This September 2020 paper from Trend Micro Research September 2020 examines the capabilities and security of new access-control devices based on edge computing architecture. Many popular access control solutions based on biometric technology are more secure and less prone to issues such as credential theft and fraud than traditional security solutions. However, biometric authenticators are usually computationally heavy. Offering an alternative approach is edge computing, a distributed architecture design that places computing nodes at the edge of the network. This brings them much closer to information-gathering sensors and devices, thereby eliminating the need to send large amounts of data to computational services in distant locations. The analysis concludes that many edge-based access-control devices are fully capable of controlling access through facial recognition, but they lack basic security features. Manufacturers should apply the necessary guidelines and measures to make sure that these devices are as secured and protected as possible.
Key words: access controls, blade/edge technology, computer/network hardware, identification systems, intelligent buildings, cybersecurity/privacy. protocols/standards