A Model for Context-Driven Authentication in Physical Access Control Environments

Khutso Lebea, Wai Sze Leung

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Authentication is the first line of defense in the process of securing any system. For physical access, access points during peak hours tend to be bottlenecks due to the time it takes to authenticate through a contact-driven authentication barrier. Typically, these are two-factor authentication access points, which require a user to scan a token followed by a biometric scan. User error, coupled with hardware wear and tear, contribute to false rejections which increase the authentication time. The Model aims to reduce the amount of time it takes to typically authenticate past a physical access point with minimal interaction required from the user through the use of temporal routine profiles and other context-driven mechanisms. This approach preserves the privacy of users by leveraging existing information that is already collected at access points on a daily basis to automatically generate and maintain the profiles of user access patterns.

Original languageEnglish
Title of host publicationInformation Science and Applications, ICISA 2019
EditorsKuinam J. Kim, Hye-Young Kim
PublisherSpringer
Pages319-328
Number of pages10
ISBN (Print)9789811514647
DOIs
Publication statusPublished - 2020
Event10th International Conference on Information Science and Applications, ICISA 2019 - Seoul, Korea, Republic of
Duration: 16 Dec 201918 Dec 2019

Publication series

NameLecture Notes in Electrical Engineering
Volume621
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference10th International Conference on Information Science and Applications, ICISA 2019
Country/TerritoryKorea, Republic of
CitySeoul
Period16/12/1918/12/19

Keywords

  • Access control
  • Authentication
  • Physical security
  • Trust

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'A Model for Context-Driven Authentication in Physical Access Control Environments'. Together they form a unique fingerprint.

Cite this