Skip to main content

Access Control System Which Uses Human Behavioral Profiling for Authentication

  • Conference paper
  • First Online:
Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

  • 1702 Accesses

Abstract

“An access control device has been used for securing valuable properties and lives from sinister people” [1]. Recently, these security device technologies have been improved tremendously in providing security for people through various methods. “Nevertheless, these methods are not individually perfect to provide optimal security. These, most of the time, are not convenient for a wide range of users (i.e, the innocent users who do not pose any threat) due to access time delay and several layers of authentication. The proposed security system should exhibit capabilities that support adaptive security procedures for a diverse range of users, so most innocent users require a minimum layer of identity authentication and verification while suspicious users may require passing through some additional layers of security authentication and verification” [1]. This paper proposes “a novel smart access control (SAC) system, which can identify and categorize suspicious users from the analysis of one’s activities and bio information. The SAC system observes and records users’ daily behavioral activities. From the analysis of the collected data, it selectively chooses certain users for additional layers of authentication procedure and quickly isolates those individuals who might pass through scrutiny by security personnel. Due to this adaptive feature, the SAC system not only minimizes delays and provides more convenience to the users but also enhances the security measure” [1]. Moreover, a novel idea of DPIN, a concept that uses memory and analytical potency of a user to dynamic generation, and updates ones security key is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Penubaku, L.: Smart access control system with behavioral profiling and dynamic pin concept, Master’s thesis, Louisiana State University, Baton Rouge, June 2011

    Google Scholar 

  2. Roussos, G.: Networked RFID: systems, software and services. In: Computer Communications and Networks. Springer, London (2008). https://books.google.co.in/books?id=YMdguq8bAA4C

  3. Astuti, W., Mohamed, S.: Intelligent voice-based door access control system using adaptive-network-based fuzzy inference systems (anfis) for building security

    Google Scholar 

  4. Popa, M., Popa, A., Marcu, M.: A distributed smart card based access control system. In: 8th International Symposium on Intelligent Systems and Informatics (SISY), pp. 341–346, September 2010

    Google Scholar 

  5. Zhang, Y., Li, Q., Zou, X., Hao, K., Niu, X.: The design of fingerprint vault based ic card access control system. In: Proceedings of the 5th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, EHAC 2006, pp. 172–175. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point (2006). http://dl.acm.org/citation.cfm?id=1365818.1365851

  6. De Luca, A., Hertzschuch, K., Hussmann, H.: Colorpin: Securing pin entry through indirect input. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, pp. 1103–1106. ACM, New York (2010). http://doi.acm.org/10.1145/1753326.1753490

  7. Schweitzer, D., Boleng, J., Hughes, C., Murphy, L.: Visualizing keyboard pattern passwords. In: 6th International Workshop on Visualization for Cyber Security, VizSec 2009, pp. 69–73, October 2009

    Google Scholar 

  8. Delac, K., Grgic, M.: A survey of biometric recognition methods. In: 46th International Symposium on Electronics in Marine, Proceedings Elmar 2004, pp. 184–193, June 2004

    Google Scholar 

  9. Qian, J., Ma, S., Hao, Z., Shen, Y.: Face detection and recognition method based on skin color and depth information. In: 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 345–348, April 2011

    Google Scholar 

  10. Lab, R.R.: Dynamicpin: A novel approach towards secure atm authentication

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lohit Penubaku .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Penubaku, L., Kim, JH., Iyengar, S.S., Shilpa, K.A. (2016). Access Control System Which Uses Human Behavioral Profiling for Authentication. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics