SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 517
Guarded Remittance System Employing WANET for Catastrophe Region
Mr.Bala Sundara Ganapathy.N1, Yokeshwaran.T2, Venugopal.S3, Nishanth.M4, Manoj.S5
1 Assistant Professor,2345 Students ,B-Tech, Department of Information Technology, Panimalar Engineering College,
Poonamallee, Chennai,, Tamil Nadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – In this paper, we propose an offline mobile
payment system for catastrophe region utilizing WANET
(Wireless Adhoc Network). The current payment system
requires a fixed infrastructure networksuch ascellulartowers,
or wired networks to enable transactions. In Disaster areas,
these infrastructures may not be available and impossible to
get cash from banks or ATM. To overcome this issue, we
provide an infrastructure less wireless network for
communication which permits customers to purchase in
disaster areas. Therefore we introduce a mobile payment
application which enables us to make payment offline. We use
multilevel endorsement mechanism to ensure guarantee
payment for merchant. To reduce communication overheads
we use lightweight scheme based on Bloom filter and Merkle
tree. In order to make transaction easier and secured, QR
codes are used consisting of digital signatures which restricts
an attacker from double spending the QR. In addition with
payment system, regional situation update is provided to
upload their current situation such as roadblocks, floods etc.
Key Words: WANET, Multilevel Endorser, Digital Signature,
Double Spending, Merkle tree.
1. INTRODUCTION:
Now a day’s usage of smart phone has increased
tremendously and due to the availability of internet facility
the world goes digitalized. So payments are done using
online banking and other technique especially using mobile
application. Since everybody carry mobile phone it makes
payment easier without cash transaction. Current mobile
payment adopts various technique and makes the payment
system easier, secured and guaranteed. But all the available
payment system’s technique works only when the user has
cellular connectivity or internet facility. But when there is a
calamity these communication network will be destroyedor
will not function properly. Even though real cash is
considered to be the easiest means for carrying out a
transaction it is impossible to get cash because access to the
ATMs or Banks are restricted physically. Current payment
system works only in the availability of the network. To
overcome this situation we introduce a new way to establish
communication utilizing WANET, make payment possible
and shop in disaster area. We provide an androidapplication
which communicates through WANETandmaketransaction.
We adopt various technique and strategies to make secured,
easier and guaranteed payment for customer and merchant.
This application does not require any fixedinfrastructurefor
communication and the usersmaynotknowanyinformation
about the area during calamity. Moreover we provide an
interface page which allowsthe user to view theinformation
and upload their area situation
2. PROPOSED SYSTEM:
We proposed a payment system that will provide the
infrastructure less network between User and Bank in
disaster area utilizing WANET network.WeuseTransceivers
as an intermediate for the communicationsbetweenMobiles
and Banksin order to cover a wider rangeofcommunication.
The Customer gets the merchant information by scanning
merchant’s QR code, fills payment details and passes the
payment request message across the mobiles using
transceivers. The QR code makes easy to fill the merchant’s
information and identify. For security reasons we use DES
algorithm for encryption and decryption.
To transfer message in wireless medium, Base64algorithm
is used which converts the encrypted binary data into a text
line format such as ASCII value. After reaching the bank the
data is decrypted and it is verified. In order to provide
payment guarantees we use multilevel endorsement (MLE)
mechanism for a customer-to-merchant transaction. Then
QR code is generated which is digitally signed that helps for
authentication and moreover it restricts an attacker from
double spending the QR. Bank response messagereachesthe
customer using same strategy. Then merchant scans the
received QR-code from the customer and sendsinformation
back to the Bank. Finally the QR is validated and the amount
is credited to merchant. We introduced a Disaster
Information center where the users can broadcast any
calamity information such as Roadblocks, Bridge Collapse
and flood affected areas.
3. MODULE DESCRIPTION:
3.1 Account Creation:
In this first module customer and merchant will create a
bank account and sign up in the application. Then customer
will deposit the amount in his account. They should give
their endorser name (surety) which will be added to the
account information and this will help the customer to
withdraw amount from your endorser account if customer
account is under minimum balance. Finally amount will be
converter to bit coins (Digital currency).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 518
3.2 Customer Payment Request:
Second module shows how the purchase is made by the
customer. First the User will login with credential
information like username, password and if it is valid then it
opens the User profile screen. If Customer wantstopurchase
any item then he should scan the Merchant Shop QR code
and then customer has to enter the Item name and cost of
item. Then the information will be encoded with the DES
Algorithm and then the encoded data will be converted into
stream of bits using Base 64 Algorithm. It will be
broadcasted from the customer phone and by using mobile
to mobile communication the data reaches the Bank. The
data is verified by the bank and if data is valid Bank
generates a QR code and send it back to the customer who
made the request.
3.3 Merchant Process:
In this module the received QR code will be scanned by
the Merchant from the customer. The QR code contains the
account information and transaction amount with digital
