Abstract
“An access control device has been used for securing valuable properties and lives from sinister people” [1]. Recently, these security device technologies have been improved tremendously in providing security for people through various methods. “Nevertheless, these methods are not individually perfect to provide optimal security. These, most of the time, are not convenient for a wide range of users (i.e, the innocent users who do not pose any threat) due to access time delay and several layers of authentication. The proposed security system should exhibit capabilities that support adaptive security procedures for a diverse range of users, so most innocent users require a minimum layer of identity authentication and verification while suspicious users may require passing through some additional layers of security authentication and verification” [1]. This paper proposes “a novel smart access control (SAC) system, which can identify and categorize suspicious users from the analysis of one’s activities and bio information. The SAC system observes and records users’ daily behavioral activities. From the analysis of the collected data, it selectively chooses certain users for additional layers of authentication procedure and quickly isolates those individuals who might pass through scrutiny by security personnel. Due to this adaptive feature, the SAC system not only minimizes delays and provides more convenience to the users but also enhances the security measure” [1]. Moreover, a novel idea of DPIN, a concept that uses memory and analytical potency of a user to dynamic generation, and updates ones security key is proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Penubaku, L.: Smart access control system with behavioral profiling and dynamic pin concept, Master’s thesis, Louisiana State University, Baton Rouge, June 2011
Roussos, G.: Networked RFID: systems, software and services. In: Computer Communications and Networks. Springer, London (2008). https://books.google.co.in/books?id=YMdguq8bAA4C
Astuti, W., Mohamed, S.: Intelligent voice-based door access control system using adaptive-network-based fuzzy inference systems (anfis) for building security
Popa, M., Popa, A., Marcu, M.: A distributed smart card based access control system. In: 8th International Symposium on Intelligent Systems and Informatics (SISY), pp. 341–346, September 2010
Zhang, Y., Li, Q., Zou, X., Hao, K., Niu, X.: The design of fingerprint vault based ic card access control system. In: Proceedings of the 5th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, EHAC 2006, pp. 172–175. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point (2006). http://dl.acm.org/citation.cfm?id=1365818.1365851
De Luca, A., Hertzschuch, K., Hussmann, H.: Colorpin: Securing pin entry through indirect input. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, pp. 1103–1106. ACM, New York (2010). http://doi.acm.org/10.1145/1753326.1753490
Schweitzer, D., Boleng, J., Hughes, C., Murphy, L.: Visualizing keyboard pattern passwords. In: 6th International Workshop on Visualization for Cyber Security, VizSec 2009, pp. 69–73, October 2009
Delac, K., Grgic, M.: A survey of biometric recognition methods. In: 46th International Symposium on Electronics in Marine, Proceedings Elmar 2004, pp. 184–193, June 2004
Qian, J., Ma, S., Hao, Z., Shen, Y.: Face detection and recognition method based on skin color and depth information. In: 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 345–348, April 2011
Lab, R.R.: Dynamicpin: A novel approach towards secure atm authentication
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Penubaku, L., Kim, JH., Iyengar, S.S., Shilpa, K.A. (2016). Access Control System Which Uses Human Behavioral Profiling for Authentication. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-28658-7_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28656-3
Online ISBN: 978-3-319-28658-7
eBook Packages: EngineeringEngineering (R0)