Sie sind auf Seite 1von 8

International Journal of Management, Technology And Engineering ISSN NO : 2249-7455

IoT Assisted Fingerprint based Security System using


Raspberry PI 3

1
Mohd. Abdul Muqeet, 2Fabia Akbar, 3Syed Habeebullah Hussaini
1, 2 ,3
Muffakham Jah College of Engineering and Technology, Hyderabad, India.
1
ab.muqeet2013@gmail.com, 2fabia.akbar@mjcollege.ac.in,
3
habeeb3257@gmail.com

Abstract
The ongoing progress in the field of Internet of Things (IoT) permits to embed security
system as a part of it. In order to deal with security, authentication of legit users and in
turn warning of unauthorized person plays an essential task. This article proposes to
design an intelligent entrance control system based on biometric train in terms of
fingerprint which also incorporates IoT functionality for indication of illegitimate users.
The proposed system utilizes fingerprint module for authentication procedure and uses
electromechanical relay switch to control rotating door locking system for door entrance
using Raspberry PI 3 processor. The system is also incorporated with a web camera-
based image capturing technique when any unauthorized fingerprint is detected and
simultaneously alerts the authorized user through an email using the IoT based Wi-Fi
connectivity using Raspberry PI 3.

Keywords: Fingerprint Module, Internet of Things (IoT), Raspberry PI 3 Processor,


Web Camera.

1. Introduction
In recent competitive world, security is an enormous apprehension and personnel are
persistently looking for trustworthy modes to make certain the security of their material as
well as logical assets. Therefore, a variety of sensors, small embedded systems and home
appliances have been implemented and designed continuously through numerous
companies, universities and research institutions [1], [2], [3]. One safe way presented by
more modern systems use a password or PIN as an authenticating means where the PIN of
the legit users is stored for validation which provides substantial safety. But this structure
also has shortcoming as illicit users can hack passwords by incessantly trying all feasible
permutation using various contemporary software methods. The newest form of home
access control systems deals with biometric trait such as fingerprints and faces [14]. They
have not only overcome the problems of previous security systems in remembering the
PIN but also provide a very high level of security. The fingerprints are, one of the oldest
and most universally used biometric traits [4] which are applied in our research.
The skin on our fingers reveals a flow like a pattern known as friction ridges. The
patterns of these ridges on each finger are inimitable and unassailable which formulate
fingerprint a distinctive form of identification for each individual. The Raspberry PI 3
Model B is a third generation embedded system that maintains the same popular board
format of the personal computer with low cost and lesser size embedded devices. It does
not comprise an integrated hard-disk or but uses a SD card for booting and continual
storage. The foundation of Raspberry PI provides Debian and Arch Linux ARM
distributions for download [3]. Researchers have been going on to develop systems
utilizing a combination of biometrics and low cost embedded systems with IoT capability
such as Raspberry PI 3.

Volume IX, Issue VI, JUNE/2019 Page No: 1515


International Journal of Management, Technology And Engineering ISSN NO : 2249-7455

The Internet of Things (IoT) is the set of connections of physical items or "things"
embedded with electronics, software, sensors and their hook up to internet to enable it to
achieve services by exchanging data with the manufacturer, operator or other connected
devices around the globe. The ‘thing’ in IoT could be a individual with a ECG based heart
monitor or an home with sensors and actuators installed, i.e. things that have been
allocated an IP address and have the potential to receive and transfer data over a network
without human support or involvement [2], [3]. The IoT demonstrate ability to describe
the way we secure devices and systems. It signifies the capability of equipments to collect
data and control its use. Due to its extensive benefits and implementation of various
applications IoT involves promising adaptive perception. Thus every ‘thing’ associated
with the internet, some involves controlling and some involves monitoring the parameters
from anywhere around the form the IoT applications [1], [2].
Thus motivated by the ongoing research in IoT and to provide secure access to legit
users using biometric, in this article we develop an application embedding the concept of
IoT with biometrics and implementing the algorithm in Python 3 using Raspberry PI 3.
Section 2 describes major hardware components used in our work. Section 3 elaborates
the project description in detail. Section 4 describes the experimental tests and article is
concluded in Section 5.

