IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 1 | P a g e Copyright@IDL-2017
An ATM Multi-Protocol Emulation Network
Dimple Aradhya.K.M1
, Akshatha.H.R2
, Lakshmi Narasamma N3
, Jethi Kumari.B4
,
Mrs. Pragathi M Kaliwal5
(Guide)
VTU University1, 2, 3, 4, 5
Abstract -- The project sets sight on
authenticating the conventional Credit card
transaction system. In the prevailing system
though the Credit card paves a convenient
mode of transactions, it is subjected to more
jeopardy. As technology extends its limit,
the way of hacking and cracking also goes
along the road. In out proposed system, in
every transaction with the Credit card a
handshaking signal is achieved with the
cardholder. The handshaking method is
achieved by transferring the transaction time
and the purchase details to the mobile of the
cardholder by means of a GSM modem.
From the acknowledgement and
authentication received from the
cardholder’s mobile further transaction
proceeds. The system used the MCU for the
security issues between the Mobile and the
Card. Reports can also be generated for
every successful authentication.
The cardholder will be asked for a
reply by the GSM modem message. The
message from the cardholder is the major
authentication command. The MCU decodes
the message and decides the operation to be
performed. The status of the system for each
individual process will be displayed using
LCD s and LED s.
If your card is lost you need not have
to worry until you get the replacement of
the card which will minimum take 1
month. Until then it is difficult to survive
without atm card. So we have got a new
concept of universal card. If you have lost
your card. There is a universal card given
to the security guard of the atm. People
who have lost the card can use this card.
After swiping the universal card it will
ask for the account number. On providing
that it will generate a random unique
code and sms the same to the account
holder. He has to share to the person who
is using his card. The unique code keeps
on changing on every swipe and the new
secret code is always sent by sms to the
account holder. By this way we can have
a secure mode of atmtranscaction .even
though the card is lost.
INTRODUCTION
An automated teller machine or automatic
teller machine (ATM) is a computerized
telecommunications device that provides
a financial institution's customers a secure
method of performing financial
transactions in a public space without the
need for a human clerk or bank teller.
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 2 | P a g e Copyright@IDL-2017
Using an ATM, customers can
access their bank accounts in order to
make cash withdrawals (or credit card
cash advances) and check their account
balances. Many ATMs also allow people
to deposit cash or checks, transfer money
between their bank accounts, pay bills, or
purchase goods and services. On most
modern ATMs, the customer identifies
him or herself by inserting a plastic card
with a magnetic stripe or a plastic smart
card with a chip,that contains his or her
card number and some security
information, such as an expiration
date.The customer then verifies their
identity by entering a passcode, often
referred to as a PIN (Personal
Identification Number) of four or more
digits. Upon successful entry of the PIN,
the customer may perform a transaction.
After the transaction is complete, a
transaction record is printed, usually
consisting of the action taken, date and
time, location, any applicable fees, and
available balance.
If the number is entered
incorrectly several times in a row (usually
three attempts per card insertion), some
ATMs will attempt to retain the card as a
security precaution to prevent an
unauthorized user from discovering the
PIN by guesswork. Captured cards are
often destroyed if the ATM owner is not
the card issuing bank, as non-customer's
identities cannot be reliably confirmed. In
some cases, a transaction may be
performed at the ATM that allows the
customer's PIN to be changed
securely.The cardholder will be asked for a
reply by the GSM modem message. The
message from the cardholder is the major
authentication command. The MCU decodes
the message and decides the operation to be
performed. The status of the system for each
individual process will be displayed using
LCD s and LED s.
II. RELATED WORK
In recent years, security has been
more and more significant in network
environment with the emergence of the
internetworking technology. The
internetworking technology can provide the
communication channels across networks so
that machines in different networks can talk
to each other. However, the internetworking
communication will be exposed to all kinds
of attacks in such an open environment.
Most of the network technologies, without
integrating with security mechanism
originally, have to be redesigned to provide
some security services. ATM is one of those
technologies.
ATM stands for Asynchronous
Transfer Mode. Originally, it is a transfer
mode to implement the B-ISDN(Broadband
Integrated Services Digital Network)
technology so that all forms of data
traffic(voice, video, data etc.) can be
transferred over telecommunication
networks. But ATM is not restricted to B-
ISDN. It has been used to provide a
simplified network infrastructure for various
network connections, e.g. LAN, MAN or
WAN. ATM is a connection-oriented
technique. In ATM, hosts are connected by a
network of switches. When two parties want
to talk, they request a Virtual Channel from
the switch network first. Then the two
parties can send data to each other. Although
the communication parties can send data in
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 3 | P a g e Copyright@IDL-2017
any size, ATM always delivers data in a
fixed size unit, which is called a cell. A cell
has 5 octet header and 48 octet payload. Cell
switching will base on the 5 octet header. In
the way, a cell can go through a switch very
quickly. To meet different requirements of
specific traffic, ATM also introduces the
concept of Quality of Service(QoS). Details
about ATM technology can be found in any
ATM textbooks. And the most recent
advances in this area can be found in
discussions and contributions of ATM
Forum, which is the standards organization
for ATM.
In fact, issues in ATM security have
not gained enough attention until 1995,
when a group within ATM Forum was
established to address the security issues.
Therefore, compared with other security
area, ATM security is still in its beginning.
In this paper, we first examine the threats to
ATM networks. And then we discuss the
requirements of ATM security. In section 4
we are going to discuss the implementation
issues of ATM security. Phase I ATM
Security Specification has been discussed in
this section. In conclusion, we discuss some
examples of the ATM security products.
III. PROPOSED METHODOLOGY
The proposed system is an
enhancement of the existing system, and, it
is built upon the existing card and PIN -
based system. The proposed system is in two
different modes; the first will improve the
security of the ATM by applying second
level authentication on the existing ATM
process for withdrawal, after entry of correct
a PIN, while the second will apply second
level authentication in a scenario where a
customer-specified withdrawal limit is
attained.
Depicts an instance of withdrawal on
the AT for the proposed system which is an
enhancement of the existing system. The
entry of a correct PIN is inadequate to
authenticate to the bank system. This is
because an additional level has been
incorporated for the authentication process
which requires the customer to enter a valid
code which will be sent to the customer’s
pre-registered mobile device via SMS
gateway. If a correct code is supplied the
customer gets authenticated and is granted
access for withdrawal. However, if an
incorrect code is supplied even after the
entry of a correct PIN, the authentication
process fails and the customer is denied
access for withdrawal.
An instance of withdrawal on the
ATM. This mode gives the customer the
opportunity to choose the second level
authentication process as an additional level
of authentication for withdrawal in order to
guarantee the security of the account owner.
With this mode, a customer- specified
withdrawal limit must be attained before the
system prompts for entry of a valid code. If
a valid code is supplied, the authentication
process is complete and the customer is
granted access for withdrawal. On the other
hand, if an invalid code is supplied, the
authentication process fails and the customer
is denied access for withdrawal. It is
imperative to note that if a customer-
specified withdrawal limit is not in place,
the entry of a valid PIN will be sufficient to
authenticate the customer to the system and
thereafter grant access for withdrawal. This
implies that the second level authentication
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 4 | P a g e Copyright@IDL-2017
process would not be applied in such
instances.
IV. CONCLUSION
This paper presents a novel
architecture – M-cash withdrawal- that can
be used as a means of interaction between
mobile phone/devices, an ATM machine and
a Banking application for the purpose of
withdrawing cash. The design of the
proposed secure M-cash withdrawal allows
the use of mobile phones as a tool of
interaction and provides flexibility through
robust identity management architecture.
The first part of the architecture is in the
process of being implemented and all the
process involved has been analyzed and
justified where possible. As part of our
future work, we will be providing in-depth
analyses of the design and protocols to be
used for the purpose of withdrawing cash.
The Secure M-cash has examined the
possibility of making use of similar
approaches/techniques (RFID and NFC) for
other applications and already there are
some applications that have adapted this
strategy. The Secure M-Cash Withdrawal
architecture has been defined, it will form as
a foundation for future work within this
area, which includes, protocols design, and
implementing a PC based simulation of the
architecture and implementing the system.
Banks provide security and
convenience for managing your money and
sometimes allow you to make money by
earning interest. Convenience and fees are
two of the most important things to consider
when choosing a bank.Writing and
depositing checks are perhaps the most
fundamental ways to move money in and
out of a checking account, but advancements
in technology have added ATM and debit
card transactions, ACH transfers, online bill
pay and mobile transfers to the mix.All
banks have rules about how long it takes to
access your deposits, how many debit card
transactions you're allowed in a day, and
how much cash you can withdraw from an
ATM. Access to the balance in your
checking account can also be limited by
businesses such as gas stations and hotels
that place holds on your funds when you pay
with a debit card.
Debit cards provide easy access to
the cash in your account, but can cause you
to rack up fees if you overdraw your account
or visit out-of-network ATMs.While debit
cards encourage more responsible spending
than credit cards, they do not offer the same
protection or perks.Regularly balancing your
checkbook or developing another method to
stay on top of your account balance is
essential to successfully managing your
checking account and avoiding fees,
declined transactions and bounced
payments.
