Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System

Author:

Edrah Aisha12,Ouda Abdelkader1ORCID

Affiliation:

1. Department of Electrical and Computer Engineering, Faculty of Engineering, Western University, London, ON N6A 5B9, Canada

2. Faculty of Information Technology, Alasmarya Islamic University, Zliten 218521, Libya

Abstract

With our increasing reliance on technology, there is a growing demand for efficient and seamless access control systems. Smartphone-centric biometric methods offer a diverse range of potential solutions capable of verifying users and providing an additional layer of security to prevent unauthorized access. To ensure the security and accuracy of smartphone-centric biometric identification, it is crucial that the phone reliably identifies its legitimate owner. Once the legitimate holder has been successfully determined, the phone can effortlessly provide real-time identity verification for various applications. To achieve this, we introduce a novel smartphone-integrated detection and control system called Identification: Legitimate or Counterfeit (ILC), which utilizes gait cycle analysis. The ILC system employs the smartphone’s accelerometer sensor, along with advanced statistical methods, to detect the user’s gait pattern, enabling real-time identification of the smartphone owner. This approach relies on statistical analysis of measurements obtained from the accelerometer sensor, specifically, peaks extracted from the X-axis data. Subsequently, the derived feature’s probability distribution function (PDF) is computed and compared to the known user’s PDF. The calculated probability verifies the similarity between the distributions, and a decision is made with 92.18% accuracy based on a predetermined verification threshold.

Publisher

MDPI AG

Reference36 articles.

1. Hussain, H. (2024, June 18). Password Security: Best Practices and Management Strategies. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstractid=4136333.

2. Sobers, R. (2023, November 10). 84 Must-Know Data Breach Statistics. Available online: https://www.varonis.com/blog/data-breach-statistics.

3. Balancing security and user experience in the evolving digital landscape;Okoli;E3S Web Conf.,2024

4. Okoli, K., Joseph, I., Chijioke, F., Bekeneva, Y., Chijioke, A., and Kodondo, I. (2024, January 29–31). Human-Machine Interaction in E-commerce: A Multi-Faceted Examination of CAPTCHA Effect. Proceedings of the 2024 Conference of Young Researchers in Electrical and Electronic Engineering (ElCon), Saint Petersburg, Russia.

5. Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services;Panchal;IEEE Trans. Cloud Comput.,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3