SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 134
A SURVEY ON SECURITY MEASURES IMPLEMENTED TO DETECT
BURGLARY AT THE ATM
Arpitha B.R1
, Madhusudhan K.N2
, Ashwini.V3
, Dinesh Reddy4
1
MTech Student, Department of electronics and communication, BMSCE, Bangalore, India
2
Assistant Professor, Dept of ECE, BMSCE, Bangalore-19
3
Assistant Professor, Dept of ECE, BMSCE, Bangalore-19
4
Assistant Professor, Dept of ECE, BMSCE, Bangalore-19
Abstract
Automated Teller Machines (ATMs) are part of most of our lives which eases access to financial transactions without direct
interaction with bank authorities, but ATM attacks are major problem which are however inevitable even though certain security
measures are implemented. The current work deals with survey on preventive measures took to avoid ATM thefts. The preventive
measures took to prevent ATM fraud are installing alarms and sensors, video surveillance, awareness and consumer education,
and remote monitoring. In order to avoid ATM thefts in real-time and to be able to react in time, a fully automated system is
desired.
Keywords—ATM, video surveillance, computer vision, sensors, logical attacks in ATM
---------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Consumers have come to depend on and trust the ATM
since from past three decades to efficiently meet their
banking needs [1]. ATMs don’t need the continuous human
involvement for monitoring and are mostly located in public
places where attacks are possible which tend to attract
perpetrators [2].
Thieves have been developing new ways to steal the cash
from ATM since its introduction in 1967 [2]. In the year
2007, 212,530 theft cases and 4,439 robbery cases are
happened and in 2010, 269,410 theft and 4,409 robbery
cases are happened. And also in year 2011, 270,109 of theft
and 4,509 of robbing cases are happened. Among the crime
for financial organization, the cases of theft and robber have
very high proportion of over 90% and the crime for the
ATM has been increased because the external ATM has
been increased and it is always exposed to the crime [3].
ATM crimes are not only limited to theft of cash, but also
attackers seek to obtain consumer’s personal identification
number (PIN). While these types of identity theft attacks
take more effort to net cash for criminals, the results are –
illegally obtaining money [2].
Survey by Retail Banking Research estimate more than 2.2
million ATMs are deployed across the world by 2013 and
these figures outlook to exceed 3 million ATM deployments
by 2016 [4]. So the occurrence of security threats increases
as the number of ATMs in use increases, making the
development of fraud prevention measures a high priority
for financial institutions (FIs) and ATM manufacturers.
2. AUTOMATED TELLER MACHINE
The first of automated teller machine (ATM) that was put
into use was in north London, United Kingdom, on 27 June
1967 by Barclays bank in Enfield Town [5]. The evolution
of ATMs from Early ATMs (1970’s – 1980’s) where limited
services like cash withdrawals (typically in fixed and limited
amounts), account balances (DDA), traditional deposits via
envelopes to present day Next-Gen ATMs (2013 – till date),
to name few services - bill payments, Integrated multi-
channel capabilities, on-demand services, EMV, NFC
proves the advancement of technology in terms of
functionality, accessibility, security. Even after such
advancement in technology towards ATM, threats related to
ATM theft are still occurring. The architecture of an ATM is
shown below in figure 1 [6].
ATM consists of both hardware and software. The hardware
typically consists of CPU, magnetic or chip reader, keypad,
secure cryptoprocessor, display, function keys, vault (Safe),
sensors and indicators. ATMs use ‘off-the-shelf’ operating
systems for software functionality.
3. TYPES OF ATM THEFTS
ATM thefts can occur to hardware or software of the
system. Security attacks for ATM are classified into 3
classes: card and currency fraud, logical attacks, and
physical attacks.
3.1 Card and Currency Fraud
This type of fraud involves in both direct and indirect ways.
The direct way is to steal cash from the ATM system
whereas indirect attack is to use consumer data to establish
forge cards illegally and obtaining cash from consumer’s
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 135
account through fake atonement. The ways of Card and
Currency fraud can be done are by Skimming, Card
trapping/fishing and Currency trapping/fishing [7].
Skimmer devices obtain consumer card information using
the magnetic stripe on the back of ATM card. Card trapping
and fishing try to steal card information when consumer
inserts the card for transaction inside card reader. Cash
trapping or fishing means to attempt to collect cash which is
not intended to any consumer, which means obtaining
money from the ATM illegally.
Fig. 1: ATM Architecture
3.2 Logical/Data Attacks
Logical attacks directly target to ATM’s software,
communication systems and operating system which make
these attacks most difficult to detect.
The Microsoft Windows® operating system has provided
better, greater connectivity and interconnectivity of ATMs.
The communication network which are connected via
internet including ATMs, phone systems, branch systems
and infrastructure are major targets of logical security
threats. Viruses and malware are injected to ATMs
operating system to violate integrity, confidentiality or
authenticity of transaction related data [7].
3.3 Physical Attacks
Physical attacks are related to physically damaging the
ATM by means of drilling, cutting etc. These attacks
include any type of violation that damages components of
