SlideShare uma empresa Scribd logo
1 de 16
Seminar – I
on
WIRELESS BIOMETRIC SYSTEM
USING SMARTPHONE IN GEOFENCE
By Vyanktesh Haribhau Dorlikar
MEIT1324
Guided by Mrs. Anjali Chandavale
24/04/2014 1WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Agenda
• Introduction
• Significance of topic
• Literature Survey
• Results and analysis (if any)
• Conclusion
• References
24/04/2014 2WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Introduction
• wireless biometric system based upon the
concept of Geofence
• base station (Server),
• sensor node (wifi routers)
• cluster member (smart phones).
• wireless biometric system uses camera of the
smart phones.
• There are three phases in the research topic:
• Geofence to create protected area.
• Smartphone for capturing biometric data.
• Wifi positioning system to track the user.
24/04/2014 3WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Significance of topic
• Creating the geofence using wifi AP
• transmissition power is used to create
specified range.
• Biomatric Recognition using smartphone
camera
• Multiple boimatric sign fussion
• Track the user in wifi range using dis-similarity
of AP
24/04/2014 4WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Literature Survey
• Geo-fencing: Confining Wi-Fi Coverage to Physical
Boundaries
• wireless radios have a narrow transition range (<5dBm)
• Link layer loss rate >30% ouside region and <10% witin region
24/04/2014 5WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Geo-fencing: Confining Wi-Fi Coverage to Physical
Boundaries
ADVANTAGE
• Can limit the wireless transmission.
• Virtual walls can be created which is used for
wireless biometric system.
DISADVANTAGE
• Lots of nodes and directional antennas
required, increases the cost.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 6
Literature survey: A Biometrics-Based Secure
Architecture for Mobile Computing
• Various successful algorithms are available for
boimetric:
• Face Recognition
• Fingerprint Recognition
• Face Recognition is more secured
• 3-Dimensional recognition
• Skin texture analysis
• Biometric signature fussion used for more security.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 7
Literature survey: A Biometrics-Based Secure
Architecture for Mobile Computing
• ADVANTAGE
• Handheld device used for authentication.
• human biometric features are unique.
• Improved algorithms are reliable to use even in low
light.
• DISADVANTAGES
• It must be a smart phone operating on Android/ ios/
windows.
• The camera quality must be >0.3 megapixel and flash must
required in low light.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 8
Literature survey: Autonomous Construction of a WiFi
Access Point Map Using Multidimensional Scaling
• Track user position by by estimating distances from WiFi APs within two
radio ranges
• Uses Received Signal Strength of device to evaluate distance.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 9
Literature survey: Autonomous Construction of a WiFi
Access Point Map Using Multidimensional Scaling
• ADVANTAGES
• Simple algorithm to track the smartphone location
• No modification required in AP’s.
• DISADVANTAGES
• Possible error in location.
• More number of AP’s are required, tends to increase
in cost.
24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 10
WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN
GEOFENCE
24/04/2014 11
Praposed work:
Flowchart for
wireless biometric
system
Result and Analysis
• The Geofence using wifi can capable of covering
small as well as large area according to the no of
nodes used
• For authentication in geofence the smartphone is
most suitable device for wireless biometric system
• The positioning of the device in geofence with
dissimilarity matrix of AP’s can be error prone but
suitable to used in geofence.
24/04/2014 12WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Conclusion
• In this report a novel approach is proposed for
wireless authentication using mobile device &
user authentication applying biometrics. The
proposed approach can be applied in various
mobile platforms without requiring dedicated
biometric scanners and can also enhance
protection against intruders, theft and
unwanted persons which are not allowed to
enter in the area.
24/04/2014 13WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Future Work
• wireless biometric system can be used in the
corporate, colleges for the attendance system.
• It is also used as the authentication system for
space stations and military bases, or highly
confidential areas.
24/04/2014 14WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
References
1. A Biometrics-Based Secure Architecture for Mobile Computing Muhammad Faysal Islam Department of Engineering Management
and Systems Engineering George Washington University, Washington, DC. M. Nazrul Islam, Senior Member IEEE Department of
Security Systems State University of New York, Farmingdale, New York(2012)
2. Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling Jahyoung Koo and Hojung Cha Department of
Computer Science, Yonsei University, 134 Shinchon-Dong Sudaemoon-Ku, Seoul, Korea koojh@cs.yonsei.ac.kr,
hjcha@cs.yonsei.ac.kr(2011)
3. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries Anmol Sheth1, Srinivasan Seshan2, and David Wetherall1,3 1 Intel
Research, Seattle 2 Carnegie Mellon University 3 University of Washington(2009)
4. Edney, J., Arbaugh, W.A.: Real 802.11 Security: Wi-Fi Protected Access and 802.11i, vol. 1. Addison-Wesley, Reading (2001)
5. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B., LeGrand, L., Powledge, P., Wetherall, D.: When I am on Wi-Fi, I am Fearles: Privacy
concerns and practices in everyday Wi-Fi use. In: Proceedings of ACM CHI Conference on Human Factors in Computing Systems (to
appear, 2009)
6. Kapadia, A.,Henderson,T., Fielding, J.J., Kotz, D.:Virtual walls: Protecting digitalprivacy in pervasive environments. In: LaMarca, A.,
Langheinrich, M., Truong, K.N.(eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007)
7. Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: MobiCom 2007: Proceedings of the
13th Annual International Conference on Mobile Computing and Networking (September 2007)
8. Saponas, T., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: privacy trends in consumer ubiquitous
computing. In: SS 2007: USENIX Security Symposium, Berkeley, CA, USA, pp. 1–16. USENIX Association (2007)
9. Balakrishnan, H., Padmanabhan, V., Seshan, S., Katz, R.: A comparison of mechanisms for improving TCP performance over wireless
links. IEEE/ ACM Transactions on Networking 5(6), 756–769 (1997)
10. Sat, B.,Wah, B.: Analysis and evaluation of the skype and google-talk voip systems. In: IEEE International Conference on Multimedia
and Expo., pp. 2153–2156. ACMPress, New York (2006)
24/04/2014 15WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
Thank You!!!
24/04/2014 16WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE

Mais conteúdo relacionado

Mais procurados

10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262MKEERTHIKA1
 
seminar topics cse
seminar topics cseseminar topics cse
seminar topics cseNawab Khan
 
Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...IAEME Publication
 
IoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemIoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemKaushik Gupta
 
October 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsOctober 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsijdpsjournal
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyimpulseembedded
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyimpulsetechembedded12
 
Soho wireless network applications
Soho wireless network applicationsSoho wireless network applications
Soho wireless network applicationsMohamed Alrshah
 
Level-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor NetworksLevel-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor Networksrahulmonikasharma
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phonesArpan Pal
 
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...ijtsrd
 
International Journal of Network Security & Its Applications (IJNSA) - Curre...
 International Journal of Network Security & Its Applications (IJNSA) - Curre... International Journal of Network Security & Its Applications (IJNSA) - Curre...
International Journal of Network Security & Its Applications (IJNSA) - Curre...IJNSA Journal
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIRJET Journal
 
8th Annual Night Vision Systems
8th Annual Night Vision Systems8th Annual Night Vision Systems
8th Annual Night Vision Systemsmariaidga
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...ijwmn
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994mrewaabd
 

Mais procurados (20)

10.1109@maes.2020.2970262
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
 
seminar topics cse
seminar topics cseseminar topics cse
seminar topics cse
 
Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...Detailed analysis of fiber optic networks and its benefits in defense applica...
Detailed analysis of fiber optic networks and its benefits in defense applica...
 