signature. If the merchant scans the customer QR code the
data is proceed to Bank through mobile communication
using WANET .Bank system will check the QR code
information and validates using parameters such as Date,
Signature, and Time. After the successful verification, the
amount will be transferred from customer to merchant
account and this completed transaction will be informed to
the merchant. When the transaction is completed the used
QR code will become invalid to avoid Double Spending.
3.4 Regional Situation Update:
In this final module we will be providing a page where
the user can upload their surrounding situation. Now all the
user will be connected in WANET network. So any update
made by any user will be passed to all other users. The
update is made based on their location situation like Heavy
rain, Road block. So this location update will be very helpful
to all the people who travels or rescuers by checking the
update. User can also broadcast emergency messageandcall
for rescue which will be useful for the victims in disaster
area. The Situation update can be given in three fields such
as subject, place and status. Once the user update their
Information, other user can view regional information in
their application.
4. ARCHITECTURE DIAGRAM:
Figure 1.1 Architecture Diagram
5. ALGORITHM:
5.1 DES:
DES algorithm is a block cipher used to prevent the
attack from hackersduring transmissionofuserinformation.
DES (Data Encryption Standard) is a symmetric key block
cipher published by the National Institute of Standards and
Technology (NIST).DES is an implementation of a Feistel
Cipheer. It uses 16 round Fesitel structure. The block size is
64-bit. Though, key length is 64-bit, DES hasan effective key
length of 56bits.
General Structure of DES is depicted in the following
illustration. Since DES is based on the Feistel Cipher, all that
is required to specify DES is
 Initial and final permutation
 Round Function
 Key Expansion
The important significant of DES is the algorithmmakes
the transaction secure by using 56-bit key and 64-bit plain
text. So there are 2^56 possibilitiesof keyswhichwouldtake
a decade to find the correct key using brute-force attack. It
uses same algorithm for encryption and decryption.
5.2 Base64
Base64 also be referred as Privacy-enhanced Electronic
Mail (PEM) is used to convert binary data into a text-like
format that allows it to be transported in environments that
can handle only text safely. Base64 encoding takes the
original binary data and divides it into tokens of three bytes
(24 bits) and converted into printable characters from the
ASCII standard. The first step is to take the three bytes
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 519
(24bit) of binary data and split it into four numbers of six
bits. Because the ASCII standard defines the use of seven
bits, Base64 only uses 6 bits (corresponding to 2^6 = 64
characters) to ensure the encoded data isprintableandnone
of the special characters available in ASCII are used. The
ASCII characters used for Base64 are the numbers 0-9, the
alphabets 26 lowercase and 26 uppercase characters plus
two extra characters '+' and '/‘(26+26+10+2=64).
5.3. QR Code:
QR code means Quick Response Code is the trademark
for a type of Matrix Barcode (or two-dimensional barcode).
A QR code uses four standardized encodingmodes(numeric,
alphanumeric, byte/binary, and kanji) to efficiently store
data; extensions may also be used. The QR code consists of
black squares arranged in a square grid on a white
background which can be read by an imaging device and
processed using Reed-Solomon error correction. Each of
these squares is called a module. In every QR code, there are
certain modules that must not be covered or edited, else the
code won’t scan. We specifically use IQR code.
6. HARDWARE AND SOFTWARE REQUIREMENT:
6.1 Hardware Requirement:
Windows:
Hard disk : 250 GB and above.
Processor : i3 and above.
RAM : 2GB and above.
Smart Phone:
Memory : 4GB and above.
Processor : Dual core and above.
RAM : 1GB and above.
6.2 Software Requirement:
Windows:
Operating System : Windows 7 and above
Java Version : JDK 1.7
Web Server : Tomcat 7.0.11
Database : MYSQL
Smart Phone:
Operating System : Gingerbread and above.
No. of Devices : 2(at least).
7. CONCLUSIONS
We designed an online mobile payment system using
WANET to purchase product in disaster areas. The current
payment system needs an online medium to enable the
transaction which usesfixed infrastructure network suchas
cellular towers, base station etc. By using WANET can
provide infrastructure less network which helps the mobile
payment application to work in offline mode. So the
developed application allows the user to shop even in
disaster areas which reduces the fear of people from
purchasing essential goods.
ACKNOWLEDGEMENT
A project of this magnitude and nature requires kind
co-operation and support from many, for successful
completion . We wish to express our sincere thanks to all
those who were involved in the completion of this project.
REFERENCES
[1] B. Ojetunde, N. Shibata, J. Gao, and M. Ito, “An
endorsement-based mobile payment system for a disaster
area,” in Proc. 29th IEEE Int.Conf. Adv. Inf. Netw. Appl.
(AINA), Gwangju, South Korea, Mar. 2015, pp. 482–489.
[2] A. Mishra and K. M. Nadkarni, “Security in wirelessadhoc
networks,” in The Handbook of Ad Hoc Wireless Networks.
Boca Raton, FL, USA: CRC Press, 2003, ch. 30, pp. 499–549.
[3] W. Li, Q. Wen, Q. Su, and Z. Jin, “An efficient and secure
mobile payment protocol for restricted connectivity
scenarios in vehicular ad hoc network,” Comput. Commun.,
vol. 35, no. 2, pp. 188–195, Jan. 2012.
[4] X. Dai, O. Ayoade, and J. Grundy, “Off-line micro-payment
protocol for multiple vendorsin mobile commerce,” in Proc.
7th Int. Conf. Parallel Distrib. Comput. Appl. Technol.
(PDCAT), Taipei, Taiwan, 2006, pp. 197–202
[5] V. Patil and R. K. Shyamasundar, “An efficient, secure and
delegable micro-payment system,” in Proc. IEEE Int. Conf. e-
Technol. e-Commerce e-Service (EEE), Taipei, Taiwan, Mar.
2004, pp. 394–404.

More Related Content

What's hot

IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
dbpublications
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET Journal
 
Paper id 71201959
Paper id 71201959Paper id 71201959
Paper id 71201959
IJRAT
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET Journal
 
D0351022026
D0351022026D0351022026
D0351022026
inventionjournals
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
Journal For Research
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card Payment
Editor IJCATR
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
 
article
articlearticle
IRJET- Smart Trolley for Billing System
IRJET-   	  Smart Trolley for Billing SystemIRJET-   	  Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET Journal
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
Ivona M
 
Bq33413420
Bq33413420Bq33413420
Bq33413420
IJERA Editor
 
N044057478
N044057478N044057478
N044057478
IJERA Editor
 
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block Chain
IRJET Journal
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
TELKOMNIKA JOURNAL
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
IRJET Journal
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
First Atlantic Commerce
 

What's hot (20)

IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 
Gresham Publication
Gresham PublicationGresham Publication
Gresham Publication
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
 
Paper id 71201959
Paper id 71201959Paper id 71201959
Paper id 71201959
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
 
D0351022026
D0351022026D0351022026
D0351022026
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card Payment
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
article
articlearticle
article
 
IRJET- Smart Trolley for Billing System
IRJET-   	  Smart Trolley for Billing SystemIRJET-   	  Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
 
Bq33413420
Bq33413420Bq33413420
Bq33413420
 
N044057478
N044057478N044057478
N044057478
 
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block Chain
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
 

Similar to IRJET- Guarded Remittance System Employing WANET for Catastrophe Region

E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFC
IRJET Journal
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
IRJET Journal
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
IRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
 
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSSECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
IRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
 
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
AnthonyOtuonye
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
IRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
E wallet nfc service payment
E wallet nfc service paymentE wallet nfc service payment
E wallet nfc service paymentigede tirtanata
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
 

Similar to IRJET- Guarded Remittance System Employing WANET for Catastrophe Region (20)

E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFC
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSSECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
E wallet nfc service payment
E wallet nfc service paymentE wallet nfc service payment
E wallet nfc service payment
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 

Recently uploaded (20)

