Browse > Article
http://dx.doi.org/10.9723/jksiis.2017.22.6.031

IoT based Authentication System Implementation on Raspberry Pi  

Kim, Jeong Won (신라대학교 컴퓨터소프트웨어공학부)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.22, no.6, 2017 , pp. 31-38 More about this Journal
Abstract
With the Development of Information Technology, Security is becoming very Important. Existing Security Systems are Mostly Expensive and Not Easy to Implement, and are Also very Complex when using Biometric Information. In this paper, We try to solve this Problem by Implementing a Low cost Internet based Security Terminal Using Fingerprint and Face Image. To Implement a Low-cost Security System, a Fingerprint Scanner and a Camera are installed in Raspberry pi, and the Scanned Image is encrypted with the AES-256 Algorithm and Transmitted to Cloud. Through This Study, We confirmed the Possibility of the Proposed System in view of Authentication, Cost Reduction, Security and Scalability.
Keywords
IoT; Authentication; Finger print; Raspberry Pi;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 http://biometrics.gov/Documents/Glossary.pdf, National Science and Technology Council's (NSTC) Subcommittee on Biometrics, Biometrics Glossary, 2006.
2 Lee, S. H., Kim. J. Y., and Kim, S. Y., “Implementation of Indoor Environment Monitoring and Automatic Control System based on Internet of Things,” Journal of the Korea Industrial Information Systems Research, Vol. 21, No. 6, pp. 71-80, 2016.   DOI
3 Park, J. S., Hong, S. G., and Kim, N. R., “A Development Plan for Co-creation-based Smart City through the Trend Analysis of Internet of Things,” Journal of the Korea Industrial Information Systems Research, Vol. 21, No. 4, pp. 67-78, 2016.   DOI
4 Choi, Y. H., and Kim, Y. R., “Research Regard to Necessity of Smart Water Management Based on IoT Technology,” Journal of the Korea Industrial Information Systems Research, Vol. 22, No. 4, pp. 11-18, 2017.   DOI
5 Sasse M. A., Brostoff S., and Weirich D., “Transforming the weakest links human/computer interaction approach to usable and effective security,” BT technology, Journal, Vol. 19, No. 3, pp. 122-131, 2001.   DOI
6 Yan, A. F., Blackwell, R. J., Anderson, and Grant A., “Password memorability and security: Empirical results,” IEEE Security & privacy, Vol. 2, No. 5, pp. 25-31, 2004.   DOI
7 Dhannawat R., Sarode T., and Kekre H. B., "Kekre's Hybrid Wavelet Transform Technique with DCT, Walsh, Hartley And Kekre Transforms for Image Fusion," IJCET, Vol. 4, Issue 1, pp. 195-202, January-February 2013.
8 Senthilkumar G., Gopalakrishnan K., Kumar V.S., "Embedded Image Capturing System Using Raspberry Pi System," International Journal of Emerging Trends & Technology in Computer Science, Vol. 3, issue 2, pp. 213-215, April 2014.
9 Sivaranjani S., and Sumathi S., "Implementation of Fingerprint and Newborn Footprint Feature Extraction on Raspberry Pi," IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems ICIIECS, pp. 328-336, 2015.
10 Shah, D. K., Bharadi, V .A., Kaul, V. J., and Amrutia, S., "End-to-End Encryption Based Biometric SaaS: Using Raspberry Pi as a Remote Authentication Node," IEEE sponsored 1st International Conference on Computing, Communication, Contro,l and Automation (ICCUBEA), pp. 52-59, 2015.
11 Bharadi V. A. and DSilva, G. M., "Online Signature Recognition Using Software as a Service (SaaS) Model on Public Cloud," International Conference on Computing, Communication, Control and Automation, pp. 65-72, 2015.
12 Debnath B., Rahul R., Farkhod A., and ChoiM., “Biometric Authentication: A Review,” International Journal of e-Service, Science and Technology, Vol. 2, No. 3, pp. 13-27, September, 2009.
13 Anil K. J., Karthik N., and Abhishek N., "Biometric Template Security," Journal on Advances in Signal Processing Volume, Article ID 579416, 2008.