Three Level Authentication for Student Attendance Management System

Similar documents
International Journal of Emerging Technology & Research

BIOMETRIC BASED VOTING MACHINE

[Swain, 4(7): July, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

Voice Response System for Parents of Hostel Students

child check-in quick start version 12

Android based Attendance Management System Offline and Online accessibility

Smart Student Attendance System Using Face Detection

Design and implementation of fingerprint based bank locker system using ARM7 and GSM

ADVANCES in NATURAL and APPLIED SCIENCES

Getting Started in CAMS Enterprise

Automated Biometric Attendance Management System

GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION

Types of Peripheral Devices

Android Based Digital Attendance Recording System

Authentication Technologies

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN:

User Manual. BioTime Web

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

CAMS Enterprise. Application Portal. Unit4 Education Solutions, Inc. Published: 29 January Abstract

Web Site Guidelines. University of Texas at El Paso. Prepared by: The Office of Information Resources and Planning. November 16, 2004.

User Manual Documentation

Zodiac iclass OPERATOR GUIDE

Communication Tools Quick Reference Card

Classroom Automation System

CONTENTS 1) OVERVIEW OF ICAS 2. 2) DATA WAREHOUSING 4 Connecting on to ICAS 4 Logging on to ICAS 5

INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES

Introduction. Welcome to PeopleAdmin 7, the new and improved Online Employment System. This system allows applicants to:

ThinkVantage Fingerprint Software

DELIVERY NOTIFICATION SYSTEM USING WEB BASED FATIN NAJIBAH BT RADUAN CA09100

Smart Vehicle with Theft Prevention using GSM and GPS

How to access Launchpad and Textbooks online

for Credit is from January 22 through February 20 at midnight.

Implementation of Aadhaar Based EVM

Faculty Training. Blackboard I Workshop Bobbi Dubins

Parent Portal Account Registration and Password Reset/Account Look-up

FINGERPRINT BASED BIOMETRIC AUTHENTICATION

SECURE ENTRY SYSTEM USING MOVE ON APPS IN MOBILITY

BioPassport TM Enterprise Server

Assessment Data Online: Quick Start Guide

Brighton Central Schools Schooltool Parent Portal

PNB KIOSK BANKING SOLUTION KBS MANUAL FOR BCAs

Oklahoma School Testing Program (OSTP) & College and Career Readiness Assessments (CCRA) Portal User Guide

Secure Authentication for Internet environment using Biometric and One-Time Password

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

Minutiae Based Fingerprint Authentication System

RFID Based Security for Exam Paper Leakage using Electromagnetic Lock System

TOPSpro Quick Start Tutorial Overview

Meeting the requirements of PCI DSS 3.2 standard to user authentication

Payroll Made Easy: Developing a Web Based System for Student Employee Payroll

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

UNIVERSAL ACCOUNT NUMBER (UAN)

InfoEd Global SPIN Reference Guide

Using the New UCOP UAT Validation Reports For Undergraduate Admissions

Alkan University College Student Information Management System

Computerized Attendance System Using Face Recognition

Smart Campus an Android and Web based Application using. IoT and NFC Technology

Assessment Data Online: Admin Guide

Campus Solutions Self Service: Faculty Quick Reference Guide

Zodiac iclass II OPERATOR GUIDE

Creating a Parent Portal Account

Manual Visy Access Net. Visy Oy Hatanpään valtatie 34 D FI FINLAND tel fax

Zodiac Max OPERATOR GUIDE

Guide to All Saints College Edumate Parent Portal

Design of Campus one-finger Service System Based on Fingerprint Identification

Table of Contents.

Test Plan Specification

Wireless Fingerprint Attendance Management System

NCAA Compliance Forms Database Frequently Asked Questions. Are institutions required to use the NCAA Compliance Forms Database?

STUDENT REGISTRATION DATABASE (SRD) TABLE of CONTENTS

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

for Credit is between September 5 and October 3 at midnight.