English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 

IRJET- Guarded Remittance System Employing WANET for Catastrophe Region

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 517 Guarded Remittance System Employing WANET for Catastrophe Region Mr.Bala Sundara Ganapathy.N1, Yokeshwaran.T2, Venugopal.S3, Nishanth.M4, Manoj.S5 1 Assistant Professor,2345 Students ,B-Tech, Department of Information Technology, Panimalar Engineering College, Poonamallee, Chennai,, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In this paper, we propose an offline mobile payment system for catastrophe region utilizing WANET (Wireless Adhoc Network). The current payment system requires a fixed infrastructure networksuch ascellulartowers, or wired networks to enable transactions. In Disaster areas, these infrastructures may not be available and impossible to get cash from banks or ATM. To overcome this issue, we provide an infrastructure less wireless network for communication which permits customers to purchase in disaster areas. Therefore we introduce a mobile payment application which enables us to make payment offline. We use multilevel endorsement mechanism to ensure guarantee payment for merchant. To reduce communication overheads we use lightweight scheme based on Bloom filter and Merkle tree. In order to make transaction easier and secured, QR codes are used consisting of digital signatures which restricts an attacker from double spending the QR. In addition with payment system, regional situation update is provided to upload their current situation such as roadblocks, floods etc. Key Words: WANET, Multilevel Endorser, Digital Signature, Double Spending, Merkle tree. 1. INTRODUCTION: Now a day’s usage of smart phone has increased tremendously and due to the availability of internet facility the world goes digitalized. So payments are done using online banking and other technique especially using mobile application. Since everybody carry mobile phone it makes payment easier without cash transaction. Current mobile payment adopts various technique and makes the payment system easier, secured and guaranteed. But all the available payment system’s technique works only when the user has cellular connectivity or internet facility. But when there is a calamity these communication network will be destroyedor will not function properly. Even though real cash is considered to be the easiest means for carrying out a transaction it is impossible to get cash because access to the ATMs or Banks are restricted physically. Current payment system works only in the availability of the network. To overcome this situation we introduce a new way to establish communication utilizing WANET, make payment possible and shop in disaster area. We provide an androidapplication which communicates through WANETandmaketransaction. We adopt various technique and strategies to make secured, easier and guaranteed payment for customer and merchant. This application does not require any fixedinfrastructurefor communication and the usersmaynotknowanyinformation about the area during calamity. Moreover we provide an interface page which allowsthe user to view theinformation and upload their area situation 2. PROPOSED SYSTEM: We proposed a payment system that will provide the infrastructure less network between User and Bank in disaster area utilizing WANET network.WeuseTransceivers as an intermediate for the communicationsbetweenMobiles and Banksin order to cover a wider rangeofcommunication. The Customer gets the merchant information by scanning merchant’s QR code, fills payment details and passes the payment request message across the mobiles using transceivers. The QR code makes easy to fill the merchant’s information and identify. For security reasons we use DES algorithm for encryption and decryption. To transfer message in wireless medium, Base64algorithm is used which converts the encrypted binary data into a text line format such as ASCII value. After reaching the bank the data is decrypted and it is verified. In order to provide payment guarantees we use multilevel endorsement (MLE) mechanism for a customer-to-merchant transaction. Then QR code is generated which is digitally signed that helps for authentication and moreover it restricts an attacker from double spending the QR. Bank response messagereachesthe customer using same strategy. Then merchant scans the received QR-code from the customer and sendsinformation back to the Bank. Finally the QR is validated and the amount is credited to merchant. We introduced a Disaster Information center where the users can broadcast any calamity information such as Roadblocks, Bridge Collapse and flood affected areas. 3. MODULE DESCRIPTION: 3.1 Account Creation: In this first module customer and merchant will create a bank account and sign up in the application. Then customer will deposit the amount in his account. They should give their endorser name (surety) which will be added to the account information and this will help the customer to withdraw amount from your endorser account if customer account is under minimum balance. Finally amount will be converter to bit coins (Digital currency).