2. Hardware Component Description


All The major hardware components used in the development of this work are the
optical fingerprint scanner, web camera, and Raspberry PI 3 and door locking mechanism.
The Raspberry PI 3 fetches the input from the fingerprint module and when the
verification information are legit then the system automatically provides access to the user
by opening the rotating door using a relay switch. The system also captures the image of
the users who provides the wrong verification of fingerprint and subsequently sends an
alerting message with the face image of the unauthorized user to the authorized user with
a predefined email ID using the IoT based Wi-Fi technology. The hardware components
are described in the subsequent sections.
.
2.1. Raspberry PI 3 Board

Raspberry PI 3 board is a powerful low cost, credit-card sized mini-computer.


Raspberry PI 3 has some features we need, like database, web server, and non-volatile
storage. Furthermore, the hardware configuration of Raspberry PI 3 are not different from
a computer, so it’s more than enough to be used as a key hardware for the home security
system [4]. Figure 1 describes the pictorial representation of the Raspberry PI 3 board [5],
[6], [7].
Raspberry PI is uses the Advanced Reduced Instruction Set Computing Machine
(ARM) expertise. It is an energy efficient multi-core CPU designed as System-On-Chip
(SoC). Its power rating is 5V and 700mA. The Raspberry PI 3 B+ board with ARM11is
the newest which incorporates 512MB RAM working at 700 MHz frequency. It works on
Linux based operating systems (OS) like Raspbian, Pidora, and Raspbm. It has four USB
2.0 ports to hook up to I/O peripherals like mouse, keyboard, and Wi-Fi adapter etc.
treating it as a full sized portable pocket computer [5], [7]. It also has an Ethernet port to
connect to the network. It has in-built GPIO ports utilized for connecting various sensors
and output devices. It also incorporates a HDMI port to connect with LCD screens and
projectors. Additionally, it has an in-built PI camera interface port. Thus Raspberry PI 3
can be used for various IoT applications and can also be used as a minicomputer. We used
the Raspbian OS which is an open source Debian based OS. Raspbian OS provides the
basic set of programs and software utilities, also comes with more than 35,000 Raspbian

Volume IX, Issue VI, JUNE/2019 Page No: 1516


International Journal of Management, Technology And Engineering ISSN NO : 2249-7455

packages which are precompiled software. Python programming language is the scripting
programming language that is used to operate the Raspberry PI 3 [7].

Figure 1. Raspberry PI 3 Board

2.2. Optical Fingerprint Scanner

Fingerprints have general characteristic of ridge patterns that consent them to be


systematically identified. There are three specific classes for all fingerprints based upon
their visual patterns that are arches, loops, and whorls [11], [12]. The fingerprint traits are
captured with an optical fingerprint scanner which comprise of a charge coupled device
(CCD) and outputs image of the scanned finger. An in-built ADC produces a digital
representation of this image. After completion of scanning, the output inverted image of
the finger is stored. This scanned image exhibits the ridges and valleys of the finger. The
ridges can be spotted by the darker regions where the light reflection is higher. The
valleys can be marked by the lighter regions, where the light reflection is minor. Before
comparing this enrolled template to stored templates, the scanner processor assures the
scanner has captured an apparent image. It ensures the average pixel darkness or the
overall values in a small sample and discards the scan if the captured image is too dark or
too light. If the image is rejected, the scanner adjusts the exposure time to let in more or
less light and then tries the scan again [12]. The major advantages of the optical
fingerprint sensor are low cost and strong prevention of Electro Static Discharge (ESD).

2.3. Wi-Fi Set-Up in the Raspberry PI 3

Wi-Fi is basically a trademarked phrase that means IEEE 802.11x. The Wi-Fi is
very significant in our project with Raspberry PI 3 with can establish the wireless
LAN connection [9]. We need to setup the Wi-Fi by adding the network details in
the terminal window of Raspbian OS.
The following procedure illustrate different steps to setup the Wi-Fi in Raspberry
OS. To set up the Wi-Fi connection on Raspberry PI 3 the command $sudo iwlist
wlan0 scan is run in the terminal window of Raspbian OS. This command will scan
and list all the existing Wi-Fi networks with all the essential details. We will update
our home network details into this list which will make sure that network (that we
want to connect) is available or not for Raspberry PI 3. The next step is to add
network details on Raspberry PI 3 which is done by executing the command,
$ sudo nano/etc/wpa_supplicant/wpa_supplicant.conf
This will open up wpa_supplicant.conf file. In the next step, code of our
fingerprint scanning and security method is executed and the network information is
updated with the details as shown in Figure 2 (a). Our file will look something
analogous as shown in Figure 2 (a). Now the details and reboot the Raspberry PI 3 is
provided Wi-Fi internet with the help of mobile hotspot as shown in Figure 2 (b).

