Tuesday, May 5, 2020

Pros and Cons of Using Biometric-

Question: Using an Internet search, explore an Internet of Things project currently underway or already in place. Provide a detailed account of the issues it responds to and outline its key features. Answer: Topic of the project The topic of the project is Internet of things Introduction and the problem The technology internet of things is defined as the interlinking of the physical device such as the fan, TV, oven or any other electronic devices. These electronic devices are attached with sensors or actuators which allow these devices to exchange data. These data contains the instructions of the user on which these devices perform operations. The following assignment is project related to Internet of things, the chosen project for this assignment is biometrics system. The biometric is the machine which is used for security purpose in identification and authentication services. These devices automatically identify and recognize the identity of a particular person through different behavioral characteristics (Gubbi, 2013). The behavioral characteristics include fingerprints of thumb, facial, voice, eyes recognition. In various organization where thousands of worker are working at a time, it is difficult and time taking to check the identity of each employee whether he is working in that company or not. If a person who is not the part of that organization enters the premises with the intention of stealing the confidential data, he can succeed in his work if the organization does not have a strong identity checking machine. Solution with the features The problem arising in the previous section is solved by the usage of biometric machine. Nowadays every company install a biometric system at the entrance point of the office and each employee has to give prove his identity in terms of voice, face, eye that he is working for that organization. The biometrics captures the identity and matches with the registered employee identity which can be vocal, iris, thumb if the match is successful then the person will be allowed to enter or else he cannot enter the organization. Most organization uses the biometric for the attendance purpose. The biometric records the entry and exit time of the employee during identity check thus helping company to know whether the employee is late or early and can be penalized according to the same (Mhaske Patankar, 2013). Besides the attendance using biometric saves time, easy to use and affordable thus it is the great machine to check the persons identification in seconds. Diagram to visualize the project Figure 1: Biometric system (Source: Rao Satoa, 2013) Explanation of the working To construct a simple biometric finger print scanner following things are required(Rao Satoa, 2013): Fingerprint scanner (and JST connector) Serial LCD kit (w/ATmega328) ATtiny85 NPN transistor Buzzer Speaker wire 3D printed case Copper tape 5V voltage regulator 9V battery 9V battery connector SPDT limit switch The ATmega328 is a powerful processor which not only controls the LCD display but also can act as audrino to exchange the data with the fingerprint scanner. It communicates at 3.3 volt the component is soldered with the ATmega328 and the sample fingerprint is stored in ATmega328 in it fingerprints database. After the fingerprints the programming is performed for the LCD test and for the blink test so that it will alert the user fingerprint is not registered (Bolle et al, 2013). A serial data is transferred to the by the fingerprint scanner to the microcontroller. The code received is then matched with predefined numbers stored in the flash ROM, and then a signal high is send to the module 1 if the number becomes valid. Pros and Cons of using biometric The usage of biometric has various advantages: Time The biometric sensors take least time to check the identity of the person thus has lage application in the big organization. Application Besides the finger biometric also has capability to scan the voice, iris, face thus provide more security in the scanning of the identity. Accountability Biometric identification creates a concrete account trail to help establish accountability. Each negative or positive action of the employee will be recorded and clearly documented by the individual associated with it which reduces the possibility of system misuse and fraud (Xia et al, 2012). Cons of using Biometric system Security There are various links available online which shows how to forge a biometric system therefore if a organization does not have a good biometric it can be easily hacked. In order to install stronger biometric system greater budget is required (Das, 2013). Reset If the data of the biometric system is hacked or compromised with the security then there is no way the data can be retrieved back. Breaching It is easy to breach the biometric if the someone presents the recorded voice of the registered person then it can be easily opened. Conclusion From the assignment it can be Internet of things is used to connect the appliances which contains an IP address. The biometric scanner which is the application of the Internet of things has saved huge time in verifying the data of the user as it can do that in seconds. The usage of biometric scanner has huge application in business sector as it can be upgraded to provide the security to the data of the company. Though it has some limitation but it can be overcome through usage of artificial intelligence in the syatem References Bolle, R. M., Connell, J., Pankanti, S., Ratha, N. K., Senior, A. W. (2013).Guide to biometrics. Springer Science Business Media. Das, R. (2013). Biometrics in the cloud.Keesing Journal of Documents and Identity,42, 21-23. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions.Future generation computer systems,29(7), 1645-1660. Mhaske, V. D., Patankar, A. J. (2013, December). Multimodal biometrics by integrating fingerprint and palmprint for security. InComputational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on(pp. 1-5). IEEE. Rao, S., Satoa, K. J. (2013). An attendance monitoring system using biometrics authentication.International Journal of Advanced Research in Computer Science and Software Engineering,3(4). Xia, F., Yang, L. T., Wang, L., Vinel, A. (2012). Internet of things.International Journal of Communication Systems,25(9), 1101.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.