Skip to main content

DoAR: An Augmented Reality Based Door Security Prototype Application

  • Conference paper
  • First Online:
HCI International 2021 - Late Breaking Posters (HCII 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1498))

Included in the following conference series:

  • 2128 Accesses

Abstract

The advent of massive technological paradigm shift to subsequent interest in augmented reality (AR) paved the way for designers to design, develop and deploy new use cases of AR in the service industry. In this paper, we investigate the use of augmented reality as an option for providing entry into secured buildings by comparing it against the traditional radio frequency identification devices cards. 51 participants from various backgrounds were recruited to enter a secured building using an AR-based app and an RFID card. The results stipulate that AR-based app had a greater acceptance among participants in terms of security and ease of use. 40 participants thought AR-based app is more secure than RFID cards and 34 participants felt the application was easier to use compared to RFID cards. 32 participants indicated that they would prefer to use the AR-based on daily basis. The result only came short in favor of RFID-based systems in terms of faster access with a margin of 3 persons where RFID systems outperformed AR-Based systems. The results indicate that the system is a suitable option but further research is needed to deploy the research in real-world settings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arifin, R.D.H., Sarno, R.: Door automation system based on speech command and pin using android smartphone. In: 2018 International Conference on Information and Communications Technology (ICOIACT), pp. 667–672. IEEE (2018)

    Google Scholar 

  2. Ashtari, N., Bunt, A., McGrenere, J., Nebeling, M., Chilana, P.K.: Creating augmented and virtual reality applications: current practices, challenges, and opportunities. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–13 (2020)

    Google Scholar 

  3. Divya, R., Mathew, M.: Survey on various door lock access control mechanisms. In: 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1–3. IEEE (2017)

    Google Scholar 

  4. Gupta, A., Lin, B.R., Ji, S., Patel, A., Vogel, D.: Replicate and reuse: tangible interaction design for digitally-augmented physical media objects. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2020)

    Google Scholar 

  5. Hung, C.H., Bai, Y.W., Ren, J.H.: Design and implementation of a door lock control based on a near field communication of a smartphone. In: 2015 IEEE International Conference on Consumer Electronics-Taiwan, pp. 45–46. IEEE (2015)

    Google Scholar 

  6. Hung, C.H., Fanjiang, Y.Y., Chung, K.C., Kao, C.Y.: A door lock system with augmented reality technology. In: 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE), pp. 1–2. IEEE (2017)

    Google Scholar 

  7. Jeong, J.: A study on the IoT based smart door lock system. In: Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 1307–1318. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-0557-2_123

    Chapter  Google Scholar 

  8. Kleinman, R.A., Merkel, C.: Digital contact tracing for COVID-19. CMAJ 192(24), E653–E656 (2020)

    Article  Google Scholar 

  9. Kolesau, A., Šešok, D.: Investigation of acoustic features for voice activation problem. In: 2020 IEEE Open Conference of Electrical, Electronic and Information Sciences (eStream), pp. 1–4. IEEE (2020)

    Google Scholar 

  10. Krombholz, K., Frühwirt, P., Kieseberg, P., Kapsalis, I., Huber, M., Weippl, E.: QR code security: a survey of attacks and challenges for usable security. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 79–90. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07620-1_8

    Chapter  Google Scholar 

  11. Kwon, T., Na, S.: SwitchPIN: securing smartphone pin entry with switchable keypads. In: 2014 IEEE International Conference on Consumer Electronics (ICCE), pp. 23–24. IEEE (2014)

    Google Scholar 

  12. Masood, T., Egger, J.: Augmented reality in support of industry 4.0-implementation challenges and success factors. Robot. Comput. Integr. Manuf. 58, 181–195 (2019)

    Google Scholar 

  13. Masood, T., Egger, J.: Adopting augmented reality in the age of industrial digitalisation. Comput. Ind. 115, 103112 (2020)

    Google Scholar 

  14. Mathew, M., Divya, R.: Super secure door lock system for critical zones. In: 2017 International Conference on Networks & Advances in Computational Technologies (NetACT), pp. 242–245. IEEE (2017)

    Google Scholar 

  15. Molnar, D., Wagner, D.: Privacy and security in library RFID: issues, practices, and architectures. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 210–219 (2004)

    Google Scholar 

  16. Mostajeran, F., Steinicke, F., Ariza Nunez, O.J., Gatsios, D., Fotiadis, D.: Augmented reality for older adults: exploring acceptability of virtual coaches for home-based balance training in an aging population. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–12 (2020)

    Google Scholar 

  17. Parekh, P., Patel, S., Patel, N., Shah, M.: Systematic review and meta-analysis of augmented reality in medicine, retail, and games. Visual Comput. Ind. Biomed. Art 3(1), 1–20 (2020). https://doi.org/10.1186/s42492-020-00057-7

    Article  Google Scholar 

  18. Thornton, F., Lanthem, C.: RFID Security. Elsevier (2006)

    Google Scholar 

  19. Wang, J., Lounis, K., Zulkernine, M.: CSKES: a context-based secure keyless entry system. In: 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 817–822 (2019). https://doi.org/10.1109/COMPSAC.2019.00120

  20. Wazir, W., Khattak, H.A., Almogren, A., Khan, M.A., Din, I.U.: Doodle-based authentication technique using augmented reality. IEEE Access 8, 4022–4034 (2020)

    Article  Google Scholar 

  21. Yahoo: Global RFID market (2021 to 2026) - rising need for contact-tracing solutions due to COVID-19 presents opportunities - researchandmarkets.com, March 2021. https://www.yahoo.com/entertainment/global-rfid-market-2021-2026-130000356.html

  22. Zhu, F., Grossman, T.: BISHARE: exploring bidirectional interactions between smartphones and head-mounted augmented reality. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–14 (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muhammad Usama Islam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Islam, M.U., Chaudhry, B. (2021). DoAR: An Augmented Reality Based Door Security Prototype Application. In: Stephanidis, C., Antona, M., Ntoa, S. (eds) HCI International 2021 - Late Breaking Posters. HCII 2021. Communications in Computer and Information Science, vol 1498. Springer, Cham. https://doi.org/10.1007/978-3-030-90176-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-90176-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-90175-2

  • Online ISBN: 978-3-030-90176-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics