Access Control System Which Uses Human Behavioral Profiling for Authentication

  • Lohit Penubaku
  • Jong-Hoon Kim
  • Sitharama S. Iyengar
  • Kadbur A. Shilpa
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 425)


“An access control device has been used for securing valuable properties and lives from sinister people” [1]. Recently, these security device technologies have been improved tremendously in providing security for people through various methods. “Nevertheless, these methods are not individually perfect to provide optimal security. These, most of the time, are not convenient for a wide range of users (i.e, the innocent users who do not pose any threat) due to access time delay and several layers of authentication. The proposed security system should exhibit capabilities that support adaptive security procedures for a diverse range of users, so most innocent users require a minimum layer of identity authentication and verification while suspicious users may require passing through some additional layers of security authentication and verification” [1]. This paper proposes “a novel smart access control (SAC) system, which can identify and categorize suspicious users from the analysis of one’s activities and bio information. The SAC system observes and records users’ daily behavioral activities. From the analysis of the collected data, it selectively chooses certain users for additional layers of authentication procedure and quickly isolates those individuals who might pass through scrutiny by security personnel. Due to this adaptive feature, the SAC system not only minimizes delays and provides more convenience to the users but also enhances the security measure” [1]. Moreover, a novel idea of DPIN, a concept that uses memory and analytical potency of a user to dynamic generation, and updates ones security key is proposed.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Penubaku, L.: Smart access control system with behavioral profiling and dynamic pin concept, Master’s thesis, Louisiana State University, Baton Rouge, June 2011Google Scholar
  2. 2.
    Roussos, G.: Networked RFID: systems, software and services. In: Computer Communications and Networks. Springer, London (2008).
  3. 3.
    Astuti, W., Mohamed, S.: Intelligent voice-based door access control system using adaptive-network-based fuzzy inference systems (anfis) for building securityGoogle Scholar
  4. 4.
    Popa, M., Popa, A., Marcu, M.: A distributed smart card based access control system. In: 8th International Symposium on Intelligent Systems and Informatics (SISY), pp. 341–346, September 2010Google Scholar
  5. 5.
    Zhang, Y., Li, Q., Zou, X., Hao, K., Niu, X.: The design of fingerprint vault based ic card access control system. In: Proceedings of the 5th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications, EHAC 2006, pp. 172–175. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point (2006).
  6. 6.
    De Luca, A., Hertzschuch, K., Hussmann, H.: Colorpin: Securing pin entry through indirect input. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2010, pp. 1103–1106. ACM, New York (2010).
  7. 7.
    Schweitzer, D., Boleng, J., Hughes, C., Murphy, L.: Visualizing keyboard pattern passwords. In: 6th International Workshop on Visualization for Cyber Security, VizSec 2009, pp. 69–73, October 2009Google Scholar
  8. 8.
    Delac, K., Grgic, M.: A survey of biometric recognition methods. In: 46th International Symposium on Electronics in Marine, Proceedings Elmar 2004, pp. 184–193, June 2004Google Scholar
  9. 9.
    Qian, J., Ma, S., Hao, Z., Shen, Y.: Face detection and recognition method based on skin color and depth information. In: 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet), pp. 345–348, April 2011Google Scholar
  10. 10.
    Lab, R.R.: Dynamicpin: A novel approach towards secure atm authenticationGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Lohit Penubaku
    • 1
  • Jong-Hoon Kim
    • 2
  • Sitharama S. Iyengar
    • 2
  • Kadbur A. Shilpa
    • 1
  1. 1.Reva UniversityBangaloreIndia
  2. 2.Florida International UniversityMiamiUSA

Personalised recommendations