The project sets sight on authenticating the conventional Credit card transaction system. In the prevailing system though the Credit card paves a convenient mode of transactions, it is subjected to more jeopardy. As technology extends its limit, the way of hacking and cracking also goes along the road. In out proposed system, in every transaction with the Credit card a handshaking signal is achieved with the cardholder. The handshaking method is achieved by transferring the transaction time and the purchase details to the mobile of the cardholder by means of a GSM modem. From the acknowledgement and authentication received from the cardholder’s mobile further transaction proceeds. The system used the MCU for the security issues between the Mobile and the Card. Reports can also be generated for every successful authentication.
1. IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 1 | P a g e Copyright@IDL-2017
An ATM Multi-Protocol Emulation Network
Dimple Aradhya.K.M1
, Akshatha.H.R2
, Lakshmi Narasamma N3
, Jethi Kumari.B4
,
Mrs. Pragathi M Kaliwal5
(Guide)
VTU University1, 2, 3, 4, 5
Abstract -- The project sets sight on
authenticating the conventional Credit card
transaction system. In the prevailing system
though the Credit card paves a convenient
mode of transactions, it is subjected to more
jeopardy. As technology extends its limit,
the way of hacking and cracking also goes
along the road. In out proposed system, in
every transaction with the Credit card a
handshaking signal is achieved with the
cardholder. The handshaking method is
achieved by transferring the transaction time
and the purchase details to the mobile of the
cardholder by means of a GSM modem.
From the acknowledgement and
authentication received from the
cardholder’s mobile further transaction
proceeds. The system used the MCU for the
security issues between the Mobile and the
Card. Reports can also be generated for
every successful authentication.
The cardholder will be asked for a
reply by the GSM modem message. The
message from the cardholder is the major
authentication command. The MCU decodes
the message and decides the operation to be
performed. The status of the system for each
individual process will be displayed using
LCD s and LED s.
If your card is lost you need not have
to worry until you get the replacement of
the card which will minimum take 1
month. Until then it is difficult to survive
without atm card. So we have got a new
concept of universal card. If you have lost
your card. There is a universal card given
to the security guard of the atm. People
who have lost the card can use this card.
After swiping the universal card it will
ask for the account number. On providing
that it will generate a random unique
code and sms the same to the account
holder. He has to share to the person who
is using his card. The unique code keeps
on changing on every swipe and the new
secret code is always sent by sms to the
account holder. By this way we can have
a secure mode of atmtranscaction .even
though the card is lost.
INTRODUCTION
An automated teller machine or automatic
teller machine (ATM) is a computerized
telecommunications device that provides
a financial institution's customers a secure
method of performing financial
transactions in a public space without the
need for a human clerk or bank teller.
2. IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 2 | P a g e Copyright@IDL-2017
Using an ATM, customers can
access their bank accounts in order to
make cash withdrawals (or credit card
cash advances) and check their account
balances. Many ATMs also allow people
to deposit cash or checks, transfer money
between their bank accounts, pay bills, or
purchase goods and services. On most
modern ATMs, the customer identifies
him or herself by inserting a plastic card
with a magnetic stripe or a plastic smart
card with a chip,that contains his or her
card number and some security
information, such as an expiration
date.The customer then verifies their
identity by entering a passcode, often
referred to as a PIN (Personal
Identification Number) of four or more
digits. Upon successful entry of the PIN,
the customer may perform a transaction.
After the transaction is complete, a
transaction record is printed, usually
consisting of the action taken, date and
time, location, any applicable fees, and
available balance.
If the number is entered
incorrectly several times in a row (usually
three attempts per card insertion), some
ATMs will attempt to retain the card as a
security precaution to prevent an
unauthorized user from discovering the
PIN by guesswork. Captured cards are
often destroyed if the ATM owner is not
the card issuing bank, as non-customer's
identities cannot be reliably confirmed. In
some cases, a transaction may be
performed at the ATM that allows the
customer's PIN to be changed
securely.The cardholder will be asked for a
reply by the GSM modem message. The
message from the cardholder is the major
authentication command. The MCU decodes
the message and decides the operation to be
performed. The status of the system for each
individual process will be displayed using
LCD s and LED s.
