<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Multifactor Student Attendance Management System Using Fingerprint Biometrics and RFID Techniques</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>A. Ahmed</string-name>
          <email>1aliyu.ahmed@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>O. M. Olaniyi</string-name>
          <email>2mikail.olaniyi@futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>J. G. Kolo</string-name>
          <email>3jgkolo@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>C. Durugo</string-name>
          <email>4durugo@st.futminna.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Engineering, Federal University of Technology Minna</institution>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>69</fpage>
      <lpage>74</lpage>
      <abstract>
        <p>-Attendance is an important factor for measuring eligibility, commitment and record keeping for assessment of students and employees. Several automated attendance systems have been developed. These systems are mostly based on single factor template based, which pose a security fault line. This paper presents the development of a multifactor attendance system that employs the flexibility of RFID technology and the security of fingerprint biometrics to manage students' attendance record. Performance evaluation in terms of response time and event using 10 students shows that average execution time of approximately 4.61 seconds could be achieved. Likewise, the system recorded zero percent (0%) of false reject, which tries the system reliability and integrity of the result.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Keywords- RFID; Fingerprint Biometric; Cryptography;
Authentication; Security.</p>
      <p>I.</p>
      <p>INTRODUCTION</p>
      <p>
        In schools and various institutions or organizations,
attendance is used for several purposes which include
assessment of students’ eligibility for term or promotional
exams, assessment of staffs’ commitment toward their job,
and record keeping for employees. Attendance can be
defined as being available either at a meeting or a
particular place at a given time. It can as well be seen as
the recurrence with which a person is available or the
numbers of individuals present [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This concept can be
applied and adopted for recording attendance in
companies, industries, schools and so on where people are
involved.
      </p>
      <p>Radio Frequency Identification (RFID) is a fast and
reliable means of identifying objects whereby identification
data are saved in an electronic device known as RFID tags,
also called transponders, and the data is retrieved by RFID
readers, also called Interrogators, through radio waves. RFID
tags are classified into two, namely: Active RFID labels and
Passive RFID labels. Active labels have a battery
incorporated with the label and transmits signal periodically
to the reader. Whereas a passive label is cheaper, smaller,
and makes use of radio energy that is transmitted by the
reader because it is not self-powered by a battery. This
project used passive RFID tags since they are less expensive,
flexible, light, and last longer than active tags.</p>
      <p>
        Biometrics means “Life Measurement”, but the term is
linked up with the function of measurable unique
physiological and biological characteristics to identify an
individual. Biometric characteristics are considered to be
unique to a particular individual. Therefore, use of
biometrics in this system provides a good approach against
impersonation. This ensures users to verify a person’s
identity based on “who is he/she?”, rather than verifying by
what he/she possesses (Example, an ID card), or by “what
he/she remembers” example, a password [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Selected
biometric feature for Human Recognition System includes –
DNA, Retina, Voice, fingerprint, iris, facial, and hand.
      </p>
      <p>This paper presents the development of a multifactor
authentication system (RFID and Finger Print Biometrics)
for students’ attendance management system.</p>
      <p>The rest of the paper is structured as follows. Section 2
presents some of the related literatures in the field of study.
While, Sections 3 presents the system design and
implementation. Section 4 presents the system evaluation,
while conclusion and recommendation for future work is
presented lastly in section 6.</p>
      <p>II.</p>
      <p>
        A number of related works exist in the application of
different methods and principles to effectively monitor the
attendance of students. In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], an attendance management
system using Biometrics was developed. The system took
attendance of students via a fingerprint module and the
records were stored in a database. There was no false
identification of students as success rate was over 90%.
However, there were no security measures adopted in the
database to protect students’ data.
      </p>
      <p>
        Also, [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] implemented a Wireless, Fingerprint
Attendance Marking System, which presented a
framework using which attendance management can be
made automated and on-line. But the system lacks
security measures to protect students’ data.
      </p>
      <p>
        In the same vain, [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] implemented a Zigbee Based
Student Attendance System Using L o c a l A r e a
N e t w o r k ( LAN) Networking. In this system, students
could report their attendance via biometric system and
notification of attendance is passed to the administrative
office through a Zigbee Module. However, the device can
get damaged and the students’ data will be exposed.