IoT Based Water Management and Supervision System
IoT Based Water Management and Supervision SystemIoT Based Water Management and Supervision System
IoT Based Water Management and Supervision System
 
October 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systemsOctober 2020: Top Read Articles in Distributed and Parallel systems
October 2020: Top Read Articles in Distributed and Parallel systems
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technology
 
Realization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technologyRealization of intelligence monitoring system based on remote sensor technology
Realization of intelligence monitoring system based on remote sensor technology
 
Soho wireless network applications
Soho wireless network applicationsSoho wireless network applications
Soho wireless network applications
 
Level-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor NetworksLevel-Headedness in Wireless Sensor Networks
Level-Headedness in Wireless Sensor Networks
 
Sensing mobile phones
Sensing mobile phonesSensing mobile phones
Sensing mobile phones
 
(2006) Wireless and Biometrics
(2006) Wireless and Biometrics(2006) Wireless and Biometrics
(2006) Wireless and Biometrics
 
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
A Study on the ZigBee Wireless Communication for IAQ Monitoring of Undergroun...
 
Topics
TopicsTopics
Topics
 
International Journal of Network Security & Its Applications (IJNSA) - Curre...
 International Journal of Network Security & Its Applications (IJNSA) - Curre... International Journal of Network Security & Its Applications (IJNSA) - Curre...
International Journal of Network Security & Its Applications (IJNSA) - Curre...
 
Indoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beaconsIndoor Positioning System using Magnetic Positioning and BLE beacons
Indoor Positioning System using Magnetic Positioning and BLE beacons
 
8th Annual Night Vision Systems
8th Annual Night Vision Systems8th Annual Night Vision Systems
8th Annual Night Vision Systems
 
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
Most Viewed Articles - International Journal of Wireless & Mobile Networks (I...
 
Project Work Main Slides
Project Work Main SlidesProject Work Main Slides
Project Work Main Slides
 
736 ijar 14994
736 ijar 14994736 ijar 14994
736 ijar 14994
 
2014 vol 7_num_2
2014 vol 7_num_22014 vol 7_num_2
2014 vol 7_num_2
 

Destaque

Encryptioon and key management introduction
Encryptioon and key management introductionEncryptioon and key management introduction
Encryptioon and key management introductionVyanktesh Dorlikar
 
Présentation IBM InfoSphere MDM 11.3
Présentation IBM InfoSphere MDM 11.3Présentation IBM InfoSphere MDM 11.3
Présentation IBM InfoSphere MDM 11.3IBMInfoSphereUGFR
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems securitySelf
 
Smart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySmart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySukanta Biswas
 

Destaque (7)

Ibm cell
Ibm cell Ibm cell
Ibm cell
 
Encryptioon and key management introduction
Encryptioon and key management introductionEncryptioon and key management introduction
Encryptioon and key management introduction
 
Object oriented data model
Object oriented data modelObject oriented data model
Object oriented data model
 
Présentation IBM InfoSphere MDM 11.3
Présentation IBM InfoSphere MDM 11.3Présentation IBM InfoSphere MDM 11.3
Présentation IBM InfoSphere MDM 11.3
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 
Smart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI TechnologySmart Attendance Management System Using Android WIFI Technology
Smart Attendance Management System Using Android WIFI Technology
 

Semelhante a wireless biometric system

Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmIJERA Editor
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxMd.Jamilur Rahman
 
April 2024 Top 10 Read Article for Wireless & Mobile Networks
April 2024 Top 10 Read        Article for Wireless & Mobile NetworksApril 2024 Top 10 Read        Article for Wireless & Mobile Networks
April 2024 Top 10 Read Article for Wireless & Mobile Networksijwmn
 
Artificial Intelligence Drone
Artificial Intelligence DroneArtificial Intelligence Drone
Artificial Intelligence DroneBasilA2
 
Wi-Fi based indoor positioning
Wi-Fi based indoor positioningWi-Fi based indoor positioning
Wi-Fi based indoor positioningSherwin Rodrigues
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...Microsoft
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...Internetwork Engineering (IE)
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...ijwmn
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...ijwmn
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Brundha Sholaganga
 
Aruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdfAruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdfMuruEtti
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 

Semelhante a wireless biometric system (20)

Secure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing ParadigmSecure Distributed Collection of Data Using Participator Sensing Paradigm
Secure Distributed Collection of Data Using Participator Sensing Paradigm
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptxTracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
Tracking-Application-for-Smart-Homes-using-Android-Smartphone.pptx
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
April 2024 Top 10 Read Article for Wireless & Mobile Networks
April 2024 Top 10 Read        Article for Wireless & Mobile NetworksApril 2024 Top 10 Read        Article for Wireless & Mobile Networks
April 2024 Top 10 Read Article for Wireless & Mobile Networks
 
ECE department faculty research profile
ECE department faculty research profileECE department faculty research profile
ECE department faculty research profile
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Kv2518941899
Kv2518941899Kv2518941899
Kv2518941899
 
Artificial Intelligence Drone
Artificial Intelligence DroneArtificial Intelligence Drone
Artificial Intelligence Drone
 
Wi-Fi based indoor positioning
Wi-Fi based indoor positioningWi-Fi based indoor positioning
Wi-Fi based indoor positioning
 
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
« The Microsoft Research Lab of Things » : from IoT research and prototyping,...
 
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
2019 UNC Cause Session - Dennis Holmes - WiFi & Mobility Technology for Safer...
 
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...
 
Beacons
Beacons Beacons
Beacons
 
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 
SenseDroid
SenseDroidSenseDroid
SenseDroid
 
Aruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdfAruba_Construindo-Redes-Otimizadas.pdf
Aruba_Construindo-Redes-Otimizadas.pdf
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 
Informative Indoor Tracking
Informative Indoor TrackingInformative Indoor Tracking
Informative Indoor Tracking
 

Último

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Último (20)

