You are on page 1of 5

IDL - International Digital Library Of

Technology & Research


Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

An ATM Multi-Protocol Emulation Network


Dimple Aradhya.K.M1, Akshatha.H.R2, Lakshmi Narasamma N3, Jethi Kumari.B4,
Mrs. Pragathi M Kaliwal5 (Guide)
VTU University1, 2, 3, 4, 5

Abstract -- The project sets sight on If your card is lost you need not have
authenticating the conventional Credit card to worry until you get the replacement of
transaction system. In the prevailing system the card which will minimum take 1
though the Credit card paves a convenient month. Until then it is difficult to survive
mode of transactions, it is subjected to more without atm card. So we have got a new
jeopardy. As technology extends its limit, concept of universal card. If you have lost
the way of hacking and cracking also goes your card. There is a universal card given
along the road. In out proposed system, in to the security guard of the atm. People
every transaction with the Credit card a who have lost the card can use this card.
handshaking signal is achieved with the After swiping the universal card it will
cardholder. The handshaking method is ask for the account number. On providing
achieved by transferring the transaction time that it will generate a random unique
and the purchase details to the mobile of the code and sms the same to the account
cardholder by means of a GSM modem. holder. He has to share to the person who
From the acknowledgement and is using his card. The unique code keeps
authentication received from the on changing on every swipe and the new
cardholders mobile further transaction secret code is always sent by sms to the
proceeds. The system used the MCU for the account holder. By this way we can have
security issues between the Mobile and the a secure mode of atmtranscaction .even
Card. Reports can also be generated for though the card is lost.
every successful authentication.
INTRODUCTION
The cardholder will be asked for a
reply by the GSM modem message. The An automated teller machine or automatic
message from the cardholder is the major teller machine (ATM) is a computerized
authentication command. The MCU decodes telecommunications device that provides
the message and decides the operation to be a financial institution's customers a secure
performed. The status of the system for each method of performing financial
individual process will be displayed using transactions in a public space without the
LCD s and LED s. need for a human clerk or bank teller.

IDL - International Digital Library 1|P a ge Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


Using an ATM, customers can authentication command. The MCU decodes
access their bank accounts in order to the message and decides the operation to be
make cash withdrawals (or credit card performed. The status of the system for each
cash advances) and check their account individual process will be displayed using
balances. Many ATMs also allow people LCD s and LED s.
to deposit cash or checks, transfer money
between their bank accounts, pay bills, or II. RELATED WORK
purchase goods and services. On most
modern ATMs, the customer identifies In recent years, security has been
him or herself by inserting a plastic card more and more significant in network
with a magnetic stripe or a plastic smart environment with the emergence of the
card with a chip,that contains his or her internetworking technology. The
card number and some security internetworking technology can provide the
information, such as an expiration communication channels across networks so
date.The customer then verifies their that machines in different networks can talk
identity by entering a passcode, often to each other. However, the internetworking
referred to as a PIN (Personal communication will be exposed to all kinds
Identification Number) of four or more of attacks in such an open environment.
digits. Upon successful entry of the PIN, Most of the network technologies, without
the customer may perform a transaction. integrating with security mechanism
After the transaction is complete, a originally, have to be redesigned to provide
transaction record is printed, usually some security services. ATM is one of those
consisting of the action taken, date and technologies.
time, location, any applicable fees, and
available balance. ATM stands for Asynchronous
Transfer Mode. Originally, it is a transfer
If the number is entered mode to implement the B-ISDN(Broadband
incorrectly several times in a row (usually Integrated Services Digital Network)
three attempts per card insertion), some technology so that all forms of data
ATMs will attempt to retain the card as a traffic(voice, video, data etc.) can be
security precaution to prevent an transferred over telecommunication
unauthorized user from discovering the networks. But ATM is not restricted to B-
PIN by guesswork. Captured cards are ISDN. It has been used to provide a
often destroyed if the ATM owner is not simplified network infrastructure for various
the card issuing bank, as non-customer's network connections, e.g. LAN, MAN or
identities cannot be reliably confirmed. In WAN. ATM is a connection-oriented
some cases, a transaction may be technique. In ATM, hosts are connected by a
performed at the ATM that allows the network of switches. When two parties want
customer's PIN to be changed to talk, they request a Virtual Channel from
securely.The cardholder will be asked for a the switch network first. Then the two
reply by the GSM modem message. The parties can send data to each other. Although
message from the cardholder is the major the communication parties can send data in

IDL - International Digital Library 2|P a ge Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


