SlideShare a Scribd company logo
Department of Electrical & Electronics Engineering
Topic:- MICROCONTROLLER BASED WEAPON
              AUTHENTICATION
         Guided by:- Smt. Rashmi Pawar
                 Presented by:-
                  Amruta Dixit
          University NO:- 2BL08EE004
1)   Abstract
2)   Introduction
3)   General working principle
4)   Existing authentication tech
5)    Drawbacks
6)   Conclusion
7)   Bibliography
 Today  our world is facing one of the big threats of
 terrorism. A very recent attack on our country which
 can never be forgettable is 26/11 attack on Mumbai.
 Terrorists armed with deadly weapons such as AK-
 47, grenades etc attacked the mob killing hundreds.
 These terrorists were using weapons from falling into
 wrong hands & strengthen our defense system, many
 engineers & technologists have come up with an idea
 to authenticate weapons by providing acess of the
 weapon to valid user.
 Terrorists  used weapons which are smuggled
  illegally. Hence stopping weapons from falling into
  the wrong hands is a major problem for law &
  enforcement agencies.
 To protect these weapons new technique is evolved
  i.e. weapon authentication.
 Weapon is a tool used to destroy the enemy or used
  for self defense.
 Authentication gives the meaning of authorization.
 Weapon Authentication is summarized as a technique
  used for authorization of weapon.
 Terrorists& underworld criminals use stolen
  weapons which are smuggled & used illegally.
 People who own guns for their personal use may face
  problems as Kids at home unknowingly may make
  childish use of guns.
 Many times during fight criminals may steal
  Policeman’s gun & use them illegally.
 These problems ask us to think about developing
  safety & security mechanism for fire arms so that
  only authorized users can use the weapon.
weapon authentication
 Here  the authentication can be done using RFID tag
  & reader.
 Licensed user will be provided with a tag with
  specific user ID.
 When weapon is set to validation RFID reader reads
  RFID tag.
 RFID reader sends the read data to microcontroller
  chip where authorization of user is checked.
 If a person is authorized the microcontroller unlocks
  the gun by instructing magnetic locks.
weapon authentication
 Here  authorization of user can be checked by using
  finger print scanner.
 Finger print of user is scanned by finger print
  scanner.
 Scanner sends the data to microcontroller chip where
  authorization of user is checked.
 If a person is authorized the microcontroller unlocks
  the gun by instructing magnetic locks.
a)   The O’dwyer’s VLE smart gun
    Electronically fired gun & launcher design.
    Multiple barrels with multiple rounds stacked in
     each barrel.
    It allows user to select b/w different types of round.
    No mechanical parts involved.
    Validates the exact finger print of the user.
weapon authentication
 It is a new computer chip promises to keep police
  guns away from firing if they fall into wrong hands.
 It uses RFID technology.
 This tiny chip is implanted b/w the shoulder & elbow
  area of user’s hand.
 Chip needs no battery or power source.
weapon authentication
 Reloading  mechanism is tedious for VLE guns.
 Scanning device could malfunction.
 Veri chip may get lost or may get smashed during
  fight.
 The system can be hacked & reprogrammed.
 Weapon usage cannot be traced.
 In today’s world technology has advanced to great
  extent.
 Many concept which were impractical to hear have
  now become reality.
 In this modern world developing smart weapons
  would be a hope for better future.
 In future illegal training of weapons may come to an
  end.
 Developing smart weapons will also help armies &
  federal bodies in fighting crimes in better ways.
 www.popularmechanics.com
 www.sciencecentral.com
 www.popsci.com
 www.wikipedia.org
 www.militaryphotos.net

More Related Content

PDF
Le security v0.8
PPTX
Process Assignment
PDF
Radio Frequency Identification (RFID) Security issues and possible solutions
PPS
Ranjith_Bm
PDF
Research paper_Anshul _Ankita_RSG
PPTX
GUN CONTROL SMART GUN ALTERNATION
ODP
Tsunami Detector
Le security v0.8
Process Assignment
Radio Frequency Identification (RFID) Security issues and possible solutions
Ranjith_Bm
Research paper_Anshul _Ankita_RSG
GUN CONTROL SMART GUN ALTERNATION
Tsunami Detector

Viewers also liked (9)

PDF
Painel 3 – Hydrokinetic Energy Experience
PPTX
Tsunami detection system
PDF
Identification Simplified - An Introduction to Biometrics
PDF
ELectricity from Ocean Waves
PPTX
Advanced softwares used in civil engineering
PPTX
Managing Earthquakes
PPT
Civil Engineering
PPTX
Civil engineering powerpoint
PDF
Digital Strategy 101
Painel 3 – Hydrokinetic Energy Experience
Tsunami detection system
Identification Simplified - An Introduction to Biometrics
ELectricity from Ocean Waves
Advanced softwares used in civil engineering
Managing Earthquakes
Civil Engineering
Civil engineering powerpoint
Digital Strategy 101
Ad

Similar to weapon authentication (20)

PPTX
Biometric/fingerprint in guns
PPTX
enlish presentation about technology.pptx
PDF
PDF
IRJET- RFID Based Security Guard System using GSM
PDF
IRJET- RFID Based Security Guard System using GSM
PPT
Ubiquitous security- is it just biometrics?
PDF
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
PDF
Intellectual Bank Locker Security System
PDF
Intellectual Bank Locker Security System
PPTX
cyber security and its importance .pptx
PPTX
Technology for national security
PPTX
Biometric authentication
PDF
Cyber weapons 1632578286
PDF
Understanding the Functionalities of the Anti-Drone Systems.pdf
PPTX
Ethical-Hacking-ppt.pptx
PDF
Deviant Security The Technical Computer Security Practices Of Cyber Criminals...
PDF
Hacking Internet of Things (IoT)
PPTX
Artificial Intelligence, Regulating LAWS.
PPTX
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
PDF
D0351022026
Biometric/fingerprint in guns
enlish presentation about technology.pptx
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
Ubiquitous security- is it just biometrics?
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
cyber security and its importance .pptx
Technology for national security
Biometric authentication
Cyber weapons 1632578286
Understanding the Functionalities of the Anti-Drone Systems.pdf
Ethical-Hacking-ppt.pptx
Deviant Security The Technical Computer Security Practices Of Cyber Criminals...
Hacking Internet of Things (IoT)
Artificial Intelligence, Regulating LAWS.
Zero Trust Cybersecurity for IoT - powered by SDP and Blockchain technology
D0351022026
Ad

Recently uploaded (20)

PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
DOCX
Business Management - unit 1 and 2
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Tata consultancy services case study shri Sharda college, basrur
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Cours de Système d'information about ERP.pdf
PDF
Module 2 - Modern Supervison Challenges - Student Resource.pdf
PDF
Deliverable file - Regulatory guideline analysis.pdf
PPT
Chapter four Project-Preparation material
PDF
How to Get Funding for Your Trucking Business
PPTX
Probability Distribution, binomial distribution, poisson distribution
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Comments on Crystal Cloud and Energy Star.pdf
PDF
Hindu Circuler Economy - Model (Concept)
PDF
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
Charisse Litchman: A Maverick Making Neurological Care More Accessible
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
Business Management - unit 1 and 2
340036916-American-Literature-Literary-Period-Overview.ppt
Tata consultancy services case study shri Sharda college, basrur
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
ICG2025_ICG 6th steering committee 30-8-24.pptx
Cours de Système d'information about ERP.pdf
Module 2 - Modern Supervison Challenges - Student Resource.pdf
Deliverable file - Regulatory guideline analysis.pdf
Chapter four Project-Preparation material
How to Get Funding for Your Trucking Business
Probability Distribution, binomial distribution, poisson distribution
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Comments on Crystal Cloud and Energy Star.pdf
Hindu Circuler Economy - Model (Concept)
TyAnn Osborn: A Visionary Leader Shaping Corporate Workforce Dynamics
Daniels 2024 Inclusive, Sustainable Development
Solaris Resources Presentation - Corporate August 2025.pdf

weapon authentication

  • 1. Department of Electrical & Electronics Engineering Topic:- MICROCONTROLLER BASED WEAPON AUTHENTICATION Guided by:- Smt. Rashmi Pawar Presented by:- Amruta Dixit University NO:- 2BL08EE004
  • 2. 1) Abstract 2) Introduction 3) General working principle 4) Existing authentication tech 5) Drawbacks 6) Conclusion 7) Bibliography
  • 3.  Today our world is facing one of the big threats of terrorism. A very recent attack on our country which can never be forgettable is 26/11 attack on Mumbai. Terrorists armed with deadly weapons such as AK- 47, grenades etc attacked the mob killing hundreds. These terrorists were using weapons from falling into wrong hands & strengthen our defense system, many engineers & technologists have come up with an idea to authenticate weapons by providing acess of the weapon to valid user.
  • 4.  Terrorists used weapons which are smuggled illegally. Hence stopping weapons from falling into the wrong hands is a major problem for law & enforcement agencies.  To protect these weapons new technique is evolved i.e. weapon authentication.  Weapon is a tool used to destroy the enemy or used for self defense.  Authentication gives the meaning of authorization.  Weapon Authentication is summarized as a technique used for authorization of weapon.
  • 5.  Terrorists& underworld criminals use stolen weapons which are smuggled & used illegally.  People who own guns for their personal use may face problems as Kids at home unknowingly may make childish use of guns.  Many times during fight criminals may steal Policeman’s gun & use them illegally.  These problems ask us to think about developing safety & security mechanism for fire arms so that only authorized users can use the weapon.
  • 7.  Here the authentication can be done using RFID tag & reader.  Licensed user will be provided with a tag with specific user ID.  When weapon is set to validation RFID reader reads RFID tag.  RFID reader sends the read data to microcontroller chip where authorization of user is checked.  If a person is authorized the microcontroller unlocks the gun by instructing magnetic locks.
  • 9.  Here authorization of user can be checked by using finger print scanner.  Finger print of user is scanned by finger print scanner.  Scanner sends the data to microcontroller chip where authorization of user is checked.  If a person is authorized the microcontroller unlocks the gun by instructing magnetic locks.
  • 10. a) The O’dwyer’s VLE smart gun  Electronically fired gun & launcher design.  Multiple barrels with multiple rounds stacked in each barrel.  It allows user to select b/w different types of round.  No mechanical parts involved.  Validates the exact finger print of the user.
  • 12.  It is a new computer chip promises to keep police guns away from firing if they fall into wrong hands.  It uses RFID technology.  This tiny chip is implanted b/w the shoulder & elbow area of user’s hand.  Chip needs no battery or power source.
  • 14.  Reloading mechanism is tedious for VLE guns.  Scanning device could malfunction.  Veri chip may get lost or may get smashed during fight.  The system can be hacked & reprogrammed.  Weapon usage cannot be traced.
  • 15.  In today’s world technology has advanced to great extent.  Many concept which were impractical to hear have now become reality.  In this modern world developing smart weapons would be a hope for better future.  In future illegal training of weapons may come to an end.  Developing smart weapons will also help armies & federal bodies in fighting crimes in better ways.
  • 16.  www.popularmechanics.com  www.sciencecentral.com  www.popsci.com  www.wikipedia.org  www.militaryphotos.net