Analysis of Biometric Authentication Systems for Smart Home Automation
VerifiedAdded on 2022/10/17
|33
|6155
|49
Report
AI Summary
This report delves into the application of biometric authentication in smart home automation, focusing on enhancing security measures within residential complexes. It examines various biometric systems, including fingerprint scanning, face recognition, and iris recognition, highlighting their contrasting features, advantages, and potential vulnerabilities. The research employs a qualitative analysis approach, supported by real-time evidence and data from reliable sources, to assess the effectiveness of these technologies in preventing unauthorized access. The report covers the background of biometric authentication, its significance, research questions, and methodology, including the use of questionnaires and secondary sources. It also discusses the research problem, proposed solutions, and concludes with a comprehensive analysis of the findings, emphasizing the necessity of implementing biometric systems for advanced protection in dwellings. The report provides a detailed overview of biometric identifiers and traits, comparing biometric systems to traditional authentication methods and their benefits.

Running head: SMART HOME AUTOMATION BY BIOMETRICS
SMART HOME AUTOMATION BY BIOMETRICS
Name of the student: Siddharth Mehta
Student Id: 4580480
Supervisor Name: Farhad Ahmed
Research Project
SMART HOME AUTOMATION BY BIOMETRICS
Name of the student: Siddharth Mehta
Student Id: 4580480
Supervisor Name: Farhad Ahmed
Research Project
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
Abstract
The concept of biometric authentication came into the scenario owing to the loopholes present in
the structural framework of face recognition fetching the purpose of authentication. Biometrics
which is also referred to as Biometric authentication is the process of establishing identity of an
individual based on the behavioral and physiological characteristics also known as the identifiers
or traits. This report aims to highlight the contrasting features and aspects of biometric system of
authentication for the purpose of rendering security to the residential complex and dwellings to
combat the unauthorized access of the intruders, trespassing in the properties of others. This
report concludes the necessity of implementing biometrics for the purpose of rendering A-grade
protection to the dwellings and the residences from the external intruders. This report has
performed a thorough qualitative analysis on the concerned topic based on real time evidences
and data collection from authentic source, which is free from any sorts of manipulation and
biasness.
Keywords: biometric authentication, face recognition, identifiers, traits, qualitative analysis
Abstract
The concept of biometric authentication came into the scenario owing to the loopholes present in
the structural framework of face recognition fetching the purpose of authentication. Biometrics
which is also referred to as Biometric authentication is the process of establishing identity of an
individual based on the behavioral and physiological characteristics also known as the identifiers
or traits. This report aims to highlight the contrasting features and aspects of biometric system of
authentication for the purpose of rendering security to the residential complex and dwellings to
combat the unauthorized access of the intruders, trespassing in the properties of others. This
report concludes the necessity of implementing biometrics for the purpose of rendering A-grade
protection to the dwellings and the residences from the external intruders. This report has
performed a thorough qualitative analysis on the concerned topic based on real time evidences
and data collection from authentic source, which is free from any sorts of manipulation and
biasness.
Keywords: biometric authentication, face recognition, identifiers, traits, qualitative analysis

3
ACKNOWLEDGMENTS
ACKNOWLEDGMENTS
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
TABLE OF CONTENTS
Abstract.......................................................................................................................................................2
ACKNOWLEDGMENTS.................................................................................................................................3
1.0INTRODUCTION......................................................................................................................................5
1.1Research background.............................................................................................................................7
1.2 Aims and objectives...............................................................................................................................8
1.3 Significance of the research...................................................................................................................8
1.4 Research problem..................................................................................................................................9
1.5 Research Questions.............................................................................................................................10
1.6 Research structure/ research diagram................................................................................................11
2.0LITERATURE REVIEW.............................................................................................................................13
2.1 introduction.........................................................................................................................................13
2.2 Biometric systems................................................................................................................................14
2.21 finger print scanning..........................................................................................................................15
2.22 Face recognition................................................................................................................................16
2.23 Hand Geometry.................................................................................................................................16
2.24 Iris recognition...................................................................................................................................17
2.3 Working of a Biometric system............................................................................................................18
2.4 Literature gap......................................................................................................................................19
3.0 RESEARCH METHODOLOGY.................................................................................................................20
TABLE OF CONTENTS
Abstract.......................................................................................................................................................2
ACKNOWLEDGMENTS.................................................................................................................................3
1.0INTRODUCTION......................................................................................................................................5
1.1Research background.............................................................................................................................7
1.2 Aims and objectives...............................................................................................................................8
1.3 Significance of the research...................................................................................................................8
1.4 Research problem..................................................................................................................................9
1.5 Research Questions.............................................................................................................................10
1.6 Research structure/ research diagram................................................................................................11
2.0LITERATURE REVIEW.............................................................................................................................13
2.1 introduction.........................................................................................................................................13
2.2 Biometric systems................................................................................................................................14
2.21 finger print scanning..........................................................................................................................15
2.22 Face recognition................................................................................................................................16
2.23 Hand Geometry.................................................................................................................................16
2.24 Iris recognition...................................................................................................................................17
2.3 Working of a Biometric system............................................................................................................18
2.4 Literature gap......................................................................................................................................19
3.0 RESEARCH METHODOLOGY.................................................................................................................20
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
3.1 Introduction.........................................................................................................................................20
3.2 use of questionnaires..........................................................................................................................21
3.21 Benefits of using questionnaires........................................................................................................21
3.22 Disadvantages of using questionnaires..............................................................................................24
3.3 secondary sources...............................................................................................................................24
3.4 Analysis of the biometrics studies.......................................................................................................25
4.0 RESULTS AND DISCUSSIONS................................................................................................................27
4.1 Proposed solution................................................................................................................................27
5.0 CONCLUSION.......................................................................................................................................29
6.0 REFERENCES........................................................................................................................................31
3.1 Introduction.........................................................................................................................................20
3.2 use of questionnaires..........................................................................................................................21
3.21 Benefits of using questionnaires........................................................................................................21
3.22 Disadvantages of using questionnaires..............................................................................................24
3.3 secondary sources...............................................................................................................................24
3.4 Analysis of the biometrics studies.......................................................................................................25
4.0 RESULTS AND DISCUSSIONS................................................................................................................27
4.1 Proposed solution................................................................................................................................27
5.0 CONCLUSION.......................................................................................................................................29
6.0 REFERENCES........................................................................................................................................31

6
1.0 INTRODUCTION
The need for an accurate user authentication method has greatly increased with the wake of
heightened issues about rapid advancement in communication, mobility, networking and
security. Biometrics refers to the science of recognizing an individual based on legitimate
techniques for determining an individual’s identity. Biometrics which is also referred to as
Biometric authentication is the process of establishing identity of an individual based on the
behavioral and physiological characteristics also known as the identifiers or traits as illustrated in
figure 1 below. The traits include; finger prints, face, iris, hand geometry, voice, signature,
keystrokes among others.
Fig 1: Classification of Biometric identifiers /traits
1.0 INTRODUCTION
The need for an accurate user authentication method has greatly increased with the wake of
heightened issues about rapid advancement in communication, mobility, networking and
security. Biometrics refers to the science of recognizing an individual based on legitimate
techniques for determining an individual’s identity. Biometrics which is also referred to as
Biometric authentication is the process of establishing identity of an individual based on the
behavioral and physiological characteristics also known as the identifiers or traits as illustrated in
figure 1 below. The traits include; finger prints, face, iris, hand geometry, voice, signature,
keystrokes among others.
Fig 1: Classification of Biometric identifiers /traits
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7
Biometric systems offer many benefits as compared to the traditional authentication systems.
The biometric systems are more reliable and efficient than the password system. This is because
the biometric identifiers or traits cannot be forgotten or lost and at the same time, they are
difficult to share, copy and distribute. The biometric systems require the individual to the
individual to be authenticated to be present at the point and time of authentication. Hence, a
biometric system is a power alternative to the traditional authentication systems.
Biometric authentication is based on the principle of measurable behavioural or physiological
characteristics such as voice sample or fingerprints. Usually the biometric systems can be used
in two modes i.e. identity verification which is also referred to as one-on-one comparison or
authentication , this occurs when the user claims to be enrolled in the system ( the user then
will be required to present an identification card or a login name) in this scenario the biometric
data which is obtained from the user are compared to the data which is stored in the data
base
This report has performed a thorough qualitative analysis on the concerned topic based on real
time evidences and data collection from authentic source, which is free from any sorts of
manipulation and biasness. The report incorporates all the necessary methodologies and tools for
the purpose of biometric authentication. This includes the authentication based on-retina
scanning, fingerprint scanning, voice recognition and facial recognition.
1.1 Research background
The main objective of this research is to automate the homes using biometric system for the
authentication purpose rendering security to the dwellings and the residential complexes. The
concept of biometric authentication came into the scenario owing to the loopholes present in the
Biometric systems offer many benefits as compared to the traditional authentication systems.
The biometric systems are more reliable and efficient than the password system. This is because
the biometric identifiers or traits cannot be forgotten or lost and at the same time, they are
difficult to share, copy and distribute. The biometric systems require the individual to the
individual to be authenticated to be present at the point and time of authentication. Hence, a
biometric system is a power alternative to the traditional authentication systems.
Biometric authentication is based on the principle of measurable behavioural or physiological
characteristics such as voice sample or fingerprints. Usually the biometric systems can be used
in two modes i.e. identity verification which is also referred to as one-on-one comparison or
authentication , this occurs when the user claims to be enrolled in the system ( the user then
will be required to present an identification card or a login name) in this scenario the biometric
data which is obtained from the user are compared to the data which is stored in the data
base
This report has performed a thorough qualitative analysis on the concerned topic based on real
time evidences and data collection from authentic source, which is free from any sorts of
manipulation and biasness. The report incorporates all the necessary methodologies and tools for
the purpose of biometric authentication. This includes the authentication based on-retina
scanning, fingerprint scanning, voice recognition and facial recognition.
1.1 Research background
The main objective of this research is to automate the homes using biometric system for the
authentication purpose rendering security to the dwellings and the residential complexes. The
concept of biometric authentication came into the scenario owing to the loopholes present in the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8
structural framework of face recognition fetching the purpose of authentication (Berini et al.
2016). The background of biometric authentication comprises the key and contrasting aspects of
its characteristic features that are summarised below:
Fingerprint technology has wiped out the loopholes of all the prevailing
authentication methodologies dominating in the market so far for the ages (Jin egt
al. 2016). There is no further requirement to undergo the hassles of entering pins
and passwords for the purpose of securing the dwellings.
The unique property of fingerprint lies in the fact that the fingerprint is different
for individuals and hence cannot be replicated fetching the sole purpose of
forgery.
The basic drawbacks of the password oriented authentication system is that the
users might forget the passwords or the pin set up by them at any point of time
(Deutschmann et al. 2016 ). However, the fingerprint of the user cannot change
even with the advancement in the age of the individuals.
The space consumed for the installation of the fingerprint-oriented system is
minimal in contrast to the space consumed by the other authentication systems
fetching the same purpose of rendering security to the residences.
However, there is no scope of breach of the fingerprint unlike the other password-
protected systems, as fingerprint cannot be shared unlike the passwords and the
pin-protected systems.
Keeping in mind all these contrasting aspects, the biometric recognition system made its
appearance in the market for the purpose of protecting the homes from the intrude
structural framework of face recognition fetching the purpose of authentication (Berini et al.
2016). The background of biometric authentication comprises the key and contrasting aspects of
its characteristic features that are summarised below:
Fingerprint technology has wiped out the loopholes of all the prevailing
authentication methodologies dominating in the market so far for the ages (Jin egt
al. 2016). There is no further requirement to undergo the hassles of entering pins
and passwords for the purpose of securing the dwellings.
The unique property of fingerprint lies in the fact that the fingerprint is different
for individuals and hence cannot be replicated fetching the sole purpose of
forgery.
The basic drawbacks of the password oriented authentication system is that the
users might forget the passwords or the pin set up by them at any point of time
(Deutschmann et al. 2016 ). However, the fingerprint of the user cannot change
even with the advancement in the age of the individuals.
The space consumed for the installation of the fingerprint-oriented system is
minimal in contrast to the space consumed by the other authentication systems
fetching the same purpose of rendering security to the residences.
However, there is no scope of breach of the fingerprint unlike the other password-
protected systems, as fingerprint cannot be shared unlike the passwords and the
pin-protected systems.
Keeping in mind all these contrasting aspects, the biometric recognition system made its
appearance in the market for the purpose of protecting the homes from the intrude

9
1.2 Aims and objectives
This report aims to highlight the contrasting features and aspects of biometric system of
authentication for the purpose of rendering security to the residential complex and dwellings to
combat the unauthorized access of the intruders, trespassing in the properties of others. This
study has performed thorough and profound analysis on the following scenario incorporating the
positive aspects of the applied technology as well as the vulnerabilities embedded within the
architecture.
1.3 Significance of the research
The significance of the research is profound and extensive. The significance is summarized in
the subsequent section:
The face recognition property of the biometric authentication is significant owing to the
fact that the facial postures vary for individuals (Berini et al. 2016). Hence, this is very
authentic for the purpose of identity verification of the individuals.
The property of recognition of the retina is the most outstanding procedure. The retina of
an individual, the orientation of the eyeball, the alignment of the lens, the distribution of
the rod and the cone cells, the viscosity of the aqueous humor and the category of iris is
the unique property of an individual. Hence, forging of the above-mentioned parameters
is very difficult (Grulkowski et al. 2018). Hence, the system deploying the retina
verification is very authentic in regards to rendering security and imparts robustness to
the infrastructure of the security systems of the residences.
The voice recognition parameter of the biometric authentication is also significant. This
procedure compares the voice of the individual to that recorded in the database and grants
access only in the case of 100 percent match. Hence, this approach is also enticing.
1.2 Aims and objectives
This report aims to highlight the contrasting features and aspects of biometric system of
authentication for the purpose of rendering security to the residential complex and dwellings to
combat the unauthorized access of the intruders, trespassing in the properties of others. This
study has performed thorough and profound analysis on the following scenario incorporating the
positive aspects of the applied technology as well as the vulnerabilities embedded within the
architecture.
1.3 Significance of the research
The significance of the research is profound and extensive. The significance is summarized in
the subsequent section:
The face recognition property of the biometric authentication is significant owing to the
fact that the facial postures vary for individuals (Berini et al. 2016). Hence, this is very
authentic for the purpose of identity verification of the individuals.
The property of recognition of the retina is the most outstanding procedure. The retina of
an individual, the orientation of the eyeball, the alignment of the lens, the distribution of
the rod and the cone cells, the viscosity of the aqueous humor and the category of iris is
the unique property of an individual. Hence, forging of the above-mentioned parameters
is very difficult (Grulkowski et al. 2018). Hence, the system deploying the retina
verification is very authentic in regards to rendering security and imparts robustness to
the infrastructure of the security systems of the residences.
The voice recognition parameter of the biometric authentication is also significant. This
procedure compares the voice of the individual to that recorded in the database and grants
access only in the case of 100 percent match. Hence, this approach is also enticing.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

10
Finally, comes the fingerprint recognition. The application of the finger print recognition is
perhaps the second durable method of authentication in the chronology after the retina
recognition. The fingerprint for an individual is the unique property of an individual (Jin egt al.
2016). The pattern of fingerprint is diversified for different individuals. Even the fingerprint of
different fingers is also different. Hence, the methodology is appropriate for the authentication
purpose
1.4 Research problem
There are 3 contrasting problems associated with the biometric authentication. They are
summarized below:
Although it may seem that the finger print and the facial properties of individuals are unique
properties of the individuals. They cannot be forged as fingerprint and the facial properties
cannot be replicated. However, the cyber predators are capable enough to gain access over
these properties as well through the implementation of the brute force attacks and phishing
activities (Berini et al. 2015). The facial properties of the individuals like the eyes, ears and
nose are exposed to the external environment and hence it is not a big deal for the cyber
predators to replicate the same through the implementation of ultra-sensor-based
technologies.
The fingerprint of an individual can be easily replicated through the prototyping techniques
as fingerprint gets recorded in certain devices when it comes in physical contact with the
fingerprint of the individuals (Jin egt al. 2016). The software deployed for the purpose of
imitating the finger print of the individuals is the VeriFinger software.
Finally, comes the fingerprint recognition. The application of the finger print recognition is
perhaps the second durable method of authentication in the chronology after the retina
recognition. The fingerprint for an individual is the unique property of an individual (Jin egt al.
2016). The pattern of fingerprint is diversified for different individuals. Even the fingerprint of
different fingers is also different. Hence, the methodology is appropriate for the authentication
purpose
1.4 Research problem
There are 3 contrasting problems associated with the biometric authentication. They are
summarized below:
Although it may seem that the finger print and the facial properties of individuals are unique
properties of the individuals. They cannot be forged as fingerprint and the facial properties
cannot be replicated. However, the cyber predators are capable enough to gain access over
these properties as well through the implementation of the brute force attacks and phishing
activities (Berini et al. 2015). The facial properties of the individuals like the eyes, ears and
nose are exposed to the external environment and hence it is not a big deal for the cyber
predators to replicate the same through the implementation of ultra-sensor-based
technologies.
The fingerprint of an individual can be easily replicated through the prototyping techniques
as fingerprint gets recorded in certain devices when it comes in physical contact with the
fingerprint of the individuals (Jin egt al. 2016). The software deployed for the purpose of
imitating the finger print of the individuals is the VeriFinger software.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

11
The vulnerability of the voice recognition system lies in the fact that the voice can be
imitated through the recording activities and can be used for the purpose of forgery thereby
gaining unauthorized access over the restricted property of the individuals.
1.5 Research Questions
This study was guided by the following research questions;
What are the biometric systems?
What are the benefits of implementing unautomated biometric system in the residential and
commercial dwellings?
What are the behavioural and psychological traits which are used in the biometric identification
systems.
How does the automated biometric system work?
Which are the commonly used biometric systems in the current world and their benefits.
How can an automated biometric system be implemented in a residential and a commercial
dwelling?
1.6 Research structure/ research diagram
This thesis is made up of six sections as discussed below;
Introduction: This section intrudes the reader to the topic, whereby the aims and objectives of the
research are discussed, the significance of the research, the background of the research topic and
the research statement. The introduction gives the overview of the research topic.
Literature review: This section reviews the previous studies which have been carried out on the
research topic. Carrying out a detailed literature reviews enables the researcher to gain a deeper
understanding of the research topic and formulate the research hypothesis. This section contains
information from the studies that have been carried out within the last decade to ensure that the
obtained data is updated, data from the studies that were carried out more than a decade ago was
considered to be irrelevant and outdated.
The vulnerability of the voice recognition system lies in the fact that the voice can be
imitated through the recording activities and can be used for the purpose of forgery thereby
gaining unauthorized access over the restricted property of the individuals.
1.5 Research Questions
This study was guided by the following research questions;
What are the biometric systems?
What are the benefits of implementing unautomated biometric system in the residential and
commercial dwellings?
What are the behavioural and psychological traits which are used in the biometric identification
systems.
How does the automated biometric system work?
Which are the commonly used biometric systems in the current world and their benefits.
How can an automated biometric system be implemented in a residential and a commercial
dwelling?
1.6 Research structure/ research diagram
This thesis is made up of six sections as discussed below;
Introduction: This section intrudes the reader to the topic, whereby the aims and objectives of the
research are discussed, the significance of the research, the background of the research topic and
the research statement. The introduction gives the overview of the research topic.
Literature review: This section reviews the previous studies which have been carried out on the
research topic. Carrying out a detailed literature reviews enables the researcher to gain a deeper
understanding of the research topic and formulate the research hypothesis. This section contains
information from the studies that have been carried out within the last decade to ensure that the
obtained data is updated, data from the studies that were carried out more than a decade ago was
considered to be irrelevant and outdated.

12
Research methodology: This section of the thesis explains the techniques that were used to
gather the data during the study. The section also explains the methods that were used to analysis
the data that was gathered. In this section the benefits and limitation of all the methods that
were used are also reviewed.
Results and discussions: This section elaborates the findings of the research, the findings of the
data which was collected during the study are clearly presented. The findings of the research are
discussed in details in this section.
Conclusion: This section summarizes the thesis by highlighting the key findings of the research.
The research concludes if the research was successful and gives recommendations on what to be
done to for the study to be successful.
References and bibliography: in this section all the sources where the data was obtained directly
or indirectly are listed. The materials are listed alphabetically according to the surname of the
author.
The figure below in illustrations of the research diagram which shows the flow of the research.
Research methodology: This section of the thesis explains the techniques that were used to
gather the data during the study. The section also explains the methods that were used to analysis
the data that was gathered. In this section the benefits and limitation of all the methods that
were used are also reviewed.
Results and discussions: This section elaborates the findings of the research, the findings of the
data which was collected during the study are clearly presented. The findings of the research are
discussed in details in this section.
Conclusion: This section summarizes the thesis by highlighting the key findings of the research.
The research concludes if the research was successful and gives recommendations on what to be
done to for the study to be successful.
References and bibliography: in this section all the sources where the data was obtained directly
or indirectly are listed. The materials are listed alphabetically according to the surname of the
author.
The figure below in illustrations of the research diagram which shows the flow of the research.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 33
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.