Professional Documents
Culture Documents
175-june2019
175-june2019
net/publication/333994323
CITATIONS READS
0 3,734
3 authors:
SEE PROFILE
All content following this page was uploaded by Mohd Abdul Muqeet on 25 June 2019.
1
Mohd. Abdul Muqeet, 2Fabia Akbar, 3Syed Habeebullah Hussaini
1, 2 ,3
Muffakham Jah College of Engineering and Technology, Hyderabad, India.
1
ab.muqeet2013@gmail.com, 2fabia.akbar@mjcollege.ac.in,
3
habeeb3257@gmail.com
Abstract
The ongoing progress in the field of Internet of Things (IoT) permits to embed security
system as a part of it. In order to deal with security, authentication of legit users and in
turn warning of unauthorized person plays an essential task. This article proposes to
design an intelligent entrance control system based on biometric train in terms of
fingerprint which also incorporates IoT functionality for indication of illegitimate users.
The proposed system utilizes fingerprint module for authentication procedure and uses
electromechanical relay switch to control rotating door locking system for door entrance
using Raspberry PI 3 processor. The system is also incorporated with a web camera-
based image capturing technique when any unauthorized fingerprint is detected and
simultaneously alerts the authorized user through an email using the IoT based Wi-Fi
connectivity using Raspberry PI 3.
1. Introduction
In recent competitive world, security is an enormous apprehension and personnel are
persistently looking for trustworthy modes to make certain the security of their material as
well as logical assets. Therefore, a variety of sensors, small embedded systems and home
appliances have been implemented and designed continuously through numerous
companies, universities and research institutions [1], [2], [3]. One safe way presented by
more modern systems use a password or PIN as an authenticating means where the PIN of
the legit users is stored for validation which provides substantial safety. But this structure
also has shortcoming as illicit users can hack passwords by incessantly trying all feasible
permutation using various contemporary software methods. The newest form of home
access control systems deals with biometric trait such as fingerprints and faces [14]. They
have not only overcome the problems of previous security systems in remembering the
PIN but also provide a very high level of security. The fingerprints are, one of the oldest
and most universally used biometric traits [4] which are applied in our research.
The skin on our fingers reveals a flow like a pattern known as friction ridges. The
patterns of these ridges on each finger are inimitable and unassailable which formulate
fingerprint a distinctive form of identification for each individual. The Raspberry PI 3
Model B is a third generation embedded system that maintains the same popular board
format of the personal computer with low cost and lesser size embedded devices. It does
not comprise an integrated hard-disk or but uses a SD card for booting and continual
storage. The foundation of Raspberry PI provides Debian and Arch Linux ARM
distributions for download [3]. Researchers have been going on to develop systems
utilizing a combination of biometrics and low cost embedded systems with IoT capability
such as Raspberry PI 3.
The Internet of Things (IoT) is the set of connections of physical items or "things"
embedded with electronics, software, sensors and their hook up to internet to enable it to
achieve services by exchanging data with the manufacturer, operator or other connected
devices around the globe. The ‘thing’ in IoT could be a individual with a ECG based heart
monitor or an home with sensors and actuators installed, i.e. things that have been
allocated an IP address and have the potential to receive and transfer data over a network
without human support or involvement [2], [3]. The IoT demonstrate ability to describe
the way we secure devices and systems. It signifies the capability of equipments to collect
data and control its use. Due to its extensive benefits and implementation of various
applications IoT involves promising adaptive perception. Thus every ‘thing’ associated
with the internet, some involves controlling and some involves monitoring the parameters
from anywhere around the form the IoT applications [1], [2].
Thus motivated by the ongoing research in IoT and to provide secure access to legit
users using biometric, in this article we develop an application embedding the concept of
IoT with biometrics and implementing the algorithm in Python 3 using Raspberry PI 3.
Section 2 describes major hardware components used in our work. Section 3 elaborates
the project description in detail. Section 4 describes the experimental tests and article is
concluded in Section 5.
packages which are precompiled software. Python programming language is the scripting
programming language that is used to operate the Raspberry PI 3 [7].
Wi-Fi is basically a trademarked phrase that means IEEE 802.11x. The Wi-Fi is
very significant in our project with Raspberry PI 3 with can establish the wireless
LAN connection [9]. We need to setup the Wi-Fi by adding the network details in
the terminal window of Raspbian OS.
The following procedure illustrate different steps to setup the Wi-Fi in Raspberry
OS. To set up the Wi-Fi connection on Raspberry PI 3 the command $sudo iwlist
wlan0 scan is run in the terminal window of Raspbian OS. This command will scan
and list all the existing Wi-Fi networks with all the essential details. We will update
our home network details into this list which will make sure that network (that we
want to connect) is available or not for Raspberry PI 3. The next step is to add
network details on Raspberry PI 3 which is done by executing the command,
$ sudo nano/etc/wpa_supplicant/wpa_supplicant.conf
This will open up wpa_supplicant.conf file. In the next step, code of our
fingerprint scanning and security method is executed and the network information is
updated with the details as shown in Figure 2 (a). Our file will look something
analogous as shown in Figure 2 (a). Now the details and reboot the Raspberry PI 3 is
provided Wi-Fi internet with the help of mobile hotspot as shown in Figure 2 (b).
Algorithm:
Step 1: Firstly the Raspberry PI 3 and all hardware components are configured. (The
Raspbian OS is preinstalled in the SD Card).
