Internet of Things (IoT)-Based System for Classroom Access Control and Resource Management

被引:3
作者
Guerrero-Ulloa, Gleiston [1 ,2 ]
Villafuerte-Solorzano, Jonathan [1 ]
Yanez, Michael [1 ]
Hornos, Miguel J. [2 ]
Rodriguez-Dominguez, Carlos [2 ]
机构
[1] State Tech Univ Quevedo, Quevedo 120301, Ecuador
[2] Univ Granada, Granada 18071, Spain
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING & AMBIENT INTELLIGENCE (UCAMI 2022) | 2023年 / 594卷
关键词
Internet of Things; Development methodology; Access control; Facial recognition; Fingerprint authentication; Classroom resource management;
D O I
10.1007/978-3-031-21333-5_61
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) is transforming our society and even the way people interact with their environment. In an IoT-based system (IoTS), the identification, authentication and authorization of people and objects is especially important to be able to avoid privacy and security issues. This paper presents an IoTS to control access to classrooms and to efficiently manage their resources (lights and electric/electronic devices). Since the professor scheduled to teach a lesson at a given moment is the only authorized person to open the classroom door, this IoTS identifies that professor through facial recognition, considering a pre-established classroom schedule. In addition, RFID or fingerprint authentication are used to register the attendance of students to each lesson. To develop this IoTS, TDDM4IoTS (Test-Driven Development Methodology for IoT-based Systems) was used. This methodology encourages user engagement during the IoTS development. In fact, professors were involved from the very beginning, especially to improve the design of the mobile application interfaces, finally achieving 100% acceptance by them.
引用
收藏
页码:604 / 615
页数:12
相关论文
共 15 条
[1]  
[Anonymous], VISUAL PARADIGM 1 DE
[2]  
Ashton K., 2009, RFID J, V22, P97
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]   A Two-Stage Feature Transformation-Based Fingerprint Authentication System for Privacy Protection in IoT [J].
Bedari, Aseel ;
Wang, Song ;
Yang, Jucheng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) :2745-2752
[5]  
Chan May O.A., 2016, PIST ED, V38, P100
[6]   Are IoBT services accessible to everyone? [J].
Francese, Rita ;
Frasca, Maria ;
Risi, Michele .
PATTERN RECOGNITION LETTERS, 2021, 147 :71-77
[7]   BioSec: A Biometric Authentication Framework for Secure and Private Communication Among Edge Devices in IoT and Industry 4.0 [J].
Golec, Muhammed ;
Gill, Sukhpal Singh ;
Bahsoon, Rami ;
Rana, Omer .
IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (02) :51-56
[8]   IoT-Based Smart Medicine Dispenser to Control and Supervise Medication Intake [J].
Guerrero-Ulloa, Gleiston ;
Hornos, Miguel J. ;
RodrigueZ-Dominguez, Carlos ;
Mercedes Fernandez-Coello, Ma .
INTELLIGENT ENVIRONMENTS 2020, 2020, 28 :39-48
[9]   TDDM4IoTS: A Test-Driven Development Methodology for Internet of Things (IoT)-Based Systems [J].
Guerrero-Ulloa, Gleiston ;
Hornos, Miguel J. ;
Rodriguez-Dominguez, Carlos .
APPLIED TECHNOLOGIES (ICAT 2019), PT I, 2020, 1193 :41-55
[10]   IoT-Based System to Help Care for Dependent Elderly [J].
Guerrero-Ulloa, Gleiston ;
Rodriguez-Dominguez, Carlos ;
Hornos, Miguel J. .
TECHNOLOGY TRENDS, 2019, 895 :41-55