Three Level Authentication for Student Attendance Management System 1 G.Ravi kumar, 2 V.Sridhar , 3 T.Venu Gopal, 4 G.Nagendra 1,2 Assistant professor, 3,4 Associate professor 1,2,3,4 Department of Electronics and communication Engineering 1,2,3,4 Vidya Jyothi Institute of Technology,Aziz Nagar,Hyderabad,Telangana,India ABSTRACT: Authentication is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity. It’s a mechanism of associating an incoming request with a set of identifying credentials. Most of the schools nowadays are implementing automated techniques and processes to meet their growing needs, and it can be best defined by widely used of computers and other device. Authentication is required mainly for the students and the faculty.This paper involves three levels of the user authentication. It contains three logins having three different kinds of password systems. Users would be given privilege to access their data at any time. This paper comprises of RFID system, Biometric system, and password based system. This way there would be negligible chances of boot or anyone to crack the passwords even if they have cracked first level. Hence while creating the technology the emphasis was put on the use of innovative and non-traditional methods. The system developed is user friendly and has simple interface. It provides strong security for the data. The paper involves in management of attendance of the student, maintaining the report up to date and time. Hardware components required are NI MYRIO, RFID readers and tags, finger print sensor, USB port, and male to female pin connectors. Keywords: Authentication, RFID system, Biometric system,NI MYRIO, finger print sensor, USB port 1. Introduction: Attendance Management System (AMS) is software developed for daily attendance of students. Previously, the college relied heavily on paper records. This paper focuses on preventing information in an easy way and intelligible manner which reduces paper and time. The paper makes use of database in order to keep a record of attendance and is used while generating a report for individual student. The system is fully controlled by administrator about the staff’s profile, student information student attendance. The administrator can add new student, add new staff, view staff and student and view the student attendance report. The faculties are able to directly access all aspects of the student’s progress through a secure, online interface embedded in the college website. After the class has been finished, the lecturer can view the student’s attendance that has been saved in the faculty server. This system will also help in evaluating attendance eligibility criteria of a student. The faculty can also send messages to parents or guardians about the student performance and attendance by short listing the students. Hence, here communication is made easier with parents and faculty. The messages can be sent through SMS to the mobile number given in details of the students in the file. The purpose of developing this software is to computerize the tradition way of taking attendance. Another purpose of software is to generate the report automatically at the end of the session. Moreover, graphical user interface is provided in the proposed system, which provides user to deal with system very easily. International Journal of Pure and Applied Mathematics Volume 119 No. 15 2018, 1997-2012 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ Special Issue http://www.acadpubl.eu/hub/ 1997
16
Embed
Three Level Authentication for Student Attendance ...Three Level Authentication for Student Attendance Management System 1G.Ravi kumar ,2V.Sridhar, 3T.Venu Gopal ,4G.Nagendra 1,2Assistant
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Three Level Authentication for Student Attendance Management System
1G.Ravi kumar,
2V.Sridhar
,3T.Venu Gopal,
4G.Nagendra
1,2Assistant professor,
3,4Associate professor
1,2,3,4Department of Electronics and communication Engineering
1,2,3,4Vidya Jyothi Institute of Technology,Aziz Nagar,Hyderabad,Telangana,India
ABSTRACT:
Authentication is the act of confirming the truth of an attribute of a single piece of data
claimed true by an entity. It’s a mechanism of associating an incoming request with a set of
identifying credentials. Most of the schools nowadays are implementing automated techniques
and processes to meet their growing needs, and it can be best defined by widely used of
computers and other device. Authentication is required mainly for the students and the
faculty.This paper involves three levels of the user authentication. It contains three logins having
three different kinds of password systems. Users would be given privilege to access their data at
any time. This paper comprises of RFID system, Biometric system, and password based system.
This way there would be negligible chances of boot or anyone to crack the passwords even if
they have cracked first level. Hence while creating the technology the emphasis was put on the
use of innovative and non-traditional methods. The system developed is user friendly and has
simple interface. It provides strong security for the data. The paper involves in management of
attendance of the student, maintaining the report up to date and time. Hardware components
required are NI MYRIO, RFID readers and tags, finger print sensor, USB port, and male to
female pin connectors.
Keywords: Authentication, RFID system, Biometric system,NI MYRIO, finger print sensor,
USB port
1. Introduction: Attendance Management System (AMS) is software developed for daily
attendance of students. Previously, the college relied heavily on paper records. This paper
focuses on preventing information in an easy way and intelligible manner which reduces paper
and time. The paper makes use of database in order to keep a record of attendance and is used
while generating a report for individual student. The system is fully controlled by administrator
about the staff’s profile, student information student attendance. The administrator can add new
student, add new staff, view staff and student and view the student attendance report. The
faculties are able to directly access all aspects of the student’s progress through a secure, online
interface embedded in the college website. After the class has been finished, the lecturer can
view the student’s attendance that has been saved in the faculty server. This system will also help
in evaluating attendance eligibility criteria of a student. The faculty can also send messages to
parents or guardians about the student performance and attendance by short listing the students.
Hence, here communication is made easier with parents and faculty. The messages can be sent
through SMS to the mobile number given in details of the students in the file. The purpose of
developing this software is to computerize the tradition way of taking attendance. Another
purpose of software is to generate the report automatically at the end of the session. Moreover,
graphical user interface is provided in the proposed system, which provides user to deal with
system very easily.
International Journal of Pure and Applied MathematicsVolume 119 No. 15 2018, 1997-2012ISSN: 1314-3395 (on-line version)url: http://www.acadpubl.eu/hub/Special Issue http://www.acadpubl.eu/hub/
1997
2 Objectives: This paper was aimed at providing authentication schemes that shall bridge the gap
between the security and usability. It is also aimed that security be achieved using RFID card as
factor of authentication. This paper is aimed to the highest security in authenticating users
through Fingerprint module. It provides the detailed database of the attendance which can be
accessed through password.
2.1 RFID based attendance system:
There are plenty of educational institutions that use RFID technology to record their
student’s attendance. Easy connection of data into internet make RFID technology most common
technology used in recording student attendance However, RFID technologies incur high cost
and need experience people to handle the system. Apart from that, biometrics technology is
another tremendous use of technology in the domain of attendance reporting and tracking. Most
of the biometrics technology used thumb print as sign of system entry. This allows a fair and
reliable attendance to be recorded since there is no platform for any attendance cheating
Biometric utilizes the fingerprint apart from thumb print method.
2.2 Biometric attendance system:
Fingerprint peripheral used to record the attendance and sent the data into system using
wireless technology. Image recording is another recent method used in recording attendance.
These advanced technologies require high costing and well trained system developer. The
Design and implementation of Student Attendance Management system based on MVC paper
aims at the research of Web technology, as well as the attendance management system based on
the campus network for all college students is implemented. The system is controlled by Web
Work, while data or status and logic process are enforced by “Action”. The system uses Multi-
layer structure of J2EE which has been realized by Free Marker, Web Work and spring. Three
technologies have been used in page resources layer: HTML performs structure of document,
CSS defines style of document and JavaScript decides behavior of document. The presentation
layer is realized by JSP in traditional Web development. The modules of attendance management
system include importing course-plan, adding, and modifying, querying, verifying and
summarizingattendanceinformation.
2.3 Automation of attendance system:
The purpose of Automation of Attendance System using RFID, Biometrics, and GSM
Modem with .NET framework paper is to develop a wireless system to detect and maintain the
attendance of a student and locate a student using RFID, Biometrics, and GSM modem with .net
framework. For, this the students ID (identification) card is tagged with an Radio-frequency
identification (RFID) passive tag which is matched against the database and only finalized once
his fingerprint is verified using the biometric fingerprint scanner. The guardian is intimated by a
SMS (short message service) sent using the GSM (Global System for Mobile Communications)
modem. There will be a website through which the student, teacher and the guardians can view
the status of attendance. The system can maintain the attendance records of both students and
faculty members of an institution. The system can also detect the current location of the students,
faculties, and other staff members anywhere within the domain of institution campus.An
automated SMS service is facilitated in the system, which sends an SMS automatically to the
parents in order to notify that their ward has successfully reached the college. Parents as well as
student will be notified via e-mail, if the student is lagging behind in attendance. There is a
functionality of automatic attendance performance graph in the system, which gives an idea of
the student’s consistency in attendance throughout the semester.
