라즈베리파이에서 사물인터넷 기반의 인증 시스템 구현

IoT based Authentication System Implementation on Raspberry Pi

  • 김정원 (신라대학교 컴퓨터소프트웨어공학부)
  • 투고 : 2017.10.14
  • 심사 : 2017.11.23
  • 발행 : 2017.12.31


정보기술의 발전에 따라 보안의 중요성은 매우 높아지고 있다. 기존의 보안 시스템은 대부분 고가이고 구현이 용이하지 않으며 생체 정보를 사용하는 경우 또한 매우 복잡하다. 본 논문에서는 지문과 얼굴 이미지를 사용하는 저가의 사물인터넷 기반 보안 단말기를 구현하여 이러한 점을 해결하고자 한다. 저가의 보안 시스템을 구현하기 위하여 라즈베리파이에 지문인식 스캐너와 카메라를 장착하고 스캔 이미지는 AES-256 알고리즘으로 암호화하여 클라우드에 전송한다. 본 연구를 통해 우리는 제안하는 시스템의 인증 서비스, 비용의 감소, 보안성, 그리고 확장성 측면에서의 가능성을 확인할 수 있었다.

With the Development of Information Technology, Security is becoming very Important. Existing Security Systems are Mostly Expensive and Not Easy to Implement, and are Also very Complex when using Biometric Information. In this paper, We try to solve this Problem by Implementing a Low cost Internet based Security Terminal Using Fingerprint and Face Image. To Implement a Low-cost Security System, a Fingerprint Scanner and a Camera are installed in Raspberry pi, and the Scanned Image is encrypted with the AES-256 Algorithm and Transmitted to Cloud. Through This Study, We confirmed the Possibility of the Proposed System in view of Authentication, Cost Reduction, Security and Scalability.



  1. Anil K. J., Karthik N., and Abhishek N., "Biometric Template Security," Journal on Advances in Signal Processing Volume, Article ID 579416, 2008.
  2. Debnath B., Rahul R., Farkhod A., and ChoiM., “Biometric Authentication: A Review,” International Journal of e-Service, Science and Technology, Vol. 2, No. 3, pp. 13-27, September, 2009.
  3., National Science and Technology Council's (NSTC) Subcommittee on Biometrics, Biometrics Glossary, 2006.
  4. Lee, S. H., Kim. J. Y., and Kim, S. Y., “Implementation of Indoor Environment Monitoring and Automatic Control System based on Internet of Things,” Journal of the Korea Industrial Information Systems Research, Vol. 21, No. 6, pp. 71-80, 2016.
  5. Park, J. S., Hong, S. G., and Kim, N. R., “A Development Plan for Co-creation-based Smart City through the Trend Analysis of Internet of Things,” Journal of the Korea Industrial Information Systems Research, Vol. 21, No. 4, pp. 67-78, 2016.
  6. Choi, Y. H., and Kim, Y. R., “Research Regard to Necessity of Smart Water Management Based on IoT Technology,” Journal of the Korea Industrial Information Systems Research, Vol. 22, No. 4, pp. 11-18, 2017.
  7. Sasse M. A., Brostoff S., and Weirich D., “Transforming the weakest links human/computer interaction approach to usable and effective security,” BT technology, Journal, Vol. 19, No. 3, pp. 122-131, 2001.
  8. Yan, A. F., Blackwell, R. J., Anderson, and Grant A., “Password memorability and security: Empirical results,” IEEE Security & privacy, Vol. 2, No. 5, pp. 25-31, 2004.
  9. Dhannawat R., Sarode T., and Kekre H. B., "Kekre's Hybrid Wavelet Transform Technique with DCT, Walsh, Hartley And Kekre Transforms for Image Fusion," IJCET, Vol. 4, Issue 1, pp. 195-202, January-February 2013.
  10. Senthilkumar G., Gopalakrishnan K., Kumar V.S., "Embedded Image Capturing System Using Raspberry Pi System," International Journal of Emerging Trends & Technology in Computer Science, Vol. 3, issue 2, pp. 213-215, April 2014.
  11. Sivaranjani S., and Sumathi S., "Implementation of Fingerprint and Newborn Footprint Feature Extraction on Raspberry Pi," IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems ICIIECS, pp. 328-336, 2015.
  12. Shah, D. K., Bharadi, V .A., Kaul, V. J., and Amrutia, S., "End-to-End Encryption Based Biometric SaaS: Using Raspberry Pi as a Remote Authentication Node," IEEE sponsored 1st International Conference on Computing, Communication, Contro,l and Automation (ICCUBEA), pp. 52-59, 2015.
  13. Bharadi V. A. and DSilva, G. M., "Online Signature Recognition Using Software as a Service (SaaS) Model on Public Cloud," International Conference on Computing, Communication, Control and Automation, pp. 65-72, 2015.