Fig. 1. Proposed system model
Fig. 2. User registration flow
Fig. 3. User Identification, password registration flow
Fig. 4. User face registration flow
Fig. 5. RFID tag registration flow
Fig. 6. Smartphone registration flow
Fig. 7. Possession based authentication method
Fig. 8. Proposed system
Fig. 9. User authentication using Identification, password
Fig. 10. User authentication using RFID
Fig. 11. User authentication using OTP
Fig. 12. User authentication using face
Table 1. Raspberry Pi 3 B+ specifications
Table 2. Proposed system specifications
Table 3. Authentication System Comparison
Table 4. Authentication System Comparison
References
- J. W. Jung, J. D. Kim, M. G. Song & C. G. Jin. (2015). A study on Development of Certification Schemes for Cloud Security, The Journal of digital policy & management, 13(8), 43-49. DOI: 10.14400/JDC.2015.13.8.43
- S. H. Hong. (2012). New Authentication Methods based on User's Behavior Big Data Analysis on Cloud, Journal of Convergence for Information Technology, 2(2), 35-41. DOI: 10.22156/CS4SMB.2016.6.4.031
- M. K. Choi, T. C. Kwan & D. H. Lee. (2013). Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone, Journal of The Korea Institute of Information Security and Cryptology, 23(1), 19-32. DOI: 10.13089/jkiisc.2013.23.1.019
- S. J. Kim. (2010). Information Security Plan on Cloud Computing - Information Security Management System, Korean Review of Management Consulting, 1(2), 194- 208.
- H. T. Chae & S. J. Lee. (2014). Security Policy Proposals through PC Security Solution Log Analysis - Prevention Leakage of Personal Information, Journal of the Korea Institute of Information Security & Cryptology, 24(5), 961-968. DOI: 10.13089/jkiisc.2014.24.5.961
- D. R. Kim. (2015). A Study on the OTP Generation Algorithm for User Authentication, The Journal of digital policy & management, 13(1), 283-288. DOI: 10.14400/JDC.2015.13.1.283
- S. H. Lee. (2014). User Authentication Using Biometrics and OTP in Mobile Device, Journal of Convergence for Information Technology, 4(3), 85-90.
- T. K. Lee, Y. H. Kim & E. G. Im. (2017). Biometric User Authentication Method of Mobile Appilication in Trustable Space, Journal of The Korea Institute of Information Security and Cryptology, 27(2), 201-212. DOI: 10.13089/jkiisc.2017.27.2.201
- J. S. Kim, S. J. Lee, B. S. Kim & S. W. Lee. (2015). Standardization trend of non-face authentication technology based on telebio recognition, Journal of The Korea Institute of Information Security and Cryptology, 25(4), 43-50.
- Y. J. Lee, Y. E. Ku & T. K. Kwon. (2019). A Study of User Perception on Features Used in Behavior-Based Authentication, Journal of the Korea Institute of Information Security & Cryptology, 29(1), 127-137. https://doi.org/10.13089/JKIISC.2019.29.1.127
- Raspberry Pi Foundation. (2019). Raspberry Pi. Raspberry Pi [Online]. https://www.raspberrypi.org
- Y. J. Shin. (2017). A Study on the Personal Information Protection for Improvement of Personal Identification - Focusing on the Alternative Means of Resident Number for Users, Journal of Korean Associastion for Regional Information Society, 20(2), 1-24.
- S. H. Yun. (2016). The Biometric Authentication based Dynamic Group Signature Scheme, Journal of the Korea Convergence Society, 7(1), 49-55. DOI: 10.15207/jkcs.2016.7.1.049
- M. G. Lee, Do. W. Kim & J. S. Shon. (2012). Active Authentication Method using NFC, The Journal of Korean Institute of Communications and Information Sciences, 37(2), 140-156. https://doi.org/10.7840/KICS.2012.37C.2.140
- C. O. Kang, J. J. Won, S. J. Park & J. C. Ryou. (2013). Efficient File System Level Encryption Mechanism Using HSM, Journal of the Korea Institute of Information Security and Cryptology, 23(5), 849-858. DOI: 10.13089/jkiisc.2013.23.5.849
- S. Balaban. (2015). Deep learning and face recognition: the state of the art, Biometric and Surveillance Technology for Human and Activity Identification XII, 1-9 DOI: 10.1117/12.2181526