Volume IX, Issue VI, JUNE/2019 Page No: 1517


International Journal of Management, Technology And Engineering ISSN NO : 2249-7455

Figure 2 (a). Wi-Fi Setup.

Figure 2 (b). Mobile Hotspot Settings


3. Project Description
The hardware is implemented and the corresponding circuit diagram is depicted in
Figure 3. The hardware circuit diagram of the project work is described in Figure 4.

Figure 3. Circuit Diagram of the Project

Volume IX, Issue VI, JUNE/2019 Page No: 1518


International Journal of Management, Technology And Engineering ISSN NO : 2249-7455

Figure 4. Finger print based Security System Hardware Setup

Algorithm:

Step 1: Firstly the Raspberry PI 3 and all hardware components are configured. (The
Raspbian OS is preinstalled in the SD Card).
Step 3. Setup the Wi-Fi on Raspberry PI 3 and execute the project.
Step 4 : In the training stage, sample fingerprints of authorized users are scanned and
saved in the train database.
Step 5: LCD displays fingerprints based Security System and waits for input sample of
fingerprint.
Step 6: Sample fingerprint of authorized user is provided to fingerprint scanner.
Step 7: The input sample fingerprint is compared with the fingerprint samples already
stored in the database of authorized users.
Step 8: For the correct match LCD displays Access Granted and rotating door is open to
allow access to the authorized user.
Step 9: If no match happens LCD displays Access Denied.
Step 10: Image of unauthorized person is taken and send to predefine email ID provided
in the Wi-Fi setup.
The flowchart of the project work is shown in Figure 5.

Volume IX, Issue VI, JUNE/2019 Page No: 1519


International Journal of Management, Technology And Engineering ISSN NO : 2249-7455

Figure 5. Flow chart of Security System

4. Project Execution Steps


The proposed system makes use of fingerprint module for the authentication process
and an electromechanical relay switch to control system for door access.
The system also supports a Web camera-based image capturing technique whose code
written in Python is embedded into Raspberry PI 3. When any unauthorized fingerprint is
detected and an alert through the email is sent to the authorized user from the wireless
Wi-Fi connectivity of Raspberry PI 3. Below are the steps for implementation of the
project.

 Turn ON the entire kit including the Raspberry PI 3 by giving the power supply
through the regulated power supply.
 The internet is provided from a mobile phone using a mobile hotspot to the
Raspberry PI 3.
 After connecting to Wi-Fi, we see the message “Waiting for the input” on LCD
screen i.e. the Raspberry PI 3 is waiting for a fingerprint to scan with the help of
fingerprint scanner.
 With the fingerprint scanner, the user must first enrol with the administrator for
remote door access. If the user is an authorized person, the person can directly
access the door by placing the finger.
 If there is no fingerprint as input, we get a message “Fingerprint not detected” as
shown in Figure 6 on the LCD screen.

Figure 6. Finger Not Detected.

 Now if the fingerprint of the authorized person is placed on the fingerprint


scanner, it is compared with the stored fingerprint data. If match happens we see a
message “Access Granted” as shown in Figure 7 on LCD screen.

Figure 7. Access Granted Operation

Volume IX, Issue VI, JUNE/2019 Page No: 1520


International Journal of Management, Technology And Engineering ISSN NO : 2249-7455

 It activates the DC motor with the help of the relay circuit. The DC motor
operates a rotating door which initiates door opening operation.
 If an unauthorized person places the finger on the fingerprint scanner, display will
show a message of “Access denied” as shown in Figure 8.

Figure 8. Access Denied Operation

 As already explained if an unauthorized person tries to access door his image is


then immediately captured with the help of web-camera and an email is sent to
the predefined email which is provided by the user as shown in Figure 9.