If you have more money than you
need to manage your day-to-day expenses,
banks offer a variety of options for saving,
including money market accounts, CDs,
high-interest online savings accounts and
basic savings accounts.To protect your
money from electronic theft, identity theft
and other forms of fraud, it's important to
implement basic precautions such as
shredding account statements, having
complex passwords, safeguarding your PIN
and only conducting online and mobile
banking through secure internet connections.
IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org
International e-Journal For Technology And Research-2017
IDL - International Digital Library 5 | P a g e Copyright@IDL-2017
REFERENCES
1] AbdullahiArabo, "Secure Cash
Withdrawal through Mobile Phone/Device ",
in Proceedings of the International
Conference on Computer and
Communication Engineering, 2008, 818-
822.
[2] Daojing He, Maode Ma, Yan Zhang,
Chun Chen, Jiajun Bu, "A strong user
authentication scheme with smart cards for
wireless communications", Computer
Communications 34, 2011, 367-374.
[3] Francesco Buccafurri, Gianluca Lax,
"Implementing disposable credit card
numbers by mobile phones", in Springer
Science+Business Media, LLC 2011.
[4] Kuo-Hui Yeh, Chunhua Su, N.W. Lo,
Yingjiu Li, Yi-Xiang Hung, "Two robust
remote user authentication protocols using
smart cards", in The Journal of Systems and
Software, 2010, 2556-2565.
[5] Manoj Kumar, "An Enhanced Remote
User Authentication Scheme with Smart
Card", International Journal of Network
Security, 10(3) (2010), 175-184.
[6] Mohamed HamdyEldefrawy, Khaled
Alghathbar, Muhammad Khurram Khan,
"OTP-Based Two- Factor Authentication
Using Mobile Phones", in 2011 Eighth
International Conference on Information
Technology: New Generations, 2011, 327-
331.
[7] Ms. Trupti Hemant Gurav, Ms. Manisha
Dhage, "Remote client Authentiction using
mobile phone generated OTP", International
Journal of Scientific and Research
Publications, 2(5), 2012.
[8] Sagar Acharya, ApoorvaPolawar,
P.Y.Pawar, "Two Factor Authentication
Using Smartphone Generated One Time
Password", IOSR Journal of Computer
Engineering, 11 (2) (2013), 85-90.
[9] SagarGajbhar, ShrikantAher, Swapnil
Auti, Shailesh Hodge, "Authentication using
Mobile phone generated OTP", International
Journal of Computer Science and
Management Research 2(5) (2013).

An ATM Multi-Protocol Emulation Network

  • 1.
    IDL - InternationalDigital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 1 | P a g e Copyright@IDL-2017 An ATM Multi-Protocol Emulation Network Dimple Aradhya.K.M1 , Akshatha.H.R2 , Lakshmi Narasamma N3 , Jethi Kumari.B4 , Mrs. Pragathi M Kaliwal5 (Guide) VTU University1, 2, 3, 4, 5 Abstract -- The project sets sight on authenticating the conventional Credit card transaction system. In the prevailing system though the Credit card paves a convenient mode of transactions, it is subjected to more jeopardy. As technology extends its limit, the way of hacking and cracking also goes along the road. In out proposed system, in every transaction with the Credit card a handshaking signal is achieved with the cardholder. The handshaking method is achieved by transferring the transaction time and the purchase details to the mobile of the cardholder by means of a GSM modem. From the acknowledgement and authentication received from the cardholder’s mobile further transaction proceeds. The system used the MCU for the security issues between the Mobile and the Card. Reports can also be generated for every successful authentication. The cardholder will be asked for a reply by the GSM modem message. The message from the cardholder is the major authentication command. The MCU decodes the message and decides the operation to be performed. The status of the system for each individual process will be displayed using LCD s and LED s. If your card is lost you need not have to worry until you get the replacement of the card which will minimum take 1 month. Until then it is difficult to survive without atm card. So we have got a new concept of universal card. If you have lost your card. There is a universal card given to the security guard of the atm. People who have lost the card can use this card. After swiping the universal card it will ask for the account number. On providing that it will generate a random unique code and sms the same to the account holder. He has to share to the person who is using his card. The unique code keeps on changing on every swipe and the new secret code is always sent by sms to the account holder. By this way we can have a secure mode of atmtranscaction .even though the card is lost. INTRODUCTION An automated teller machine or automatic teller machine (ATM) is a computerized telecommunications device that provides a financial institution's customers a secure method of performing financial transactions in a public space without the need for a human clerk or bank teller.
