SlideShare a Scribd company logo
1 of 5
Download to read offline
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 1 | P a g e Copyright@IDL-2017
An ATM Multi-Protocol Emulation Network
Dimple Aradhya.K.M1
, Akshatha.H.R2
, Lakshmi Narasamma N3
, Jethi Kumari.B4
,
Mrs. Pragathi M Kaliwal5
(Guide)
VTU University1, 2, 3, 4, 5
Abstract -- The project sets sight on
authenticating the conventional Credit card
transaction system. In the prevailing system
though the Credit card paves a convenient
mode of transactions, it is subjected to more
jeopardy. As technology extends its limit,
the way of hacking and cracking also goes
along the road. In out proposed system, in
every transaction with the Credit card a
handshaking signal is achieved with the
cardholder. The handshaking method is
achieved by transferring the transaction time
and the purchase details to the mobile of the
cardholder by means of a GSM modem.
From the acknowledgement and
authentication received from the
cardholder’s mobile further transaction
proceeds. The system used the MCU for the
security issues between the Mobile and the
Card. Reports can also be generated for
every successful authentication.
The cardholder will be asked for a
reply by the GSM modem message. The
message from the cardholder is the major
authentication command. The MCU decodes
the message and decides the operation to be
performed. The status of the system for each
individual process will be displayed using
LCD s and LED s.
If your card is lost you need not have
to worry until you get the replacement of
the card which will minimum take 1
month. Until then it is difficult to survive
without atm card. So we have got a new
concept of universal card. If you have lost
your card. There is a universal card given
to the security guard of the atm. People
who have lost the card can use this card.
After swiping the universal card it will
ask for the account number. On providing
that it will generate a random unique
code and sms the same to the account
holder. He has to share to the person who
is using his card. The unique code keeps
on changing on every swipe and the new
secret code is always sent by sms to the
account holder. By this way we can have
a secure mode of atmtranscaction .even
though the card is lost.
INTRODUCTION
An automated teller machine or automatic
teller machine (ATM) is a computerized
telecommunications device that provides
a financial institution's customers a secure
method of performing financial
transactions in a public space without the
need for a human clerk or bank teller.
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 2 | P a g e Copyright@IDL-2017
Using an ATM, customers can
access their bank accounts in order to
make cash withdrawals (or credit card
cash advances) and check their account
balances. Many ATMs also allow people
to deposit cash or checks, transfer money
between their bank accounts, pay bills, or
purchase goods and services. On most
modern ATMs, the customer identifies
him or herself by inserting a plastic card
with a magnetic stripe or a plastic smart
card with a chip,that contains his or her
card number and some security
information, such as an expiration
date.The customer then verifies their
identity by entering a passcode, often
referred to as a PIN (Personal
Identification Number) of four or more
digits. Upon successful entry of the PIN,
the customer may perform a transaction.
After the transaction is complete, a
transaction record is printed, usually
consisting of the action taken, date and
time, location, any applicable fees, and
available balance.
If the number is entered
incorrectly several times in a row (usually
three attempts per card insertion), some
ATMs will attempt to retain the card as a
security precaution to prevent an
unauthorized user from discovering the
PIN by guesswork. Captured cards are
often destroyed if the ATM owner is not
the card issuing bank, as non-customer's
identities cannot be reliably confirmed. In
some cases, a transaction may be
performed at the ATM that allows the
customer's PIN to be changed
securely.The cardholder will be asked for a
reply by the GSM modem message. The
message from the cardholder is the major
authentication command. The MCU decodes
the message and decides the operation to be
performed. The status of the system for each
individual process will be displayed using
LCD s and LED s.
II. RELATED WORK
In recent years, security has been
more and more significant in network
environment with the emergence of the
internetworking technology. The
internetworking technology can provide the
communication channels across networks so
that machines in different networks can talk
to each other. However, the internetworking
communication will be exposed to all kinds
of attacks in such an open environment.
Most of the network technologies, without
integrating with security mechanism
originally, have to be redesigned to provide
some security services. ATM is one of those
technologies.
ATM stands for Asynchronous
Transfer Mode. Originally, it is a transfer
mode to implement the B-ISDN(Broadband
Integrated Services Digital Network)
technology so that all forms of data
traffic(voice, video, data etc.) can be
transferred over telecommunication
networks. But ATM is not restricted to B-
ISDN. It has been used to provide a
simplified network infrastructure for various
network connections, e.g. LAN, MAN or
WAN. ATM is a connection-oriented
technique. In ATM, hosts are connected by a
network of switches. When two parties want
to talk, they request a Virtual Channel from
the switch network first. Then the two
parties can send data to each other. Although
the communication parties can send data in
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 3 | P a g e Copyright@IDL-2017
any size, ATM always delivers data in a
fixed size unit, which is called a cell. A cell
has 5 octet header and 48 octet payload. Cell
switching will base on the 5 octet header. In
the way, a cell can go through a switch very
quickly. To meet different requirements of
specific traffic, ATM also introduces the
concept of Quality of Service(QoS). Details
about ATM technology can be found in any
ATM textbooks. And the most recent
advances in this area can be found in
discussions and contributions of ATM
Forum, which is the standards organization
for ATM.
In fact, issues in ATM security have
not gained enough attention until 1995,
when a group within ATM Forum was
established to address the security issues.
Therefore, compared with other security
area, ATM security is still in its beginning.
In this paper, we first examine the threats to
ATM networks. And then we discuss the
requirements of ATM security. In section 4
we are going to discuss the implementation
issues of ATM security. Phase I ATM
Security Specification has been discussed in
this section. In conclusion, we discuss some
examples of the ATM security products.
III. PROPOSED METHODOLOGY
The proposed system is an
enhancement of the existing system, and, it
is built upon the existing card and PIN -
based system. The proposed system is in two
different modes; the first will improve the
security of the ATM by applying second
level authentication on the existing ATM
process for withdrawal, after entry of correct
a PIN, while the second will apply second
level authentication in a scenario where a
customer-specified withdrawal limit is
attained.
Depicts an instance of withdrawal on
the AT for the proposed system which is an
enhancement of the existing system. The
entry of a correct PIN is inadequate to
authenticate to the bank system. This is
because an additional level has been
incorporated for the authentication process
which requires the customer to enter a valid
code which will be sent to the customer’s
pre-registered mobile device via SMS
gateway. If a correct code is supplied the
customer gets authenticated and is granted
access for withdrawal. However, if an
incorrect code is supplied even after the
entry of a correct PIN, the authentication
process fails and the customer is denied
access for withdrawal.
An instance of withdrawal on the
ATM. This mode gives the customer the
opportunity to choose the second level
authentication process as an additional level
of authentication for withdrawal in order to
guarantee the security of the account owner.
With this mode, a customer- specified
withdrawal limit must be attained before the
system prompts for entry of a valid code. If
a valid code is supplied, the authentication
process is complete and the customer is
granted access for withdrawal. On the other
hand, if an invalid code is supplied, the
authentication process fails and the customer
is denied access for withdrawal. It is
imperative to note that if a customer-
specified withdrawal limit is not in place,
the entry of a valid PIN will be sufficient to
authenticate the customer to the system and
thereafter grant access for withdrawal. This
implies that the second level authentication
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 4 | P a g e Copyright@IDL-2017
process would not be applied in such
instances.
IV. CONCLUSION
This paper presents a novel
architecture – M-cash withdrawal- that can
be used as a means of interaction between
mobile phone/devices, an ATM machine and
a Banking application for the purpose of
withdrawing cash. The design of the
proposed secure M-cash withdrawal allows
the use of mobile phones as a tool of
interaction and provides flexibility through
robust identity management architecture.
The first part of the architecture is in the
process of being implemented and all the
process involved has been analyzed and
justified where possible. As part of our
future work, we will be providing in-depth
analyses of the design and protocols to be
used for the purpose of withdrawing cash.
The Secure M-cash has examined the
possibility of making use of similar
approaches/techniques (RFID and NFC) for
other applications and already there are
some applications that have adapted this
strategy. The Secure M-Cash Withdrawal
architecture has been defined, it will form as
a foundation for future work within this
area, which includes, protocols design, and
implementing a PC based simulation of the
architecture and implementing the system.
Banks provide security and
convenience for managing your money and
sometimes allow you to make money by
earning interest. Convenience and fees are
two of the most important things to consider
when choosing a bank.Writing and
depositing checks are perhaps the most
fundamental ways to move money in and
out of a checking account, but advancements
in technology have added ATM and debit
card transactions, ACH transfers, online bill
pay and mobile transfers to the mix.All
banks have rules about how long it takes to
access your deposits, how many debit card
transactions you're allowed in a day, and
how much cash you can withdraw from an
ATM. Access to the balance in your
checking account can also be limited by
businesses such as gas stations and hotels
that place holds on your funds when you pay
with a debit card.
Debit cards provide easy access to
the cash in your account, but can cause you
to rack up fees if you overdraw your account
or visit out-of-network ATMs.While debit
cards encourage more responsible spending
than credit cards, they do not offer the same
protection or perks.Regularly balancing your
checkbook or developing another method to
stay on top of your account balance is
essential to successfully managing your
checking account and avoiding fees,
declined transactions and bounced
payments.
If you have more money than you
need to manage your day-to-day expenses,
banks offer a variety of options for saving,
including money market accounts, CDs,
high-interest online savings accounts and
basic savings accounts.To protect your
money from electronic theft, identity theft
and other forms of fraud, it's important to
implement basic precautions such as
shredding account statements, having
complex passwords, safeguarding your PIN
and only conducting online and mobile
banking through secure internet connections.
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 5 | P a g e Copyright@IDL-2017
REFERENCES
1] AbdullahiArabo, "Secure Cash
Withdrawal through Mobile Phone/Device ",
in Proceedings of the International
Conference on Computer and
Communication Engineering, 2008, 818-
822.
[2] Daojing He, Maode Ma, Yan Zhang,
Chun Chen, Jiajun Bu, "A strong user
authentication scheme with smart cards for
wireless communications", Computer
Communications 34, 2011, 367-374.
[3] Francesco Buccafurri, Gianluca Lax,
"Implementing disposable credit card
numbers by mobile phones", in Springer
Science+Business Media, LLC 2011.
[4] Kuo-Hui Yeh, Chunhua Su, N.W. Lo,
Yingjiu Li, Yi-Xiang Hung, "Two robust
remote user authentication protocols using
smart cards", in The Journal of Systems and
Software, 2010, 2556-2565.
[5] Manoj Kumar, "An Enhanced Remote
User Authentication Scheme with Smart
Card", International Journal of Network
Security, 10(3) (2010), 175-184.
[6] Mohamed HamdyEldefrawy, Khaled
Alghathbar, Muhammad Khurram Khan,
"OTP-Based Two- Factor Authentication
Using Mobile Phones", in 2011 Eighth
International Conference on Information
Technology: New Generations, 2011, 327-
331.
[7] Ms. Trupti Hemant Gurav, Ms. Manisha
Dhage, "Remote client Authentiction using
mobile phone generated OTP", International
Journal of Scientific and Research
Publications, 2(5), 2012.
[8] Sagar Acharya, ApoorvaPolawar,
P.Y.Pawar, "Two Factor Authentication
Using Smartphone Generated One Time
Password", IOSR Journal of Computer
Engineering, 11 (2) (2013), 85-90.
[9] SagarGajbhar, ShrikantAher, Swapnil
Auti, Shailesh Hodge, "Authentication using
Mobile phone generated OTP", International
Journal of Computer Science and
Management Research 2(5) (2013).

More Related Content

What's hot

E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Cardjournal ijrtem
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...CSCJournals
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146IJRAT
 
Mordern banking technologies
Mordern banking technologiesMordern banking technologies
Mordern banking technologiesParvathy Ashok
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011Andris Soroka
 
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
SFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARINGSFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARING
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARINGijcsit
 

What's hot (20)

A011140104
A011140104A011140104
A011140104
 
E banking & security
E banking & securityE banking & security
E banking & security
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
N044057478
N044057478N044057478
N044057478
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
All about Contactless payments
All about Contactless paymentsAll about Contactless payments
All about Contactless payments
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
 
Bq33413420
Bq33413420Bq33413420
Bq33413420
 
Paper id 2320146
Paper id 2320146Paper id 2320146
Paper id 2320146
 
Mordern banking technologies
Mordern banking technologiesMordern banking technologies
Mordern banking technologies
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
SFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARINGSFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARING
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
 

Similar to An ATM Multi-Protocol Emulation Network

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)IAESIJEECS
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSJournal For Research
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...ijctcm
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionIOSR Journals
 

Similar to An ATM Multi-Protocol Emulation Network (20)

Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
E010313141
E010313141E010313141
E010313141
 
15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)15 9247 nfc based digital innovation (edit ari)
15 9247 nfc based digital innovation (edit ari)
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Moneypad
MoneypadMoneypad
Moneypad
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
J017216164
J017216164J017216164
J017216164
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud Detection
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 

An ATM Multi-Protocol Emulation Network

  • 1. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 1 | P a g e Copyright@IDL-2017 An ATM Multi-Protocol Emulation Network Dimple Aradhya.K.M1 , Akshatha.H.R2 , Lakshmi Narasamma N3 , Jethi Kumari.B4 , Mrs. Pragathi M Kaliwal5 (Guide) VTU University1, 2, 3, 4, 5 Abstract -- The project sets sight on authenticating the conventional Credit card transaction system. In the prevailing system though the Credit card paves a convenient mode of transactions, it is subjected to more jeopardy. As technology extends its limit, the way of hacking and cracking also goes along the road. In out proposed system, in every transaction with the Credit card a handshaking signal is achieved with the cardholder. The handshaking method is achieved by transferring the transaction time and the purchase details to the mobile of the cardholder by means of a GSM modem. From the acknowledgement and authentication received from the cardholder’s mobile further transaction proceeds. The system used the MCU for the security issues between the Mobile and the Card. Reports can also be generated for every successful authentication. The cardholder will be asked for a reply by the GSM modem message. The message from the cardholder is the major authentication command. The MCU decodes the message and decides the operation to be performed. The status of the system for each individual process will be displayed using LCD s and LED s. If your card is lost you need not have to worry until you get the replacement of the card which will minimum take 1 month. Until then it is difficult to survive without atm card. So we have got a new concept of universal card. If you have lost your card. There is a universal card given to the security guard of the atm. People who have lost the card can use this card. After swiping the universal card it will ask for the account number. On providing that it will generate a random unique code and sms the same to the account holder. He has to share to the person who is using his card. The unique code keeps on changing on every swipe and the new secret code is always sent by sms to the account holder. By this way we can have a secure mode of atmtranscaction .even though the card is lost. INTRODUCTION An automated teller machine or automatic teller machine (ATM) is a computerized telecommunications device that provides a financial institution's customers a secure method of performing financial transactions in a public space without the need for a human clerk or bank teller.
  • 2. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 2 | P a g e Copyright@IDL-2017 Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances. Many ATMs also allow people to deposit cash or checks, transfer money between their bank accounts, pay bills, or purchase goods and services. On most modern ATMs, the customer identifies him or herself by inserting a plastic card with a magnetic stripe or a plastic smart card with a chip,that contains his or her card number and some security information, such as an expiration date.The customer then verifies their identity by entering a passcode, often referred to as a PIN (Personal Identification Number) of four or more digits. Upon successful entry of the PIN, the customer may perform a transaction. After the transaction is complete, a transaction record is printed, usually consisting of the action taken, date and time, location, any applicable fees, and available balance. If the number is entered incorrectly several times in a row (usually three attempts per card insertion), some ATMs will attempt to retain the card as a security precaution to prevent an unauthorized user from discovering the PIN by guesswork. Captured cards are often destroyed if the ATM owner is not the card issuing bank, as non-customer's identities cannot be reliably confirmed. In some cases, a transaction may be performed at the ATM that allows the customer's PIN to be changed securely.The cardholder will be asked for a reply by the GSM modem message. The message from the cardholder is the major authentication command. The MCU decodes the message and decides the operation to be performed. The status of the system for each individual process will be displayed using LCD s and LED s. II. RELATED WORK In recent years, security has been more and more significant in network environment with the emergence of the internetworking technology. The internetworking technology can provide the communication channels across networks so that machines in different networks can talk to each other. However, the internetworking communication will be exposed to all kinds of attacks in such an open environment. Most of the network technologies, without integrating with security mechanism originally, have to be redesigned to provide some security services. ATM is one of those technologies. ATM stands for Asynchronous Transfer Mode. Originally, it is a transfer mode to implement the B-ISDN(Broadband Integrated Services Digital Network) technology so that all forms of data traffic(voice, video, data etc.) can be transferred over telecommunication networks. But ATM is not restricted to B- ISDN. It has been used to provide a simplified network infrastructure for various network connections, e.g. LAN, MAN or WAN. ATM is a connection-oriented technique. In ATM, hosts are connected by a network of switches. When two parties want to talk, they request a Virtual Channel from the switch network first. Then the two parties can send data to each other. Although the communication parties can send data in
  • 3. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 3 | P a g e Copyright@IDL-2017 any size, ATM always delivers data in a fixed size unit, which is called a cell. A cell has 5 octet header and 48 octet payload. Cell switching will base on the 5 octet header. In the way, a cell can go through a switch very quickly. To meet different requirements of specific traffic, ATM also introduces the concept of Quality of Service(QoS). Details about ATM technology can be found in any ATM textbooks. And the most recent advances in this area can be found in discussions and contributions of ATM Forum, which is the standards organization for ATM. In fact, issues in ATM security have not gained enough attention until 1995, when a group within ATM Forum was established to address the security issues. Therefore, compared with other security area, ATM security is still in its beginning. In this paper, we first examine the threats to ATM networks. And then we discuss the requirements of ATM security. In section 4 we are going to discuss the implementation issues of ATM security. Phase I ATM Security Specification has been discussed in this section. In conclusion, we discuss some examples of the ATM security products. III. PROPOSED METHODOLOGY The proposed system is an enhancement of the existing system, and, it is built upon the existing card and PIN - based system. The proposed system is in two different modes; the first will improve the security of the ATM by applying second level authentication on the existing ATM process for withdrawal, after entry of correct a PIN, while the second will apply second level authentication in a scenario where a customer-specified withdrawal limit is attained. Depicts an instance of withdrawal on the AT for the proposed system which is an enhancement of the existing system. The entry of a correct PIN is inadequate to authenticate to the bank system. This is because an additional level has been incorporated for the authentication process which requires the customer to enter a valid code which will be sent to the customer’s pre-registered mobile device via SMS gateway. If a correct code is supplied the customer gets authenticated and is granted access for withdrawal. However, if an incorrect code is supplied even after the entry of a correct PIN, the authentication process fails and the customer is denied access for withdrawal. An instance of withdrawal on the ATM. This mode gives the customer the opportunity to choose the second level authentication process as an additional level of authentication for withdrawal in order to guarantee the security of the account owner. With this mode, a customer- specified withdrawal limit must be attained before the system prompts for entry of a valid code. If a valid code is supplied, the authentication process is complete and the customer is granted access for withdrawal. On the other hand, if an invalid code is supplied, the authentication process fails and the customer is denied access for withdrawal. It is imperative to note that if a customer- specified withdrawal limit is not in place, the entry of a valid PIN will be sufficient to authenticate the customer to the system and thereafter grant access for withdrawal. This implies that the second level authentication
  • 4. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 4 | P a g e Copyright@IDL-2017 process would not be applied in such instances. IV. CONCLUSION This paper presents a novel architecture – M-cash withdrawal- that can be used as a means of interaction between mobile phone/devices, an ATM machine and a Banking application for the purpose of withdrawing cash. The design of the proposed secure M-cash withdrawal allows the use of mobile phones as a tool of interaction and provides flexibility through robust identity management architecture. The first part of the architecture is in the process of being implemented and all the process involved has been analyzed and justified where possible. As part of our future work, we will be providing in-depth analyses of the design and protocols to be used for the purpose of withdrawing cash. The Secure M-cash has examined the possibility of making use of similar approaches/techniques (RFID and NFC) for other applications and already there are some applications that have adapted this strategy. The Secure M-Cash Withdrawal architecture has been defined, it will form as a foundation for future work within this area, which includes, protocols design, and implementing a PC based simulation of the architecture and implementing the system. Banks provide security and convenience for managing your money and sometimes allow you to make money by earning interest. Convenience and fees are two of the most important things to consider when choosing a bank.Writing and depositing checks are perhaps the most fundamental ways to move money in and out of a checking account, but advancements in technology have added ATM and debit card transactions, ACH transfers, online bill pay and mobile transfers to the mix.All banks have rules about how long it takes to access your deposits, how many debit card transactions you're allowed in a day, and how much cash you can withdraw from an ATM. Access to the balance in your checking account can also be limited by businesses such as gas stations and hotels that place holds on your funds when you pay with a debit card. Debit cards provide easy access to the cash in your account, but can cause you to rack up fees if you overdraw your account or visit out-of-network ATMs.While debit cards encourage more responsible spending than credit cards, they do not offer the same protection or perks.Regularly balancing your checkbook or developing another method to stay on top of your account balance is essential to successfully managing your checking account and avoiding fees, declined transactions and bounced payments. If you have more money than you need to manage your day-to-day expenses, banks offer a variety of options for saving, including money market accounts, CDs, high-interest online savings accounts and basic savings accounts.To protect your money from electronic theft, identity theft and other forms of fraud, it's important to implement basic precautions such as shredding account statements, having complex passwords, safeguarding your PIN and only conducting online and mobile banking through secure internet connections.
  • 5. IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 5 | P a g e Copyright@IDL-2017 REFERENCES 1] AbdullahiArabo, "Secure Cash Withdrawal through Mobile Phone/Device ", in Proceedings of the International Conference on Computer and Communication Engineering, 2008, 818- 822. [2] Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu, "A strong user authentication scheme with smart cards for wireless communications", Computer Communications 34, 2011, 367-374. [3] Francesco Buccafurri, Gianluca Lax, "Implementing disposable credit card numbers by mobile phones", in Springer Science+Business Media, LLC 2011. [4] Kuo-Hui Yeh, Chunhua Su, N.W. Lo, Yingjiu Li, Yi-Xiang Hung, "Two robust remote user authentication protocols using smart cards", in The Journal of Systems and Software, 2010, 2556-2565. [5] Manoj Kumar, "An Enhanced Remote User Authentication Scheme with Smart Card", International Journal of Network Security, 10(3) (2010), 175-184. [6] Mohamed HamdyEldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, "OTP-Based Two- Factor Authentication Using Mobile Phones", in 2011 Eighth International Conference on Information Technology: New Generations, 2011, 327- 331. [7] Ms. Trupti Hemant Gurav, Ms. Manisha Dhage, "Remote client Authentiction using mobile phone generated OTP", International Journal of Scientific and Research Publications, 2(5), 2012. [8] Sagar Acharya, ApoorvaPolawar, P.Y.Pawar, "Two Factor Authentication Using Smartphone Generated One Time Password", IOSR Journal of Computer Engineering, 11 (2) (2013), 85-90. [9] SagarGajbhar, ShrikantAher, Swapnil Auti, Shailesh Hodge, "Authentication using Mobile phone generated OTP", International Journal of Computer Science and Management Research 2(5) (2013).