Biometric security management based on Internet of Things

被引:0
|
作者
Sesha Vidhya S. [1 ]
Shanthi K.G. [1 ]
Keerthana S. [1 ]
Nisha P. [1 ]
Monisha H. [1 ]
Nandhini Devi G. [1 ]
机构
[1] Department of Electronics and Communication Engineering, RMK College of Engineering and Technology, Tamilnadu, Chennai
来源
关键词
Anonymization; Authentication; Examination; Impersonation; Internet of Things (IoT); Security;
D O I
10.1016/j.matpr.2021.07.198
中图分类号
学科分类号
摘要
The Secured exams are one of the foremost troublesome challenges in impersonation Judgment. For any Educational Institution, conducting an online authenticated examination is a major task due to its diverse security components. The main objective of our paper is to provide maximum security and to avoid the malpractice due to impersonation which are happening during the conduct of the examinations. The main objective of our paper is to provide maximum security and to avoid the impersonation and it is related to malpractices which are happening during the conduct of the examinations. The methodology we have adapted deals with the automation process of all the manual verification processes which are done. This is done by the combination of IoT and Image Processing technology. The verification of image and fingerprint confirms the authenticity of the person. The final result is displayed in the IoT database which reduces man power and time consumption. This paper has proposed a technique which eliminates all the errors and illegal activities which happen at the initial stage of the examination process. This technique has proved to provide a better security rather than the manual checkup process. © 2021
引用
收藏
页码:3204 / 3207
页数:3
相关论文
共 50 条
  • [41] Design of Internet of Things Information Security Based on Blockchain
    Zhang, Jiasheng
    Li, Zetao
    2020 3RD WORLD CONFERENCE ON MECHANICAL ENGINEERING AND INTELLIGENT MANUFACTURING (WCMEIM 2020), 2020, : 114 - 117
  • [42] A Security Routing Protocol for Internet of Things Based on RPL
    Ma, Guojun
    Li, Xing
    Pei, Qingqi
    Li, Zi
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 209 - 213
  • [43] AES and MQTT based security system in the internet of things
    Ahamed, Jameel
    Zahid, Md
    Omar, Mohd
    Ahmad, Khaleel
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (08): : 1589 - 1598
  • [44] Security algorithm of Internet of Things based on ZigBee protocol
    Yongkang Wang
    Chunxia Chen
    Qijie Jiang
    Cluster Computing, 2019, 22 : 14759 - 14766
  • [45] Security of internet of things based on cryptographic algorithms: a survey
    Seyyed Keyvan Mousavi
    Ali Ghaffari
    Sina Besharat
    Hamed Afshari
    Wireless Networks, 2021, 27 : 1515 - 1555
  • [46] Layer and RFID Based Security Issues of Internet of Things
    Singh, Navdeep
    Hans, Abhinav
    Kaur, Sukhdeep
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (10): : 301 - 310
  • [47] Fog-Based Internet of Things: A Security Scheme
    Alhazmi, Omar H.
    Aloufi, Khalid S.
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [48] AN IBE-BASED SECURITY SCHEME ON INTERNET OF THINGS
    Chen, Wang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1046 - 1049
  • [49] Security Technology of Smart Home Based on Internet of Things
    Xu, Zhi-fang
    Zhu, Xun
    Gui, Lin
    INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2013), 2013, : 536 - 540
  • [50] Security Challenges in the IP-based Internet of Things
    Tobias Heer
    Oscar Garcia-Morchon
    René Hummen
    Sye Loong Keoh
    Sandeep S. Kumar
    Klaus Wehrle
    Wireless Personal Communications, 2011, 61 : 527 - 542