II. RELATED WORK
In recent years, security has been
more and more significant in network
environment with the emergence of the
internetworking technology. The
internetworking technology can provide the
communication channels across networks so
that machines in different networks can talk
to each other. However, the internetworking
communication will be exposed to all kinds
of attacks in such an open environment.
Most of the network technologies, without
integrating with security mechanism
originally, have to be redesigned to provide
some security services. ATM is one of those
technologies.
ATM stands for Asynchronous
Transfer Mode. Originally, it is a transfer
mode to implement the B-ISDN(Broadband
Integrated Services Digital Network)
technology so that all forms of data
traffic(voice, video, data etc.) can be
transferred over telecommunication
networks. But ATM is not restricted to B-
ISDN. It has been used to provide a
simplified network infrastructure for various
network connections, e.g. LAN, MAN or
WAN. ATM is a connection-oriented
technique. In ATM, hosts are connected by a
network of switches. When two parties want
to talk, they request a Virtual Channel from
the switch network first. Then the two
parties can send data to each other. Although
the communication parties can send data in
3. IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 3 | P a g e Copyright@IDL-2017
any size, ATM always delivers data in a
fixed size unit, which is called a cell. A cell
has 5 octet header and 48 octet payload. Cell
switching will base on the 5 octet header. In
the way, a cell can go through a switch very
quickly. To meet different requirements of
specific traffic, ATM also introduces the
concept of Quality of Service(QoS). Details
about ATM technology can be found in any
ATM textbooks. And the most recent
advances in this area can be found in
discussions and contributions of ATM
Forum, which is the standards organization
for ATM.
In fact, issues in ATM security have
not gained enough attention until 1995,
when a group within ATM Forum was
established to address the security issues.
Therefore, compared with other security
area, ATM security is still in its beginning.
In this paper, we first examine the threats to
ATM networks. And then we discuss the
requirements of ATM security. In section 4
we are going to discuss the implementation
issues of ATM security. Phase I ATM
Security Specification has been discussed in
this section. In conclusion, we discuss some
examples of the ATM security products.
III. PROPOSED METHODOLOGY
The proposed system is an
enhancement of the existing system, and, it
is built upon the existing card and PIN -
based system. The proposed system is in two
different modes; the first will improve the
security of the ATM by applying second
level authentication on the existing ATM
process for withdrawal, after entry of correct
a PIN, while the second will apply second
level authentication in a scenario where a
customer-specified withdrawal limit is
attained.
Depicts an instance of withdrawal on
the AT for the proposed system which is an
enhancement of the existing system. The
entry of a correct PIN is inadequate to
authenticate to the bank system. This is
because an additional level has been
incorporated for the authentication process
which requires the customer to enter a valid
code which will be sent to the customer’s
pre-registered mobile device via SMS
gateway. If a correct code is supplied the
customer gets authenticated and is granted
access for withdrawal. However, if an
incorrect code is supplied even after the
entry of a correct PIN, the authentication
process fails and the customer is denied
access for withdrawal.
An instance of withdrawal on the
ATM. This mode gives the customer the
opportunity to choose the second level
authentication process as an additional level
of authentication for withdrawal in order to
guarantee the security of the account owner.
With this mode, a customer- specified
withdrawal limit must be attained before the
system prompts for entry of a valid code. If
a valid code is supplied, the authentication
process is complete and the customer is
granted access for withdrawal. On the other
hand, if an invalid code is supplied, the
authentication process fails and the customer
is denied access for withdrawal. It is
imperative to note that if a customer-
specified withdrawal limit is not in place,
the entry of a valid PIN will be sufficient to
authenticate the customer to the system and
thereafter grant access for withdrawal. This
implies that the second level authentication
4. IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 4 | P a g e Copyright@IDL-2017
process would not be applied in such
instances.
IV. CONCLUSION
This paper presents a novel
architecture – M-cash withdrawal- that can
be used as a means of interaction between
mobile phone/devices, an ATM machine and
a Banking application for the purpose of
withdrawing cash. The design of the
proposed secure M-cash withdrawal allows
the use of mobile phones as a tool of
interaction and provides flexibility through
robust identity management architecture.