Preface. Honorable customers,

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

BIOMETRIC PRINTER SECURITY SYSTEM

Digitized Engineering Notebook

2013 EDITION. V-Camp Student. Guide. INTERACTIVE GUIDE Use the buttons shown below to navigate throughout this interactive PDF BACK

M5 User Manual (V1.0)

Skyward Family Access Letter Instructions

Chapter 3: User Authentication

Microsoft Expression Web Basics of Creating a Web Site

TABLE OF CONTENTS PREFACE... 6 INTENDED AUDIENCE... 6 BEFORE YOU START... 6 I-SKOOL... 7 TECHNICAL SPECIFICATION... 7

JOHNSON COUNTY COMMUNITY COLLEGE COURSE SYLLABUS WEB CRN Web Scripting: JavaScript I

Master Student IT Guidebook. Step by Step Guide to IT Success in Zayed University

How do I sign up for a Canvas account as a parent?

BioEnable Iris Recognition Solutions

Parent Portal - Create an Account And Forgot Password

My VR Spot: TCS s New Video Management System

RescueAssist. Administrator Guide. LogMeIn, Inc. 320 Summer St., Boston MA LogMeIn, Inc. All rights reserved.

Getting Started Quick Start Guide

INVISION TM IRIS TIME CLOCK USER GUIDE. InVision Iris Time Clock

Canadian Access Federation: Trust Assertion Document (TAD)

A REVIEW ON RESEARCH ON AUTHENTICATING MACHINES BY USING HUMAN BIOMERTRIC

Winter School Year STI PD. Instructor User Manual

PowerTeacher Administrator User Guide. PowerTeacher Gradebook

International Journal of Informative & Futuristic Research ISSN:

Parent Portal - Create an Account and Forgot Password

E-Voting System based on Mobile using NIC and SIM

PowerSchool Parent Portal User Guide. PowerSchool Student Information System

NFC DESIGN FOR ATTENDANCE SYSTEM IN THE UNIVERSITY

Transcription:

Volume 119 No. 15 2018, 1997-2012 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ Three Level Authentication for Student Attendance Management System 1 G.Ravi kumar, 2 V.Sridhar, 3 T.Venu Gopal, 4 G.Nagendra 1,2 Assistant professor, 3,4 Associate professor 1,2,3,4 Department of Electronics and communication Engineering 1,2,3,4 Vidya Jyothi Institute of Technology,Aziz Nagar,Hyderabad,Telangana,India ABSTRACT: Authentication is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity. It s a mechanism of associating an incoming request with a set of identifying credentials. Most of the schools nowadays are implementing automated techniques and processes to meet their growing needs, and it can be best defined by widely used of computers and other device. Authentication is required mainly for the students and the faculty.this paper involves three levels of the user authentication. It contains three logins having three different kinds of password systems. Users would be given privilege to access their data at any time. This paper comprises of RFID system, Biometric system, and password based system. This way there would be negligible chances of boot or anyone to crack the passwords even if they have cracked first level. Hence while creating the technology the emphasis was put on the use of innovative and non-traditional methods. The system developed is user friendly and has simple interface. It provides strong security for the data. The paper involves in management of attendance of the student, maintaining the report up to date and time. Hardware components required are NI MYRIO, RFID readers and tags, finger print sensor, USB port, and male to female pin connectors. Keywords: Authentication, RFID system, Biometric system,ni MYRIO, finger print sensor, USB port 1. Introduction: Attendance Management System (AMS) is software developed for daily attendance of students. Previously, the college relied heavily on paper records. This paper focuses on preventing information in an easy way and intelligible manner which reduces paper and time. The paper makes use of database in order to keep a record of attendance and is used while generating a report for individual student. The system is fully controlled by administrator about the staff s profile, student information student attendance. The administrator can add new student, add new staff, view staff and student and view the student attendance report. The faculties are able to directly access all aspects of the student s progress through a secure, online interface embedded in the college website. After the class has been finished, the lecturer can view the student s attendance that has been saved in the faculty server. This system will also help in evaluating attendance eligibility criteria of a student. The faculty can also send messages to parents or guardians about the student performance and attendance by short listing the students. Hence, here communication is made easier with parents and faculty. The messages can be sent through SMS to the mobile number given in details of the students in the file. The purpose of developing this software is to computerize the tradition way of taking attendance. Another purpose of software is to generate the report automatically at the end of the session. Moreover, graphical user interface is provided in the proposed system, which provides user to deal with system very easily. 1997

2 Objectives: This paper was aimed at providing authentication schemes that shall bridge the gap between the security and usability. It is also aimed that security be achieved using RFID card as factor of authentication. This paper is aimed to the highest security in authenticating users through Fingerprint module. It provides the detailed database of the attendance which can be accessed through password. 2.1 RFID based attendance system: There are plenty of educational institutions that use RFID technology to record their student s attendance. Easy connection of data into internet make RFID technology most common technology used in recording student attendance However, RFID technologies incur high cost and need experience people to handle the system. Apart from that, biometrics technology is another tremendous use of technology in the domain of attendance reporting and tracking. Most of the biometrics technology used thumb print as sign of system entry. This allows a fair and reliable attendance to be recorded since there is no platform for any attendance cheating Biometric utilizes the fingerprint apart from thumb print method. 2.2 Biometric attendance system: Fingerprint peripheral used to record the attendance and sent the data into system using wireless technology. Image recording is another recent method used in recording attendance. These advanced technologies require high costing and well trained system developer. The Design and implementation of Student Attendance Management system based on MVC paper aims at the research of Web technology, as well as the attendance management system based on the campus network for all college students is implemented. The system is controlled by Web Work, while data or status and logic process are enforced by Action. The system uses Multilayer structure of J2EE which has been realized by Free Marker, Web Work and spring. Three technologies have been used in page resources layer: HTML performs structure of document, CSS defines style of document and JavaScript decides behavior of document. The presentation layer is realized by JSP in traditional Web development. The modules of attendance management system include importing course-plan, adding, and modifying, querying, verifying and summarizingattendanceinformation. 2.3 Automation of attendance system: The purpose of Automation of Attendance System using RFID, Biometrics, and GSM Modem with.net framework paper is to develop a wireless system to detect and maintain the attendance of a student and locate a student using RFID, Biometrics, and GSM modem with.net framework. For, this the students ID (identification) card is tagged with an Radio-frequency identification (RFID) passive tag which is matched against the database and only finalized once his fingerprint is verified using the biometric fingerprint scanner. The guardian is intimated by a SMS (short message service) sent using the GSM (Global System for Mobile Communications) modem. There will be a website through which the student, teacher and the guardians can view the status of attendance. The system can maintain the attendance records of both students and faculty members of an institution. The system can also detect the current location of the students, faculties, and other staff members anywhere within the domain of institution campus.an automated SMS service is facilitated in the system, which sends an SMS automatically to the parents in order to notify that their ward has successfully reached the college. Parents as well as student will be notified via e-mail, if the student is lagging behind in attendance. There is a functionality of automatic attendance performance graph in the system, which gives an idea of the student s consistency in attendance throughout the semester. 1998

3. Experimental Result: 3.1 Interfacing RFID Reader module with lab view Figure 3.1 RFID connections At a simple level, RFID systems consist of three components: an RFID tag orsmart label, an RFID reader, and antenna. RFID contains an integrated circuit and antenna, which are used transmit data to the RFID reader (also called interrogator). The reader then converts the radio waves to more unstable form of data. Information collected from the tags is then transferred through a communications interface to a host computer system, where the data can be stored in a database and analyzed at later time. The below block diagram shows the working of an RFID. Once the tag is scanned, the information store in the tag is passed to the code through the universal serial bus. The information is displayed in the data string.with the help of Lab view, the code has been developed so that the student can enter into the college by scanning his/her RFID. RFID sample code 1999

The execution of the RFID is discussed further with the help of block diagrams and front panel of the lab view. 3.2 Interfacing Fingerprint sensor with Lab view: Fingerprint processing has three primary functions: enrollment, searching and verification. Among these functions, enrollment which captures fingerprint image from the sensor plays an important role. Hardware connections are shown below. Figure 5.2 Fingerprint hardware connections Fingerprint sensor works with a demo software called SFG demo. SFG demo enrolls the fingerprints and stores them which are used for comparisons. 3.2.1 Working of SFG demo: Download the driver and SFG demo software with the respective window version. Then check for the port to which USB is connected. Click on open device and select the port number (ex: com1, com2, etc.) The dialogue will be displayed as open device successful. Click on capture. Put the finger on the sensor when blue light is turned on, the image will be captured. If the image is perfect enough to be used, save the image to the sample folder. Capture the images and save to the database with their respective names. Below diagram gives a clear picture about SFG demo. SFG demo application 2000

