IoT-based Facelook and Fingerprint Safe Security System

Authors

Josya Marvin Immanuel , Ibrahim , Reni Rahmadewi , Yuliarman Saragih

DOI:

10.29303/jppipa.v10i2.6832

Published:

2024-02-25

Issue:

Vol. 10 No. 2 (2024): February

Keywords:

Facelook, Fingerprint, Internet of Things

Research Articles

Downloads

How to Cite

Immanuel, J. M. ., Ibrahim, I., Rahmadewi, R. ., & Saragih, Y. . (2024). IoT-based Facelook and Fingerprint Safe Security System . Jurnal Penelitian Pendidikan IPA, 10(2), 500–505. https://doi.org/10.29303/jppipa.v10i2.6832

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Abstract

This research aims to develop an advanced safe security system by combining Facelook and Fingerprint technologies based on the Internet of Things (IoT). These technologies are expected to provide a higher level of security and facilitate access for safe owners. Subsequently, testing is carried out on the safe's opening mechanism after successful authentication via both the fingerprint sensor and the face recognition system. These trials encompass the evaluation of success rates, the speed of the opening mechanism, and the overall response time. Data from the testing phase is collected and analyzed to comprehensively assess the system's performance. The average notification delivery delay for the face recognition system was measured at 2.67 seconds with a standard deviation of 0.37. The notification delivery data revealed an average delay of 2.04 seconds with a standard deviation of 0.38 These findings collectively affirm the effectiveness of the integrated face recognition and fingerprint system in the proposed safe security setup

References

Alahi, M. E. E., Sukkuea, A., Tina, F. W., Nag, A., Kurdthongmee, W., Suwannarat, K., & Mukhopadhyay, S. C. (2023). Integration of IoT-Enabled Technologies and Artificial Intelligence (AI) for Smart City Scenario: Recent Advancements and Future Trends. Sensors, 23(11), 5206. https://doi.org/10.3390/s23115206

Aldoseri, A., Al-Khalifa, K. N., & Hamouda, A. M. (2023). Re-Thinking Data Strategy and Integration for Artificial Intelligence: Concepts, Opportunities, and Challenges. Applied Sciences, 13(12), 7082. https://doi.org/10.3390/app13127082

Amodu, O. A., & Othman, M. (2018). Machine-to-Machine Communication: An Overview of Opportunities. Computer Networks, 145, 255–276. https://doi.org/10.1016/j.comnet.2018.09.001

Aroganam, G., Manivannan, N., & Harrison, D. (2019). Review on Wearable Technology Sensors Used in Consumer Sport Applications. Sensors, 19(9). https://doi.org/10.3390/s19091983

Atzori, L., Iera, A., & Morabito, G. (2017). Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm. Ad Hoc Networks, 56, 122–140. https://doi.org/10.1016/j.adhoc.2016.12.004

Babiuch, M., & Postulka, J. (2021). Smart Home Monitoring System Using ESP32 Microcontrollers. In F. P. G. Márquez (Ed.), Internet of Things. IntechOpen. https://doi.org/10.5772/intechopen.94589

Bansal, S., & Kumar, D. (2020). IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication. International Journal of Wireless Information Networks, 27, 340–364. https://doi.org/10.1007/s10776-020-00483-7

Chakravarthi, V. S. (2021). Internet of Things and M2M communication technologies. Springer. https://doi.org/10.1007/978-3-030-79272-5

Chauhan, M., & Shiaeles, S. (2023). An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions. Network, 3(3), 422–450. https://doi.org/10.3390/network3030018

Dwivedi, J. N. (2021). Internet of Things (IoT) and Machine to Machine (M2M) Communication Techniques for Cyber Crime Prediction. Intelligent Data Analytics for Terror Threat Prediction: Architectures, Methodologies, Techniques and Applications, 31–55. https://doi.org/10.1002/9781119711629.ch2

Fortino, G., Savaglio, C., Spezzano, G., & Zhou, M. (2020). Internet of things as system of systems: A review of methodologies, frameworks, platforms, and tools. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51(1), 223–236. https://doi.org/10.1109/TSMC.2020.3042898

Haleem, A., Javaid, M., Qadri, M. A., & Suman, R. (2022). Understanding the role of digital technologies in education: A review. Sustainable Operations and Computers, 3, 275–285. https://doi.org/10.1016/j.susoc.2022.05.004

Hassani, H., Huang, X., & Silva, E. (2021). The Human Digitalisation Journey: Technology First at the Expense of Humans? Information, 12(7), 267. https://doi.org/10.3390/info12070267

Hercog, D., Lerher, T., TruntiÄ, M., & Težak, O. (2023). Design and Implementation of ESP32-Based IoT Devices. Sensors, 23(15), 6739. https://doi.org/10.3390/s23156739

Javaid, M., Haleem, A., Singh, R. P., & Suman, R. (2023). Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends. Cyber Security and Applications, 1, 100016. https://doi.org/10.1016/j.csa.2023.100016

Kaur, R., GabrijelÄiÄ, D., & KlobuÄar, T. (2023). Artificial intelligence for cybersecurity: Literature review and future research directions. Information Fusion, 97, 101804. https://doi.org/10.1016/j.inffus.2023.101804

Kumar, S., Tiwari, P., & Zymbler, M. (2019). Internet of Things is a revolutionary approach for future technology enhancement: A review. Journal of Big Data, 6(1), 111. https://doi.org/10.1186/s40537-019-0268-2

Leminen, S., Rajahonka, M., Wendelin, R., & Westerlund, M. (2020). Industrial internet of things business models in the machine-to-machine context. Industrial Marketing Management, 84, 298–311. https://doi.org/10.1016/j.indmarman.2019.08.008

Li, Y., & Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports, 7, 8176–8186. https://doi.org/10.1016/j.egyr.2021.08.126

Lokhande, M. P., & Patil, D. D. (2021). Secured energy efficient machine -to-machine communication for telerobotic system. Informatics in Medicine Unlocked, 26, 100731. https://doi.org/10.1016/j.imu.2021.100731

Nardo, M., Forino, D., & Murino, T. (2020). The evolution of man–machine interaction: The role of human in Industry 4.0 paradigm. Production & Manufacturing Research, 8(1), 20–34. https://doi.org/10.1080/21693277.2020.1737592

Pradhan, D., & Tun, H. M. (2022). Security Challenges: M2M Communication in IoT. Journal of Electrical Engineering and Automation, 4(3), 187–199. Retrieved from https://shorturl.asia/pKLGO

Radouan, A. M. R. A. (2021). Internet of Things (IoT. Journal of Data Analysis and Information Processing, 09(02), 77–101. https://doi.org/10.4236/jdaip.2021.92006

Rejeb, A., Suhaiza, Z., Rejeb, K., Seuring, S., & Treiblmaier, H. (2022). The Internet of Things and the circular economy: A systematic literature review and research agenda. Journal of Cleaner Production, 350, 131439. https://doi.org/10.1016/j.jclepro.2022.131439

Revadiaz, E., Fatkhurrokhman, M., & Aribowo, D. (2022). Prototype Automated Manipulator Robot Menggunakan Mikrokontroler NodeMCU ESP8266 Berbasis Internet of Things (IoT. JTEV (Jurnal Teknik Elektro Dan Vokasional, 8(2), 439. https://doi.org/10.24036/jtev.v8i2.117682

Salama, R., Altrjman, C., & Al-Turjman, F. (2023). An overview of the Internet of Things (IoT) and Machine to Machine (M2M) Communications. NEU Journal for Artificial Intelligence and Internet of Things, 2(3). Retrieved from https://dergi.neu.edu.tr/index.php/aiit/article/view/728

Sarfraz, M. (2021). Introductory Chapter: On Fingerprint Recognition. In M. Sarfraz (Ed.), Biometric Systems. IntechOpen. https://doi.org/10.5772/intechopen.95630

Setyawan, R. A., Muttaqin, A., & Khulud, H. (2022). Aplikasi NODEMCU ESP8266 sebagai Pemantau Suhu dan Kelembaban Ruang Data Center. Jurnal EECCIS (Electrics, Electronics, Communications, Controls, Informatics, Systems, 15(1), 23–28. https://doi.org/10.21776/jeeccis.v15i1.1554

Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. Ieee Access, 8, 23022–23040. https://doi.org/10.1109/ACCESS.2020.2970118

Shukla, A., Katt, B., Nweke, L. O., Yeng, P. K., & Weldehawaryat, G. K. (2022). System security assurance: A systematic literature review. Computer Science Review, 45, 100496. https://doi.org/10.1016/j.cosrev.2022.100496

Siddique, K., & Ogami, Y. (2022). Computational Study on Thermal Motion Sensors That Can Measure Acceleration and Rotation Simultaneously. Sensors, 22(18), 6744. https://doi.org/10.3390/s22186744

Soori, M., Arezoo, B., & Dastres, R. (2023). Internet of things for smart factories in industry 4.0, a review. Internet of Things and Cyber-Physical Systems, 3, 192–204. https://doi.org/10.1016/j.iotcps.2023.04.006

Sudarmani, R., Venusamy, K., Sivaraman, S., Jayaraman, P., Suriyan, K., & Alagarsamy, M. (2022). Machine to machine communication enabled internet of things: a review. International Journal of Reconfigurable and Embedded Systems, 11(2), 126. Retrieved from https://shorturl.asia/vM79c

Tang, K., Liu, A., Wang, W., Li, P., & Chen, X. (2018). A Novel Fingerprint Sensing Technology Based on Electrostatic Imaging. Sensors, 18(9), 3050. https://doi.org/10.3390/s18093050

Tariq, U., Ahmed, I., Bashir, A. K., & Shaukat, K. (2023). A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors, 23(8), 4117. https://doi.org/10.3390/s23084117

Ullah, A., Anwar, S. M., Li, J., Nadeem, L., Mahmood, T., Rehman, A., & Saba, T. (2023). Smart cities: The role of Internet of Things and machine learning in realizing a data-centric smart environment. Complex & Intelligent Systems. https://doi.org/10.1007/s40747-023-01175-4

Wicaksono, M. F., & Rahmatya, M. D. (2020). Implementasi Arduino dan ESP32 CAM untuk Smart Home. Jurnal Teknologi Dan Informasi, 10(1), 40–51. https://doi.org/10.34010/jati.v10i1.2836

Wijaya, N. H., Mujib, A. K., Santoso, A. B., & Supriyadi, K. (2020). Design and Development of Heart Rate Per Minutes Based on Atmega16 Microcontroller with Alarm Warning. IOP Conference Series: Materials Science and Engineering, 835(1), 12053. https://doi.org/10.1088/1757-899X/835/1/012053

Yeh, C.-C., Huang, T.-W., Lin, Y.-R., & Su, G.-D. (2023). The Design and Fabrication of Large-Area Under-Screen Fingerprint Sensors with Optimized Aperture and Microlens Structures. Sensors, 23(21), 8731. https://doi.org/10.3390/s23218731

Yulianto, Y., Juarto, B., Rachmawati, I. D. A., & Yulistiani, R. (2022). Safe-Deposit Box Using Fingerprint and Blynk. Engineering, MAthematics and Computer Science (EMACS) Journal, 4(1), 1–4. https://doi.org/10.21512/emacsjournal.v4i1.8080

Author Biographies

Josya Marvin Immanuel, Universitas Singaperbangsa Karawang

Ibrahim, Universitas Singaperbangsa Karawang

 

 

Reni Rahmadewi, Universitas Singaperbangsa Karawang

Yuliarman Saragih, Universitas Singaperbangsa Karawang

License

Copyright (c) 2024 Josya Marvin Immanuel, Ibrahim, Reni Rahmadewi, Yuliarman Saragih

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Authors who publish with Jurnal Penelitian Pendidikan IPA, agree to the following terms:

  1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution 4.0 International License (CC-BY License). This license allows authors to use all articles, data sets, graphics, and appendices in data mining applications, search engines, web sites, blogs, and other platforms by providing an appropriate reference. The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
  2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in Jurnal Penelitian Pendidikan IPA.
  3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).