SlideShare uma empresa Scribd logo
1 de 16
Seminar – I
on
WIRELESS BIOMETRIC SYSTEM
USING SMARTPHONE IN GEOFENCE
By Vyanktesh Haribhau Dorlikar
MEIT1324
Guided by Mrs. Anjali Chandavale
24/04/2014 1WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Agenda
• Introduction
• Significance of topic
• Literature Survey
• Results and analysis (if any)
• Conclusion
• References
24/04/2014 2WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Introduction
• wireless biometric system based upon the
concept of Geofence
• base station (Server),
• sensor node (wifi routers)
• cluster member (smart phones).
• wireless biometric system uses camera of the
smart phones.
• There are three phases in the research topic:
• Geofence to create protected area.
• Smartphone for capturing biometric data.
• Wifi positioning system to track the user.
24/04/2014 3WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Significance of topic
• Creating the geofence using wifi AP
• transmissition power is used to create
specified range.
• Biomatric Recognition using smartphone
camera
• Multiple boimatric sign fussion
• Track the user in wifi range using dis-similarity
of AP
24/04/2014 4WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Literature Survey
• Geo-fencing: Confining Wi-Fi Coverage to Physical
Boundaries
• wireless radios have a narrow transition range (<5dBm)
• Link layer loss rate >30% ouside region and <10% witin region
24/04/2014 5WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Geo-fencing: Confining Wi-Fi Coverage to Physical
Boundaries
ADVANTAGE
• Can limit the wireless transmission.
• Virtual walls can be created which is used for
wireless biometric system.
DISADVANTAGE
• Lots of nodes and directional antennas
required, increases the cost.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 6
Literature survey: A Biometrics-Based Secure
Architecture for Mobile Computing
• Various successful algorithms are available for
boimetric:
• Face Recognition
• Fingerprint Recognition
• Face Recognition is more secured
• 3-Dimensional recognition
• Skin texture analysis
• Biometric signature fussion used for more security.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 7
Literature survey: A Biometrics-Based Secure
Architecture for Mobile Computing
• ADVANTAGE
• Handheld device used for authentication.
• human biometric features are unique.
• Improved algorithms are reliable to use even in low
light.
• DISADVANTAGES
• It must be a smart phone operating on Android/ ios/
windows.
• The camera quality must be >0.3 megapixel and flash must
required in low light.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 8
Literature survey: Autonomous Construction of a WiFi
Access Point Map Using Multidimensional Scaling
• Track user position by by estimating distances from WiFi APs within two
radio ranges
• Uses Received Signal Strength of device to evaluate distance.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 9
Literature survey: Autonomous Construction of a WiFi
Access Point Map Using Multidimensional Scaling
• ADVANTAGES
• Simple algorithm to track the smartphone location
• No modification required in AP’s.
• DISADVANTAGES
• Possible error in location.
• More number of AP’s are required, tends to increase
in cost.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 10
WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN
GEOFENCE
24/04/2014 11
Praposed work:
Flowchart for
wireless biometric
system
Result and Analysis
• The Geofence using wifi can capable of covering
small as well as large area according to the no of
nodes used
• For authentication in geofence the smartphone is
most suitable device for wireless biometric system
• The positioning of the device in geofence with
dissimilarity matrix of AP’s can be error prone but
suitable to used in geofence.
24/04/2014 12WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Conclusion
• In this report a novel approach is proposed for
wireless authentication using mobile device &
user authentication applying biometrics. The
proposed approach can be applied in various
mobile platforms without requiring dedicated
biometric scanners and can also enhance
protection against intruders, theft and
unwanted persons which are not allowed to
enter in the area.
24/04/2014 13WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Future Work
• wireless biometric system can be used in the
corporate, colleges for the attendance system.
• It is also used as the authentication system for
space stations and military bases, or highly
confidential areas.
24/04/2014 14WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
References
1. A Biometrics-Based Secure Architecture for Mobile Computing Muhammad Faysal Islam Department of Engineering Management
and Systems Engineering George Washington University, Washington, DC. M. Nazrul Islam, Senior Member IEEE Department of
Security Systems State University of New York, Farmingdale, New York(2012)
2. Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling Jahyoung Koo and Hojung Cha Department of
Computer Science, Yonsei University, 134 Shinchon-Dong Sudaemoon-Ku, Seoul, Korea koojh@cs.yonsei.ac.kr,
hjcha@cs.yonsei.ac.kr(2011)
3. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries Anmol Sheth1, Srinivasan Seshan2, and David Wetherall1,3 1 Intel
Research, Seattle 2 Carnegie Mellon University 3 University of Washington(2009)
4. Edney, J., Arbaugh, W.A.: Real 802.11 Security: Wi-Fi Protected Access and 802.11i, vol. 1. Addison-Wesley, Reading (2001)
5. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B., LeGrand, L., Powledge, P., Wetherall, D.: When I am on Wi-Fi, I am Fearles: Privacy
concerns and practices in everyday Wi-Fi use. In: Proceedings of ACM CHI Conference on Human Factors in Computing Systems (to
appear, 2009)
6. Kapadia, A.,Henderson,T., Fielding, J.J., Kotz, D.:Virtual walls: Protecting digitalprivacy in pervasive environments. In: LaMarca, A.,
Langheinrich, M., Truong, K.N.(eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007)
7. Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: MobiCom 2007: Proceedings of the
13th Annual International Conference on Mobile Computing and Networking (September 2007)
8. Saponas, T., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: privacy trends in consumer ubiquitous
computing. In: SS 2007: USENIX Security Symposium, Berkeley, CA, USA, pp. 1–16. USENIX Association (2007)
9. Balakrishnan, H., Padmanabhan, V., Seshan, S., Katz, R.: A comparison of mechanisms for improving TCP performance over wireless
links. IEEE/ ACM Transactions on Networking 5(6), 756–769 (1997)
10. Sat, B.,Wah, B.: Analysis and evaluation of the skype and google-talk voip systems. In: IEEE International Conference on Multimedia
and Expo., pp. 2153–2156. ACMPress, New York (2006)
24/04/2014 15WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Thank You!!!
24/04/2014 16WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE

Mais conteúdo relacionado

Mais procurados

10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262MKEERTHIKA1
 
seminar topics cse
seminar topics cseseminar topics cse
seminar topics cseNawab Khan
 
Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...IAEME Publication
 
IoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemIoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemKaushik Gupta
 
October 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsOctober 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsijdpsjournal
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyimpulseembedded
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyimpulsetechembedded12
 
Soho wireless network applications
Soho wireless network applicationsSoho wireless network applications
Soho wireless network applicationsMohamed Alrshah
 
Level-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor NetworksLevel-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor Networksrahulmonikasharma
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phonesArpan Pal
 
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...ijtsrd
 
International Journal of Network Security & Its Applications (IJNSA) - Curre...
 International Journal of Network Security & Its Applications (IJNSA) - Curre... International Journal of Network Security & Its Applications (IJNSA) - Curre...
International Journal of Network Security & Its Applications (IJNSA) - Curre...IJNSA Journal
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIRJET Journal
 
8th Annual Night Vision Systems
8th Annual Night Vision Systems8th Annual Night Vision Systems
8th Annual Night Vision Systemsmariaidga
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994mrewaabd
 

Mais procurados (20)

10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
 
seminar topics cse
seminar topics cseseminar topics cse
seminar topics cse
 
Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...
 
IoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemIoT Based Water Management and Supervision System
IoT Based Water Management and Supervision System
 
October 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsOctober 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systems
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technology
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technology
 
Soho wireless network applications
Soho wireless network applicationsSoho wireless network applications
Soho wireless network applications
 
Level-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor NetworksLevel-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor Networks
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phones
 
(2006) Wireless and Biometrics
(2006) Wireless and Biometrics(2006) Wireless and Biometrics
(2006) Wireless and Biometrics
 
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
 
Topics
TopicsTopics
Topics
 
International Journal of Network Security & Its Applications (IJNSA) - Curre...
 International Journal of Network Security & Its Applications (IJNSA) - Curre... International Journal of Network Security & Its Applications (IJNSA) - Curre...
International Journal of Network Security & Its Applications (IJNSA) - Curre...
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beacons
 
