=Paper=
{{Paper
|id=Vol-1830/Paper12
|storemode=property
|title=A Multifactor Student Attendance Management System Using Fingerprint Biometrics and RFID Techniques
|pdfUrl=https://ceur-ws.org/Vol-1830/Paper12.pdf
|volume=Vol-1830
|authors=A. Ahmed,O. M. Olaniyi,J. G. Kolo,C. Durugo
}}
==A Multifactor Student Attendance Management System Using Fingerprint Biometrics and RFID Techniques==
International Conference on Information and Communication Technology and Its Applications
(ICTA 2016)
Federal University of Technology, Minna, Nigeria
November 28 – 30, 2016
A Multifactor Student Attendance Management System Using Fingerprint
Biometrics and RFID Techniques
A. Ahmed1, O. M. Olaniyi2, J. G. Kolo3, and C. Durugo4
Department of Computer Engineering, Federal University of Technology Minna, Nigeria
1
aliyu.ahmed@futminna.edu.ng, 2mikail.olaniyi@futminna.edu.ng, 3jgkolo@gmail.com, 4durugo@st.futminna.edu.ng
Abstract—Attendance is an important factor for measuring Biometrics means “Life Measurement”, but the term is
eligibility, commitment and record keeping for assessment of linked up with the function of measurable unique
students and employees. Several automated attendance systems physiological and biological characteristics to identify an
have been developed. These systems are mostly based on single individual. Biometric characteristics are considered to be
factor template based, which pose a security fault line. This unique to a particular individual. Therefore, use of
paper presents the development of a multifactor attendance biometrics in this system provides a good approach against
system that employs the flexibility of RFID technology and the impersonation. This ensures users to verify a person’s
security of fingerprint biometrics to manage students’ identity based on “who is he/she?”, rather than verifying by
attendance record. Performance evaluation in terms of
what he/she possesses (Example, an ID card), or by “what
response time and event using 10 students shows that average
execution time of approximately 4.61 seconds could be
he/she remembers” example, a password [2]. Selected
achieved. Likewise, the system recorded zero percent (0%) of biometric feature for Human Recognition System includes –
false reject, which tries the system reliability and integrity of DNA, Retina, Voice, fingerprint, iris, facial, and hand.
the result. This paper presents the development of a multifactor
authentication system (RFID and Finger Print Biometrics)
Keywords- RFID; Fingerprint Biometric; Cryptography; Au- for students’ attendance management system.
thentication; Security. The rest of the paper is structured as follows. Section 2
presents some of the related literatures in the field of study.
I. INTRODUCTION While, Sections 3 presents the system design and
implementation. Section 4 presents the system evaluation,
In schools and various institutions or organizations, while conclusion and recommendation for future work is
attendance is used for several purposes which include presented lastly in section 6.
assessment of students’ eligibility for term or promotional
exams, assessment of staffs’ commitment toward their job,
and record keeping for employees. Attendance can be
defined as being available either at a meeting or a II. RELATED WORKS
particular place at a given time. It can as well be seen as A number of related works exist in the application of
the recurrence with which a person is available or the different methods and principles to effectively monitor the
numbers of individuals present [1]. This concept can be attendance of students. In [2], an attendance management
applied and adopted for recording attendance in system using Biometrics was developed. The system took
companies, industries, schools and so on where people are attendance of students via a fingerprint module and the
involved. records were stored in a database. There was no false
Radio Frequency Identification (RFID) is a fast and identification of students as success rate was over 90%.
reliable means of identifying objects whereby identification However, there were no security measures adopted in the
data are saved in an electronic device known as RFID tags, database to protect students’ data.
also called transponders, and the data is retrieved by RFID Also, [3] implemented a Wireless, Fingerprint
readers, also called Interrogators, through radio waves. RFID Attendance Marking System, which presented a
tags are classified into two, namely: Active RFID labels and framework using which attendance management can be
Passive RFID labels. Active labels have a battery made automated and on-line. But the system lacks
incorporated with the label and transmits signal periodically security measures to protect students’ data.
to the reader. Whereas a passive label is cheaper, smaller, In the same vain, [4] implemented a Zigbee Based
and makes use of radio energy that is transmitted by the Student Attendance System Using L o c a l A r e a
reader because it is not self-powered by a battery. This N e t w o r k ( LAN) Networking. In this system, students
project used passive RFID tags since they are less expensive, could report their attendance via biometric system and
flexible, light, and last longer than active tags. notification of attendance is passed to the administrative
69
International Conference on Information and Communication Technology and Its Applications (ICTA 2016)
office through a Zigbee Module. However, the device can personal computer which shall take the record of each
get damaged and the students’ data will be exposed. student’s Name, Matriculation Number, RFID tag number,
A solution based on Template-Free Biometric-Key and the session. This will enable report generation and
Generation by Means of Fuzzy Genetic Clustering which proper record management. Secondly, students will be
requires the storage of neither biometric templates nor required to place their fingerprints on a scanner for biometric
encryption keys, but by directly generating the keys from capture in order to link to the student’s RFID information
statistical features of biometric data was proposed in [5]. already entered in the microcontroller’s database.
This solution was proposed but not implemented.
Furthermore, [6] designed and developed a Portable
Class- room Attendance System Based on Arduino and
Fingerprint Biometric. However, the system is prone to
attack by an intruder, especially through the web since the
web application share the same database with the desktop
application and no security measures were taken to
protect information in the database.
Similarly, an embedded computer-based lecture
attendance management system where a single-chip
computer based sub- systems (an improvised electronic
card and the card reader) were interfaced serially to the
serial port of the digital computer. The electronic card is a
model of a smart card containing the student identity (ID-
Name, Matriculation Number and five pins encrypted
code) was proposed in [7]. The system, though provided
a simplified, low cost embedded computer based system Figure 1. Block Diagram of Attendance System Hardware
solution to the management of lecture attendance problem in
developing countries but does not eliminate the risk of B. Authentication/Verification unit
impersonation. During authentication, the students will be required to
RFID [8] and Biometrics technologies have both been pass their RFID tag close to the hardware module carrying
individually used to solve the problem of attendance in the RFID transceiver; the number associated with the tag is
modern times. RFID has a major security and integrity taken by the RFID Reader and sent to the processor which
problem called “buddy punching” which is when a user further displays the students’ details on the screen. The
swipes a card on behalf of another without the presence system will furthermore proceed to scan the students
of that user [2]. The system developed in this paper fingerprint for authentication and then record the time of
combines the flexibility of RFID technology and the attendance in the SD Card Memory.
security of fingerprint biometrics to track student’s The flowchart of the system is shown in Figure 2.
attendance record.
C. System software Design Considerations
III. SYSTEM DESIGN The developed Software consists of a Database (Back
In the attendance system, RFID labels having unique end) and also an application program (Front end). The
characters are linked with student names. This implies every database stores the fingerprint record of the Students,
student is given RFID labels exclusive to him/her. Passive Courses offered, Lecturers data. It as well serves for report
RFID labels were picked in light of the fact that they needn’t generation as specified by the administrator and was
bother with a power source to function. However, they get implemented using Microsoft SQL Server. SQL Server
powered through the electromagnetic field made by the incorporates numerous elements that make it an effective
RFID transceiver. At the point when a student swipes his/her database administration framework: It has support for
RFID label near the RFID transceiver in the hardware multiple platforms/operating system, easy integration with
module, the number connected to the tag is caught by the Microsoft .NET environment, scalable meaning can grow
transceiver and sent to the processor which further shows the with database needs of a firm and reliable meaning c an
students’ details on a Liquid Crystal Display (LCD) screen. detect incomplete transaction in a database and prevents it
The system will furthermore need to scan the students from being corrupted after power failure. The application
fingerprint for authentication and then record the time of program was developed using Microsoft Visual Basic.Net
attendance in the SD Card Memory. language in visual studio environment. The .Net gives
The attendance system consists of two phases: The simplicity of creating projects for cross-platform
Registration unit and the Authentication unit. Figure 1 shows compatibility. The significant parts of the .Net consist of the
the block diagram of the system. The hardware unit is Visual Studio Integrated Development Environment (IDE)
powered by 3.3V DC power source. responsible for developing the programs and the
Microsoft .Net Framework, which is responsible for
A. Registration Unit running programs. VB.Net is a very user-friendly and an
Student’s registration is in two (2) phases: firstly, object-oriented programming language. Block diagram and
registration with the Attendance Management System use case diagram of the software application is shown in
Desktop Application Software in the Administrator’s Figures 3 and 4 respectively.
70
International Conference on Information and Communication Technology and Its Applications (ICTA 2016)
Figure 4. Use Case Diagram
D. System Implementation
The hardware authentication unit as shown in Figures 5 is
a combination of the RFID reader (125 KHz 10 cm range
RFID reader), fingerprint sensor (Optical Fingerprint Sensor
Module – FPM10A with TTL/UART interface), TFT LCD
display, Real Time Clock, Buzzer, Arduino Mega 2560
board, and an SD card reader. This unit is independent of the
computer system to carry out its operation. For attendance,
Students get to swipe their tags and place their fingerprints
on this module at every lecture. Attendance record of each
Figure 2. System Flowchart student is taken and stored in the SD card. At the end of the
day, the administrator takes the SD card to the computer
system to download attendance record into the Student
Attendance Management System Software (SAMS).
Figure 3. Block diagram of the Attendance Management System
Software Figure 5. Stand-alone Hardware Unit
71
International Conference on Information and Communication Technology and Its Applications (ICTA 2016)
The RFID Tag is shown in Figure 6.
Figure 8. Course Information Form
4) Attendance Form: Through this form as shown in
Figure 9, attendance details of students saved on the SD
card from the hardware device after attendance of the day
must have been completed are uploaded to the software’s
database.
Figure 6. RFID Tag
E. Software Modules
1) Login Form: This is the first interface displayed
when the SAMS application is launched after it must
have been installed by the user. It enables the administrator
to gain access to the attendance management system after
entering valid login credentials in the Username and
Password fields respectively. The login form is shown in
Figure 9. Attendance Form Interface
Figure 7.
2) Registration Forms: This consists of two forms: the 5) Student Record Form: As shown if Figure 10, this
Course registration form for the registration of courses form displays the record of individual attendance for
offered in the department and the Student registration each lecture. The administrator can view and show
form through which students details are saved in the students their individual attendance records for the
database of the system. semester. The form also includes percentage attendance
3) Record Forms: This likewise consists of the two which shows the qualification of students for an
forms as shown in Figure 8, bearing information of every examination.
registered course and student in the department. The 6) Report Form: This is a report of the overall
administrator gets to view, search, delete, and edit student attendance of every registered student per course. Figure
or course information saved in the database. 11 shows the report form.
Figure 7. Login Form Interface Figure 10. Student Record Form Interface
72
International Conference on Information and Communication Technology and Its Applications (ICTA 2016)
Figure 11. Report Form Interface of Attendance System Figure 12. Comparisons of Success and Failure Rate
TABLE II. COMPARISON OF SUCCESS AND FAILURE
RATE
IV. PERFORMANCE EVALUATION
Biometric Rfid/Biometric
For performance evaluation, this work was compared Students Attendance System Attendance System
with an existing biometric attendance system, developed by (in seconds) (in seconds)
[7]. [7] developed an attendance management system using 1 3.81 4.06
Biometrics. The system was tested and compared with the 2 3.43 4.30
manual attendance system. The system was verified using 3 4.12 4.90
fingerprints captured from Eighty (80) students of the 4 3.63 5.17
department. The 80 students were separated into Eight (8) 5 2.53 4.79
groups of 10 students each. A number of successes were 6 2.49 4.66
obtained from the tests carried out. 7 2.72 4.70
The result of the tests carried out for the RFID and 8 3.35 3.95
Biometric Attendance system are shown in Table and Figure 9 4.01 5.24
12. The test result shows that the system is effective and 10 4.21 4.31
fast in response. There were no false accepts i.e. a person
that was not preregistered was not falsely enrolled for Results obtained in the system under research shows a
attendance, and very minimal false rejects either due to higher precision in measurement than the attendance system
incorrect placement of finger or the fingerprint contains dirt by [1]. Testing of the same set of students was carried out 5
or moisture. The system was tested using 10 RFID tags and times with very high success rate. It can be shown in Figure
10 fingerprints of students in the department of Computer 13 that the attendance management system under research
Engineering, Federal University of Technology Minna, has fast response time with an average execution time of
Niger State. 4.61 seconds.