Step 3. Setup the Wi-Fi on Raspberry PI 3 and execute the project.
Step 4 : In the training stage, sample fingerprints of authorized users are scanned and
saved in the train database.
Step 5: LCD displays fingerprints based Security System and waits for input sample of
fingerprint.
Step 6: Sample fingerprint of authorized user is provided to fingerprint scanner.
Step 7: The input sample fingerprint is compared with the fingerprint samples already
stored in the database of authorized users.
Step 8: For the correct match LCD displays Access Granted and rotating door is open to
allow access to the authorized user.
Step 9: If no match happens LCD displays Access Denied.
Step 10: Image of unauthorized person is taken and send to predefine email ID provided
in the Wi-Fi setup.
The flowchart of the project work is shown in Figure 5.
Turn ON the entire kit including the Raspberry PI 3 by giving the power supply
through the regulated power supply.
The internet is provided from a mobile phone using a mobile hotspot to the
Raspberry PI 3.
After connecting to Wi-Fi, we see the message “Waiting for the input” on LCD
screen i.e. the Raspberry PI 3 is waiting for a fingerprint to scan with the help of
fingerprint scanner.
With the fingerprint scanner, the user must first enrol with the administrator for
remote door access. If the user is an authorized person, the person can directly
access the door by placing the finger.
If there is no fingerprint as input, we get a message “Fingerprint not detected” as
shown in Figure 6 on the LCD screen.
It activates the DC motor with the help of the relay circuit. The DC motor
operates a rotating door which initiates door opening operation.
If an unauthorized person places the finger on the fingerprint scanner, display will
show a message of “Access denied” as shown in Figure 8.
5. Conclusions
This project work describes the design and implementation of fingerprint based smart
security system using Raspberry PI 3 and IoT. The main objective of the work is to design
a smart biometric based security system using IoT and fingerprint module. The need for
an advanced home security systems using biometrics is gradually escalating, as security
becomes a very significant issue for protecting financial and logical assets. Instead of
using personal computer as the computing machine Raspberry PI 3 is used which not only
reduces the cost of the entire security system but also provide support in connecting
different hardware component due to the provision of accessing the hardware support of
References
[1] F. Ganz, et al., “A practical evaluation of information processing and abstraction techniques for the
internet of things,” IEEE Internet of Things Journal, vol. 2, no. 4, pp. 340-354, 2015.
[2] R. Khan et al., “Future Internet: The Internet of Things architecture, possible applications and key
challenges,” Proc. 10th Int. Conf. FIT, pp. 257–260, 2012.
[3] A. Jacobsson, M. Boldt, B. Carlsson. “On the risk exposure of smart home automation systems. In
Future Internet of Things and Cloud (FiCloud)”, 2014 Intern. Conf., IEEE, 2014.
[4] J. J. Yan, A. F. Blackwell, R. J. Anderson, and A. Grant, “Biometrics in the password memorability and
security: empirical results,” IEEE Secur. & privacy, vol. 2, no. 5, pp. 25–31, 2004.
[5] Huu-Quoc Nguyen, Ton Thi Kim Loan, Bui Dinh Mao and Eui-Nam Huh, “ Low cost real time system
monitoring system using Raspberry PI,” IEEE, pp. 857-859, 2015.
[6] M.R Alam, M. B. I Reaz, M. A. M, “A Review of smart homes—Past, present, and future,” IEEE Trans.
Syst. Man Cybern. Part C (Appl. Rev.), vol. 42, pp. 1190–1203, 2012.
[7] Mussab Alaa et al., ”A Review of smart home applications based on Internet of Things,”, Journ. of
Network and Computer Applications, http://dx.doi.org/10.1016/j.jnca.2017.08.017.
[8] P. VamsiKrishna et al. “Advanced Raspberry Pi surveillance system,” IEEE conf., pp. 860-862, 2015.
[9] A. B. Thabet, N.Ben Amor, “Enhanced smart doorbell system based On face recognition,” Proc. 16th
IEEE Intern. Conf. on Sci. and Techn. of Automatic Control and Computer Engg. (STA), pp. 373 – 377,
2015.
[10] D. K. Shah, V. A Bharadi, V. J. Kaul, S. Amrutia, “End-to-End encryption based biometric SaaS:
using Raspberry Pi as a remote authentication node,” IEEE spons. 1st Intern. Conf. on Computing,
Comm., Control and Autom.(ICCUBEA), pp. 52 – 59, 2015.
[11] T. Ignatenko, F. M. J. Williams, “Biometric Systems: Privacy and Secrecy aspects,” IEEE Trans.
on Inform. Forensics and security, IEEE, vol.4, no.4, December 2009.
[12] Jiao She. K., A. Zhang, “Study on the Embedded Fingerprint Image Recognition System,” Int. Conf. of
Inform. Science and Manag. Engg, IEEE Computer Society, 2010.
[13] L. Verma, M. Fakharzadeh,, Sunghyun Choi, "Wifi on steroids: 802.11AC and 802.11A,” Wireless
Communications, IEEE, vol. 20, issue: 6, 2013.
[14] M. A. Muqeet, R. S. Holambe, “A collaborative representation face classification on separable adaptive
directional wavelet transform based completed local binary pattern features," Eng. Science and Tech., an
Intern. Journ. vol. 21, no. 4, pp. 611-624.