CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
wireless biometric system
1. Seminar – I
on
WIRELESS BIOMETRIC SYSTEM
USING SMARTPHONE IN GEOFENCE
By Vyanktesh Haribhau Dorlikar
MEIT1324
Guided by Mrs. Anjali Chandavale
24/04/2014 1WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
2. Agenda
• Introduction
• Significance of topic
• Literature Survey
• Results and analysis (if any)
• Conclusion
• References
24/04/2014 2WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
3. Introduction
• wireless biometric system based upon the
concept of Geofence
• base station (Server),
• sensor node (wifi routers)
• cluster member (smart phones).
• wireless biometric system uses camera of the
smart phones.
• There are three phases in the research topic:
• Geofence to create protected area.
• Smartphone for capturing biometric data.
• Wifi positioning system to track the user.
24/04/2014 3WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
4. Significance of topic
• Creating the geofence using wifi AP
• transmissition power is used to create
specified range.
• Biomatric Recognition using smartphone
camera
• Multiple boimatric sign fussion
• Track the user in wifi range using dis-similarity
of AP
24/04/2014 4WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
5. Literature Survey
• Geo-fencing: Confining Wi-Fi Coverage to Physical
Boundaries
• wireless radios have a narrow transition range (<5dBm)
• Link layer loss rate >30% ouside region and <10% witin region
24/04/2014 5WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
6. Geo-fencing: Confining Wi-Fi Coverage to Physical
Boundaries
ADVANTAGE
• Can limit the wireless transmission.
• Virtual walls can be created which is used for
wireless biometric system.
DISADVANTAGE
• Lots of nodes and directional antennas
required, increases the cost.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 6
7. Literature survey: A Biometrics-Based Secure
Architecture for Mobile Computing
• Various successful algorithms are available for
boimetric:
• Face Recognition
• Fingerprint Recognition
• Face Recognition is more secured
• 3-Dimensional recognition
• Skin texture analysis
• Biometric signature fussion used for more security.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 7
8. Literature survey: A Biometrics-Based Secure
Architecture for Mobile Computing
• ADVANTAGE
• Handheld device used for authentication.
• human biometric features are unique.
• Improved algorithms are reliable to use even in low
light.
• DISADVANTAGES
• It must be a smart phone operating on Android/ ios/
windows.
• The camera quality must be >0.3 megapixel and flash must
required in low light.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 8
9. Literature survey: Autonomous Construction of a WiFi
Access Point Map Using Multidimensional Scaling
• Track user position by by estimating distances from WiFi APs within two
radio ranges
• Uses Received Signal Strength of device to evaluate distance.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 9
10. Literature survey: Autonomous Construction of a WiFi
Access Point Map Using Multidimensional Scaling
• ADVANTAGES
• Simple algorithm to track the smartphone location
• No modification required in AP’s.
• DISADVANTAGES
• Possible error in location.
• More number of AP’s are required, tends to increase
in cost.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 10
11. WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN
GEOFENCE
24/04/2014 11
Praposed work:
Flowchart for
wireless biometric
system
12. Result and Analysis
• The Geofence using wifi can capable of covering
small as well as large area according to the no of
nodes used
• For authentication in geofence the smartphone is
most suitable device for wireless biometric system
• The positioning of the device in geofence with
dissimilarity matrix of AP’s can be error prone but
suitable to used in geofence.
24/04/2014 12WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
13. Conclusion
• In this report a novel approach is proposed for
wireless authentication using mobile device &
user authentication applying biometrics. The
proposed approach can be applied in various
mobile platforms without requiring dedicated
biometric scanners and can also enhance
protection against intruders, theft and
unwanted persons which are not allowed to
enter in the area.
24/04/2014 13WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
14. Future Work
• wireless biometric system can be used in the
corporate, colleges for the attendance system.
• It is also used as the authentication system for
space stations and military bases, or highly
confidential areas.
24/04/2014 14WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
15. References
1. A Biometrics-Based Secure Architecture for Mobile Computing Muhammad Faysal Islam Department of Engineering Management
and Systems Engineering George Washington University, Washington, DC. M. Nazrul Islam, Senior Member IEEE Department of
Security Systems State University of New York, Farmingdale, New York(2012)
2. Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling Jahyoung Koo and Hojung Cha Department of
Computer Science, Yonsei University, 134 Shinchon-Dong Sudaemoon-Ku, Seoul, Korea koojh@cs.yonsei.ac.kr,
hjcha@cs.yonsei.ac.kr(2011)
3. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries Anmol Sheth1, Srinivasan Seshan2, and David Wetherall1,3 1 Intel
Research, Seattle 2 Carnegie Mellon University 3 University of Washington(2009)
4. Edney, J., Arbaugh, W.A.: Real 802.11 Security: Wi-Fi Protected Access and 802.11i, vol. 1. Addison-Wesley, Reading (2001)
5. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B., LeGrand, L., Powledge, P., Wetherall, D.: When I am on Wi-Fi, I am Fearles: Privacy
concerns and practices in everyday Wi-Fi use. In: Proceedings of ACM CHI Conference on Human Factors in Computing Systems (to
appear, 2009)
6. Kapadia, A.,Henderson,T., Fielding, J.J., Kotz, D.:Virtual walls: Protecting digitalprivacy in pervasive environments. In: LaMarca, A.,
Langheinrich, M., Truong, K.N.(eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007)
7. Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: MobiCom 2007: Proceedings of the
13th Annual International Conference on Mobile Computing and Networking (September 2007)
8. Saponas, T., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: privacy trends in consumer ubiquitous
computing. In: SS 2007: USENIX Security Symposium, Berkeley, CA, USA, pp. 1–16. USENIX Association (2007)
9. Balakrishnan, H., Padmanabhan, V., Seshan, S., Katz, R.: A comparison of mechanisms for improving TCP performance over wireless
links. IEEE/ ACM Transactions on Networking 5(6), 756–769 (1997)
10. Sat, B.,Wah, B.: Analysis and evaluation of the skype and google-talk voip systems. In: IEEE International Conference on Multimedia
and Expo., pp. 2153–2156. ACMPress, New York (2006)
24/04/2014 15WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE