Next Article in Journal
An NLP-Based Exploration of Variance in Student Writing and Syntax: Implications for Automated Writing Evaluation
Previous Article in Journal
Personalized Classifier Selection for EEG-Based BCIs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System

1
Department of Electrical and Computer Engineering, Faculty of Engineering, Western University, London, ON N6A 5B9, Canada
2
Faculty of Information Technology, Alasmarya Islamic University, Zliten, Libya
*
Author to whom correspondence should be addressed.
Computers 2024, 13(7), 159; https://doi.org/10.3390/computers13070159
Submission received: 31 May 2024 / Revised: 18 June 2024 / Accepted: 19 June 2024 / Published: 22 June 2024

Abstract

With our increasing reliance on technology, there is a growing demand for efficient and seamless access control systems. Smartphone-centric biometric methods offer a diverse range of potential solutions capable of verifying users and providing an additional layer of security to prevent unauthorized access. To ensure the security and accuracy of smartphone-centric biometric identification, it is crucial that the phone reliably identifies its legitimate owner. Once the legitimate holder has been successfully determined, the phone can effortlessly provide real-time identity verification for various applications. To achieve this, we introduce a novel smartphone-integrated detection and control system called Identification: Legitimate or Counterfeit (ILC), which utilizes gait cycle analysis. The ILC system employs the smartphone’s accelerometer sensor, along with advanced statistical methods, to detect the user’s gait pattern, enabling real-time identification of the smartphone owner. This approach relies on statistical analysis of measurements obtained from the accelerometer sensor, specifically, peaks extracted from the X-axis data. Subsequently, the derived feature’s probability distribution function (PDF) is computed and compared to the known user’s PDF. The calculated probability verifies the similarity between the distributions, and a decision is made with 92.18% accuracy based on a predetermined verification threshold.
Keywords: access control systems; identity verification; gait cycle analysis; smartphone sensors access control systems; identity verification; gait cycle analysis; smartphone sensors

Share and Cite

MDPI and ACS Style

Edrah, A.; Ouda, A. Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System. Computers 2024, 13, 159. https://doi.org/10.3390/computers13070159

AMA Style

Edrah A, Ouda A. Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System. Computers. 2024; 13(7):159. https://doi.org/10.3390/computers13070159

Chicago/Turabian Style

Edrah, Aisha, and Abdelkader Ouda. 2024. "Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System" Computers 13, no. 7: 159. https://doi.org/10.3390/computers13070159

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop