Location

Comstock Memorial Union, MSUM

Document Type

Poster

Event Website

https://www.mnstate.edu/sac/

Start Date

15-4-2025 12:00 AM

End Date

15-4-2025 12:00 AM

Publication Date

4-15-2025

Description

Background. Access control systems play a central role in securing physical spaces, where secured areas are accessed only by authorized individuals. As security threats increase and the need for robust authentication rises, the integration of advanced smart card readers and network controllers has become essential. Johnson Controls' RDR8S Smart Card Reader and iSTAR Ultra G2 Controller offer cyber-hardened, scalable access control solutions, designed to enhance security, compliance, and operational efficiency. Research Question/Purpose: This study examines the efficiency of RDR8S and iSTAR Ultra G2 in door authentication security. In particular, it looks at how these products facilitate multi-level access control, encryption, and real-time monitoring, thereby breaking the constraints of traditional authentication methods. Methods: The research involves a technical review of system configurations, security protocols, and their deployment on test setups. Data is collected from the documentation of manufacturers, whitepapers, integration manuals, and case studies in the industry to compare the performance, reliability, and scalability of these authentication devices. Findings: Preliminary results show that the support provided by the iSTAR Ultra G2 for up to 32 readers paired with RDR8S's smart card encryption and multi-factor authentication support significantly elevates door access security. Its trusted execution environment (TEE) and secure boot also shield against cyber attacks, thereby meeting compliance with security standards such as NIST and ISO 27001. Conclusion and Significance This research illustrates how RDR8S and iSTAR Ultra G2 work together to enhance access control via a scalable, encrypted, and cyber-secure authentication system. These findings have important implications for organizations that are seeking to update facility security, discourage unauthorized facility access, and incorporate contemporary authentication technologies within the security system. Future recommendations are to conduct further testing using biometric integrations and apply AI-based anomaly detection to facilitate adaptive security management.

Share

COinS
 
Apr 15th, 12:00 AM Apr 15th, 12:00 AM

Enhancing Door Authentication Security with RDR8S and iSTAR Ultra G2 Controllers

Comstock Memorial Union, MSUM

Background. Access control systems play a central role in securing physical spaces, where secured areas are accessed only by authorized individuals. As security threats increase and the need for robust authentication rises, the integration of advanced smart card readers and network controllers has become essential. Johnson Controls' RDR8S Smart Card Reader and iSTAR Ultra G2 Controller offer cyber-hardened, scalable access control solutions, designed to enhance security, compliance, and operational efficiency. Research Question/Purpose: This study examines the efficiency of RDR8S and iSTAR Ultra G2 in door authentication security. In particular, it looks at how these products facilitate multi-level access control, encryption, and real-time monitoring, thereby breaking the constraints of traditional authentication methods. Methods: The research involves a technical review of system configurations, security protocols, and their deployment on test setups. Data is collected from the documentation of manufacturers, whitepapers, integration manuals, and case studies in the industry to compare the performance, reliability, and scalability of these authentication devices. Findings: Preliminary results show that the support provided by the iSTAR Ultra G2 for up to 32 readers paired with RDR8S's smart card encryption and multi-factor authentication support significantly elevates door access security. Its trusted execution environment (TEE) and secure boot also shield against cyber attacks, thereby meeting compliance with security standards such as NIST and ISO 27001. Conclusion and Significance This research illustrates how RDR8S and iSTAR Ultra G2 work together to enhance access control via a scalable, encrypted, and cyber-secure authentication system. These findings have important implications for organizations that are seeking to update facility security, discourage unauthorized facility access, and incorporate contemporary authentication technologies within the security system. Future recommendations are to conduct further testing using biometric integrations and apply AI-based anomaly detection to facilitate adaptive security management.

https://red.mnstate.edu/sac/2025/cbac/4