Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies

Full Text (PDF, 708KB), PP.64-69

Views: 0 Downloads: 0

Author(s)

Fredrick R. Ishengoma 1,*

1. The University of Dodoma, College of Informatics and Virtual Education, Dodoma, Tanzania

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2014.06.08

Received: 4 Sep. 2014 / Revised: 1 Oct. 2014 / Accepted: 6 Nov. 2014 / Published: 8 Dec. 2014

Index Terms

ARM7TDMI-S, Authentication, Fingerprint Recognition Technology, Iris Recognition Technology and Smart Homes

Abstract

With the rapid advancement in technology, smart homes have become applicable and so the need arise to solve the security challenges that are accompanied with its operation. Passwords and identity cards have been used as traditional authentication mechanisms in home environments, however, the rise of misuse of these mechanisms are proving them to be less reliable. For instance, ID cards can be misplaced, copied or counterfeited and being misused. Conversely, studies have shown that biometrics authentication systems particularly Iris Recognition Technology (IRT) and Fingerprint Recognition Technology (FRT) have the most reliable mechanisms to date providing tremendous accuracy and speed. As the technology becomes less expensive, application of IRT& FRT in smart-homes becomes more reliable and appropriate solution for security challenges. In this paper, we present our approach to design an authentication system for smart homes based on IRT, FRT and ARM7TDMI-S.The system employs two biometrics mechanisms for high reliability whereby initially, system users must enroll their fingerprints and eyes into the camera. Iris and fingerprint biometrics are scanned and the images are stored in the database. In the stage of authentication, FRT and IRT fingerprint scan and analyze points of the user's current input iris and fingerprint and match with the database contents. If one or more captured images do not match with the one in the database, then the system will not give authorization.

Cite This Paper

Fredrick R. Ishengoma, "Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies", International Journal of Information Engineering and Electronic Business(IJIEEB), vol.6, no.6, pp.64-69, 2014. DOI:10.5815/ijieeb.2014.06.08

Reference

[1]D. Bregman. Smart Home Intelligence – The eHome that Learns [J]. International Journal of Smart Home, Vol.4, No.4, 2010.

[2]J. Travis. LabVIEW for Everyone: Graphical Programming Made Easy and Fun [M]. Third Edition. Prentice Hall Professional, 2007.

[3]D. Zhang. Biometrics Technologies and Applications [C]. Proc. of International Conference on Image and Graphics, pp.42-49, Tianjing, China, 2000.

[4]Lawton. Biometrics: A New Era in Security [J]. IEEE Computer, pp.16-18, 1998.

[5]S.V. Sheela and P.A Vijaya. Iris Recognition Methods – Survey [J]. International Journal of Computer Applications, Vol. 3, No.5. pp. 19 -25, June 2010.

[6]M. Subra and S. Vanithaasri. A Study on Authenticated Admittance of ATM Clients using Biometric based Cryptosystem [J]. International Journal of Advances in Engineering & Technology, Vol.4 Issue 2, Sep 2012.

[7]Aru, OkerekeEze, IhekweabaGozie. Facial Verification Technology for Use In ATM Transactions [J]. American Journal of Engineering Research (AJER), Volume-02, Issue-05, pp-188-193, 2013.

[8]Moses OkechukwuOnyesolu, Ignatus Majesty Ezeani. ATM Security using Fingerprint Biometric Identifier: An Investigative Study [J]. International Journal of Advanced Computer Science and Applications, Vol. 3, No. 4, 2012.

[9]A.M. Lawan. Use of Biometrics to Tackle ATM Fraud [C]. International Conference on Business and Economics Research vol.1, IACSIT Press, Kuala Lumpur, Malaysia, 2011.

[10]M. Prithika, P.Rajalakshmi. Credit Card Duplication and Crime Prevention Using Biometrics [J]. IOSR Journal of Computer Engineering (IOSR-JCE), Volume 10, Issue 1, 2013.

[11]T. Rajyalakshmi, K.Koteswararao, K.Anuradha. The Design and Implementation of ID Authentication System Based on Fingerprint and Iris Identification [J]. International Journal of Professional Engineering Studies, Volume I-Issue 2, 2013.

[12]Vijay Srinivasan, John Stankovic, Kamin Whitehouse. Using Height Sensors for Biometric Identification in Multi-resident Homes [C]. Pervasive Computing, 8th International Conference, Pervasive 2010, pp. 337-354, Helsinki, Finland, 2010.

[13]A.P.N Fahmi. Hey Home, Open Your Door, I'm Back! Authentication System using Ear Biometrics for Smart Home [J]. International Journal of Smart Home, Vol. 7, No. 1, 2013.

[14]Basma M. Mohammad El-Basioni, Sherie M. Abd El-Kader, and Mahmoud Abdelmonim. Smart Home Design using Wireless Sensor Network and Biometric Technologies [J]. International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 3, March 2013.

[15]Ruben Vera Rodrigues, Richard P. Lewis, John S.D. Mason and Nicholas W.D. Evans. Footstep Recognition for a Smart Home Environment [J]. International Journal of Smart Home. Volume 2, No. 2April, 2008.