3.2.2 Execution of fingerprint module: The fingerprint sensor captures the fingerprints by the above process as mentioned. These fingerprints are compared with the template fingerprint using vision and motion tools by lab view software.the fingerprint code contains two cases where the code checks for the suitable fingerprints and gives access to either of the cases depending on the match.the below block diagram shows the execution of the fingerprint module in a clear descriptive way.the case below describes the true case where the given fingerprint are matched with the sample fingerprint.the name of the fingerprint is obtained in this case which is passed to the main VI through a global variable. Figure 3.3 Fingerprint Block diagram The case below describes the invalid case which is false where the template fingerprint is not matched with the samples in the database. Invalid data is sent through the global variable to the main VI. Figure 3.4 Fingerprint block diagram (false case) 2001

3.3 Algorithm for three level authentications: (4) Student enters Welcome check your RFID Yes (1) No Check RFID RFID success, Not authorized or Give fingerprint Not registered Waiting for FP data No Finger Yes (2) print? Success both RFID FP not matched and fingerprint 2002

Checking details CANCEL Login is successful (3) Logout 3.4 Block Diagram:The three level authentications include five cases namely welcome, RFID, Fingerprint, save data, Check details.the block diagrams of all the cases are shown below with brief description. Figure 3.5 Main Block diagram (Welcome case) The welcome case is the default case which is displayed in the status initially when the program is complied 2003

Figure 3.6 Main Block diagram (RFID True case) RFID case contains two sub cases where the true case displays welcome, check your RFID and the false case checks the RFID tag number with the stored database and displays the status respectively. After RFID case is complied, it gives access to the fingerprint. Figure 3.7 Block diagram (RFID False case) 2004

When the status is displayed as Give fingerprint, the fingerprint code is compiled which already discussed in above topic (3. 2). Figure 3.8 Block diagram (fingerprint false case) After the fingerprint is accessed, the code saves the details with the login time and date which is saved to the database for further access. Figure 3.9 Block diagram (save data: login case) 2005

The below block diagram gives the information about the log out time. If the RFID is scanned once again, the exit time sub VI is compiled internally and a pop up is displayed to log out. Figure 3.10 Block diagram (save data: logout case) Figure 3.11 Block diagram (check details: true case) 2006

Figure 3.12 Block diagram (check details: False case) 3.5 Password Level: This paper provides a password based access in order to view the attendance sheet which is updated every day. We implemented this to overcome the difficulties faced by the faculty during the attendance calculation of the students. The password and username are provided to the students and faculty in their database.the password code calculates the delay and working hours. This is shown in block diagram and front panel. Figure 3.13 Block diagram: password 2007

Figure 3.14 Front panel of password Hardware Connections 2008

3.6 Front Panel: 2009

3.7 Excel Output:The excel sheet is displayed below which gives the information about the students attendance for each and every day. Individual data: 2010

4. Conclusion: Authentication is the proper validation and right management of the user for accessing the resources of any information system. Single mechanism is not efficient and effective to provide adequate security. On that note we go for three level authentication technique which employs RFID, BIOMETRIC and PASSWORD to enhance the efficient security for the users. 5. Future Scope: Our application has immense scope of development in the future. Some of the points that can be taken into account at that point of time are:this paper can further be developed by using the camera based facial recognition technique for taking the attendance of the student. This would reduce manual work to a minimal level.voice recognition based attendance management. The system will mark the student s attendance when He /She give the roll call.we can add a GPS tracker to the student mobile system to keep a check on his present location. 6. References: [1] Angell, I., Kietzmann, J. (2006). "RFID and the end of cash?" (PDF). Communications of the ACM. 49 (12): 90 96. doi:10.1145/1183236.1183237. Retrieved 9 November 2013 [2] Attendance Management System, International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Issue 05, Volume 4 (May 2017) SPECIAL ISSUE [3] Multifactor Authentication System, International Journal of Advanced Research in Computer and Communication Engineering ISO 3297:2007 Certified Vol. 6, Issue 2, February 2017 [4] https://cdn-learn.adafruit.com/downloads/pdf/adafruit-optical-fingerprint-sensor.pdf [5] http://www.explainthatstuff.com/fingerprintscanners.html [6] http://www.technovelgy.com/ct/technology-article.asp 2011

2012