DeepRL-ID: Scalable End-to-End Deep Reinforcement Learning for Dynamic Real-Time Identity Validation

Authors

  • Suman Kumar Sanjeev Prasanna, Lauren VanTalia

Keywords:

Deep Reinforcement Learning, Identity Validation, Multimodal Biometrics, Real-Time Authentication, Recognition Rate, Robustness, Scalability

Abstract

Real-time identity verification in high-throughput digital ecosystems demands adaptive, sequential decision-making under uncertainty. Traditional rule-based or static supervised models often fail to generalize under evolving user behaviors or adversarial strategies. This research introduces DeepRL-ID, a scalable end-to-end deep reinforcement learning framework for dynamic real-time identity validation. The framework formulates the verification process as a Markov Decision Process (MDP), where an autonomous agent optimizes authentication policies by integrating multi-modal identity signals, including biometric embeddings, behavioral telemetry, and transactional metadata. The architecture employs Deep Q-Networks (DQN) with prioritized experience replay, hierarchical action abstraction, and distributed experience sharing to navigate high-dimensional state spaces efficiently. DeepRL-ID proactively adapts to sequential and evolving adversarial threats, learning to flag suspicious patterns before breaches occur. Empirical evaluation on large-scale identity datasets demonstrates substantial improvements in verification accuracy, latency, and system throughput compared to conventional static and supervised baselines, while maintaining robust generalization to previously unseen identity patterns. These results establish deep reinforcement learning as a practical, adaptive, and scalable methodology for operational identity validation in complex and adversarial digital ecosystems.

Downloads

Download data is not yet available.

References

Batool, S., S. A. Gill, S. Javaid, and A. J. Khan, “Good governance via e-governance: Moving towards digitalization for a digital economy,” Review of Applied Management and Social Sciences, vol. 4, no. 4, pp. 823–836, 2021.

Papernot, N., et al., “Adversarial examples in machine learning,” in Proc. IEEE European Symp. Security and Privacy, 2017.

Das, R., Adopting Biometric Technology: Challenges and Solutions. London, U.K.: Routledge, 2017.

Kumar, S., and S. Prasanna, “Heterogeneous ensemble learning for robust adversarial pattern recognition in digital ecosystems,” Journal of Computational Analysis and Applications, vol. 27, no. 5, pp. 18–28, 2019.

Hamidi, H., “An approach to develop smart health using Internet of Things and authentication based on biometric technology,” Future Generation Computer Systems, vol. 91, pp. 434–449, 2019.

Kumar, S., S. Prasanna, and X. Ruan, “A unified hybrid machine learning architecture for robust identity anomaly detection in large-scale digital ecosystems,” Journal of Electrical Systems, vol. 14, no. 1, pp. 160–173, 2018.

Bock, L., Identity Management with Biometrics: Explore the Latest Innovative Solutions to Provide Secure Identification and Authentication. Birmingham, U.K.: Packt Publishing, 2020.

S. K. S. Prasanna, “GeoDNN: Geometry-aware deep neural networks for cross-domain fingerprint spoof detection,” Int. J. Intell. Syst. Appl. Eng., vol. 6, no. 1, pp. 97–107, Mar. 2018.

Ciolacu, M., A. F. Tehrani, L. Binder, and P. M. Svasta, “Education 4.0—Artificial intelligence assisted higher education: Early recognition system with machine learning to support students' success,” in Proc. IEEE 24th Int. Symp. Design and Technology in Electronic Packaging (SIITME), Oct. 2018, pp. 23–30.

Sundararajan, K., and D. L. Woodard, “Deep learning for biometrics: A survey,” ACM Computing Surveys, vol. 51, no. 3, pp. 1–34, 2018.

Zhang, X., L. Yao, C. Huang, T. Gu, Z. Yang, and Y. Liu, “DeepKey: An EEG and gait based dual-authentication system,” arXiv preprint arXiv:1706.01606, 2017.

Zou, Q., Y. Wang, Q. Wang, Y. Zhao, and Q. Li, “Deep learning-based gait recognition using smartphones in the wild,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3197–3212, 2020.

Mehraj, H., and A. H. Mir, “A survey of biometric recognition using deep learning,” EAI Endorsed Trans. Energy Web, vol. 8, no. 33, 2021.

Dos Santos, C. F. G., et al., “Gait recognition based on deep learning: A survey,” ACM Computing Surveys, vol. 55, no. 2, pp. 1–34, 2022.

Mekruksavanich, S., and A. Jitpattanakul, “Deep learning approaches for continuous authentication based on activity patterns using mobile sensing,” Sensors, vol. 21, no. 22, p. 7519, 2021.

López, A. B., “Deep learning in biometrics: A survey,” ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, vol. 8, no. 4, p. 19, 2019.

Wang, M., and W. Deng, “Deep face recognition: A survey,” Neurocomputing, vol. 429, pp. 215–244, 2021.

Ashfahani, A., and M. Pratama, “Autonomous deep learning: Continual learning approach for dynamic environments,” in Proc. SIAM Int. Conf. Data Mining, May 2019, pp. 666–674.

S. K. S. Prasanna, “DeepSynth: A robust multi-layer neural detection of coordinated latent anomalies in high-dimensional identity systems,” Int. J. Intell. Syst. Appl. Eng., vol. 7, no. 1, pp. 66–77, Mar. 2019.

Downloads

Published

01.07.2023

How to Cite

Suman Kumar Sanjeev Prasanna. (2023). DeepRL-ID: Scalable End-to-End Deep Reinforcement Learning for Dynamic Real-Time Identity Validation . International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 766–774. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/8157

Most read articles by the same author(s)