Professional Documents
Culture Documents
Security Systems: The Introduction of Biometric Technology As A Smart Solution
Security Systems: The Introduction of Biometric Technology As A Smart Solution
Abstract— Corporations are always in need to strengthen The purpose of this study is to analyze and describe
their security systems due to the assets they need to protect biometric technology as an added value to an
and ongoing security threats. Traditional security methods organization’s security system by describing the design of
are at their maximum working capacity. In order to face a security system in a pharmaceutical company.
present and future risks it is necessary a reliable
identification system. In addition, it is essential to focus in a
holistic security system approach which can be able to SECURITY SYSTEMS
integrate innovative solutions such as biometric technology.
Biometric authentication is indeed a helpful tool that Safety is a priority in any industry, not only for
enhances security by providing an effective identification protecting people but physical and digital assets. Security
using biological characteristics of an individual. The concerns nowadays are rising among companies due to
following study describes how biometric technology can be the increment of terrorist incidents and online criminal
introduced in an organization’s security system, using the incidents. Organizations need to prevent unauthorized
example of a pharmaceutical company.
entry into sensitive areas, data or valuable resources.
Moreover, electronic security systems market is expected
to exceed US$80 billion by 2020. United States is the
INTRODUCTION largest market worldwide followed by Europe [2].
Organizations’ security needs depend on the Access control, video surveillance, and intrusion systems
complexity of their processes and the nature of their can be used in conjunction to provide an integral solution
businesses. Physical security nowadays is not enough for system.
daily work activities or asset protection. It is essential to
incorporate an integrated security system into the • Access control systems, are utilized to control
company. This system consists of different security who or what can view or use resources at an
components such as: Access Control, Video Surveillance organization. They are divided into two groups:
and Intrusion systems. These components are a must to physical and logical. Physical access control
protect corporate goods and personnel. refers to specific areas such as buildings or
rooms. Logical access refers to computer
Biometric technology plays a vital role in security networks, files or data. The authorization,
systems. Biometric characteristics are used to enhance identification, authentication and access control
safety because these traits are intrinsic for each person, processes of this system is performed by the
which allows an effective identification. Organizations usage of login credentials such as passwords,
generally use this technology for monitoring staff and PINs, biometric traits and physical or electronic
granting access to authorized personnel to specific areas keys [3].
or networks. In addition, it can be used in conjunction
with any of the components of an integrated security • Video Surveillance systems offer the possibility
system. of monitoring even if the observer is not present
on site. The information collected through the
Pharmaceutical organizations need security solutions cameras in the Closed-Circuit Television
due to the sensitive information and materials they (CCTV) system can be stored, evaluated and
manage in everyday activities. Serious threats that can repeated as many times as necessary [4].
lead into criminal activities such as terrorism can occur if
high security levels are not implemented in • Intrusion systems monitor if an authorized entry
pharmaceutical facilities. Biometric technology takes part happened inside company’s facility outside
as a useful tool to increase safety since it can effectively working hours. Door or window sensors, motion
authorize or deny access into restricted areas. Moreover, detectors, glass break detectors, panic buttons
it can track employees at all times inside company’s are installed as part of this system [5].
premises and offers accountability if safety incidents Biometric technology can be used along with any of
occur [1]. these systems, providing an advanced security design.
000348
SISY 2017 • IEEE 15th International Symposium on Intelligent Systems and Informatics • September 14-16, 2017 • Subotica, Serbia
Due to these issues, it is vital to implement an integral friendly interface for employee usage and an antifraud
security system. Moreover, enhance its security by the detection system [17].
introduction of biometric technology. Biometric
identifiers contribute to effectively grant access to For the high security rooms, iris identification will be
authorized personnel intro critical areas and networks used. In the laboratories, research and manufacturing
inside the company. Moreover, these biological areas; it is not possible to use fingerprint identification
characteristics can monitor employees always, which it is because of gloves’ usage. For this reason, a contactless
important for the investigation of accountability on safety device is the most suitable option to protect clinical trials
incidents. information, new drug research and key components for
drug production and make sure that just authorized
As an example, a pharmaceutical plant in need of a high personnel will have access to these areas. The device
security system is going to be analyzed. It is a research chosen is IrisAccess 7000. This device recognizes the iris
and development facility that comprises administrative of the eye from 35 cm away and can be used with
offices, research laboratories and development areas personal protective equipment such as googles.
