With the rapid advancement of technology and the growing number of security threats, both physical and cyber, conventional methods of access control have become insufficient in ensuring the security ...