Biometric security management based on Internet of Things

被引:0
|
作者
Sesha Vidhya S. [1 ]
Shanthi K.G. [1 ]
Keerthana S. [1 ]
Nisha P. [1 ]
Monisha H. [1 ]
Nandhini Devi G. [1 ]
机构
[1] Department of Electronics and Communication Engineering, RMK College of Engineering and Technology, Tamilnadu, Chennai
来源
关键词
Anonymization; Authentication; Examination; Impersonation; Internet of Things (IoT); Security;
D O I
10.1016/j.matpr.2021.07.198
中图分类号
学科分类号
摘要
The Secured exams are one of the foremost troublesome challenges in impersonation Judgment. For any Educational Institution, conducting an online authenticated examination is a major task due to its diverse security components. The main objective of our paper is to provide maximum security and to avoid the malpractice due to impersonation which are happening during the conduct of the examinations. The main objective of our paper is to provide maximum security and to avoid the impersonation and it is related to malpractices which are happening during the conduct of the examinations. The methodology we have adapted deals with the automation process of all the manual verification processes which are done. This is done by the combination of IoT and Image Processing technology. The verification of image and fingerprint confirms the authenticity of the person. The final result is displayed in the IoT database which reduces man power and time consumption. This paper has proposed a technique which eliminates all the errors and illegal activities which happen at the initial stage of the examination process. This technique has proved to provide a better security rather than the manual checkup process. © 2021
引用
收藏
页码:3204 / 3207
页数:3
相关论文
共 50 条
  • [21] Internet of things security
    Baskaran S.B.M.
    Journal of ICT Standardization, 2019, 7 (01): : 21 - 39
  • [22] Information Security Monitoring and Management Method Based on Big Data in the Internet of Things Environment
    Liang, Wuchao
    Li, Wenning
    Feng, Lili
    IEEE ACCESS, 2021, 9 : 39798 - 39812
  • [23] Based on the Role of Internet of Things Security in the Management of Enterprise Human Resource Information Leakage
    Zeng, Zhen
    Zhang, Jiajia
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [24] MONITORING OF MARINE ECOLOGICAL ENVIRONMENTAL DATA SECURITY AND MANAGEMENT SYSTEM BASED ON INTERNET OF THINGS
    Liu, Leian
    Zou, Ying
    ENVIRONMENTAL ENGINEERING AND MANAGEMENT JOURNAL, 2022, 21 (02): : 225 - 236
  • [25] Biometric Identification System based on Object Interactions in Internet of Things Environments
    Krawiecka, Klaudia
    Birnbach, Simon
    Eberz, Simon
    Martinovic, Ivan
    2022 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2022), 2022, : 215 - 221
  • [26] Laboratory Management of the Internet based on the Technology of Internet of Things
    Jia, Chunxia
    PROCEEDINGS OF THE AASRI INTERNATIONAL CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (IEA 2015), 2015, 2 : 345 - 347
  • [27] Lightweight Bio-Chaos Crypt to Enhance the Security of Biometric Images in Internet of Things Applications
    Sujarani, Rajendran
    Manivannan, Doraipandian
    Manikandan, Ramachandran
    Vidhyacharan, Bhaskar
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 119 (03) : 2517 - 2537
  • [28] Security, privacy and trust management in the internet of things era - SePriT
    Sicari, Sabrina
    Hailes, Stephen
    Turgut, Damla
    Sharafeddine, Sanaa
    Desai, Uday B.
    AD HOC NETWORKS, 2013, 11 (08) : 2623 - 2624
  • [29] IoTBlockSIEM for information security incident management in the internet of things ecosystem
    Natalia Miloslavskaya
    Alexander Tolstoy
    Cluster Computing, 2020, 23 : 1911 - 1925
  • [30] Lightweight Bio-Chaos Crypt to Enhance the Security of Biometric Images in Internet of Things Applications
    Rajendran Sujarani
    Doraipandian Manivannan
    Ramachandran Manikandan
    Bhaskar Vidhyacharan
    Wireless Personal Communications, 2021, 119 : 2517 - 2537