CFP last date
20 January 2025
Reseach Article

Bluetooth based Authentication System

Published on February 2013 by Kishor T. Mane, Vandana G. Pujari
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 8
February 2013
Authors: Kishor T. Mane, Vandana G. Pujari
95ab5051-ae20-4b7f-aca8-a21823a75b20

Kishor T. Mane, Vandana G. Pujari . Bluetooth based Authentication System. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 8 (February 2013), 1-3.

@article{
author = { Kishor T. Mane, Vandana G. Pujari },
title = { Bluetooth based Authentication System },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 8 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 1-3 },
numpages = 3,
url = { /proceedings/icrtitcs2012/number8/10299-1403/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Kishor T. Mane
%A Vandana G. Pujari
%T Bluetooth based Authentication System
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 8
%P 1-3
%D 2013
%I International Journal of Computer Applications
Abstract

In this information technology era, enterprise needs the automation of every system get the competitive advantage and multidimensional growth of the business. For this every enterprise need to observe the incoming and outgoing time of every employee and to stop the entry of unauthorized persons. For this many automated and manual systems are available like smart card, RFID, manual ID card, thumb impression techniques, etc. Every technique has its advantages and disadvantages. But the biggest problems with these system is that employees have to carry a number of electronic devices (PDA, Mobile Phone, Smart card, Library card, ATM Card, Credit Card etc) with them for different purposes. Carrying many e-devices/e-cards is not comfortable for a person. To reduce the number of e-devices one has to carry, many IT companies are working towards integration. The purpose of this paper is to integrate the authentication process at the time of entry and exit of employee using mobile phones with the support of Bluetooth Ad-Hoc network.

References
  1. P. K. Bishnoi P. K. Das "Check In Check Out using Bluetooth ad- hoc network (CICO-BT)" International Journal of Computer Applications (0975 – 8887) Volume 7– No. 3 September 2010.
  2. Dr. Dipak Kumar, Dr. P. K. Jakhar "Relative Distance Mobile Ad Hoc Networks" International Journal of Computer Applications, Volume 2(4), 733-735.
  3. "Bluetooth: Low Power and Low Cost" Available: http://www. bluetomorrow . com.
  4. "High Speed Bluetooth" Available: http://www. bluetomorrow. com/content /section/ 344/466/.
  5. Don Murray and Anup Basu "Motion Tracking with an Active Camera" IEEE transactions on pattern analysis and machine intelligence Volume 16, NO. 5, MAY 1994.
  6. Wireless Ad Hoc Networks: Basic Concepts by Gary Breed from High Frequency Electronics March 2007.
  7. Jari Välimäki "Bluetooth and Ad Hoc Networking".
  8. Kiran S. Bhat, Mahesh Saptharishi, Pradeep Khosla "Motion Detection and Segmentation Using Image Mosaics".
  9. Andre N. Klingsheim "J2ME Bluetooth Programming" The NoWires Research Group.
  10. James Keogh "J2ME: The Complete Reference" McGraw Hill publication.
  11. http://en. wikipedia. org/wiki/Barcode
  12. http://www. biometrics. gov/documents/biointro. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Bluetooth Ad-hoc Network Rfid Authentication System