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 518 3.2 Customer Payment Request: Second module shows how the purchase is made by the customer. First the User will login with credential information like username, password and if it is valid then it opens the User profile screen. If Customer wantstopurchase any item then he should scan the Merchant Shop QR code and then customer has to enter the Item name and cost of item. Then the information will be encoded with the DES Algorithm and then the encoded data will be converted into stream of bits using Base 64 Algorithm. It will be broadcasted from the customer phone and by using mobile to mobile communication the data reaches the Bank. The data is verified by the bank and if data is valid Bank generates a QR code and send it back to the customer who made the request. 3.3 Merchant Process: In this module the received QR code will be scanned by the Merchant from the customer. The QR code contains the account information and transaction amount with digital signature. If the merchant scans the customer QR code the data is proceed to Bank through mobile communication using WANET .Bank system will check the QR code information and validates using parameters such as Date, Signature, and Time. After the successful verification, the amount will be transferred from customer to merchant account and this completed transaction will be informed to the merchant. When the transaction is completed the used QR code will become invalid to avoid Double Spending. 3.4 Regional Situation Update: In this final module we will be providing a page where the user can upload their surrounding situation. Now all the user will be connected in WANET network. So any update made by any user will be passed to all other users. The update is made based on their location situation like Heavy rain, Road block. So this location update will be very helpful to all the people who travels or rescuers by checking the update. User can also broadcast emergency messageandcall for rescue which will be useful for the victims in disaster area. The Situation update can be given in three fields such as subject, place and status. Once the user update their Information, other user can view regional information in their application. 4. ARCHITECTURE DIAGRAM: Figure 1.1 Architecture Diagram 5. ALGORITHM: 5.1 DES: DES algorithm is a block cipher used to prevent the attack from hackersduring transmissionofuserinformation. DES (Data Encryption Standard) is a symmetric key block cipher published by the National Institute of Standards and Technology (NIST).DES is an implementation of a Feistel Cipheer. It uses 16 round Fesitel structure. The block size is 64-bit. Though, key length is 64-bit, DES hasan effective key length of 56bits. General Structure of DES is depicted in the following illustration. Since DES is based on the Feistel Cipher, all that is required to specify DES is  Initial and final permutation  Round Function  Key Expansion The important significant of DES is the algorithmmakes the transaction secure by using 56-bit key and 64-bit plain text. So there are 2^56 possibilitiesof keyswhichwouldtake a decade to find the correct key using brute-force attack. It uses same algorithm for encryption and decryption. 5.2 Base64 Base64 also be referred as Privacy-enhanced Electronic Mail (PEM) is used to convert binary data into a text-like format that allows it to be transported in environments that can handle only text safely. Base64 encoding takes the original binary data and divides it into tokens of three bytes (24 bits) and converted into printable characters from the ASCII standard. The first step is to take the three bytes
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 519 (24bit) of binary data and split it into four numbers of six bits. Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensure the encoded data isprintableandnone of the special characters available in ASCII are used. The ASCII characters used for Base64 are the numbers 0-9, the alphabets 26 lowercase and 26 uppercase characters plus two extra characters '+' and '/‘(26+26+10+2=64). 5.3. QR Code: QR code means Quick Response Code is the trademark for a type of Matrix Barcode (or two-dimensional barcode). A QR code uses four standardized encodingmodes(numeric, alphanumeric, byte/binary, and kanji) to efficiently store data; extensions may also be used. The QR code consists of black squares arranged in a square grid on a white background which can be read by an imaging device and processed using Reed-Solomon error correction. Each of these squares is called a module. In every QR code, there are certain modules that must not be covered or edited, else the code won’t scan. We specifically use IQR code. 6. HARDWARE AND SOFTWARE REQUIREMENT: 6.1 Hardware Requirement: Windows: Hard disk : 250 GB and above. Processor : i3 and above. RAM : 2GB and above. Smart Phone: Memory : 4GB and above. Processor : Dual core and above. RAM : 1GB and above. 6.2 Software Requirement: Windows: Operating System : Windows 7 and above Java Version : JDK 1.7 Web Server : Tomcat 7.0.11 Database : MYSQL Smart Phone: Operating System : Gingerbread and above. No. of Devices : 2(at least). 7. CONCLUSIONS We designed an online mobile payment system using WANET to purchase product in disaster areas. The current payment system needs an online medium to enable the transaction which usesfixed infrastructure network suchas cellular towers, base station etc. By using WANET can provide infrastructure less network which helps the mobile payment application to work in offline mode. So the developed application allows the user to shop even in disaster areas which reduces the fear of people from purchasing essential goods. ACKNOWLEDGEMENT A project of this magnitude and nature requires kind co-operation and support from many, for successful completion . We wish to express our sincere thanks to all those who were involved in the completion of this project. REFERENCES [1] B. Ojetunde, N. Shibata, J. Gao, and M. Ito, “An endorsement-based mobile payment system for a disaster area,” in Proc. 29th IEEE Int.Conf. Adv. Inf. Netw. Appl. (AINA), Gwangju, South Korea, Mar. 2015, pp. 482–489. [2] A. Mishra and K. M. Nadkarni, “Security in wirelessadhoc networks,” in The Handbook of Ad Hoc Wireless Networks. Boca Raton, FL, USA: CRC Press, 2003, ch. 30, pp. 499–549. [3] W. Li, Q. Wen, Q. Su, and Z. Jin, “An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network,” Comput. Commun., vol. 35, no. 2, pp. 188–195, Jan. 2012. [4] X. Dai, O. Ayoade, and J. Grundy, “Off-line micro-payment protocol for multiple vendorsin mobile commerce,” in Proc. 7th Int. Conf. Parallel Distrib. Comput. Appl. Technol. (PDCAT), Taipei, Taiwan, 2006, pp. 197–202 [5] V. Patil and R. K. Shyamasundar, “An efficient, secure and delegable micro-payment system,” in Proc. IEEE Int. Conf. e- Technol. e-Commerce e-Service (EEE), Taipei, Taiwan, Mar. 2004, pp. 394–404.