Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies

Автор: Fredrick R. Ishengoma

Журнал: International Journal of Information Engineering and Electronic Business(IJIEEB) @ijieeb

Статья в выпуске: 6 vol.6, 2014 года.

Бесплатный доступ

With the rapid advancement in technology, smart homes have become applicable and so the need arise to solve the security challenges that are accompanied with its operation. Passwords and identity cards have been used as traditional authentication mechanisms in home environments, however, the rise of misuse of these mechanisms are proving them to be less reliable. For instance, ID cards can be misplaced, copied or counterfeited and being misused. Conversely, studies have shown that biometrics authentication systems particularly Iris Recognition Technology (IRT) and Fingerprint Recognition Technology (FRT) have the most reliable mechanisms to date providing tremendous accuracy and speed. As the technology becomes less expensive, application of IRT& FRT in smart-homes becomes more reliable and appropriate solution for security challenges. In this paper, we present our approach to design an authentication system for smart homes based on IRT, FRT and ARM7TDMI-S.The system employs two biometrics mechanisms for high reliability whereby initially, system users must enroll their fingerprints and eyes into the camera. Iris and fingerprint biometrics are scanned and the images are stored in the database. In the stage of authentication, FRT and IRT fingerprint scan and analyze points of the user's current input iris and fingerprint and match with the database contents. If one or more captured images do not match with the one in the database, then the system will not give authorization.

Еще

ARM7TDMI-S, Authentication, Fingerprint Recognition Technology, Iris Recognition Technology and Smart Homes

Короткий адрес: https://sciup.org/15013321

IDR: 15013321

Текст научной статьи Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies

Published Online December 2014 in MECS

Safety is one of the most significant necessities for people at home. A smart home refers to a home that is combined with a highly sophisticated automatic systems for monitoring temperature, multimedia, windows, doors, alarms, alerts and various additional tasks monitored by computer systems [1]. A smart home technology offers a remote interface to home automation system itself, through a telephone line, wireless transmission or the web internet, monitored through a browser, smartphone or a a browser [2].

There exist several security and authentication mechanisms that can be embedded in a smart home. These include the use of numerical codes like passwords, Personal Identification Number (PIN) and passphrases, security tokens like smart card and biometric authentication methods. However, studies have shown that numerical codes, smart cards and physical keys mechanisms have their associated drawbacks [3,4]. Table one shows the risks associated with using various security mechanisms for smart home authentication.

Table 1: Risks associated with various security tokens

Token

Risks

Identity card (ID)

Lost, stolen, duplicate, left at home

Physical keys

Lost, stolen, duplicate, left at home

Password

Forgotten, shared, observed, hacked

Magnetic stripe cards

Lost, stolen, duplicate, left at home

Smart card

Lost, stolen, duplicate, left at home

Signature

Imitated

Iris technology uses the iris part of the human eye that features a complex system for authentication. The complex system encompasses the combination of different human eye features [5]. It is considered one of the most reliable authentication mechanisms to date. Fingerprint Recognition Technology (FRT) uses human fingerprint to compare the fingerprint patterns in order to identify a person.

In this paper, we present the design of an authentication system for smart home that combines the two-biometrics mechanisms: IRT and FRT. Our research work aims to define a framework that is most reliable for authentication of smart homes.

We start by providing related work in section 2. Section 3 is dedicated to the overview of biometric authentication. Section 4 presents the proposed authentication system with hardware and software designs. Section 5 describes the implementation of the proposed system. Challenges are discussed in section 6 and section 7 presents the conclusion

  • II.    Related Work

To our knowledge, not much work has been done to explore the biometric authentication mechanisms specifically for smart homes. However, it has been noted that, the use of biometrics technology for authentication systems in financial sector has been widely studied with various systems and applications proposed by [6-10].

The work by Rajyalakshmi [11] explores the concept of fingerprint and Iris identification on ATM machines. The proposed system combines a number of authentication mechanisms (id card, RFID, passwords, fingerprint and iris recognition) together with a series of authentication steps for ATM access. While this system seems to have the high level of security, the 5 levels of authentication for the user can be burdensome.

Srinivasan [12] proposes the system that uses height sensors for identification in multi-residents home environment. In this system, ultrasonic range sensors are positioned on top of the door at home where they can be used to recognize residents as they walk throughout a home. However this system is limited since it uses a height, which is a weak biometric. The system is limited to the home environment with a small number of residents where height difference can be used as a factor for resident recognition and cannot be used with large population.

Fahmi [13] proposes an authentication system for smart homes that uses ear recognition. In this system, the home server is connected to user’s smartphone to authenticate the user once is within the smart home proximity. The system captures ear image and process its Monogenic Representation Local Binary Pattern (M-LBP). The pattern is then compared to the template in the server for recognition. One limitation of this system is that, the user must have a smartphone that is configures to work with the system every time for authentication. Moreover, it is not known how the system is susceptible to fraud, example when a person walks to the door with a configured smartphone and a picture/3D model of the ear of known system user.