where small amounts of products are manufactured. Moreover, it can stand harsh environments such as a
laboratory or a manufacturing plant. It offers a time and
SECURITY SYSTEM: PHARMACEUTICAL COMPANY attendance feature which can control the activities in
these places. It also allows integration with other devices
A holistic security approach will be implemented in the [18].
design of the security system. That means the integration
of advanced security systems in conjunction with In addition, for protecting valuable assets such as
biometric identifiers, in order to offer one comprehensive information related to clinical trials or a new drug
solution [16]. This security solution understands the discovery and development; an electronic signature
specific hazards and risk levels of the facility and it is system based on biometric characteristics will be
tailored according to the pharmaceutical plant safety implemented to grant access to electronic resources. This
needs. system uses a two-factor authentication; in this case, it
will be a password and an iris scan. Xyntek industry will
The following capabilities will be introduced into the provide the software for this application. Moreover, this
system: software allows the integration of different biometric
sensors [19].
• Surveillance and protection of the facility’s
perimeter with intrusion systems Access will be granted depending on the users’
permissions such as authority, type of role in the
• Access control verifying who enters and leaves company and time of the day.
the plant.
Surveillance Systems
• Monitoring of the workers’ and visitor
movements at any part of the plant in real time A CCTV system provided by Honeywell will be
and asset electronically location. implemented in the plant. Cameras will be placed at
specific areas such as the laboratories and manufacturing
• Restrict the entrance to sensitive areas sites to monitor daily activities. Additionally, cameras at
the building entrance and the parking lot will be
• Track material movement and storage implemented to check who is entering or exiting the
premises and for tracking sensitive material
Intrusion System transportation and storage. A video log will be recorded
of everyone passing through the doors or attempting to
The intrusion system will be provided by Honeywell access the building [20].
security. It consists of window, door opening and motion
sensors in every room. In addition, glass break sensors, Table 1 shows a summary of the Security system for a
will be activated in the research and manufacturing areas. Pharmaceutical company, specifications and pictures of
These features will inform unauthorized entries, sound an the biometric devices.
alarm and alert the security station.
000349
Lourdes Cecilia Ruiz Salvador • Security Systems: The Introduction of Biometric Technology as a Smart Solution
000350
SISY 2017 • IEEE 15th International Symposium on Intelligent Systems and Informatics • September 14-16, 2017 • Subotica, Serbia
Multilayerd Security System," Procedia Computer Science, vol. 58, pp. [19] Xyntek , "Xyntek Inc," Biometric Authentication Systems, 2016.
492-498, 2015. [Online]. Available: http://www.xyntekinc.com/default.aspx?pid=1.
[13] J. Anil K, R. Arun and P. Salil, "An Introduction to Biometric [Accessed 31 May 2017].
Recognition," in IEEE Transactions on Circuits and Systems for Video [20] Honeywell, "Honeywell Security," [Online]. Available:
Technology, 2004. http://www.security.honeywell.com/star/hsce_Files/Files/O-CCTV.htm.
[14] F. Miehl, "Security Info Watch," 11 August 2011. [Online]. Available: [Accessed 1 June 2017].
http://www.securityinfowatch.com/article/10517916/security-planning- [21] M. Brandel, "CSO from IDG," 10 March 2010. [Online]. Available:
for-the-pharmaceutical-industry. [Accessed 17 May 2017]. http://www.csoonline.com/article/2124929/access-control/using-
[15] B. Contos, "Cyber Threats and Pharmaceuticals," CSO, 2017. biometric-access-systems--dos-and-don-ts.html?upd=1496170062275.
[Accessed 22 May 2017].
[16] Honeywell, "Security Honeywell," March 2008. [Online]. Available:
https://www.security.honeywell.com/documents/BHNWINDCO.pdf. [22] R. J. Minter, "The Informatization of the Body: What biometric
technology could reveal to employers about current and potential medical
[17] Morpho, "OT Morpho," 2017. [Online]. Available:
conditions," in American Bar Association, Labor& Employment Law
https://www.morpho.com/en/biometric-terminals/access-control-
Section National Conference on Equal Employment Opportunity Law,
terminals/fingerprint-terminals/morphoaccess-sigma-series. [Accessed 1
New Orleans, 2011.
June 2017].
[18] Iris ID, "Iris ID," Iris Advanced Identity Authentication, 2016. [Online].
Available:
http://www.irisid.com/productssolutions/irisaccesssystem/irisaccess7000/.
[Accessed 31 May 2017].
000351
Lourdes Cecilia Ruiz Salvador • Security Systems: The Introduction of Biometric Technology as a Smart Solution
000352