User authentication using neural network in smart home

Jee,, Tze Ling (2009) User authentication using neural network in smart home. [Final Year Project Report] (Unpublished)

[img]
Preview
PDF
User Authentication Using Neural Network in Smart Home(24 pgs).pdf

Download (247kB) | Preview
[img] PDF (Please get the password by email to repository@unimas.my , or call ext: 3914 / 3942 / 3933)
User Authentication Using Neural Network in Smart Home(OCR).pdf
Restricted to Registered users only

Download (915kB)

Abstract

Security has been an important issue and concern in the smart home systems. Smart home networks consist of a wide range of wired or wireless devices, there is possibility that illegal access to some restricted data or devices may happen. Password-based authentication is widely used to identify authorize users, because this method is cheap, easy and quite accurate. Conventional password-based authentication methods store passwords as a password or verification table which is vulnerable. In this project, a neural network is trained to store the passwords and replace verification table. This method is useful in solving security problems that happened in some authentication system. Furthermore, it can be applied to the door lock for a smart home system. The conventional way to train the network using Backpropagation (BPN) requires a long training time. Hence, a faster training algorithm, Resilient Backpropagation (RPROP) is embedded to the network to accelerate the training process. For the experiment, 200 sets of UserID and Passwords were created and encoded into binary as the input and target. The experiment had been carried out to evaluate the performance for different number of hidden neurons, training sets, and combination of transfer functions. Mean Square Error (MSE), training time and number of epochs are used to determine the network performance. From the simulation results obtained, using Tansig and Purelin in hidden and output layer, and 250 hidden neurons gave the better performance. The network which gives the better performance network is used to develop the user authentication system.

Item Type: Final Year Project Report
Additional Information: Project Report (B.Sc.) -- Universiti Malaysia Sarawak, 2009.
Uncontrolled Keywords: Neural networks (Computer science), Neural computers, technology, unimas, university, universiti, Borneo, Malaysia, Sarawak, kuching, samarahan, ipta, education, undergraduate, Universiti Malaysia Sarawak
Subjects: T Technology > T Technology (General)
Divisions: Academic Faculties, Institutes and Centres > Faculty of Engineering
Faculties, Institutes, Centres > Faculty of Engineering
Depositing User: Karen Kornalius
Date Deposited: 20 Mar 2015 00:32
Last Modified: 03 Jul 2023 06:55
URI: http://ir.unimas.my/id/eprint/6549

Actions (For repository members only: login required)

View Item View Item