Tr 00101

Page 1

IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017

Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

An ATM Multi-Protocol Emulation Network Dimple Aradhya.K.M1, Akshatha.H.R2, Lakshmi Narasamma N3, Jethi Kumari.B4, Mrs. Pragathi M Kaliwal5 (Guide) VTU University1, 2, 3, 4, 5 Abstract -- The project sets sight on authenticating the conventional Credit card transaction system. In the prevailing system though the Credit card paves a convenient mode of transactions, it is subjected to more jeopardy. As technology extends its limit, the way of hacking and cracking also goes along the road. In out proposed system, in every transaction with the Credit card a handshaking signal is achieved with the cardholder. The handshaking method is achieved by transferring the transaction time and the purchase details to the mobile of the cardholder by means of a GSM modem. From the acknowledgement and authentication received from the cardholder’s mobile further transaction proceeds. The system used the MCU for the security issues between the Mobile and the Card. Reports can also be generated for every successful authentication. The cardholder will be asked for a reply by the GSM modem message. The message from the cardholder is the major authentication command. The MCU decodes the message and decides the operation to be performed. The status of the system for each individual process will be displayed using LCD s and LED s.

IDL - International Digital Library

If your card is lost you need not have to worry until you get the replacement of the card which will minimum take 1 month. Until then it is difficult to survive without atm card. So we have got a new concept of universal card. If you have lost your card. There is a universal card given to the security guard of the atm. People who have lost the card can use this card. After swiping the universal card it will ask for the account number. On providing that it will generate a random unique code and sms the same to the account holder. He has to share to the person who is using his card. The unique code keeps on changing on every swipe and the new secret code is always sent by sms to the account holder. By this way we can have a secure mode of atmtranscaction .even though the card is lost. INTRODUCTION An automated teller machine or automatic teller machine (ATM) is a computerized telecommunications device that provides a financial institution's customers a secure method of performing financial transactions in a public space without the need for a human clerk or bank teller.

1|P a ge

Copyright@IDL-2017


IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017

Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances. Many ATMs also allow people to deposit cash or checks, transfer money between their bank accounts, pay bills, or purchase goods and services. On most modern ATMs, the customer identifies him or herself by inserting a plastic card with a magnetic stripe or a plastic smart card with a chip,that contains his or her card number and some security information, such as an expiration date.The customer then verifies their identity by entering a passcode, often referred to as a PIN (Personal Identification Number) of four or more digits. Upon successful entry of the PIN, the customer may perform a transaction. After the transaction is complete, a transaction record is printed, usually consisting of the action taken, date and time, location, any applicable fees, and available balance. If the number is entered incorrectly several times in a row (usually three attempts per card insertion), some ATMs will attempt to retain the card as a security precaution to prevent an unauthorized user from discovering the PIN by guesswork. Captured cards are often destroyed if the ATM owner is not the card issuing bank, as non-customer's identities cannot be reliably confirmed. In some cases, a transaction may be performed at the ATM that allows the customer's PIN to be changed securely.The cardholder will be asked for a reply by the GSM modem message. The message from the cardholder is the major IDL - International Digital Library

authentication command. The MCU decodes the message and decides the operation to be performed. The status of the system for each individual process will be displayed using LCD s and LED s. II. RELATED WORK In recent years, security has been more and more significant in network environment with the emergence of the internetworking technology. The internetworking technology can provide the communication channels across networks so that machines in different networks can talk to each other. However, the internetworking communication will be exposed to all kinds of attacks in such an open environment. Most of the network technologies, without integrating with security mechanism originally, have to be redesigned to provide some security services. ATM is one of those technologies. ATM stands for Asynchronous Transfer Mode. Originally, it is a transfer mode to implement the B-ISDN(Broadband Integrated Services Digital Network) technology so that all forms of data traffic(voice, video, data etc.) can be transferred over telecommunication networks. But ATM is not restricted to BISDN. It has been used to provide a simplified network infrastructure for various network connections, e.g. LAN, MAN or WAN. ATM is a connection-oriented technique. In ATM, hosts are connected by a network of switches. When two parties want to talk, they request a Virtual Channel from the switch network first. Then the two parties can send data to each other. Although the communication parties can send data in 2|P a ge

Copyright@IDL-2017


IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017

Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

any size, ATM always delivers data in a fixed size unit, which is called a cell. A cell has 5 octet header and 48 octet payload. Cell switching will base on the 5 octet header. In the way, a cell can go through a switch very quickly. To meet different requirements of specific traffic, ATM also introduces the concept of Quality of Service(QoS). Details about ATM technology can be found in any ATM textbooks. And the most recent advances in this area can be found in discussions and contributions of ATM Forum, which is the standards organization for ATM. In fact, issues in ATM security have not gained enough attention until 1995, when a group within ATM Forum was established to address the security issues. Therefore, compared with other security area, ATM security is still in its beginning. In this paper, we first examine the threats to ATM networks. And then we discuss the requirements of ATM security. In section 4 we are going to discuss the implementation issues of ATM security. Phase I ATM Security Specification has been discussed in this section. In conclusion, we discuss some examples of the ATM security products. III. PROPOSED METHODOLOGY The proposed system is an enhancement of the existing system, and, it is built upon the existing card and PIN based system. The proposed system is in two different modes; the first will improve the security of the ATM by applying second level authentication on the existing ATM process for withdrawal, after entry of correct a PIN, while the second will apply second level authentication in a scenario where a IDL - International Digital Library

customer-specified attained.