8th Annual Night Vision Systems
8th Annual Night Vision Systems8th Annual Night Vision Systems
8th Annual Night Vision Systems
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
Project Work Main Slides
Project Work Main SlidesProject Work Main Slides
Project Work Main Slides
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994
 
2014 vol 7_num_2
2014 vol 7_num_22014 vol 7_num_2
2014 vol 7_num_2
 

Destaque

Encryptioon and key management introduction
Encryptioon and key management introductionEncryptioon and key management introduction
Encryptioon and key management introductionVyanktesh Dorlikar
 
Présentation IBM InfoSphere MDM 11.3
Présentation IBM InfoSphere MDM 11.3Présentation IBM InfoSphere MDM 11.3
Présentation IBM InfoSphere MDM 11.3IBMInfoSphereUGFR
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Smart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySmart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySukanta Biswas
 

Destaque (7)

Ibm cell
Ibm cell Ibm cell
Ibm cell
 
Encryptioon and key management introduction
Encryptioon and key management introductionEncryptioon and key management introduction
Encryptioon and key management introduction
 
Object oriented data model
Object oriented data modelObject oriented data model
Object oriented data model
 
Présentation IBM InfoSphere MDM 11.3
Présentation IBM InfoSphere MDM 11.3Présentation IBM InfoSphere MDM 11.3
Présentation IBM InfoSphere MDM 11.3
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Smart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySmart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI Technology
 

Semelhante a wireless biometric system

Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmIJERA Editor
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxMd.Jamilur Rahman
 
Artificial Intelligence Drone
Artificial Intelligence DroneArtificial Intelligence Drone
Artificial Intelligence DroneBasilA2
 
Wi-Fi based indoor positioning
Wi-Fi based indoor positioningWi-Fi based indoor positioning
Wi-Fi based indoor positioningSherwin Rodrigues
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...Microsoft
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...Internetwork Engineering (IE)
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...ijwmn
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...ijwmn
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Brundha Sholaganga
 
Aruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdfAruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdfMuruEtti
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveDawn Nash Pfeiffer
 

Semelhante a wireless biometric system (20)

Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing Paradigm
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
ECE department faculty research profile
ECE department faculty research profileECE department faculty research profile
ECE department faculty research profile
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Artificial Intelligence Drone
Artificial Intelligence DroneArtificial Intelligence Drone
Artificial Intelligence Drone
 
Wi-Fi based indoor positioning
Wi-Fi based indoor positioningWi-Fi based indoor positioning
Wi-Fi based indoor positioning
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
 
Beacons
Beacons Beacons
Beacons
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 
SenseDroid
SenseDroidSenseDroid
SenseDroid
 
Aruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdfAruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdf
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Informative Indoor Tracking
Informative Indoor TrackingInformative Indoor Tracking
Informative Indoor Tracking
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 

Último

lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Último (20)

lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 

wireless biometric system

  • 1. Seminar – I on WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE By Vyanktesh Haribhau Dorlikar MEIT1324 Guided by Mrs. Anjali Chandavale 24/04/2014 1WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 2. Agenda • Introduction • Significance of topic • Literature Survey • Results and analysis (if any) • Conclusion • References 24/04/2014 2WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 3. Introduction • wireless biometric system based upon the concept of Geofence • base station (Server), • sensor node (wifi routers) • cluster member (smart phones). • wireless biometric system uses camera of the smart phones. • There are three phases in the research topic: • Geofence to create protected area. • Smartphone for capturing biometric data. • Wifi positioning system to track the user. 24/04/2014 3WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 4. Significance of topic • Creating the geofence using wifi AP • transmissition power is used to create specified range. • Biomatric Recognition using smartphone camera • Multiple boimatric sign fussion • Track the user in wifi range using dis-similarity of AP 24/04/2014 4WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 5. Literature Survey • Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries • wireless radios have a narrow transition range (<5dBm) • Link layer loss rate >30% ouside region and <10% witin region 24/04/2014 5WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 6. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries ADVANTAGE • Can limit the wireless transmission. • Virtual walls can be created which is used for wireless biometric system. DISADVANTAGE • Lots of nodes and directional antennas required, increases the cost. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 6
  • 7. Literature survey: A Biometrics-Based Secure Architecture for Mobile Computing • Various successful algorithms are available for boimetric: • Face Recognition • Fingerprint Recognition • Face Recognition is more secured • 3-Dimensional recognition • Skin texture analysis • Biometric signature fussion used for more security. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 7
  • 8. Literature survey: A Biometrics-Based Secure Architecture for Mobile Computing • ADVANTAGE • Handheld device used for authentication. • human biometric features are unique. • Improved algorithms are reliable to use even in low light. • DISADVANTAGES • It must be a smart phone operating on Android/ ios/ windows. • The camera quality must be >0.3 megapixel and flash must required in low light. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 8
  • 9. Literature survey: Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling • Track user position by by estimating distances from WiFi APs within two radio ranges • Uses Received Signal Strength of device to evaluate distance. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 9
  • 10. Literature survey: Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling • ADVANTAGES • Simple algorithm to track the smartphone location • No modification required in AP’s. • DISADVANTAGES • Possible error in location. • More number of AP’s are required, tends to increase in cost. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 10
  • 11. WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 24/04/2014 11 Praposed work: Flowchart for wireless biometric system
  • 12. Result and Analysis • The Geofence using wifi can capable of covering small as well as large area according to the no of nodes used • For authentication in geofence the smartphone is most suitable device for wireless biometric system • The positioning of the device in geofence with dissimilarity matrix of AP’s can be error prone but suitable to used in geofence. 24/04/2014 12WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 13. Conclusion • In this report a novel approach is proposed for wireless authentication using mobile device & user authentication applying biometrics. The proposed approach can be applied in various mobile platforms without requiring dedicated biometric scanners and can also enhance protection against intruders, theft and unwanted persons which are not allowed to enter in the area. 24/04/2014 13WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 14. Future Work • wireless biometric system can be used in the corporate, colleges for the attendance system. • It is also used as the authentication system for space stations and military bases, or highly confidential areas. 24/04/2014 14WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 15. References 1. A Biometrics-Based Secure Architecture for Mobile Computing Muhammad Faysal Islam Department of Engineering Management and Systems Engineering George Washington University, Washington, DC. M. Nazrul Islam, Senior Member IEEE Department of Security Systems State University of New York, Farmingdale, New York(2012) 2. Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling Jahyoung Koo and Hojung Cha Department of Computer Science, Yonsei University, 134 Shinchon-Dong Sudaemoon-Ku, Seoul, Korea koojh@cs.yonsei.ac.kr, hjcha@cs.yonsei.ac.kr(2011) 3. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries Anmol Sheth1, Srinivasan Seshan2, and David Wetherall1,3 1 Intel Research, Seattle 2 Carnegie Mellon University 3 University of Washington(2009) 4. Edney, J., Arbaugh, W.A.: Real 802.11 Security: Wi-Fi Protected Access and 802.11i, vol. 1. Addison-Wesley, Reading (2001) 5. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B., LeGrand, L., Powledge, P., Wetherall, D.: When I am on Wi-Fi, I am Fearles: Privacy concerns and practices in everyday Wi-Fi use. In: Proceedings of ACM CHI Conference on Human Factors in Computing Systems (to appear, 2009) 6. Kapadia, A.,Henderson,T., Fielding, J.J., Kotz, D.:Virtual walls: Protecting digitalprivacy in pervasive environments. In: LaMarca, A., Langheinrich, M., Truong, K.N.(eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007) 7. Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: MobiCom 2007: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking (September 2007) 8. Saponas, T., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: SS 2007: USENIX Security Symposium, Berkeley, CA, USA, pp. 1–16. USENIX Association (2007) 9. Balakrishnan, H., Padmanabhan, V., Seshan, S., Katz, R.: A comparison of mechanisms for improving TCP performance over wireless links. IEEE/ ACM Transactions on Networking 5(6), 756–769 (1997) 10. Sat, B.,Wah, B.: Analysis and evaluation of the skype and google-talk voip systems. In: IEEE International Conference on Multimedia and Expo., pp. 2153–2156. ACMPress, New York (2006) 24/04/2014 15WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 16. Thank You!!! 24/04/2014 16WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE