Revista ELECTRO

Vol. 40 – Año 2018
Artículo
TÍTULO
Control de Acceso a un Centro de Datos Usando Tres Mecanismos de Seguridad
AUTORES
Vega-Luna J.I., Lagos-Acosta M.A., Sánchez-Rangel F.J., Cosme-Aceves J., Salgado-Guzmán G.
RESUMEN
Se presenta un sistema de acceso para un centro de datos usando una tarjeta RFiD, un lector de huellas digitales y verificación de rostro. El objetivo fue diseñar un sistema compuesto por un módulo central y tres módulos d istribuidos usando tres mecanismos de identificación. Los módulos se componen de una tarjeta Raspberry Pi 3, un lector de tarjetas RFiD, un lector de huellas digitales, una cámara de video y una pantalla táctil. La información de los usuarios se almacena e n el módulo central en una base de datos MySQL, en la memoria flash del lector de huellas y en un directorio de fotografías. Cuando un usuario intenta acceder al centro de datos, la información de su identidad se transmite al módulo central para su validac ión. Se logró un alcance de 48 metros en la comunicación WiFi entre los módulos y el punto de acceso con línea de vista.
Palabras Clave: lector de huellas digitales, MySQL, pantalla táctil, Raspberry Pi 3, RFiD, WiFi.
ABSTRACT
An access system for a da ta center is presented using an RFID card, a fingerprint reader and face verification. The objective was to design a system composed of a central module and three modules distributed using three identification mechanisms. The modules consist of a Raspberry Pi 3 card, an RFID card reader, a fingerprint reader, a video camera and a touch screen. The information of the users is stored in the central module in a MySQL database, in the flash memory of the fingerprint reader and in a directory of photographs. Whe n a user tries to access the data center, their identity information is transmitted to the central module for validation. A range of 48 meters was achieved in the WiFi communication between the modules and the access point with line of sight.
Keywords: fingerprint reader, MySQL, Raspberry Pi 3, RFiD, touch screen, WiFi.
REFERENCIAS
[1] K. Nemati, A. Zabalegui, M. Bana, "Quantifying data center performance", 34th Thermal Measurem ent, Modeling & Management Symposium (SEMI-THERM), San Jose, CA, USA, 19-23 March, 2018, Pages: 141-147.
[2] Y. W. Bai, C. N. Fu, J. H. Yang, "Using NFC tags and smartphones to design a reliable mechanism to pick a child up from school", IEEE International Con ference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 12-14 Jan., 2018, Pages: 1-4.
[3] S. Thakre, A. K. Gupta, "Secure reliable multimodel biometric fingerprint and face recognition", International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 5-7 Jan., 2017, Pages: 1-4.
[4] M. A. Hmani, D. Petrovska-Delacrétaz, "State-of-the-art face recognition performance using publicly available software and datasets", 4th International Conference on Advanced Technologies for Signal a nd Image Processing (ATSIP), Sousse, Tunisia, 21-24 March, 2018, Pages: 1-6.
[5] R. Kaur, D. Sharma, A. Verma, "An advance 2D face recognition by feature extraction (ICA) and optimize multilayer architecture", 4th International Conference on Signal Processing, Computing and Control (ISPCC), So lan, India, 21-23 Sept., 2017.
[6] S. Wibawanto, K. C. Kirana, "Recognition of student emotion based on matrix-1 median fisher's face and backpropagation algorithm", International Conference on Electrical Engineering and Infor matics (ICELTICs), Banda Aceh, Indonesia, 18-20 Oct., 2017, Pages: 103-108.
[7] C. Ying, S. Yaojie, "Face Recognition of the Rhinopithecus Roxellana Qinlingensis Based on Improved HOG and Sparse Representation", International Conference on Computer Network, El ectronic and Automation (ICCNEA), Xi'an, China, 23-25 Sept., 2017, Pages: 499-503.
[8] C. Lunerti, R. M. Guest, R. Blanco-Gonzalo, "Environmental effects on face recognition in smartphones", International Carnahan Conference on Security Technology (ICCST), Mad rid, Spain, 23-26 Oct., 2017, Pages: 1-6.
[9] D. A. Wati, D. Abadianto, "Design of face detection and recognition system for smart home security application", 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 1-2 Nov., 2017, Pages: 342-347.
[10] N. A. Jamil, U. U. Sheikh, M. M. Mokji, "Improved face recognition on video surveillance images using pose correction", TENCON 2017-IEEE Region 10 Conference, Penang, Malaysia, 5-8 Nov., 2017, Pages: 1391-1395.
[11] F. Schroff, D. Kalenichenko, J. Philbin, "FaceNet: A unified embedding for face recognition and clustering", IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, 7-12 June, 2015, Pages: 815-823.
[12] S. Srisuk, S. Ongkittikul, "Robust face recognition based on weighted DeepFace", International Electrical Engineering Congress (iEECON), Pattaya, Thailand, 8-10 March, 2017, Pages: 1-4.
[13] B. Sugiarto, E. Prakasa, R. Wardoyo, "Wood identification based on histogram of oriented gradient (HOG) feature and support vector machine (SVM) classifier", 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 1-2 Nov., 2017, Pages: 33 7-341.
[14] C. I. Orozco, F. Iglesias, M. E. Buemi, "Real-time gender recognition from face images using deep convolutional neural network", 7th Latin American Conference on Networked and Electronic Media (LACNEM 2017), Valparaiso, Chile, 6-7 Nov., 2017, Pages: 7-11.
[15] E. V. Zatonskikh, G. I. Borzunov, "Development of elements of two-level biometrie protection based on face and speech recognition in the video stream", IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Moscow, Russia, 29 Jan.-1 Feb., 2018, Pages: 1579-1583.
[16] J. A. Kusnadi, D. Julio, "Security system with 3 dimensional face recognition using PCA method and neural networks algorithm", 4th International Conference on New Media Studies (CONMEDIA), Yogyakarta, Indonesia, 8-10 Nov., 2017, Pages: 152-155.
CITAR COMO:
Vega-Luna J.I., Lagos-Acosta M.A., Sánchez-Rangel F.J., Cosme-Aceves J., Salgado-Guzmán G., "Control de Acceso a un Centro de Datos Usando Tres Mecanismos de Seguridad", Revista ELECTRO, Vol. 40, 2018, pp. 20-25.
VERSIÓN PDF