Trusted Worrier: A low-cost and high-accuracy user authentication system for firearm exploiting dynamic hand pressure biometrics

Usage of firearm by only original users is one of the prime concerns of the research community considering limitless damage and even lethal consequences in case of having the usage in any other way. However, a low-cost, limited-resources, and high-accuracy solution for performing real-time user identification of firearm is yet to be proposed in the literature. As a remedy to this situation, in this paper, we propose a novel solution named Trusted Worrier that can identify users of a firearm in real time using only a small number of low-cost and low-power COTS pressure sensors. Here, we propose judicious positioning of the sensors such that the number of required sensors can retain a small value (five in our case). Besides, we develop a novel machine learning technique that exhibits high accuracy in user authentication demanding small amount of resource and execution time. We evaluate the approach using real data collected from twenty nine users. Our rigorous analysis over the data confirms effectiveness of Trusted Worrier in identifying users of a firearm.

[1]  Michal Daszykowski,et al.  Revised DBSCAN algorithm to cluster data with dense adjacent clusters , 2013 .

[2]  Anil K. Jain,et al.  Biometrics of Next Generation: An Overview , 2010 .

[3]  Peter Corcoran,et al.  Iris authentication in handheld devices - considerations for constraint-free acquisition , 2015, IEEE Transactions on Consumer Electronics.

[4]  Raymond N. J. Veldhuis,et al.  Grip-pattern verification for a smart gun , 2008, J. Electronic Imaging.

[5]  Rajeswari Mukesh,et al.  A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits , 2014, Int. J. Netw. Secur..

[6]  S. K. Basu,et al.  Reliability Assessment Based on Design and Manufacturing Tolerances for Control Burst Mechanism of Small Arms , 1997 .

[7]  Wouter Joosen,et al.  SmartAuth: dynamic context fingerprinting for continuous user authentication , 2015, SAC.

[8]  Subbarao Kambhampati,et al.  What We Instagram: A First Analysis of Instagram Photo Content and User Types , 2014, ICWSM.

[9]  Jie Yu A nonlinear kernel Gaussian mixture model based inferential monitoring approach for fault detection and diagnosis of chemical processes , 2012 .

[10]  Bill Jackson,et al.  Complex zero-free regions at large |q| for multivariate Tutte polynomials (alias Potts-model partition functions) with general complex edge weights , 2008, J. Comb. Theory, Ser. B.

[11]  Henrik Walter,et al.  Prediction error as a linear function of reward probability is coded in human nucleus accumbens , 2006, NeuroImage.

[12]  Trilok Chand Sharma,et al.  WEKA Approach for Comparative Study of Classification Algorithm , 2013 .

[13]  Hamidreza Jafarnejadsani,et al.  Adaptive Control of a Variable-Speed Variable-Pitch Wind Turbine Using Radial-Basis Function Neural Network , 2013, IEEE Transactions on Control Systems Technology.

[14]  Michael R. Lyu,et al.  Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones , 2014, SOUPS.

[16]  Sk Hafizul Islam,et al.  Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system , 2015, J. King Saud Univ. Comput. Inf. Sci..

[17]  Zong Chen Handgrip Recognition , 2022 .

[18]  Zhuo Yang,et al.  MAC protocol identification using support vector machines for cognitive radio networks , 2014, IEEE Wireless Communications.

[19]  Chien-Chung Shen,et al.  Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms , 2014, ArXiv.

[20]  Raymond N. J. Veldhuis,et al.  Grip-Pattern Recognition for Smart Guns , 2003 .

[21]  Steven Furnell,et al.  Continuous user authentication using multi-modal biometrics , 2015, Comput. Secur..

[22]  Markus Jakobsson,et al.  Hand authentication on multi-touch tablets , 2014, HotMobile.

[23]  Mary Hanson Fingerprint-based Forensics Identify Argentina's Desaparecidos , 2000, IEEE Computer Graphics and Applications.

[24]  Chun-Ta Li,et al.  An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..