      </p>
      <p>
        A solution based on Template-Free Biometric-Key
Generation by Means of Fuzzy Genetic Clustering which
requires the storage of neither biometric templates nor
encryption keys, but by directly generating the keys from
statistical features of biometric data was proposed in [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
This solution was proposed but not implemented.
      </p>
      <p>
        Furthermore, [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] designed and developed a Portable
Class- room Attendance System Based on Arduino and
Fingerprint Biometric. However, the system is prone to
attack by an intruder, especially through the web since the
web application share the same database with the desktop
application and no security measures were taken to
protect information in the database.
      </p>
      <p>
        Similarly, an embedded computer-based lecture
attendance management system where a single-chip
computer based sub- systems (an improvised electronic
card and the card reader) were interfaced serially to the
serial port of the digital computer. The electronic card is a
model of a smart card containing the student identity
(IDName, Matriculation Number and five pins encrypted
code) was proposed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The system, though provided
a simplified, low cost embedded computer based system
solution to the management of lecture attendance problem in
developing countries but does not eliminate the risk of
impersonation.
      </p>
      <p>
        RFID [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and Biometrics technologies have both been
individually used to solve the problem of attendance in
modern times. RFID has a major security and integrity
problem called “buddy punching” which is when a user
swipes a card on behalf of another without the presence
of that user [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The system developed in this paper
combines the flexibility of RFID technology and the
security of fingerprint biometrics to track student’s
attendance record.
      </p>
      <p>III.</p>
      <p>SYSTEM DESIGN</p>
      <p>In the attendance system, RFID labels having unique
characters are linked with student names. This implies every
student is given RFID labels exclusive to him/her. Passive
RFID labels were picked in light of the fact that they needn’t
bother with a power source to function. However, they get
powered through the electromagnetic field made by the
RFID transceiver. At the point when a student swipes his/her
RFID label near the RFID transceiver in the hardware
module, the number connected to the tag is caught by the
transceiver and sent to the processor which further shows the
students’ details on a Liquid Crystal Display (LCD) screen.
The system will furthermore need to scan the students
fingerprint for authentication and then record the time of
attendance in the SD Card Memory.</p>
      <p>The attendance system consists of two phases: The
Registration unit and the Authentication unit. Figure 1 shows
the block diagram of the system. The hardware unit is
powered by 3.3V DC power source.</p>
    </sec>
    <sec id="sec-2">
      <title>A. Registration Unit</title>
      <p>Student’s registration is in two (2) phases: firstly,
registration with the Attendance Management System
Desktop Application Software in the Administrator’s
personal computer which shall take the record of each
student’s Name, Matriculation Number, RFID tag number,
and the session. This will enable report generation and
proper record management. Secondly, students will be
required to place their fingerprints on a scanner for biometric
capture in order to link to the student’s RFID information
already entered in the microcontroller’s database.</p>
    </sec>
    <sec id="sec-3">
      <title>B. Authentication/Verification unit</title>
      <p>During authentication, the students will be required to
pass their RFID tag close to the hardware module carrying
the RFID transceiver; the number associated with the tag is
taken by the RFID Reader and sent to the processor which
further displays the students’ details on the screen. The
system will furthermore proceed to scan the students
fingerprint for authentication and then record the time of
attendance in the SD Card Memory.</p>
      <p>The flowchart of the system is shown in Figure 2.</p>
    </sec>
    <sec id="sec-4">
      <title>C. System software Design Considerations</title>
      <p>The developed Software consists of a Database (Back
end) and also an application program (Front end). The
database stores the fingerprint record of the Students,
Courses offered, Lecturers data. It as well serves for report
generation as specified by the administrator and was
implemented using Microsoft SQL Server. SQL Server
incorporates numerous elements that make it an effective
database administration framework: It has support for
multiple platforms/operating system, easy integration with
Microsoft .NET environment, scalable meaning can grow
with database needs of a firm and reliable meaning c an
detect incomplete transaction in a database and prevents it
from being corrupted after power failure. The application
program was developed using Microsoft Visual Basic.Net
language in visual studio environment. The .Net gives
simplicity of creating projects for cross-platform
compatibility. The significant parts of the .Net consist of the
Visual Studio Integrated Development Environment (IDE)
responsible for developing the programs and the
Microsoft .Net Framework, which is responsible for
running programs. VB.Net is a very user-friendly and an
object-oriented programming language. Block diagram and
use case diagram of the software application is shown in
Figures 3 and 4 respectively.</p>
      <p>The hardware authentication unit as shown in Figures 5 is
a combination of the RFID reader (125 KHz 10 cm range
RFID reader), fingerprint sensor (Optical Fingerprint Sensor
Module – FPM10A with TTL/UART interface), TFT LCD
display, Real Time Clock, Buzzer, Arduino Mega 2560
board, and an SD card reader. This unit is independent of the
computer system to carry out its operation. For attendance,
Students get to swipe their tags and place their fingerprints
on this module at every lecture. Attendance record of each
student is taken and stored in the SD card. At the end of the
day, the administrator takes the SD card to the computer
system to download attendance record into the Student
Attendance Management System Software (SAMS).
The RFID Tag is shown in Figure 6.</p>
    </sec>
    <sec id="sec-5">
      <title>Software Modules</title>
      <p>1) Login Form: This is the first interface displayed
when the SAMS application is launched after it must
have been installed by the user. It enables the administrator
to gain access to the attendance management system after
entering valid login credentials in the Username and
Password fields respectively. The login form is shown in
Figure 7.</p>
      <p>2) Registration Forms: This consists of two forms: the
Course registration form for the registration of courses
offered in the department and the Student registration
form through which students details are saved in the
database of the system.</p>
      <p>3) Record Forms: This likewise consists of the two
forms as shown in Figure 8, bearing information of every
registered course and student in the department. The
administrator gets to view, search, delete, and edit student
or course information saved in the database.
4) Attendance Form: Through this form as shown in
Figure 9, attendance details of students saved on the SD
card from the hardware device after attendance of the day
must have been completed are uploaded to the software’s
database.
5) Student Record Form: As shown if Figure 10, this
form displays the record of individual attendance for
each lecture. The administrator can view and show
students their individual attendance records for the
semester. The form also includes percentage attendance
which shows the qualification of students for an
examination.</p>
      <p>6) Report Form: This is a report of the overall
attendance of every registered student per course. Figure
11 shows the report form.</p>
      <p>
        For performance evaluation, this work was compared
with an existing biometric attendance system, developed by
[
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] developed an attendance management system using
Biometrics. The system was tested and compared with the
manual attendance system. The system was verified using
fingerprints captured from Eighty (80) students of the
department. The 80 students were separated into Eight (8)
groups of 10 students each. A number of successes were
obtained from the tests carried out.
      </p>
      <p>The result of the tests carried out for the RFID and
Biometric Attendance system are shown in Table and Figure
12. The test result shows that the system is effective and
fast in response. There were no false accepts i.e. a person
that was not preregistered was not falsely enrolled for
attendance, and very minimal false rejects either due to
incorrect placement of finger or the fingerprint contains dirt
or moisture. The system was tested using 10 RFID tags and
10 fingerprints of students in the department of Computer
Engineering, Federal University of Technology Minna,
Niger State.</p>
      <p>Comparison of the Execution time of Biometric
Attendance and Attendance System Using RFID and
Biometrics is shown in Table 2.</p>
      <p>
        The RFID and fingerprint Biometric Attendance
Management System’s average execution time for Ten (10)
students is approximately 4.61 seconds as against 3.43
seconds for the Biometric attendance management system
using fingerprint identification developed by authors in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ],
a difference of 1.18 seconds which is a negligible difference
due to the fact that the system under research adopts two (2)
authentication techniques. Reports generated for the
attendance system in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] took approximately 30s, whereas
that of the system under research takes approximately 7
seconds.
      </p>
      <p>Students</p>
      <p>
        Results obtained in the system under research shows a
higher precision in measurement than the attendance system
by [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Testing of the same set of students was carried out 5
times with very high success rate. It can be shown in Figure
13 that the attendance management system under research
has fast response time with an average execution time of
4.61 seconds.