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

wireless biometric system

  • 1. Seminar – I on WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE By Vyanktesh Haribhau Dorlikar MEIT1324 Guided by Mrs. Anjali Chandavale 24/04/2014 1WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 2. Agenda • Introduction • Significance of topic • Literature Survey • Results and analysis (if any) • Conclusion • References 24/04/2014 2WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 3. Introduction • wireless biometric system based upon the concept of Geofence • base station (Server), • sensor node (wifi routers) • cluster member (smart phones). • wireless biometric system uses camera of the smart phones. • There are three phases in the research topic: • Geofence to create protected area. • Smartphone for capturing biometric data. • Wifi positioning system to track the user. 24/04/2014 3WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 4. Significance of topic • Creating the geofence using wifi AP • transmissition power is used to create specified range. • Biomatric Recognition using smartphone camera • Multiple boimatric sign fussion • Track the user in wifi range using dis-similarity of AP 24/04/2014 4WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 5. Literature Survey • Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries • wireless radios have a narrow transition range (<5dBm) • Link layer loss rate >30% ouside region and <10% witin region 24/04/2014 5WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 6. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries ADVANTAGE • Can limit the wireless transmission. • Virtual walls can be created which is used for wireless biometric system. DISADVANTAGE • Lots of nodes and directional antennas required, increases the cost. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 6
  • 7. Literature survey: A Biometrics-Based Secure Architecture for Mobile Computing • Various successful algorithms are available for boimetric: • Face Recognition • Fingerprint Recognition • Face Recognition is more secured • 3-Dimensional recognition • Skin texture analysis • Biometric signature fussion used for more security. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 7
  • 8. Literature survey: A Biometrics-Based Secure Architecture for Mobile Computing • ADVANTAGE • Handheld device used for authentication. • human biometric features are unique. • Improved algorithms are reliable to use even in low light. • DISADVANTAGES • It must be a smart phone operating on Android/ ios/ windows. • The camera quality must be >0.3 megapixel and flash must required in low light. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 8
  • 9. Literature survey: Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling • Track user position by by estimating distances from WiFi APs within two radio ranges • Uses Received Signal Strength of device to evaluate distance. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 9
  • 10. Literature survey: Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling • ADVANTAGES • Simple algorithm to track the smartphone location • No modification required in AP’s. • DISADVANTAGES • Possible error in location. • More number of AP’s are required, tends to increase in cost. 24/04/2014 WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 10
  • 11. WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE 24/04/2014 11 Praposed work: Flowchart for wireless biometric system
  • 12. Result and Analysis • The Geofence using wifi can capable of covering small as well as large area according to the no of nodes used • For authentication in geofence the smartphone is most suitable device for wireless biometric system • The positioning of the device in geofence with dissimilarity matrix of AP’s can be error prone but suitable to used in geofence. 24/04/2014 12WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 13. Conclusion • In this report a novel approach is proposed for wireless authentication using mobile device & user authentication applying biometrics. The proposed approach can be applied in various mobile platforms without requiring dedicated biometric scanners and can also enhance protection against intruders, theft and unwanted persons which are not allowed to enter in the area. 24/04/2014 13WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 14. Future Work • wireless biometric system can be used in the corporate, colleges for the attendance system. • It is also used as the authentication system for space stations and military bases, or highly confidential areas. 24/04/2014 14WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 15. References 1. A Biometrics-Based Secure Architecture for Mobile Computing Muhammad Faysal Islam Department of Engineering Management and Systems Engineering George Washington University, Washington, DC. M. Nazrul Islam, Senior Member IEEE Department of Security Systems State University of New York, Farmingdale, New York(2012) 2. Autonomous Construction of a WiFi Access Point Map Using Multidimensional Scaling Jahyoung Koo and Hojung Cha Department of Computer Science, Yonsei University, 134 Shinchon-Dong Sudaemoon-Ku, Seoul, Korea koojh@cs.yonsei.ac.kr, hjcha@cs.yonsei.ac.kr(2011) 3. Geo-fencing: Confining Wi-Fi Coverage to Physical Boundaries Anmol Sheth1, Srinivasan Seshan2, and David Wetherall1,3 1 Intel Research, Seattle 2 Carnegie Mellon University 3 University of Washington(2009) 4. Edney, J., Arbaugh, W.A.: Real 802.11 Security: Wi-Fi Protected Access and 802.11i, vol. 1. Addison-Wesley, Reading (2001) 5. Klasnja, P., Consolvo, S., Jung, J., Greenstein, B., LeGrand, L., Powledge, P., Wetherall, D.: When I am on Wi-Fi, I am Fearles: Privacy concerns and practices in everyday Wi-Fi use. In: Proceedings of ACM CHI Conference on Human Factors in Computing Systems (to appear, 2009) 6. Kapadia, A.,Henderson,T., Fielding, J.J., Kotz, D.:Virtual walls: Protecting digitalprivacy in pervasive environments. In: LaMarca, A., Langheinrich, M., Truong, K.N.(eds.) Pervasive 2007. LNCS, vol. 4480, pp. 162–179. Springer, Heidelberg (2007) 7. Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: MobiCom 2007: Proceedings of the 13th Annual International Conference on Mobile Computing and Networking (September 2007) 8. Saponas, T., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: privacy trends in consumer ubiquitous computing. In: SS 2007: USENIX Security Symposium, Berkeley, CA, USA, pp. 1–16. USENIX Association (2007) 9. Balakrishnan, H., Padmanabhan, V., Seshan, S., Katz, R.: A comparison of mechanisms for improving TCP performance over wireless links. IEEE/ ACM Transactions on Networking 5(6), 756–769 (1997) 10. Sat, B.,Wah, B.: Analysis and evaluation of the skype and google-talk voip systems. In: IEEE International Conference on Multimedia and Expo., pp. 2153–2156. ACMPress, New York (2006) 24/04/2014 15WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE
  • 16. Thank You!!! 24/04/2014 16WIRELESS BIOMETRIC SYSTEM USING SMARTPHONE IN GEOFENCE