📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to VOLUME 6, ISSUE 2, FEBRUARY 2017

Personal Authentication System for Illegal Usage of Arms

Chhaya C Athavale, Sivaraj K R, Pratik Jain, Bhagyashri Jogdand, Ankit Sharma

DOI: 10.17148/IJARCCE.2017.6275

Abstract: Authentication system has become necessary to overcome the security threats faced by many armed personnel these days. Nowadays, there is increase in unethical usage of weapons by stealing it from armed personnel. A result of this is the use of these weapons for various crimes. It is not uncommon to see these weapons of law enforcement being used to break the law instead. The problem is that the pistols do not recognize their rightful owner and thus anybody who has the gun can use it freely. The need of the hour is of a system that checks the identity of the person who holds the gun before he can fire it. Hence there is only one alternative i.e. authentication system which includes RFID security and biometric technology. The system uses RFID technology and biometrics to identify the rightful owner of the gun. The RFID reader is installed on the weapon to detect the tags placed on the authorized person (installed on wrist watch, belt, etc.) then the system captures the fingerprint image and scans the database for a match. If both the object and captured image belong to a registered user, access is granted and the trigger can be pulled for a definite time period; otherwise the system remains locked and the user will not be able to pull the trigger. Thus this paper describes the design of authentication system for unethical usage of arms.



Keywords: RFID, Fingerprints, Arduino, Solenoid lock.

How to Cite:

[1] Chhaya C Athavale, Sivaraj K R, Pratik Jain, Bhagyashri Jogdand, Ankit Sharma, “Personal Authentication System for Illegal Usage of Arms,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2017.6275