      </p>
      <p>No of students</p>
      <p>Figure 13. Comparison of Biometric Attendance System with RFID and</p>
      <p>Biometrics Attendance Management System</p>
      <p>The system successfully registered and validated every
registered student during attendance. This system is likewise
an easy-to-understand system as information control and
recovery can be possible by means of the user-friendly
interface. In the course of the attendance, there were no cases
of False Acceptance and thus the False Acceptance Rate
(FAR) is 0.</p>
      <p>CONCLUSION AND RECOMMENDATIONS FOR FUTURE</p>
      <p>WORK


</p>
      <p>A multifactor authentication system has been designed
and implemented for a functional automatic Student
Attendance Management System. The prototype successfully
reads RFID cards, captured and stored new fingerprints of
students, scanned fingerprints placed on the fingerprint
device and compared them with those saved in the database.
The Problem of size of biometric data and theft was resolved
by implementing SHA 256 hash function to optimize and
protect the data. From the performance analysis of the
system, the system proved to be efficient and fast because of
its short execution time, minimal False Rejections,
percentage attendance of each student and report generation.
Subsequently, we are looking at addressing the following
issues.</p>
      <p></p>
      <p>The system can be further implemented using a
wireless network for transmitting t h e student
record directly to the database of the application
software rather than SD card.</p>
      <p>A battery indicator can be interfaced with the
hard- ware unit to indicate battery level as to when to
replace or recharge battery.</p>
      <p>A sign-out interface can be created to ensure
duration of time spent by every student at every
lecture.</p>
      <p>Usage of High Frequency active RFID tags as
against passive Low frequency RFID tags for
better performance can be implemented.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O.</given-names>
            <surname>Shoewu</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Idowu</surname>
          </string-name>
          , “
          <article-title>Development of attendance management system using biometrics,”</article-title>
          <source>The Pacific Journal of Science and Technology</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>1</issue>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Adeyemo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Oyeyemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and I. A.</given-names>
            <surname>Akanbi</surname>
          </string-name>
          , “
          <article-title>Development of hybrid radio frequency and biometric security attendance system</article-title>
          ,”
          <source>International Journal of Applied Science and Technology</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>190</fpage>
          -
          <lpage>197</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Aarushi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pratik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sandeep</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Amit</surname>
          </string-name>
          , “
          <article-title>Wireless fingerprint attendance marking system</article-title>
          ,”
          <source>International Journal of Computer Applications</source>
          , vol.
          <volume>108</volume>
          , no.
          <issue>8</issue>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Prajakta</surname>
          </string-name>
          and
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Shubham</surname>
          </string-name>
          , “
          <article-title>Zigbee based student attendance system using LAN networking,”</article-title>
          <source>IOSR Journal of Electronics and Communication Engineering</source>
          , vol.
          <volume>9</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>07</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Weiguo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Gareth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Michael</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Farzin</surname>
          </string-name>
          , “
          <article-title>Template-free biometric-key generation by means of fuzzy genetic clustering</article-title>
          ,
          <source>” IEEE Transactions on Information Forensics and Security</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Ansari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Navada</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Agarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Patil</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Sonkamble</surname>
          </string-name>
          , “
          <article-title>Automation of attendance system using RFID, biometrics, GSM modem with</article-title>
          .
          <source>Net framework,” 2011 International Conference on Multimedia Technology (ICMT)</source>
          , pp.
          <fpage>2976</fpage>
          -
          <lpage>2979</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Shoewu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Olaniyi</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Lawson</surname>
          </string-name>
          , “
          <article-title>Embedded computerbased lecture attendance management system,”</article-title>
          <source>African Journal of Computing and ICT</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>27</fpage>
          -
          <lpage>36</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>RFID</given-names>
            <surname>Canada</surname>
          </string-name>
          (
          <year>November 2012</year>
          ),
          <article-title>“Understanding RFID (Radio Frequency Identification” Second Edition, www</article-title>
          .rfidcanada.com.
          <source>Journal of Applied Science and Technology</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>5</issue>
          ,
          <year>2014</year>
          . Journa
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>