El-Basioni et.al [14] proposes a design for the smart home using the wireless sensor network and the biometric technologies. The proposed system employs the biometric in the authentication for home entrance that enhances home security as well as easiness of home entering process. The proposed smart home Wireless Biometric Smart Home (WB-SH) integrates the wireless sensor network and biometric.

Rodrigues et al. [15], reports some experiments that assess the potential use of a footstep biometric verification system for a smart home environment. The study presents a semi-automatic capture system and report results on a database with independent development and evaluation datasets comprised of more than 3500 footsteps collected from 55 persons.

While some of these research works are closely related to our work in terms of biometric authentication mechanism, none of the work has explored the design of the two combined biometric security mechanisms for smart homes environment. This work presents a system for a reliable authentication in smart homes.

  • III.    Biometric Authentication

  • 3.1    Physical Based Mechanism

  • 3.2    Behavior Based Mechanism

Biometric authentication systems are gaining attractiveness as a way of providing access in different environments that needs security. Biometric authentication systems are classified into 2 groups: Physical based mechanisms and behavior based mechanisms.

Psychological based mechanisms are the ones that emphases on observing the biological and the physiological characters of the human being. Examples of physical features are fingerprint and eye iris.

Behavior based mechanisms are the ones that emphases on observing the non-biological or the non-physiological characters of the human being. Examples of behavior-based mechanism include the ones that involve gait and typing patterns biometrics.

Both psychological and behavior based biometrics mechanisms works by comparing the input biometric with the saved biometric template. The comparison provides a matching score using hamming distance, which is used to judge whether the person should be given access or not. Hamming distance is a metric that measures the number of positions between two strings of equal length at which the corresponding symbols are different. Hamming Distance (HM) is defined as:

Fig 1: Example of how Hamming Distance works with the calculated Hamming Distance between the numbers being 3.

Algorithm 1: Typical Biometric-Based Algorithm for Authentication System

  • 1:    //BT: Biometric

  • 2:    //BT: Biometric Template

  • 3:    Capture the chosen BT

(Retina/Iris/Fingerprint/Voice/Hand/Face)

  • 4:    Process the BT

  • 5:    Enroll the BT

  • 6:    Store the BT in a local or a central repository

  • 7:    Live-scan the chosen BT

  • 8:    Process the BT and extract the BT

  • 9:    Compare the scanned BT against the stored templates

  • 10:    Provide a matching score to the application

  • 11:    Log the system usage pathway

  • 1)    Fingerprint Recognition Technology (FRT)

This is the type of biometric security that uses the human fingerprint and compares its patterns for identifying a person. The recognition technology involves two steps: Enrolment step and authentication step as shown in figure 2. In enrolment step, using fingerprintcapturing device a user’s fingerprint image is captured and saved in the database.

Fig 2: FRT authorization mechanism stage 1.

In authentication process, the user places his hand on the fingerprint-capturing device whereby it captures his image and compares with the one in the database. If matches then access is granted.

Fig 3: FRT authorization mechanism stage 2.

  • 2)    Iris Recognition Technology (IRT)

This is the type of biometric mechanism that uses iris of the eye and compares iris patterns for identifying a person. Iris patterns are distinctive and their structures are composed of complicated unique patterns that are not changed till the end of life. With 266 mathematically unique features composed of pigmented vessels and ligaments, the chances of 2 irises to match are very negligible.

The first phase of authentication by using iris technology involves iris image acquisition. User stares at the special camera for some seconds and the camera scan the eye image. The captured digital image is processes by an algorithm and iris is extracted. The iris image is normalized to solve the imaging discrepancies. The patterns that constitute the iris and its surroundings (circular iris, eye lids and pupils) are located by using the formula:

max ( , Xp , Уо)| Ga x ( , xp , y„ ) ( , ? ) as |       (2)

Where:

I ( X , У )- Eye image, r - radius, GCT - Gaussian Smoothing Function, s - Contour of the circle given by r , x0 , Уо .

The circular path is found by changing the radius and the (x, y) positions of the contour of the circle. The precise location of the circular path is obtained through operator application and Gaussian smoothing function. The procedure is the same when searching for eyelids, however here the path is changed from circular to an arc. Normalization is applied to the segmented iris and transformed to polar image coordinates. A Gabor filter 2D form of the image is expressed as:

( X-Xp )( У-Уо )

| a2        g2   | е-гтг|u0 (     ) + v0 (У-Уо)|

Where:

( %o , Уо )- Image position, ( a , P )- (Width, Length), (l^o , v0)- Modulation

During system authorization process, using hamming distance the two iris codes (user’s input and the one stored in the database) are compared. Based on the score authorization decision follows. The overall process is shown in figure 4.

