Location
Comstock Memorial Union, MSUM
Document Type
Poster
Event Website
https://www.mnstate.edu/sac/
Start Date
15-4-2025 12:00 AM
End Date
15-4-2025 12:00 AM
Publication Date
4-15-2025
Description
Background. Access control systems play a central role in securing physical spaces, where secured areas are accessed only by authorized individuals. As security threats increase and the need for robust authentication rises, the integration of advanced smart card readers and network controllers has become essential. Johnson Controls' RDR8S Smart Card Reader and iSTAR Ultra G2 Controller offer cyber-hardened, scalable access control solutions, designed to enhance security, compliance, and operational efficiency. Research Question/Purpose: This study examines the efficiency of RDR8S and iSTAR Ultra G2 in door authentication security. In particular, it looks at how these products facilitate multi-level access control, encryption, and real-time monitoring, thereby breaking the constraints of traditional authentication methods. Methods: The research involves a technical review of system configurations, security protocols, and their deployment on test setups. Data is collected from the documentation of manufacturers, whitepapers, integration manuals, and case studies in the industry to compare the performance, reliability, and scalability of these authentication devices. Findings: Preliminary results show that the support provided by the iSTAR Ultra G2 for up to 32 readers paired with RDR8S's smart card encryption and multi-factor authentication support significantly elevates door access security. Its trusted execution environment (TEE) and secure boot also shield against cyber attacks, thereby meeting compliance with security standards such as NIST and ISO 27001. Conclusion and Significance This research illustrates how RDR8S and iSTAR Ultra G2 work together to enhance access control via a scalable, encrypted, and cyber-secure authentication system. These findings have important implications for organizations that are seeking to update facility security, discourage unauthorized facility access, and incorporate contemporary authentication technologies within the security system. Future recommendations are to conduct further testing using biometric integrations and apply AI-based anomaly detection to facilitate adaptive security management.
Enhancing Door Authentication Security with RDR8S and iSTAR Ultra G2 Controllers
Comstock Memorial Union, MSUM
Background. Access control systems play a central role in securing physical spaces, where secured areas are accessed only by authorized individuals. As security threats increase and the need for robust authentication rises, the integration of advanced smart card readers and network controllers has become essential. Johnson Controls' RDR8S Smart Card Reader and iSTAR Ultra G2 Controller offer cyber-hardened, scalable access control solutions, designed to enhance security, compliance, and operational efficiency. Research Question/Purpose: This study examines the efficiency of RDR8S and iSTAR Ultra G2 in door authentication security. In particular, it looks at how these products facilitate multi-level access control, encryption, and real-time monitoring, thereby breaking the constraints of traditional authentication methods. Methods: The research involves a technical review of system configurations, security protocols, and their deployment on test setups. Data is collected from the documentation of manufacturers, whitepapers, integration manuals, and case studies in the industry to compare the performance, reliability, and scalability of these authentication devices. Findings: Preliminary results show that the support provided by the iSTAR Ultra G2 for up to 32 readers paired with RDR8S's smart card encryption and multi-factor authentication support significantly elevates door access security. Its trusted execution environment (TEE) and secure boot also shield against cyber attacks, thereby meeting compliance with security standards such as NIST and ISO 27001. Conclusion and Significance This research illustrates how RDR8S and iSTAR Ultra G2 work together to enhance access control via a scalable, encrypted, and cyber-secure authentication system. These findings have important implications for organizations that are seeking to update facility security, discourage unauthorized facility access, and incorporate contemporary authentication technologies within the security system. Future recommendations are to conduct further testing using biometric integrations and apply AI-based anomaly detection to facilitate adaptive security management.
https://red.mnstate.edu/sac/2025/cbac/4