the ATM in order to obtain cash. The main component for
most physical attack includes vault, where the cash is stored
in cash cartridges as shown in figure 1.
The methods of attacks include cutting/grinding with power
saws or grinders, drilling with power drills, prying with
wedges and crowbars, burning device such as thermal lance
or any other use of explosives like dynamite, gas or
homemade bombs.
4. SECURITY MEASURES TO AVOID ATM
THEFTS
As the number of threats increasing from year to year,
certain preventive measures have been implemented to
prevent ATM thefts. The measures taken to avoid ATM
thefts can be categorized into video surveillance,
implementation of alarms and sensors, and remote
monitoring.
4.1 Video Surveillance
Video surveillance is the basic and effective method
implemented to create awareness and deter fraud attempts at
the ATMs. This method is adopted by installing Closed
Circuit Television (CCTV) Camera(s) in plain view or near
the ATM [1]. Nowadays cameras can be easily integrated
into upper top corners of ATMs and additional security can
be achieved by installing extra site cameras inside and
outside the premises. For this method, the cameras must
monitor the premises continuously.
But continuous surveillance is a critical security issue in
many states around the world. Remote sites offer particular
challenges regarding maintenance issues so these can be
solved with digital video recorders. Analyzing the video
obtained from camera after any theft occurrence, cops can
search/identify thief.
4.2 Alarms and Sensors
Sensors are integrated inside the ATM premises to detect
any theft, and alarms are used to give the information to
nearby people by whistling any type of sound. This type of
method are implemented to detect the state of the ATMs
vault door, whether the door is in open/closed condition, or
used to monitor different parameters which indicate the
attempt of robbery.
For example, Vibration sensors are used to detect any kind
of piercing to ATMs vault [8]. Temperature sensor is used
to identify the change in temperature while piercing with
torch. Door sensor can be integrated to check the ATMs
cabinet door status [1].
4.3 Remote Monitoring
Remote diagnostic services provide an automated means to
manage and monitor our ATM network. Remote monitoring
is helpful in delivering important messages with regard to
any tampering with machine.
ATM terminal availability can be improved with the help of
remote diagnostics, monitoring, and management with
reduced risk. It develops expedition prevention of service
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 136
technicians and facilitates a group of central support
associates to manage and control from their PCs, mouse and
keyboard operations of ATMs [1]. By developing fully
fledged remote monitoring system, the current status
messages from the ATM can be sent to central location on a
pre-defined plan where these messages are acted upon. By
using this facility, central support associates can manage
ATM functionalities from remote location, this way the risk
of service personnel working in ATM is minimized. Remote
diagnostic services manage, control and track events at any
ATM, to which the remote diagnostic services are available
to route and document on every action.
4.4 Others
Ink Dye is type of ATM theft avoidance method where the
cash is being sprayed with an ink on detection of any
abnormalities with regard of ATM’s hardware. Later the
cash will not be useful for either bank authorities or robbers
due to the ink stained currency notes. Anyhow this method
didn’t prove to be efficient since it is a loss to the Bank
authorities itself [1].
Few people don’t know how to conceal the information of
their respective bank account details. The people without
any awareness regarding the importance of bank account
details provide account information on fraudulent calls
asking for consumer bank details. These losses can be
avoided by creating awareness and consumer education.
5. CONCLUSION
Even though with the advancement in security measures
which are implemented to avoid robbery, somewhere or
other ATM thefts are still occurring. As the technology is
emerging to its new heights, logical/data attacks can be
avoided with the efficient programming of software in terms
of operating system. With the help of awareness and
consumer education, card and currency thefts can be
prevented to certain extent. The implementation of security
measures including both video surveillance and alarms and
sensors are proved to more efficient way to avoid ATM
thefts. Remote monitoring can be helpful only when the
group/authorities monitoring the ATMs are literate. Video
surveillance with the addition alarms and sensors and also
with the help of image processing techniques to detect
human objects provides an efficient way to avoid ATM
thefts.
REFERENCES
[1] Diebold, “ATM Fraud and Security White Paper”,
2003.
[2] Diebold, “ATM Fraud and Security”, 2012.
[3] P.Kannan, P.Meenakshi Vidya, “Design and
Implementation of Security Based ATM theft
Monitoring system”, Proceedings of “National
Conference on Information Processing & Remote
Computing Feb. 2014.
[4] “Global ATM Market and Forecasts to 2016.” Retail
Banking Research. September 2011. Brochure Page
2.
[5] “Enfield's cash gift to the world". BBC London. 27
June 2007.
[6] Michael S. Scott, “Robbery at Automated Teller
Machines”, Guide No.8, 2001
[7] From Mag Stripe to Malware: Card Security Risks
in 2011. Aite Group. 2011.
[8] M.Ajaykumar and N.Bharth Kumar, “Anti-Theft
ATM Machine Using Vibration Detection Sensor”,
IJARCSSE, Volume 3, Issue 12, December 2013.

More Related Content

What's hot

SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
SFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARINGSFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARING
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARINGijcsit
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...IJCSEA Journal
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET Journal
 
5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-bankingAlexander Decker
 
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...IRJET Journal
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
Access control basics-2
Access control basics-2Access control basics-2
Access control basics-2grantlerc
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesIAEME Publication
 
IRJET- Traffic Rules Violation System using NFC Card
IRJET-  	  Traffic Rules Violation System using NFC CardIRJET-  	  Traffic Rules Violation System using NFC Card
IRJET- Traffic Rules Violation System using NFC CardIRJET Journal
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
Best library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comBest library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comwww.mairsturnstile.com
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
 
IRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
IRJET- Electronic Voting Machine (EVM) using Finger-Print SensorIRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
IRJET- Electronic Voting Machine (EVM) using Finger-Print SensorIRJET Journal
 

What's hot (20)

SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
SFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARINGSFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARING
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
 
B010331019
B010331019B010331019
B010331019
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
DEVELOPMENT OF AUTOMATIC GEOFENCING AND ACCIDENTAL MONITORING SYSTEM BASED ON...
 
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using ArduinoIRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
IRJET - Smart E-Voting System with Fingerprint Authentication using Arduino
 
5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking
 
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
Aadhar based fully Automated EVM with High End Security Network using ARM7 an...
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
Physical security
Physical securityPhysical security
Physical security
 
Convenient voting machine
Convenient voting machineConvenient voting machine
Convenient voting machine
 
RFID Based Access Control And Proximity Security System.
RFID Based Access Control And Proximity Security System.RFID Based Access Control And Proximity Security System.
RFID Based Access Control And Proximity Security System.
 
Access control basics-2
Access control basics-2Access control basics-2
Access control basics-2
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
IRJET- Traffic Rules Violation System using NFC Card
IRJET-  	  Traffic Rules Violation System using NFC CardIRJET-  	  Traffic Rules Violation System using NFC Card
IRJET- Traffic Rules Violation System using NFC Card
 
christopher owoicho project
christopher owoicho projectchristopher owoicho project
christopher owoicho project
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
Best library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comBest library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.com
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
Ijetr042177
Ijetr042177Ijetr042177
Ijetr042177
 
IRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
IRJET- Electronic Voting Machine (EVM) using Finger-Print SensorIRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
IRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
 

Viewers also liked

Hp future cities concept note
Hp future cities concept note Hp future cities concept note
Hp future cities concept note TechXpla
 
Intelligent cities 4 - Strategies
Intelligent cities 4 - StrategiesIntelligent cities 4 - Strategies
Intelligent cities 4 - StrategiesNicos Komninos
 
Novel algorithm for color image demosaikcing using laplacian mask
Novel algorithm for color image demosaikcing using laplacian maskNovel algorithm for color image demosaikcing using laplacian mask
Novel algorithm for color image demosaikcing using laplacian maskeSAT Journals
 
A review of application of some product development technoques applied in eng...
A review of application of some product development technoques applied in eng...A review of application of some product development technoques applied in eng...
A review of application of some product development technoques applied in eng...eSAT Journals
 
It business management parameters framework from indian context
It business management parameters framework from indian contextIt business management parameters framework from indian context
It business management parameters framework from indian contexteSAT Journals
 
Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...eSAT Journals
 
Experimental investigation of effectiveness of heat wheel as a rotory heat ex...
Experimental investigation of effectiveness of heat wheel as a rotory heat ex...Experimental investigation of effectiveness of heat wheel as a rotory heat ex...
Experimental investigation of effectiveness of heat wheel as a rotory heat ex...eSAT Journals
 
Adsorption studies of colourremoval byactivated carbon derived from mangifera...
Adsorption studies of colourremoval byactivated carbon derived from mangifera...Adsorption studies of colourremoval byactivated carbon derived from mangifera...
Adsorption studies of colourremoval byactivated carbon derived from mangifera...eSAT Journals
 
Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...eSAT Journals
 
Impact of varying the nozzle stand off distance on cutting temperature in t...
Impact of varying the nozzle stand   off distance on cutting temperature in t...Impact of varying the nozzle stand   off distance on cutting temperature in t...
Impact of varying the nozzle stand off distance on cutting temperature in t...eSAT Journals
 
Intelligent cities 5 - What makes cities smart?
Intelligent cities 5 - What makes cities smart?Intelligent cities 5 - What makes cities smart?
Intelligent cities 5 - What makes cities smart?Nicos Komninos
 
Design and optimization of pid controller using genetic algorithm
Design and optimization of pid controller using genetic algorithmDesign and optimization of pid controller using genetic algorithm
Design and optimization of pid controller using genetic algorithmeSAT Journals
 
An experimental investigation into the performance of a gi basin passive sola...
An experimental investigation into the performance of a gi basin passive sola...An experimental investigation into the performance of a gi basin passive sola...
An experimental investigation into the performance of a gi basin passive sola...eSAT Journals
 
Investigation of mechanical properties on vinylester based bio composite with...
Investigation of mechanical properties on vinylester based bio composite with...Investigation of mechanical properties on vinylester based bio composite with...
Investigation of mechanical properties on vinylester based bio composite with...eSAT Journals
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...eSAT Journals
 
Effect of beam current, weld speed and dissolution on mechnical and microstru...
Effect of beam current, weld speed and dissolution on mechnical and microstru...Effect of beam current, weld speed and dissolution on mechnical and microstru...
Effect of beam current, weld speed and dissolution on mechnical and microstru...eSAT Journals
 
A comparative study on effect of basic oxygen furnace slag and iron cutting w...
A comparative study on effect of basic oxygen furnace slag and iron cutting w...A comparative study on effect of basic oxygen furnace slag and iron cutting w...
A comparative study on effect of basic oxygen furnace slag and iron cutting w...eSAT Journals
 
Design aids for tension members as per revised is 800 2007
Design aids for tension members as per revised is  800 2007Design aids for tension members as per revised is  800 2007
Design aids for tension members as per revised is 800 2007eSAT Journals
 
Design and analysis of a shock absorber
Design and analysis of a shock absorberDesign and analysis of a shock absorber
Design and analysis of a shock absorbereSAT Journals
 
Granularity of efficient energy saving in wireless sensor networks
Granularity of efficient energy saving in wireless sensor networksGranularity of efficient energy saving in wireless sensor networks
Granularity of efficient energy saving in wireless sensor networkseSAT Journals
 

Viewers also liked (20)

Hp future cities concept note
Hp future cities concept note Hp future cities concept note
Hp future cities concept note
 
Intelligent cities 4 - Strategies
Intelligent cities 4 - StrategiesIntelligent cities 4 - Strategies
Intelligent cities 4 - Strategies
 
Novel algorithm for color image demosaikcing using laplacian mask
Novel algorithm for color image demosaikcing using laplacian maskNovel algorithm for color image demosaikcing using laplacian mask
Novel algorithm for color image demosaikcing using laplacian mask
 
A review of application of some product development technoques applied in eng...
A review of application of some product development technoques applied in eng...A review of application of some product development technoques applied in eng...
A review of application of some product development technoques applied in eng...
 
It business management parameters framework from indian context
It business management parameters framework from indian contextIt business management parameters framework from indian context
It business management parameters framework from indian context
 
Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...
 
Experimental investigation of effectiveness of heat wheel as a rotory heat ex...
Experimental investigation of effectiveness of heat wheel as a rotory heat ex...Experimental investigation of effectiveness of heat wheel as a rotory heat ex...
Experimental investigation of effectiveness of heat wheel as a rotory heat ex...
 
Adsorption studies of colourremoval byactivated carbon derived from mangifera...
Adsorption studies of colourremoval byactivated carbon derived from mangifera...Adsorption studies of colourremoval byactivated carbon derived from mangifera...
Adsorption studies of colourremoval byactivated carbon derived from mangifera...
 
Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...Finite element analysis on temperature distribution in turning process using ...
Finite element analysis on temperature distribution in turning process using ...
 
Impact of varying the nozzle stand off distance on cutting temperature in t...
Impact of varying the nozzle stand   off distance on cutting temperature in t...Impact of varying the nozzle stand   off distance on cutting temperature in t...
Impact of varying the nozzle stand off distance on cutting temperature in t...
 
Intelligent cities 5 - What makes cities smart?
Intelligent cities 5 - What makes cities smart?Intelligent cities 5 - What makes cities smart?
Intelligent cities 5 - What makes cities smart?
 
Design and optimization of pid controller using genetic algorithm
Design and optimization of pid controller using genetic algorithmDesign and optimization of pid controller using genetic algorithm
Design and optimization of pid controller using genetic algorithm
 
An experimental investigation into the performance of a gi basin passive sola...
An experimental investigation into the performance of a gi basin passive sola...An experimental investigation into the performance of a gi basin passive sola...
An experimental investigation into the performance of a gi basin passive sola...
 
Investigation of mechanical properties on vinylester based bio composite with...
Investigation of mechanical properties on vinylester based bio composite with...Investigation of mechanical properties on vinylester based bio composite with...
Investigation of mechanical properties on vinylester based bio composite with...
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...
 
Effect of beam current, weld speed and dissolution on mechnical and microstru...
Effect of beam current, weld speed and dissolution on mechnical and microstru...Effect of beam current, weld speed and dissolution on mechnical and microstru...
Effect of beam current, weld speed and dissolution on mechnical and microstru...
 
A comparative study on effect of basic oxygen furnace slag and iron cutting w...
A comparative study on effect of basic oxygen furnace slag and iron cutting w...A comparative study on effect of basic oxygen furnace slag and iron cutting w...
A comparative study on effect of basic oxygen furnace slag and iron cutting w...
 
Design aids for tension members as per revised is 800 2007
Design aids for tension members as per revised is  800 2007Design aids for tension members as per revised is  800 2007
Design aids for tension members as per revised is 800 2007
 
Design and analysis of a shock absorber
Design and analysis of a shock absorberDesign and analysis of a shock absorber
Design and analysis of a shock absorber
 
Granularity of efficient energy saving in wireless sensor networks
Granularity of efficient energy saving in wireless sensor networksGranularity of efficient energy saving in wireless sensor networks
Granularity of efficient energy saving in wireless sensor networks
 

Similar to IJRET Survey Security Measures Detecting ATM Burglary

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
ATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityIRJET Journal
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security SolutionIRJET Journal
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 

Similar to IJRET Survey Security Measures Detecting ATM Burglary (20)

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
ATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance Security
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security Solution
 
N044057478
N044057478N044057478
N044057478
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
A011140104
A011140104A011140104
A011140104
 
D0351022026
D0351022026D0351022026
D0351022026
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Tounchpoint VAS Linkin
Tounchpoint VAS LinkinTounchpoint VAS Linkin
Tounchpoint VAS Linkin
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...Call girls in Ahmedabad High profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

IJRET Survey Security Measures Detecting ATM Burglary

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 134 A SURVEY ON SECURITY MEASURES IMPLEMENTED TO DETECT BURGLARY AT THE ATM Arpitha B.R1 , Madhusudhan K.N2 , Ashwini.V3 , Dinesh Reddy4 1 MTech Student, Department of electronics and communication, BMSCE, Bangalore, India 2 Assistant Professor, Dept of ECE, BMSCE, Bangalore-19 3 Assistant Professor, Dept of ECE, BMSCE, Bangalore-19 4 Assistant Professor, Dept of ECE, BMSCE, Bangalore-19 Abstract Automated Teller Machines (ATMs) are part of most of our lives which eases access to financial transactions without direct interaction with bank authorities, but ATM attacks are major problem which are however inevitable even though certain security measures are implemented. The current work deals with survey on preventive measures took to avoid ATM thefts. The preventive measures took to prevent ATM fraud are installing alarms and sensors, video surveillance, awareness and consumer education, and remote monitoring. In order to avoid ATM thefts in real-time and to be able to react in time, a fully automated system is desired. Keywords—ATM, video surveillance, computer vision, sensors, logical attacks in ATM ---------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Consumers have come to depend on and trust the ATM since from past three decades to efficiently meet their banking needs [1]. ATMs don’t need the continuous human involvement for monitoring and are mostly located in public places where attacks are possible which tend to attract perpetrators [2]. Thieves have been developing new ways to steal the cash from ATM since its introduction in 1967 [2]. In the year 2007, 212,530 theft cases and 4,439 robbery cases are happened and in 2010, 269,410 theft and 4,409 robbery cases are happened. And also in year 2011, 270,109 of theft and 4,509 of robbing cases are happened. Among the crime for financial organization, the cases of theft and robber have very high proportion of over 90% and the crime for the ATM has been increased because the external ATM has been increased and it is always exposed to the crime [3]. ATM crimes are not only limited to theft of cash, but also attackers seek to obtain consumer’s personal identification number (PIN). While these types of identity theft attacks take more effort to net cash for criminals, the results are – illegally obtaining money [2]. Survey by Retail Banking Research estimate more than 2.2 million ATMs are deployed across the world by 2013 and these figures outlook to exceed 3 million ATM deployments by 2016 [4]. So the occurrence of security threats increases as the number of ATMs in use increases, making the development of fraud prevention measures a high priority for financial institutions (FIs) and ATM manufacturers. 2. AUTOMATED TELLER MACHINE The first of automated teller machine (ATM) that was put into use was in north London, United Kingdom, on 27 June 1967 by Barclays bank in Enfield Town [5]. The evolution of ATMs from Early ATMs (1970’s – 1980’s) where limited services like cash withdrawals (typically in fixed and limited amounts), account balances (DDA), traditional deposits via envelopes to present day Next-Gen ATMs (2013 – till date), to name few services - bill payments, Integrated multi- channel capabilities, on-demand services, EMV, NFC proves the advancement of technology in terms of functionality, accessibility, security. Even after such advancement in technology towards ATM, threats related to ATM theft are still occurring. The architecture of an ATM is shown below in figure 1 [6]. ATM consists of both hardware and software. The hardware typically consists of CPU, magnetic or chip reader, keypad, secure cryptoprocessor, display, function keys, vault (Safe), sensors and indicators. ATMs use ‘off-the-shelf’ operating systems for software functionality. 3. TYPES OF ATM THEFTS ATM thefts can occur to hardware or software of the system. Security attacks for ATM are classified into 3 classes: card and currency fraud, logical attacks, and physical attacks. 3.1 Card and Currency Fraud This type of fraud involves in both direct and indirect ways. The direct way is to steal cash from the ATM system whereas indirect attack is to use consumer data to establish forge cards illegally and obtaining cash from consumer’s
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 135 account through fake atonement. The ways of Card and Currency fraud can be done are by Skimming, Card trapping/fishing and Currency trapping/fishing [7]. Skimmer devices obtain consumer card information using the magnetic stripe on the back of ATM card. Card trapping and fishing try to steal card information when consumer inserts the card for transaction inside card reader. Cash trapping or fishing means to attempt to collect cash which is not intended to any consumer, which means obtaining money from the ATM illegally. Fig. 1: ATM Architecture 3.2 Logical/Data Attacks Logical attacks directly target to ATM’s software, communication systems and operating system which make these attacks most difficult to detect. The Microsoft Windows® operating system has provided better, greater connectivity and interconnectivity of ATMs. The communication network which are connected via internet including ATMs, phone systems, branch systems and infrastructure are major targets of logical security threats. Viruses and malware are injected to ATMs operating system to violate integrity, confidentiality or authenticity of transaction related data [7]. 3.3 Physical Attacks Physical attacks are related to physically damaging the ATM by means of drilling, cutting etc. These attacks include any type of violation that damages components of the ATM in order to obtain cash. The main component for most physical attack includes vault, where the cash is stored in cash cartridges as shown in figure 1. The methods of attacks include cutting/grinding with power saws or grinders, drilling with power drills, prying with wedges and crowbars, burning device such as thermal lance or any other use of explosives like dynamite, gas or homemade bombs. 4. SECURITY MEASURES TO AVOID ATM THEFTS As the number of threats increasing from year to year, certain preventive measures have been implemented to prevent ATM thefts. The measures taken to avoid ATM thefts can be categorized into video surveillance, implementation of alarms and sensors, and remote monitoring. 4.1 Video Surveillance Video surveillance is the basic and effective method implemented to create awareness and deter fraud attempts at the ATMs. This method is adopted by installing Closed Circuit Television (CCTV) Camera(s) in plain view or near the ATM [1]. Nowadays cameras can be easily integrated into upper top corners of ATMs and additional security can be achieved by installing extra site cameras inside and outside the premises. For this method, the cameras must monitor the premises continuously. But continuous surveillance is a critical security issue in many states around the world. Remote sites offer particular challenges regarding maintenance issues so these can be solved with digital video recorders. Analyzing the video obtained from camera after any theft occurrence, cops can search/identify thief. 4.2 Alarms and Sensors Sensors are integrated inside the ATM premises to detect any theft, and alarms are used to give the information to nearby people by whistling any type of sound. This type of method are implemented to detect the state of the ATMs vault door, whether the door is in open/closed condition, or used to monitor different parameters which indicate the attempt of robbery. For example, Vibration sensors are used to detect any kind of piercing to ATMs vault [8]. Temperature sensor is used to identify the change in temperature while piercing with torch. Door sensor can be integrated to check the ATMs cabinet door status [1]. 4.3 Remote Monitoring Remote diagnostic services provide an automated means to manage and monitor our ATM network. Remote monitoring is helpful in delivering important messages with regard to any tampering with machine. ATM terminal availability can be improved with the help of remote diagnostics, monitoring, and management with reduced risk. It develops expedition prevention of service
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 03 | Mar-2015, Available @ http://www.ijret.org 136 technicians and facilitates a group of central support associates to manage and control from their PCs, mouse and keyboard operations of ATMs [1]. By developing fully fledged remote monitoring system, the current status messages from the ATM can be sent to central location on a pre-defined plan where these messages are acted upon. By using this facility, central support associates can manage ATM functionalities from remote location, this way the risk of service personnel working in ATM is minimized. Remote diagnostic services manage, control and track events at any ATM, to which the remote diagnostic services are available to route and document on every action. 4.4 Others Ink Dye is type of ATM theft avoidance method where the cash is being sprayed with an ink on detection of any abnormalities with regard of ATM’s hardware. Later the cash will not be useful for either bank authorities or robbers due to the ink stained currency notes. Anyhow this method didn’t prove to be efficient since it is a loss to the Bank authorities itself [1]. Few people don’t know how to conceal the information of their respective bank account details. The people without any awareness regarding the importance of bank account details provide account information on fraudulent calls asking for consumer bank details. These losses can be avoided by creating awareness and consumer education. 5. CONCLUSION Even though with the advancement in security measures which are implemented to avoid robbery, somewhere or other ATM thefts are still occurring. As the technology is emerging to its new heights, logical/data attacks can be avoided with the efficient programming of software in terms of operating system. With the help of awareness and consumer education, card and currency thefts can be prevented to certain extent. The implementation of security measures including both video surveillance and alarms and sensors are proved to more efficient way to avoid ATM thefts. Remote monitoring can be helpful only when the group/authorities monitoring the ATMs are literate. Video surveillance with the addition alarms and sensors and also with the help of image processing techniques to detect human objects provides an efficient way to avoid ATM thefts. REFERENCES [1] Diebold, “ATM Fraud and Security White Paper”, 2003. [2] Diebold, “ATM Fraud and Security”, 2012. [3] P.Kannan, P.Meenakshi Vidya, “Design and Implementation of Security Based ATM theft Monitoring system”, Proceedings of “National Conference on Information Processing & Remote Computing Feb. 2014. [4] “Global ATM Market and Forecasts to 2016.” Retail Banking Research. September 2011. Brochure Page 2. [5] “Enfield's cash gift to the world". BBC London. 27 June 2007. [6] Michael S. Scott, “Robbery at Automated Teller Machines”, Guide No.8, 2001 [7] From Mag Stripe to Malware: Card Security Risks in 2011. Aite Group. 2011. [8] M.Ajaykumar and N.Bharth Kumar, “Anti-Theft ATM Machine Using Vibration Detection Sensor”, IJARCSSE, Volume 3, Issue 12, December 2013.