>Security systems</subject><subject>Smart healthcare</subject><subject>Smart phones</subject><subject>Systematics</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>DOA</sourceid><recordid>eNpNUcFKJDEQDaKgjH7B7iHgecYklaQ7extGVwVBsF32GNLpareHmY4mmV3m7zfag1iXKl7Ve_XgEfKNswXnzFwtV6ubplkIJmABAIpzdUTOBNdmDgr08Zf5lFyktGal6gKp6oz8vsY0vIz0CX3YbnHsXB7CmGgfIr11GWmDfheHvKfNPmXcJurGjt6h2-Q_tMku79IPujwsC9cXpb8D_jsnJ73bJLw49Bn59fPmeXU3f3i8vV8tH-ZeMpPnWqrW61YD07VHDd6AUuhdK5RzUgopa-drBANVrzvt-0opxrGr6hY1Rw4zcj_pdsGt7Wscti7ubXCD_QBCfLEuFlsbtMYbLtHrrqu5ZJw5LwC0k6wVviqtaF1OWq8xvO0wZbsOuzgW-1bURjNRi2JkRmC68jGkFLH__MqZfQ_EToHY90DsIZDC-j6xBkT8wgAB0gj4D5hEhfw</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Almuhaideb, Abdullah M.</creator><creator>Elhussein, Mariam</creator><creator>Osman, Reem</creator><creator>AlHolyal, Fatema</creator><creator>AlGhamdi, Leena</creator><creator>Al-Ismail, Majd</creator><creator>Alawami, Maram</creator><creator>Kadour, Zainab</creator><creator>Zagrouba, Rachid</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0009-0006-5612-5728</orcidid><orcidid>https://orcid.org/0000-0001-5080-3029</orcidid><orcidid>https://orcid.org/0000-0001-6165-3214</orcidid><orcidid>https://orcid.org/0000-0002-2004-5324</orcidid></search><sort><creationdate>2023</creationdate><title>Design Recommendations for Gate Security Systems and Health Status: A Systematic Review</title><author>Almuhaideb, Abdullah M. ; Elhussein, Mariam ; Osman, Reem ; AlHolyal, Fatema ; AlGhamdi, Leena ; Al-Ismail, Majd ; Alawami, Maram ; Kadour, Zainab ; Zagrouba, Rachid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Authentication</topic><topic>Biometrics</topic><topic>Biometrics (access control)</topic><topic>Body temperature</topic><topic>COVID-19</topic><topic>Face recognition</topic><topic>Hardware</topic><topic>health and safety</topic><topic>Internet of Medical Things</topic><topic>Internet of Things</topic><topic>iris</topic><topic>Literature reviews</topic><topic>Logic gates</topic><topic>Medical services</topic><topic>Mobile applications</topic><topic>Performance evaluation</topic><topic>Security</topic><topic>Security systems</topic><topic>Smart healthcare</topic><topic>Smart phones</topic><topic>Systematics</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Almuhaideb, Abdullah M.</creatorcontrib><creatorcontrib>Elhussein, Mariam</creatorcontrib><creatorcontrib>Osman, Reem</creatorcontrib><creatorcontrib>AlHolyal, Fatema</creatorcontrib><creatorcontrib>AlGhamdi, Leena</creatorcontrib><creatorcontrib>Al-Ismail, Majd</creatorcontrib><creatorcontrib>Alawami, Maram</creatorcontrib><creatorcontrib>Kadour, Zainab</creatorcontrib><creatorcontrib>Zagrouba, Rachid</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005–Present</collection><collection>IEEE Xplore Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Almuhaideb, Abdullah M.</au><au>Elhussein, Mariam</au><au>Osman, Reem</au><au>AlHolyal, Fatema</au><au>AlGhamdi, Leena</au><au>Al-Ismail, Majd</au><au>Alawami, Maram</au><au>Kadour, Zainab</au><au>Zagrouba, Rachid</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Design Recommendations for Gate Security Systems and Health Status: A Systematic Review</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023</date><risdate>2023</risdate><volume>11</volume><spage>131508</spage><epage>131520</epage><pages>131508-131520</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>Gate security systems use authentication methods to operate hardware components that grant or deny access to restricted areas. Each context has specific requirements to determine user admissibility. There are currently no design recommendations available for these systems despite their significance. Most research proposes designs based on their recommended authentication scheme without providing general guidance on constructing these systems. This study follows the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to conduct a systematic literature review, focusing on recent smart gate research. Studies published between 2016 and 2023 are analyzed and evaluated to identify their main components and authentication schemes. A total of 52 studies published in various journals and conferences are collected. After conducting the review, three main design themes are identified: smartphones, tags, and biometrics. These themes are the focal point of the study. Of all the designs, 66% consider using only one-factor authentication. These designs primarily rely on biometric-based methods. During the COVID-19 crisis, some designs used biometric authorization instead of identity authentication to incorporate health status, with a focus on detecting whether the person wore a face mask and had a normal body temperature. Furthermore, the review reveals that most studies disregard the system's hardware components and focus on authorization. Additionally, only 25% of the studies conduct an implementation for their design and produce results evaluating their performance. The study concludes that a successful smart gate design must consider and balance cost, usability, and security. Furthermore, health status needs to be verified as an additional layer of protection after determining the existing authentication requirements.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3335115</doi><tpages>13</tpages><orcidid>https://orcid.org/0009-0006-5612-5728</orcidid><orcidid>https://orcid.org/0000-0001-5080-3029</orcidid><orcidid>https://orcid.org/0000-0001-6165-3214</orcidid><orcidid>https://orcid.org/0000-0002-2004-5324</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2023, Vol.11, p.131508-131520
issn 2169-3536
2169-3536
language eng
recordid cdi_doaj_primary_oai_doaj_org_article_9c914ec6dd814010ac2336a40b2c7a40
source IEEE Xplore Open Access Journals
subjects Authentication
Biometrics
Biometrics (access control)
Body temperature
COVID-19
Face recognition
Hardware
health and safety
Internet of Medical Things
Internet of Things
iris
Literature reviews
Logic gates
Medical services
Mobile applications
Performance evaluation
Security
Security systems
Smart healthcare
Smart phones
Systematics
title Design Recommendations for Gate Security Systems and Health Status: A Systematic Review
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T11%3A50%3A54IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_doaj_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Design%20Recommendations%20for%20Gate%20Security%20Systems%20and%20Health%20Status:%20A%20Systematic%20Review&rft.jtitle=IEEE%20access&rft.au=Almuhaideb,%20Abdullah%20M.&rft.date=2023&rft.volume=11&rft.spage=131508&rft.epage=131520&rft.pages=131508-131520&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3335115&rft_dat=%3Cproquest_doaj_%3E2896028239%3C/proquest_doaj_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c409t-645bc6b63068ce63c9355ecab25aa442448ac8e3937f6d6cf75501ed78be61e13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2896028239&rft_id=info:pmid/&rft_ieee_id=10323492&rfr_iscdi=true