  • 2.
    IDL - InternationalDigital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 2 | P a g e Copyright@IDL-2017 Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances. Many ATMs also allow people to deposit cash or checks, transfer money between their bank accounts, pay bills, or purchase goods and services. On most modern ATMs, the customer identifies him or herself by inserting a plastic card with a magnetic stripe or a plastic smart card with a chip,that contains his or her card number and some security information, such as an expiration date.The customer then verifies their identity by entering a passcode, often referred to as a PIN (Personal Identification Number) of four or more digits. Upon successful entry of the PIN, the customer may perform a transaction. After the transaction is complete, a transaction record is printed, usually consisting of the action taken, date and time, location, any applicable fees, and available balance. If the number is entered incorrectly several times in a row (usually three attempts per card insertion), some ATMs will attempt to retain the card as a security precaution to prevent an unauthorized user from discovering the PIN by guesswork. Captured cards are often destroyed if the ATM owner is not the card issuing bank, as non-customer's identities cannot be reliably confirmed. In some cases, a transaction may be performed at the ATM that allows the customer's PIN to be changed securely.The cardholder will be asked for a reply by the GSM modem message. The message from the cardholder is the major authentication command. The MCU decodes the message and decides the operation to be performed. The status of the system for each individual process will be displayed using LCD s and LED s. II. RELATED WORK In recent years, security has been more and more significant in network environment with the emergence of the internetworking technology. The internetworking technology can provide the communication channels across networks so that machines in different networks can talk to each other. However, the internetworking communication will be exposed to all kinds of attacks in such an open environment. Most of the network technologies, without integrating with security mechanism originally, have to be redesigned to provide some security services. ATM is one of those technologies. ATM stands for Asynchronous Transfer Mode. Originally, it is a transfer mode to implement the B-ISDN(Broadband Integrated Services Digital Network) technology so that all forms of data traffic(voice, video, data etc.) can be transferred over telecommunication networks. But ATM is not restricted to B- ISDN. It has been used to provide a simplified network infrastructure for various network connections, e.g. LAN, MAN or WAN. ATM is a connection-oriented technique. In ATM, hosts are connected by a network of switches. When two parties want to talk, they request a Virtual Channel from the switch network first. Then the two parties can send data to each other. Although the communication parties can send data in
  • 3.
    IDL - InternationalDigital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 3 | P a g e Copyright@IDL-2017 any size, ATM always delivers data in a fixed size unit, which is called a cell. A cell has 5 octet header and 48 octet payload. Cell switching will base on the 5 octet header. In the way, a cell can go through a switch very quickly. To meet different requirements of specific traffic, ATM also introduces the concept of Quality of Service(QoS). Details about ATM technology can be found in any ATM textbooks. And the most recent advances in this area can be found in discussions and contributions of ATM Forum, which is the standards organization for ATM. In fact, issues in ATM security have not gained enough attention until 1995, when a group within ATM Forum was established to address the security issues. Therefore, compared with other security area, ATM security is still in its beginning. In this paper, we first examine the threats to ATM networks. And then we discuss the requirements of ATM security. In section 4 we are going to discuss the implementation issues of ATM security. Phase I ATM Security Specification has been discussed in this section. In conclusion, we discuss some examples of the ATM security products. III. PROPOSED METHODOLOGY The proposed system is an enhancement of the existing system, and, it is built upon the existing card and PIN - based system. The proposed system is in two different modes; the first will improve the security of the ATM by applying second level authentication on the existing ATM process for withdrawal, after entry of correct a PIN, while the second will apply second level authentication in a scenario where a customer-specified withdrawal limit is attained. Depicts an instance of withdrawal on the AT for the proposed system which is an enhancement of the existing system. The entry of a correct PIN is inadequate to authenticate to the bank system. This is because an additional level has been incorporated for the authentication process which requires the customer to enter a valid code which will be sent to the customer’s pre-registered mobile device via SMS gateway. If a correct code is supplied the customer gets authenticated and is granted access for withdrawal. However, if an incorrect code is supplied even after the entry of a correct PIN, the authentication process fails and the customer is denied access for withdrawal. An instance of withdrawal on the ATM. This mode gives the customer the opportunity to choose the second level authentication process as an additional level of authentication for withdrawal in order to guarantee the security of the account owner. With this mode, a customer- specified withdrawal limit must be attained before the system prompts for entry of a valid code. If a valid code is supplied, the authentication process is complete and the customer is granted access for withdrawal. On the other hand, if an invalid code is supplied, the authentication process fails and the customer is denied access for withdrawal. It is imperative to note that if a customer- specified withdrawal limit is not in place, the entry of a valid PIN will be sufficient to authenticate the customer to the system and thereafter grant access for withdrawal. This implies that the second level authentication
  • 4.