International Journal of Pure and Applied Mathematics Special Issue
1998
3. Experimental Result:
3.1 Interfacing RFID Reader module with lab view
Figure 3.1 RFID connections
At a simple level, RFID systems consist of three components: an RFID tag orsmart label,
an RFID reader, and antenna. RFID contains an integrated circuit and antenna, which are used
transmit data to the RFID reader (also called interrogator). The reader then converts the radio
waves to more unstable form of data. Information collected from the tags is then transferred
through a communications interface to a host computer system, where the data can be stored in a
database and analyzed at later time.
The below block diagram shows the working of an RFID. Once the tag is scanned, the
information store in the tag is passed to the code through the universal serial bus. The
information is displayed in the data string.With the help of Lab view, the code has been
developed so that the student can enter into the college by scanning his/her RFID.
RFID sample code
International Journal of Pure and Applied Mathematics Special Issue
1999
The execution of the RFID is discussed further with the help of block diagrams and front
panel of the lab view.
3.2 Interfacing Fingerprint sensor with Lab view:
Fingerprint processing has three primary functions: enrollment, searching and
verification. Among these functions, enrollment which captures fingerprint image from the
sensor plays an important role. Hardware connections are shown below.
Figure 5.2 Fingerprint hardware connections
Fingerprint sensor works with a demo software called SFG demo. SFG demo enrolls the
fingerprints and stores them which are used for comparisons.
3.2.1 Working of SFG demo:
Download the driver and SFG demo software with the respective window version.
Then check for the port to which USB is connected. Click on open device and
select the port number (ex: com1, com2, etc.)
The dialogue will be displayed as open device successful. Click on capture.
Put the finger on the sensor when blue light is turned on, the image will be
captured. If the image is perfect enough to be used, save the image to the sample
folder.
Capture the images and save to the database with their respective names.
Below diagram gives a clear picture about SFG demo.
SFG demo application
International Journal of Pure and Applied Mathematics Special Issue
2000
3.2.2 Execution of fingerprint module:
The fingerprint sensor captures the fingerprints by the above process as
mentioned. These fingerprints are compared with the template fingerprint using vision and
motion tools by lab view software.The fingerprint code contains two cases where the code
checks for the suitable fingerprints and gives access to either of the cases depending on the
match.The below block diagram shows the execution of the fingerprint module in a clear
descriptive way.The case below describes the true case where the given fingerprint are matched
with the sample fingerprint .The name of the fingerprint is obtained in this case which is passed
to the main VI through a global variable.
Figure 3.3 Fingerprint Block diagram
The case below describes the invalid case which is false where the template fingerprint is not
matched with the samples in the database. Invalid data is sent through the global variable to the
main VI.
Figure 3.4 Fingerprint block diagram (false case)
International Journal of Pure and Applied Mathematics Special Issue
2001
3.3 Algorithm for three level authentications:
Student enters
(4)
Welcome check your RFID
Yes (1)
No
Check
RFID
RFID success,
Not authorized or
Give fingerprint Not registered
Waiting for FP data
No Finger Yes (2)
print
?
FP not matched
Success both RFID
and fingerprint
International Journal of Pure and Applied Mathematics Special Issue
2002
Checking details
CANCEL Login is successful
(3) Logout
3.4 Block Diagram:The three level authentications include five cases namely welcome, RFID,
Fingerprint, save data, Check details.The block diagrams of all the cases are shown below with
brief description.
Figure 3.5 Main Block diagram (Welcome case)
The “welcome” case is the default case which is displayed in the status initially when the program is complied
International Journal of Pure and Applied Mathematics Special Issue
2003
Figure 3.6 Main Block diagram (RFID True case)
RFID case contains two sub cases where the true case displays “welcome, check your RFID” and
the false case checks the RFID tag number with the stored database and displays the status
respectively. After RFID case is complied, it gives access to the fingerprint.
Figure 3.7 Block diagram (RFID False case)
International Journal of Pure and Applied Mathematics Special Issue
2004
When the status is displayed as “Give fingerprint”, the fingerprint code is compiled which
already discussed in above topic (3. 2).
Figure 3.8 Block diagram (fingerprint false case)
After the fingerprint is accessed, the code saves the details with the login time and date which is
saved to the database for further access.
Figure 3.9 Block diagram (save data: login case)
International Journal of Pure and Applied Mathematics Special Issue
2005
The below block diagram gives the information about the log out time. If the RFID is scanned
once again, the exit time sub VI is compiled internally and a pop up is displayed to log out.