The first part of the architecture is in the
process of being implemented and all the
process involved has been analyzed and
justified where possible. As part of our
future work, we will be providing in-depth
analyses of the design and protocols to be
used for the purpose of withdrawing cash.
The Secure M-cash has examined the
possibility of making use of similar
approaches/techniques (RFID and NFC) for
other applications and already there are
some applications that have adapted this
strategy. The Secure M-Cash Withdrawal
architecture has been defined, it will form as
a foundation for future work within this
area, which includes, protocols design, and
implementing a PC based simulation of the
architecture and implementing the system.
Banks provide security and
convenience for managing your money and
sometimes allow you to make money by
earning interest. Convenience and fees are
two of the most important things to consider
when choosing a bank.Writing and
depositing checks are perhaps the most
fundamental ways to move money in and
out of a checking account, but advancements
in technology have added ATM and debit
card transactions, ACH transfers, online bill
pay and mobile transfers to the mix.All
banks have rules about how long it takes to
access your deposits, how many debit card
transactions you're allowed in a day, and
how much cash you can withdraw from an
ATM. Access to the balance in your
checking account can also be limited by
businesses such as gas stations and hotels
that place holds on your funds when you pay
with a debit card.
Debit cards provide easy access to
the cash in your account, but can cause you
to rack up fees if you overdraw your account
or visit out-of-network ATMs.While debit
cards encourage more responsible spending
than credit cards, they do not offer the same
protection or perks.Regularly balancing your
checkbook or developing another method to
stay on top of your account balance is
essential to successfully managing your
checking account and avoiding fees,
declined transactions and bounced
payments.
If you have more money than you
need to manage your day-to-day expenses,
banks offer a variety of options for saving,
including money market accounts, CDs,
high-interest online savings accounts and
basic savings accounts.To protect your
money from electronic theft, identity theft
and other forms of fraud, it's important to
implement basic precautions such as
shredding account statements, having
complex passwords, safeguarding your PIN
and only conducting online and mobile
banking through secure internet connections.
5. IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 5 | P a g e Copyright@IDL-2017
REFERENCES
1] AbdullahiArabo, "Secure Cash
Withdrawal through Mobile Phone/Device ",
in Proceedings of the International
Conference on Computer and
Communication Engineering, 2008, 818-
822.
[2] Daojing He, Maode Ma, Yan Zhang,
Chun Chen, Jiajun Bu, "A strong user
authentication scheme with smart cards for
wireless communications", Computer
Communications 34, 2011, 367-374.
[3] Francesco Buccafurri, Gianluca Lax,
"Implementing disposable credit card
numbers by mobile phones", in Springer
Science+Business Media, LLC 2011.
[4] Kuo-Hui Yeh, Chunhua Su, N.W. Lo,
Yingjiu Li, Yi-Xiang Hung, "Two robust
remote user authentication protocols using
smart cards", in The Journal of Systems and
Software, 2010, 2556-2565.
[5] Manoj Kumar, "An Enhanced Remote
User Authentication Scheme with Smart
Card", International Journal of Network
Security, 10(3) (2010), 175-184.
[6] Mohamed HamdyEldefrawy, Khaled
Alghathbar, Muhammad Khurram Khan,
"OTP-Based Two- Factor Authentication
Using Mobile Phones", in 2011 Eighth
International Conference on Information
Technology: New Generations, 2011, 327-
331.
[7] Ms. Trupti Hemant Gurav, Ms. Manisha
Dhage, "Remote client Authentiction using
mobile phone generated OTP", International
Journal of Scientific and Research
Publications, 2(5), 2012.
[8] Sagar Acharya, ApoorvaPolawar,
P.Y.Pawar, "Two Factor Authentication
Using Smartphone Generated One Time
Password", IOSR Journal of Computer
Engineering, 11 (2) (2013), 85-90.
[9] SagarGajbhar, ShrikantAher, Swapnil
Auti, Shailesh Hodge, "Authentication using
Mobile phone generated OTP", International
Journal of Computer Science and
Management Research 2(5) (2013).