LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Tennina , Stefano; Di Renzo , Marco; Luigipomante , Luigi; Alesii , Roberto; Santucci , Fortunato; Graziosi , Fabio (2011)
Publisher: HAL CCSD
Languages: English
Types: Conference object
Subjects: [ INFO.INFO-IT ] Computer Science [cs]/Information Theory [cs.IT], [ MATH.MATH-IT ] Mathematics [math]/Information Theory [math.IT]
ISBN: 978-1-4503-0718-5; International audience; The demonstration proposal moves from the capabilities of a wireless biometric badge [4], which integrates a localization and tracking service along with an automatic personal identification mechanism, to show how a full system architecture is devised to enable the control of physical accesses to restricted areas. The system leverages on the availability of a novel IEEE 802.15.4/Zigbee Cluster Tree network model, on enhanced security levels and on the respect of all the users' privacy issues.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] O. S. Adeoye. A survey of emerging biometric technologies. International Journal of Computer Applications, 9(10):1-5, November 2010.
    • [2] J.-H. Hauer et al. An open-source ieee 802.15.4 mac implementation for tinyos 2.1, February 2011. Poster Session at 8th European Conference on Wireless Sensor Networks.
    • [3] P. Jurcik et al. Dimensioning and worst-case analysis of clustertree sensor networks. ACM Transactions on Sensor Networks, 7(2), August 2010.
    • [4] S. Tennina et al. Integrated gps-denied localization, tracking and automatic personal identification. In SenSys, pages 355- 356. ACM, 2009.
    • [5] UPEK. Chipset tcs3-tcd42, touchstrip fingerprint authentication solution, 2009.
    • [6] WEST Aquila. Wireless embedded systems technologies - L'Aquila, 2010, www.westaquila.com.
  • No related research data.
  • No similar publications.

Share - Bookmark

Funded by projects

  • FCT | ARTEMIS/0003/2008
  • EC | HYCON2

Cite this article