Fig 4: Iris recognition process.

  • IV.    Experiment and Analysis

  • 4.1    Hardware design

    • 1)    LPC 2146 Microcontroller

      The proposed system is designed to use the LPC 2146 microcontroller that is built on ARM7TDMI-S CPU. The microcontroller is equipped with a 128-bit memory and 32kB – 512kB flash memory. LPC2146 was chosen due its tiny size and low power consumption that makes it more perfect for access control applications.

  • 2)    Iris scanning camera

This system component is used to capture the iris image of the user. The user will stand, face and stare at this camera. This camera will take the image of user’s eye and scan his iris.

  • 3)    Fingerprint scanner (FIM303HV)

This system component is used to capture the fingerprints of the user. When used at the first time, the user will place his finer on this device, and the device will capture his fingerprint and save in the memory unit. For authentication stage, the user will place his finger, and the device will capture the image and compare with the one saved in the database.

  • 4)    Buzzer

This system component is used to generate various warning tones example when the user is delaying to place his finger for scanning after the iris recognition step is over.

  • 5)    Output display

  • 4.2    Software design

This system component is used to output result of the authorization process. If the iris patterns of the user and the one in the database matches, then the system will grant the user access and the OD will display a message "Access Granted". However, if the iris patterns of the user and the one in the database does not match, then the system will not grant the user access and the OD will display a message "Access Denied".

Fig 5: Block diagram of the proposed system

In this section we present our proposed algorithm that combines fingerprint and iris technology for authentication in smart homes. The proposed algorithm first scans the fingerprint, process and save its image in smart home server. It then scans the iris of the user, process and save its image pattern in the smart home server.

When the user tries to access the system for authorization, the user will have to put the biometric 1 (Fingerprint). The fingerprint will be scanned, processed to obtain its pattern. The obtained pattern will be matched with the one saved in the smart home server using hamming distance. If the patterns match each other, the system will let the user enter the second authorization stage, which is authorization with IRT.

The user will stand in front of the camera whereby his eye will be scanned and processed to obtain its unique patterns. The patterns will be compared with the ones in smart home server, whereby if the patterns match, then the user will be granted access to the smart home. However, if one or both of the authentication mechanism fails the user will be denied access to the smart home.

Fig 6: Flow chart of the proposed system

Algorithm 2:   Proposed Fingerprint-iris Based

Algorithm for Smart Homes Authentication System.

Input: Biometric (Fingerprint, Iris)

Output: System Authorization

  • 1:    //BT1: Fingerprint biometric

2:// BT2: Iris biometric

  • 3:    //BT: Biometric Template

  • 4:    //BT1: Biometric Template 1

  • 5:    //BT2: Biometric Template 2

  • 6:    //MS: Matching Score

  • 7:    //MSSA: Matching Score for System Authorization

  • 8:    Capture user’s BT1

  • 9:    Process the BT1

  • 10:    Enroll the BT1

  • 11:    Store the BT1 in a local or a central repository

  • 12:    Capture user’s BT2

13:Process the BT2

  • 14:    Enroll the BT2

  • 15:    Store the BT2 in a local or a central repository

  • 16:    Live-scan the usersBT1

  • 17:    Process the BT1 and extract the BT1

  • 18:    Compare the scanned BT1 against the stored templates

    Fig. 8. FIM3030HV Module


  • 19:    Provide a matching score to the application

  • 20:    If MS for BT1 MSSA

  • 21:    Live-scan the usersBT2

  • 22:    Process the BT2 and extract the BT2

  • 23:    Compare the scanned BT2 against the stored templates

  • 24:    Provide a matching score to the application

  • 25:    If MS for BT2 MSSA

  • 26:    Provide access

  • 27:    else

  • 28:    Deny access

  • 29:    end if

  • 30:    else

    Fig. 9. Welcome screen


  • 31:    end if

  • 32:    Log the system usage pathway

  • V.    Implementation

    The proposed prototype was coded and tested to be working successfully: A CMOS camera integrated with infrared illumination and a cutter filter components was used to capture user’s iris image. The infrared illumination had a capacity of up to 790nm. The camera was attached on the door in a fixed position to maintain stability. The FIM3030HV finger print scanner was used.

All the other modules were implemented in the GUI for better and easy use of the system. Figure 7 shows the CMOS camera used, figure 8 shows the FIM3030HV module used, and figure 9 shows the welcome screen of the prototype in GUI. Figure 10 shows the process of iris image processing in the proposed prototype. The Iris application of the system was programmed by convolving the normalized iris area by using 1D Log-Gabor filters and phase quantizing the output for producing a bitwise biometric template. The matching metric used was the Hamming Distance (HM).