any size, ATM always delivers data in a customer-specified withdrawal limit is
fixed size unit, which is called a cell. A cell attained.
has 5 octet header and 48 octet payload. Cell
switching will base on the 5 octet header. In Depicts an instance of withdrawal on
the way, a cell can go through a switch very the AT for the proposed system which is an
quickly. To meet different requirements of enhancement of the existing system. The
specific traffic, ATM also introduces the entry of a correct PIN is inadequate to
concept of Quality of Service(QoS). Details authenticate to the bank system. This is
about ATM technology can be found in any because an additional level has been
ATM textbooks. And the most recent incorporated for the authentication process
advances in this area can be found in which requires the customer to enter a valid
discussions and contributions of ATM code which will be sent to the customers
Forum, which is the standards organization pre-registered mobile device via SMS
for ATM. gateway. If a correct code is supplied the
customer gets authenticated and is granted
In fact, issues in ATM security have access for withdrawal. However, if an
not gained enough attention until 1995, incorrect code is supplied even after the
when a group within ATM Forum was entry of a correct PIN, the authentication
established to address the security issues. process fails and the customer is denied
Therefore, compared with other security access for withdrawal.
area, ATM security is still in its beginning.
In this paper, we first examine the threats to An instance of withdrawal on the
ATM networks. And then we discuss the ATM. This mode gives the customer the
requirements of ATM security. In section 4 opportunity to choose the second level
we are going to discuss the implementation authentication process as an additional level
issues of ATM security. Phase I ATM of authentication for withdrawal in order to
Security Specification has been discussed in guarantee the security of the account owner.
this section. In conclusion, we discuss some With this mode, a customer- specified
examples of the ATM security products. withdrawal limit must be attained before the
system prompts for entry of a valid code. If
III. PROPOSED METHODOLOGY a valid code is supplied, the authentication
process is complete and the customer is
The proposed system is an granted access for withdrawal. On the other
enhancement of the existing system, and, it hand, if an invalid code is supplied, the
is built upon the existing card and PIN - authentication process fails and the customer
based system. The proposed system is in two is denied access for withdrawal. It is
different modes; the first will improve the imperative to note that if a customer-
security of the ATM by applying second specified withdrawal limit is not in place,
level authentication on the existing ATM the entry of a valid PIN will be sufficient to
process for withdrawal, after entry of correct authenticate the customer to the system and
a PIN, while the second will apply second thereafter grant access for withdrawal. This
level authentication in a scenario where a implies that the second level authentication

IDL - International Digital Library 3|P a ge Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


process would not be applied in such out of a checking account, but advancements
instances. in technology have added ATM and debit
card transactions, ACH transfers, online bill
IV. CONCLUSION pay and mobile transfers to the mix.All
banks have rules about how long it takes to
This paper presents a novel access your deposits, how many debit card
architecture M-cash withdrawal- that can transactions you're allowed in a day, and
be used as a means of interaction between how much cash you can withdraw from an
mobile phone/devices, an ATM machine and ATM. Access to the balance in your
a Banking application for the purpose of checking account can also be limited by
withdrawing cash. The design of the businesses such as gas stations and hotels
proposed secure M-cash withdrawal allows that place holds on your funds when you pay
the use of mobile phones as a tool of with a debit card.
interaction and provides flexibility through
robust identity management architecture. Debit cards provide easy access to
The first part of the architecture is in the the cash in your account, but can cause you
process of being implemented and all the to rack up fees if you overdraw your account
process involved has been analyzed and or visit out-of-network ATMs.While debit
justified where possible. As part of our cards encourage more responsible spending
future work, we will be providing in-depth than credit cards, they do not offer the same
analyses of the design and protocols to be protection or perks.Regularly balancing your
used for the purpose of withdrawing cash. checkbook or developing another method to
The Secure M-cash has examined the stay on top of your account balance is
possibility of making use of similar essential to successfully managing your
approaches/techniques (RFID and NFC) for checking account and avoiding fees,
other applications and already there are declined transactions and bounced
some applications that have adapted this payments.
strategy. The Secure M-Cash Withdrawal
architecture has been defined, it will form as If you have more money than you
a foundation for future work within this need to manage your day-to-day expenses,
area, which includes, protocols design, and banks offer a variety of options for saving,
implementing a PC based simulation of the including money market accounts, CDs,
architecture and implementing the system. high-interest online savings accounts and
basic savings accounts.To protect your
Banks provide security and money from electronic theft, identity theft
convenience for managing your money and and other forms of fraud, it's important to
sometimes allow you to make money by implement basic precautions such as
earning interest. Convenience and fees are shredding account statements, having
two of the most important things to consider complex passwords, safeguarding your PIN
when choosing a bank.Writing and and only conducting online and mobile
depositing checks are perhaps the most banking through secure internet connections.
fundamental ways to move money in and

IDL - International Digital Library 4|P a ge Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


REFERENCES Journal of Scientific and Research
Publications, 2(5), 2012.
1] AbdullahiArabo, "Secure Cash
Withdrawal through Mobile Phone/Device ", [8] Sagar Acharya, ApoorvaPolawar,
in Proceedings of the International P.Y.Pawar, "Two Factor Authentication
Conference on Computer and Using Smartphone Generated One Time
Communication Engineering, 2008, 818- Password", IOSR Journal of Computer
822. Engineering, 11 (2) (2013), 85-90.

[2] Daojing He, Maode Ma, Yan Zhang, [9] SagarGajbhar, ShrikantAher, Swapnil
Chun Chen, Jiajun Bu, "A strong user Auti, Shailesh Hodge, "Authentication using
authentication scheme with smart cards for Mobile phone generated OTP", International
wireless communications", Computer Journal of Computer Science and
Communications 34, 2011, 367-374. Management Research 2(5) (2013).

[3] Francesco Buccafurri, Gianluca Lax,


"Implementing disposable credit card
numbers by mobile phones", in Springer
Science+Business Media, LLC 2011.

[4] Kuo-Hui Yeh, Chunhua Su, N.W. Lo,


Yingjiu Li, Yi-Xiang Hung, "Two robust
remote user authentication protocols using
smart cards", in The Journal of Systems and
Software, 2010, 2556-2565.

[5] Manoj Kumar, "An Enhanced Remote


User Authentication Scheme with Smart
Card", International Journal of Network
Security, 10(3) (2010), 175-184.

[6] Mohamed HamdyEldefrawy, Khaled


Alghathbar, Muhammad Khurram Khan,
"OTP-Based Two- Factor Authentication
Using Mobile Phones", in 2011 Eighth
International Conference on Information
Technology: New Generations, 2011, 327-
331.

[7] Ms. Trupti Hemant Gurav, Ms. Manisha


Dhage, "Remote client Authentiction using
mobile phone generated OTP", International

IDL - International Digital Library 5|P a ge Copyright@IDL-2017

You might also like