Skip to main content

Dual-Layer Security and Access System to Prevent the Spread of COVID-19

  • Conference paper
  • First Online:
Proceedings of International Conference on Machine Intelligence and Data Science Applications

Abstract

Coronavirus is the biggest challenge faced by humanity in the last 50 years. Coronavirus has united us, and finally, humanity has a single goal in fighting this horrible virus that has killed lakhs and affected millions. The effects of coronavirus are not only human, but also economic. It has led to lockdowns and the stoppage of all economic activity. This enemy can only be stopped by finding a way to not allow it to spread from one person to another. The virus can survive on surfaces such as ATM machines and can be spread without direct physical contact between people. So even if we follow social distancing and do not meet other people, we can still get affected with the virus and struggle in combating the spread of this horrible disease. The dual-layer security and access system allows us to use systems without physical contact by only means of audio and eye blinks. This innovative system can serve as a panacea in this time of need. As coronavirus can be spread by touching surfaces, we can stop the spread by using the dual-layer security and access system. There are multiple avenues where we require secure access for accessing sensitive content or physical areas. All current security and access systems suffer from numerous flaws that make them an inferior option to our proposed dual-layer security and access system consisting of preliminary stage of facial recognition and final password authentication using brain–computer interface. In this paper, we compare and contrast the current systems with our dual-layer system and elaborate the numerous merits of the dual-level security and access system that utilizes the state-of-the-art technology in facial recognition and brain–computer interface and is completely future proof.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Chang D, Jati A, Mishra S, Sanadhya SK (2015) Rig: A simple, secure and flexible design for password hashing. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 8957:361–381. https://doi.org/10.1007/978-3-319-16745-9_20

    Article  MathSciNet  MATH  Google Scholar 

  2. Woodward JD. Rand Rp1194 using biometrics to achieve identity dominance in the global war on terrorism

    Google Scholar 

  3. Halderman JA, Waters B, Felten EW (2005) A convenient method for securely managing passwords, p 471. https://doi.org/10.1145/1060745.1060815

  4. Guger C, Allison B, Leuthardt EC (2014) Brain-computer interface research-summary-2. Biosyst Biorobotics. https://doi.org/10.1007/978-3-642-54707-2

  5. Cutillo A, Molva R, Strufe T, Antipolis S. Security and privacy issues in OSNs

    Google Scholar 

  6. Models HM, Filters C, Rentzeperis E (2003) A comparative analysis of face recognition algorithms. 3:201–204

    Google Scholar 

  7. Zhang C, Florencio D, Ba DE, Zhang Z (2008) Maximum likelihood sound source localization and beam forming for directional microphone arrays in distributed meetings. IEEE Trans Multimedia

    Google Scholar 

  8. Adkins LD (2007) Biometrics: weighing convenience and national security against your privacy. Michigan Telecommun Technol Law Rev 13:541–555

    Google Scholar 

  9. Duc NM, Minh BQ, Vulnerability S (2009) Your face is NOT your password Face Authentication By Passing Lenovo–Asus–Toshiba. Black Hat Briefings 1–16

    Google Scholar 

  10. Rajeswari S, Kalaiselvi R (2018) Survey of data and storage security in cloud computing. In: IEEE international conference on circuits and systems ICCS 2017, pp 76–81. https://doi.org/10.1109/ICCS1.2017.8325966

  11. Soni YS, Somani SB, Shete VV (2017) Biometric user authentication using brain waves. In: Proceedings of the international conference on inventive computation technologies, ICICT 2016

    Google Scholar 

  12. Lécuyer A, Lotte F, Reilly RB et al (2008) Brain-computer interfaces, virtual reality, and videogames. Computer (Long Beach Calif) 41:66–72. https://doi.org/10.1109/MC.2008.410

    Article  Google Scholar 

  13. Woodward JD, Horn C, Gatune J, Thomas A (2002) Documented briefing

    Google Scholar 

  14. Alwasiti HH, Aris I, Jantan A (2010) Brain computer interface design and applications: challenges and future. Appl Sci 11:819–825

    Google Scholar 

  15. Dhillon HS, Singla R, Rekhi NS, Jha R (2009) EOG and EMG based virtual keyboard: A brain-computer interface. In: Proceedings of 2009 2nd IEEE international conference on computer science and information technology ICCSIT 2009, pp 259–262. https://doi.org/10.1109/ICCSIT.2009.5234951

  16. Verity R, Okell LC, Dorigatti I et al (2020) Estimates of the severity of coronavirus disease 2019: a model-based analysis. Lancet Infect Dis 20:669–677. https://doi.org/10.1016/S1473-3099(20)30243-7

    Article  Google Scholar 

  17. Kakushadze Z, Liew JK-S (2020) Coronavirus: case for digital money? SSRN Electron J 1–12. https://doi.org/10.2139/ssrn.3554496

  18. Casanova LM, Jeon S, Rutala WA et al (2010) Effects of air temperature and relative humidity on coronavirus survival on surfaces. Appl Environ Microbiol 76:2712–2717. https://doi.org/10.1128/AEM.02291-09

    Article  Google Scholar 

  19. Thorpe J, Van Oorschot PC, Somayaji A (2006) Pass-thoughts: Authenticating with our minds. Proc New Secur Paradig Work 2006:45–56

    Google Scholar 

  20. Feng S, Shen C, Xia N et al (2020) Rational use of face masks in the COVID-19 pandemic. Lancet Respir Med 8:434–436. https://doi.org/10.1016/S2213-2600(20)30134-X

    Article  Google Scholar 

  21. Cheng KK, Lam TH, Leung CC (2020) Wearing face masks in the community during the COVID-19 pandemic: altruism and solidarity. Lancet 2019:2019–2020. https://doi.org/10.1016/S0140-6736(20)30918-1

    Article  Google Scholar 

  22. Lopez-Gordo MA, Ron-Angevin R, Pelay F (2015) Authentication of brain-computer interface users in network applications. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)

    Google Scholar 

  23. Choudhury T, Kumar V, Nigam D, Mandal B (2016) Intelligent Classification of lung & oral cancer through diverse data mining algorithms. In: Proceedings - 2016 international conference on micro-electronics and telecommunication engineering, ICMETE 2016. https://doi.org/10.1109/ICMETE.2016.24

  24. Kumar P, Choudhury T, Rawat S, Jayaraman S (2016) Analysis of various machine learning algorithms for enhanced opinion mining using twitter data streams. In: International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE) 2016, pp 265–270

    Google Scholar 

  25. Tomar R, Prateek M, Sastry HG (2017) A novel approach to multicast in VANET Using MQTT. Ada User Journal 38(4):231–235

    Google Scholar 

  26. Tomar R, Tiwari R (2019) Information delivery system for early forest fire detection using Internet of Things. In: International conference on advances in computing and data sciences. Springer, Singapore, pp 477–86.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arjun Vaibhav Srivastava .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srivastava, A.V., Lohani, B.P., Kushwaha, P.K., Tyagi, S. (2021). Dual-Layer Security and Access System to Prevent the Spread of COVID-19. In: Prateek, M., Singh, T.P., Choudhury, T., Pandey, H.M., Gia Nhu, N. (eds) Proceedings of International Conference on Machine Intelligence and Data Science Applications. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-33-4087-9_28

Download citation

Publish with us

Policies and ethics