withdrawal

limit

is

Depicts an instance of withdrawal on the AT for the proposed system which is an enhancement of the existing system. The entry of a correct PIN is inadequate to authenticate to the bank system. This is because an additional level has been incorporated for the authentication process which requires the customer to enter a valid code which will be sent to the customer’s pre-registered mobile device via SMS gateway. If a correct code is supplied the customer gets authenticated and is granted access for withdrawal. However, if an incorrect code is supplied even after the entry of a correct PIN, the authentication process fails and the customer is denied access for withdrawal. An instance of withdrawal on the ATM. This mode gives the customer the opportunity to choose the second level authentication process as an additional level of authentication for withdrawal in order to guarantee the security of the account owner. With this mode, a customer- specified withdrawal limit must be attained before the system prompts for entry of a valid code. If a valid code is supplied, the authentication process is complete and the customer is granted access for withdrawal. On the other hand, if an invalid code is supplied, the authentication process fails and the customer is denied access for withdrawal. It is imperative to note that if a customerspecified withdrawal limit is not in place, the entry of a valid PIN will be sufficient to authenticate the customer to the system and thereafter grant access for withdrawal. This implies that the second level authentication

3|P a ge

Copyright@IDL-2017


IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017

Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

process would not be applied in such instances. IV. CONCLUSION This paper presents a novel architecture – M-cash withdrawal- that can be used as a means of interaction between mobile phone/devices, an ATM machine and a Banking application for the purpose of withdrawing cash. The design of the proposed secure M-cash withdrawal allows the use of mobile phones as a tool of interaction and provides flexibility through robust identity management architecture. The first part of the architecture is in the process of being implemented and all the process involved has been analyzed and justified where possible. As part of our future work, we will be providing in-depth analyses of the design and protocols to be used for the purpose of withdrawing cash. The Secure M-cash has examined the possibility of making use of similar approaches/techniques (RFID and NFC) for other applications and already there are some applications that have adapted this strategy. The Secure M-Cash Withdrawal architecture has been defined, it will form as a foundation for future work within this area, which includes, protocols design, and implementing a PC based simulation of the architecture and implementing the system. Banks provide security and convenience for managing your money and sometimes allow you to make money by earning interest. Convenience and fees are two of the most important things to consider when choosing a bank.Writing and depositing checks are perhaps the most fundamental ways to move money in and

IDL - International Digital Library

out of a checking account, but advancements in technology have added ATM and debit card transactions, ACH transfers, online bill pay and mobile transfers to the mix.All banks have rules about how long it takes to access your deposits, how many debit card transactions you're allowed in a day, and how much cash you can withdraw from an ATM. Access to the balance in your checking account can also be limited by businesses such as gas stations and hotels that place holds on your funds when you pay with a debit card. Debit cards provide easy access to the cash in your account, but can cause you to rack up fees if you overdraw your account or visit out-of-network ATMs.While debit cards encourage more responsible spending than credit cards, they do not offer the same protection or perks.Regularly balancing your checkbook or developing another method to stay on top of your account balance is essential to successfully managing your checking account and avoiding fees, declined transactions and bounced payments. If you have more money than you need to manage your day-to-day expenses, banks offer a variety of options for saving, including money market accounts, CDs, high-interest online savings accounts and basic savings accounts.To protect your money from electronic theft, identity theft and other forms of fraud, it's important to implement basic precautions such as shredding account statements, having complex passwords, safeguarding your PIN and only conducting online and mobile banking through secure internet connections.

4|P a ge

Copyright@IDL-2017


IDL - International Digital Library Of Technology & Research Volume 1, Issue 6, June 2017

Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

REFERENCES

Journal of Scientific Publications, 2(5), 2012.

and

Research

1] AbdullahiArabo, "Secure Cash Withdrawal through Mobile Phone/Device ", in Proceedings of the International Conference on Computer and Communication Engineering, 2008, 818822.

[8] Sagar Acharya, ApoorvaPolawar, P.Y.Pawar, "Two Factor Authentication Using Smartphone Generated One Time Password", IOSR Journal of Computer Engineering, 11 (2) (2013), 85-90.

[2] Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu, "A strong user authentication scheme with smart cards for wireless communications", Computer Communications 34, 2011, 367-374.

[9] SagarGajbhar, ShrikantAher, Swapnil Auti, Shailesh Hodge, "Authentication using Mobile phone generated OTP", International Journal of Computer Science and Management Research 2(5) (2013).

[3] Francesco Buccafurri, Gianluca Lax, "Implementing disposable credit card numbers by mobile phones", in Springer Science+Business Media, LLC 2011. [4] Kuo-Hui Yeh, Chunhua Su, N.W. Lo, Yingjiu Li, Yi-Xiang Hung, "Two robust remote user authentication protocols using smart cards", in The Journal of Systems and Software, 2010, 2556-2565. [5] Manoj Kumar, "An Enhanced Remote User Authentication Scheme with Smart Card", International Journal of Network Security, 10(3) (2010), 175-184. [6] Mohamed HamdyEldefrawy, Khaled Alghathbar, Muhammad Khurram Khan, "OTP-Based Two- Factor Authentication Using Mobile Phones", in 2011 Eighth International Conference on Information Technology: New Generations, 2011, 327331. [7] Ms. Trupti Hemant Gurav, Ms. Manisha Dhage, "Remote client Authentiction using mobile phone generated OTP", International

IDL - International Digital Library

5|P a ge

Copyright@IDL-2017


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.