    IDL - InternationalDigital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 4 | P a g e Copyright@IDL-2017 process would not be applied in such instances. IV. CONCLUSION This paper presents a novel architecture – M-cash withdrawal- that can be used as a means of interaction between mobile phone/devices, an ATM machine and a Banking application for the purpose of withdrawing cash. The design of the proposed secure M-cash withdrawal allows the use of mobile phones as a tool of interaction and provides flexibility through robust identity management architecture. The first part of the architecture is in the process of being implemented and all the process involved has been analyzed and justified where possible. As part of our future work, we will be providing in-depth analyses of the design and protocols to be used for the purpose of withdrawing cash. The Secure M-cash has examined the possibility of making use of similar approaches/techniques (RFID and NFC) for other applications and already there are some applications that have adapted this strategy. The Secure M-Cash Withdrawal architecture has been defined, it will form as a foundation for future work within this area, which includes, protocols design, and implementing a PC based simulation of the architecture and implementing the system. Banks provide security and convenience for managing your money and sometimes allow you to make money by earning interest. Convenience and fees are two of the most important things to consider when choosing a bank.Writing and depositing checks are perhaps the most fundamental ways to move money in and out of a checking account, but advancements in technology have added ATM and debit card transactions, ACH transfers, online bill pay and mobile transfers to the mix.All banks have rules about how long it takes to access your deposits, how many debit card transactions you're allowed in a day, and how much cash you can withdraw from an ATM. Access to the balance in your checking account can also be limited by businesses such as gas stations and hotels that place holds on your funds when you pay with a debit card. Debit cards provide easy access to the cash in your account, but can cause you to rack up fees if you overdraw your account or visit out-of-network ATMs.While debit cards encourage more responsible spending than credit cards, they do not offer the same protection or perks.Regularly balancing your checkbook or developing another method to stay on top of your account balance is essential to successfully managing your checking account and avoiding fees, declined transactions and bounced payments. If you have more money than you need to manage your day-to-day expenses, banks offer a variety of options for saving, including money market accounts, CDs, high-interest online savings accounts and basic savings accounts.To protect your money from electronic theft, identity theft and other forms of fraud, it's important to implement basic precautions such as shredding account statements, having complex passwords, safeguarding your PIN and only conducting online and mobile banking through secure internet connections.
  • 5.
    IDL - InternationalDigital Library Of Technology & Research Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org International e-Journal For Technology And Research-2017 IDL - International Digital Library 5 | P a g e Copyright@IDL-2017 REFERENCES 1] AbdullahiArabo, "Secure Cash Withdrawal through Mobile Phone/Device ", in Proceedings of the International Conference on Computer and Communication Engineering, 2008, 818- 822. [2] Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu, "A strong user authentication scheme with smart cards for wireless communications", Computer Communications 34, 2011, 367-374. [3] Francesco Buccafurri, Gianluca Lax, "Implementing disposable credit card numbers by mobile phones", in Springer Science+Business Media, LLC 2011. [4] Kuo-Hui Yeh, Chunhua Su, N.W. Lo, Yingjiu Li, Yi-Xiang Hung, "Two robust remote user authentication protocols using smart cards", in The Journal of Systems and Software, 2010, 2556-2565. [5] Manoj Kumar, "An Enhanced Remote User Authentication Scheme with Smart Card", International Journal of Network Security, 10(3) (2010), 175-184. [6] Mohamed HamdyEldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, "OTP-Based Two- Factor Authentication Using Mobile Phones", in 2011 Eighth International Conference on Information Technology: New Generations, 2011, 327- 331. [7] Ms. Trupti Hemant Gurav, Ms. Manisha Dhage, "Remote client Authentiction using mobile phone generated OTP", International Journal of Scientific and Research Publications, 2(5), 2012. [8] Sagar Acharya, ApoorvaPolawar, P.Y.Pawar, "Two Factor Authentication Using Smartphone Generated One Time Password", IOSR Journal of Computer Engineering, 11 (2) (2013), 85-90. [9] SagarGajbhar, ShrikantAher, Swapnil Auti, Shailesh Hodge, "Authentication using Mobile phone generated OTP", International Journal of Computer Science and Management Research 2(5) (2013).