Abstract
Coronavirus is the biggest challenge faced by humanity in the last 50 years. Coronavirus has united us, and finally, humanity has a single goal in fighting this horrible virus that has killed lakhs and affected millions. The effects of coronavirus are not only human, but also economic. It has led to lockdowns and the stoppage of all economic activity. This enemy can only be stopped by finding a way to not allow it to spread from one person to another. The virus can survive on surfaces such as ATM machines and can be spread without direct physical contact between people. So even if we follow social distancing and do not meet other people, we can still get affected with the virus and struggle in combating the spread of this horrible disease. The dual-layer security and access system allows us to use systems without physical contact by only means of audio and eye blinks. This innovative system can serve as a panacea in this time of need. As coronavirus can be spread by touching surfaces, we can stop the spread by using the dual-layer security and access system. There are multiple avenues where we require secure access for accessing sensitive content or physical areas. All current security and access systems suffer from numerous flaws that make them an inferior option to our proposed dual-layer security and access system consisting of preliminary stage of facial recognition and final password authentication using brain–computer interface. In this paper, we compare and contrast the current systems with our dual-layer system and elaborate the numerous merits of the dual-level security and access system that utilizes the state-of-the-art technology in facial recognition and brain–computer interface and is completely future proof.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Chang D, Jati A, Mishra S, Sanadhya SK (2015) Rig: A simple, secure and flexible design for password hashing. Lect Notes Comput Sci (Including Subser Lect Notes Artif Intell Lect Notes Bioinformatics) 8957:361–381. https://doi.org/10.1007/978-3-319-16745-9_20
Woodward JD. Rand Rp1194 using biometrics to achieve identity dominance in the global war on terrorism
Halderman JA, Waters B, Felten EW (2005) A convenient method for securely managing passwords, p 471. https://doi.org/10.1145/1060745.1060815
Guger C, Allison B, Leuthardt EC (2014) Brain-computer interface research-summary-2. Biosyst Biorobotics. https://doi.org/10.1007/978-3-642-54707-2
Cutillo A, Molva R, Strufe T, Antipolis S. Security and privacy issues in OSNs
Models HM, Filters C, Rentzeperis E (2003) A comparative analysis of face recognition algorithms. 3:201–204
Zhang C, Florencio D, Ba DE, Zhang Z (2008) Maximum likelihood sound source localization and beam forming for directional microphone arrays in distributed meetings. IEEE Trans Multimedia
Adkins LD (2007) Biometrics: weighing convenience and national security against your privacy. Michigan Telecommun Technol Law Rev 13:541–555
Duc NM, Minh BQ, Vulnerability S (2009) Your face is NOT your password Face Authentication By Passing Lenovo–Asus–Toshiba. Black Hat Briefings 1–16
Rajeswari S, Kalaiselvi R (2018) Survey of data and storage security in cloud computing. In: IEEE international conference on circuits and systems ICCS 2017, pp 76–81. https://doi.org/10.1109/ICCS1.2017.8325966
Soni YS, Somani SB, Shete VV (2017) Biometric user authentication using brain waves. In: Proceedings of the international conference on inventive computation technologies, ICICT 2016
Lécuyer A, Lotte F, Reilly RB et al (2008) Brain-computer interfaces, virtual reality, and videogames. Computer (Long Beach Calif) 41:66–72. https://doi.org/10.1109/MC.2008.410
Woodward JD, Horn C, Gatune J, Thomas A (2002) Documented briefing
Alwasiti HH, Aris I, Jantan A (2010) Brain computer interface design and applications: challenges and future. Appl Sci 11:819–825
Dhillon HS, Singla R, Rekhi NS, Jha R (2009) EOG and EMG based virtual keyboard: A brain-computer interface. In: Proceedings of 2009 2nd IEEE international conference on computer science and information technology ICCSIT 2009, pp 259–262. https://doi.org/10.1109/ICCSIT.2009.5234951
Verity R, Okell LC, Dorigatti I et al (2020) Estimates of the severity of coronavirus disease 2019: a model-based analysis. Lancet Infect Dis 20:669–677. https://doi.org/10.1016/S1473-3099(20)30243-7
Kakushadze Z, Liew JK-S (2020) Coronavirus: case for digital money? SSRN Electron J 1–12. https://doi.org/10.2139/ssrn.3554496
Casanova LM, Jeon S, Rutala WA et al (2010) Effects of air temperature and relative humidity on coronavirus survival on surfaces. Appl Environ Microbiol 76:2712–2717. https://doi.org/10.1128/AEM.02291-09
Thorpe J, Van Oorschot PC, Somayaji A (2006) Pass-thoughts: Authenticating with our minds. Proc New Secur Paradig Work 2006:45–56
Feng S, Shen C, Xia N et al (2020) Rational use of face masks in the COVID-19 pandemic. Lancet Respir Med 8:434–436. https://doi.org/10.1016/S2213-2600(20)30134-X
Cheng KK, Lam TH, Leung CC (2020) Wearing face masks in the community during the COVID-19 pandemic: altruism and solidarity. Lancet 2019:2019–2020. https://doi.org/10.1016/S0140-6736(20)30918-1
Lopez-Gordo MA, Ron-Angevin R, Pelay F (2015) Authentication of brain-computer interface users in network applications. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)
Choudhury T, Kumar V, Nigam D, Mandal B (2016) Intelligent Classification of lung & oral cancer through diverse data mining algorithms. In: Proceedings - 2016 international conference on micro-electronics and telecommunication engineering, ICMETE 2016. https://doi.org/10.1109/ICMETE.2016.24
Kumar P, Choudhury T, Rawat S, Jayaraman S (2016) Analysis of various machine learning algorithms for enhanced opinion mining using twitter data streams. In: International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE) 2016, pp 265–270
Tomar R, Prateek M, Sastry HG (2017) A novel approach to multicast in VANET Using MQTT. Ada User Journal 38(4):231–235
Tomar R, Tiwari R (2019) Information delivery system for early forest fire detection using Internet of Things. In: International conference on advances in computing and data sciences. Springer, Singapore, pp 477–86.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Srivastava, A.V., Lohani, B.P., Kushwaha, P.K., Tyagi, S. (2021). Dual-Layer Security and Access System to Prevent the Spread of COVID-19. In: Prateek, M., Singh, T.P., Choudhury, T., Pandey, H.M., Gia Nhu, N. (eds) Proceedings of International Conference on Machine Intelligence and Data Science Applications. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-33-4087-9_28
Download citation
DOI: https://doi.org/10.1007/978-981-33-4087-9_28
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4086-2
Online ISBN: 978-981-33-4087-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)