Fig. 10. Iris image processing

After the iris recognition step, the fingerprint recognition follows. A user places his finger on the FIM3030HV fingerprint-scanner as in figure 11; the scanner scans the fingerprint and compares with it in the database. After the matching procedure, the Output Display will display the result along with authorization or not. The results of the experiment reports that the proposed Fingerprint-Iris based system performs it operation faster and with finest recognition performance. The experiment gave good response and proved the proposed system to be applicable in real environment.

Fig 7: CMOS camera

Fig. 11. System waits for user to place his finger

  • VI.    Challenges And Conclusion

The proposed system is faced with a challenge for the user who lacks one of the organs that are used in authorization process in the system. Example, if the user lacks both eyes and/or both hands. Also, when the user has contact lenses or sunglasses and also when the user’s finger is wet or has wrinkles.

The need for a reliable authentication system at home arises as the misuses of traditional mechanisms (passwords, ID, tokens etc.) increases. This paper proposed a fast and highly reliable authentication system for smart homes that employs double metric mechanisms (Fingerprint and iris recognition technologies). The proposed  authentication  system  scans the  user’s biometrics and compared with the ones saved in the database for authentication. The result determines if the user will gain access or not. Our future work will focus on dealing with challenges that are facing the proposed prototype example, difficulties when the user has doesn't have an eye/palm, when the user is wearing contact lenses or sunglasses and when the user have wet or wrinkled fingers.

Список литературы Authentication System for Smart Homes Based on ARM7TDMI-S and IRIS-Fingerprint Recognition Technologies

  • D. Bregman. Smart Home Intelligence – The eHome that Learns [J]. International Journal of Smart Home, Vol.4, No.4, 2010.
  • J. Travis. LabVIEW for Everyone: Graphical Programming Made Easy and Fun [M]. Third Edition. Prentice Hall Professional, 2007.
  • D. Zhang. Biometrics Technologies and Applications [C]. Proc. of International Conference on Image and Graphics, pp.42-49, Tianjing, China, 2000.
  • Lawton. Biometrics: A New Era in Security [J]. IEEE Computer, pp.16-18, 1998.
  • S.V. Sheela and P.A Vijaya. Iris Recognition Methods – Survey [J]. International Journal of Computer Applications, Vol. 3, No.5. pp. 19 -25, June 2010.
  • M. Subra and S. Vanithaasri. A Study on Authenticated Admittance of ATM Clients using Biometric based Cryptosystem [J]. International Journal of Advances in Engineering & Technology, Vol.4 Issue 2, Sep 2012.
  • Aru, OkerekeEze, IhekweabaGozie. Facial Verification Technology for Use In ATM Transactions [J]. American Journal of Engineering Research (AJER), Volume-02, Issue-05, pp-188-193, 2013.
  • Moses OkechukwuOnyesolu, Ignatus Majesty Ezeani. ATM Security using Fingerprint Biometric Identifier: An Investigative Study [J]. International Journal of Advanced Computer Science and Applications, Vol. 3, No. 4, 2012.
  • A.M. Lawan. Use of Biometrics to Tackle ATM Fraud [C]. International Conference on Business and Economics Research vol.1, IACSIT Press, Kuala Lumpur, Malaysia, 2011.
  • M. Prithika, P.Rajalakshmi. Credit Card Duplication and Crime Prevention Using Biometrics [J]. IOSR Journal of Computer Engineering (IOSR-JCE), Volume 10, Issue 1, 2013.
  • T. Rajyalakshmi, K.Koteswararao, K.Anuradha. The Design and Implementation of ID Authentication System Based on Fingerprint and Iris Identification [J]. International Journal of Professional Engineering Studies, Volume I-Issue 2, 2013.
  • Vijay Srinivasan, John Stankovic, Kamin Whitehouse. Using Height Sensors for Biometric Identification in Multi-resident Homes [C]. Pervasive Computing, 8th International Conference, Pervasive 2010, pp. 337-354, Helsinki, Finland, 2010.
  • A.P.N Fahmi. Hey Home, Open Your Door, I'm Back! Authentication System using Ear Biometrics for Smart Home [J]. International Journal of Smart Home, Vol. 7, No. 1, 2013.
  • Basma M. Mohammad El-Basioni, Sherie M. Abd El-Kader, and Mahmoud Abdelmonim. Smart Home Design using Wireless Sensor Network and Biometric Technologies [J]. International Journal of Application or Innovation in Engineering & Management, Volume 2, Issue 3, March 2013.
  • Ruben Vera Rodrigues, Richard P. Lewis, John S.D. Mason and Nicholas W.D. Evans. Footstep Recognition for a Smart Home Environment [J]. International Journal of Smart Home. Volume 2, No. 2April, 2008.
Еще
Статья научная