TABLE I. COMPARISON OF SUCCESS AND FAILURE Re
RATE spo
nse
tim
No. of Tests 1 2 3 4 5
e
Success (%) 100 100 100 100 100 (s)
Failure (%) 0 0 20 10 0
Comparison of the Execution time of Biometric No of students
Attendance and Attendance System Using RFID and
Biometrics is shown in Table 2.
The RFID and fingerprint Biometric Attendance
Management System’s average execution time for Ten (10) Figure 13. Comparison of Biometric Attendance System with RFID and
students is approximately 4.61 seconds as against 3.43 Biometrics Attendance Management System
seconds for the Biometric attendance management system
using fingerprint identification developed by authors in [7], The system successfully registered and validated every
a difference of 1.18 seconds which is a negligible difference registered student during attendance. This system is likewise
due to the fact that the system under research adopts two (2) an easy-to-understand system as information control and
authentication techniques. Reports generated for the recovery can be possible by means of the user-friendly
attendance system in [7] took approximately 30s, whereas interface. In the course of the attendance, there were no cases
that of the system under research takes approximately 7 of False Acceptance and thus the False Acceptance Rate
seconds. (FAR) is 0.
73
International Conference on Information and Communication Technology and Its Applications (ICTA 2016)
V. CONCLUSION AND RECOMMENDATIONS FOR FUTURE REFERENCES
WORK [1] O. Shoewu and O. Idowu, “Development of attendance
A multifactor authentication system has been designed management system using biometrics,” The Pacific Journal of Science
and Technology, vol. 13, no. 1, 2012.
and implemented for a functional automatic Student
[2] Z. Adeyemo, O. Oyeyemi, and I. A. Akanbi, “Development of
Attendance Management System. The prototype successfully hybrid radio frequency and biometric security attendance system,”
reads RFID cards, captured and stored new fingerprints of International Journal of Applied Science and Technology, vol. 4, no.
students, scanned fingerprints placed on the fingerprint 5, pp. 190-197, 2014.
device and compared them with those saved in the database. [3] J. Aarushi, J. Pratik, K. Sandeep, and D. Amit, “Wireless
The Problem of size of biometric data and theft was resolved fingerprint attendance marking system,” International Journal of
by implementing SHA 256 hash function to optimize and Computer Applications, vol. 108, no. 8, 2014.
protect the data. From the performance analysis of the [4] S. J. Prajakta and S. J. Shubham, “Zigbee based student
attendance system using LAN networking,” IOSR Journal of
system, the system proved to be efficient and fast because of Electronics and Communication Engineering, vol. 9, no. 6, pp. 07–
its short execution time, minimal False Rejections, 12, 2014.
percentage attendance of each student and report generation. [5] S. Weiguo, H. Gareth, F. Michael, and D. Farzin, “Template-free
Subsequently, we are looking at addressing the following biometric-key generation by means of fuzzy genetic clustering,”
issues. IEEE Transactions on Information Forensics and Security, vol. 3, no.
The system can be further implemented using a 2, 2008.
wireless network for transmitting t h e student [6] A. N. Ansari, A. Navada, S. Agarwal, S. Patil, and B. A. Sonkamble,
“Automation of attendance system using RFID, biometrics, GSM
record directly to the database of the application modem with .Net framework,” 2011 International Conference on
software rather than SD card. Multimedia Technology (ICMT), pp. 2976-2979, 2011.
A battery indicator can be interfaced with the [7] O. Shoewu, O. Olaniyi, and A. Lawson, “Embedded computer-
hard- ware unit to indicate battery level as to when to based lecture attendance management system,” African Journal of
replace or recharge battery. Computing and ICT, vol. 4, no. 3, pp. 27– 36, 2011.
A sign-out interface can be created to ensure [8] RFID Canada (November 2012), “Understanding RFID (Radio
duration of time spent by every student at every Frequency Identification” Second Edition, www.rfidcanada.com.
Journal of Applied Science and Technology, vol. 4, no. 5, 2014.
lecture. Journa
Usage of High Frequency active RFID tags as
against passive Low frequency RFID tags for
better performance can be implemented.
74