Figure 9. Intruder Detected Image sent to Email

5. Conclusions
This project work describes the design and implementation of fingerprint based smart
security system using Raspberry PI 3 and IoT. The main objective of the work is to design
a smart biometric based security system using IoT and fingerprint module. The need for
an advanced home security systems using biometrics is gradually escalating, as security
becomes a very significant issue for protecting financial and logical assets. Instead of
using personal computer as the computing machine Raspberry PI 3 is used which not only
reduces the cost of the entire security system but also provide support in connecting
different hardware component due to the provision of accessing the hardware support of

Volume IX, Issue VI, JUNE/2019 Page No: 1521


International Journal of Management, Technology And Engineering ISSN NO : 2249-7455

Raspberry PI 3. The implementation of code granting access to authorized users and


preventing the unauthorized users is written in Python 3 and executed in Raspbian OS
interfaced with Raspberry PI 3. We can utilize the PI camera instead of web camera which
could also reduce the size of the hardware equipment. In our future work we will utilized
the multimodal technique using fingerprint and face [14] of the user to provide more
authentication security.

References

[1] F. Ganz, et al., “A practical evaluation of information processing and abstraction techniques for the
internet of things,” IEEE Internet of Things Journal, vol. 2, no. 4, pp. 340-354, 2015.
[2] R. Khan et al., “Future Internet: The Internet of Things architecture, possible applications and key
challenges,” Proc. 10th Int. Conf. FIT, pp. 257–260, 2012.
[3] A. Jacobsson, M. Boldt, B. Carlsson. “On the risk exposure of smart home automation systems. In
Future Internet of Things and Cloud (FiCloud)”, 2014 Intern. Conf., IEEE, 2014.
[4] J. J. Yan, A. F. Blackwell, R. J. Anderson, and A. Grant, “Biometrics in the password memorability and
security: empirical results,” IEEE Secur. & privacy, vol. 2, no. 5, pp. 25–31, 2004.
[5] Huu-Quoc Nguyen, Ton Thi Kim Loan, Bui Dinh Mao and Eui-Nam Huh, “ Low cost real time system
monitoring system using Raspberry PI,” IEEE, pp. 857-859, 2015.
[6] M.R Alam, M. B. I Reaz, M. A. M, “A Review of smart homes—Past, present, and future,” IEEE Trans.
Syst. Man Cybern. Part C (Appl. Rev.), vol. 42, pp. 1190–1203, 2012.
[7] Mussab Alaa et al., ”A Review of smart home applications based on Internet of Things,”, Journ. of
Network and Computer Applications, http://dx.doi.org/10.1016/j.jnca.2017.08.017.
[8] P. VamsiKrishna et al. “Advanced Raspberry Pi surveillance system,” IEEE conf., pp. 860-862, 2015.
[9] A. B. Thabet, N.Ben Amor, “Enhanced smart doorbell system based On face recognition,” Proc. 16th
IEEE Intern. Conf. on Sci. and Techn. of Automatic Control and Computer Engg. (STA), pp. 373 – 377,
2015.
[10] D. K. Shah, V. A Bharadi, V. J. Kaul, S. Amrutia, “End-to-End encryption based biometric SaaS:
using Raspberry Pi as a remote authentication node,” IEEE spons. 1st Intern. Conf. on Computing,
Comm., Control and Autom.(ICCUBEA), pp. 52 – 59, 2015.
[11] T. Ignatenko, F. M. J. Williams, “Biometric Systems: Privacy and Secrecy aspects,” IEEE Trans.
on Inform. Forensics and security, IEEE, vol.4, no.4, December 2009.
[12] Jiao She. K., A. Zhang, “Study on the Embedded Fingerprint Image Recognition System,” Int. Conf. of
Inform. Science and Manag. Engg, IEEE Computer Society, 2010.
[13] L. Verma, M. Fakharzadeh,, Sunghyun Choi, "Wifi on steroids: 802.11AC and 802.11A,” Wireless
Communications, IEEE, vol. 20, issue: 6, 2013.
[14] M. A. Muqeet, R. S. Holambe, “A collaborative representation face classification on separable adaptive
directional wavelet transform based completed local binary pattern features," Eng. Science and Tech., an
Intern. Journ. vol. 21, no. 4, pp. 611-624.

Volume IX, Issue VI, JUNE/2019 Page No: 1522

Das könnte Ihnen auch gefallen