A Prototype Model to Improve the Security System of an ATM



Similar documents
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Intelligent Home Automation and Security System

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone

RFID Based Real Time Password Authentication System for ATM

DEVELOPMENT OF INDIVIDUAL HOME SECURITY SYSTEM USING CAN AND ZIGBEE PROTOCOL

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY

International Journal of Engineering Research & Management Technology

A Surveillance Robot with Climbing Capabilities for Home Security

Design of Wireless Home automation and security system using PIC Microcontroller

Development of Low Cost Private Office Access Control System(OACS)

The Design and Construction of an Intelligent Taxi Electronic Payment System Solution

TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Protected Cash Withdrawal in Atm Using Mobile Phone

AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant

RFID based Bill Generation and Payment through Mobile

Study on Differential Protection of Transmission Line Using Wireless Communication

Access Control Using Smartcard And Passcode

Automobile Speed Violation Detection System using RFID and GSM Technologies

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM

Wireless power meter monitoring with power theft detection and intimation system using GSM and Zigbee networks

Home Security System Using Gsm Modem

ANDROID BASED SECURITY AND HOME AUTOMATION SYSTEM

Raghavendra Reddy D 1, G Kumara Swamy 2

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

RFID Based Centralized Patient Monitoring System and Tracking (RPMST)

Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology

Automated Security System using ZigBee

EMBEDDED GSM MONITOR AND CONTROL USING ANDROID APPLICATION

Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System

Modern Multipurpose Security Management System

A Multilevel Home Security System (MHSS)

How To Track A Vehicle With A Smart Vehicle Tracking System

A Review of Security System for Smart Home Applications

OVER SPEED VIOLATION MANAGEMENT OF A VEHICLE THROUGH ZIGBEE

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Collided Vehicle Position Detection using GPS & Reporting System through GSM

AUTOMATIC BUS INFORMATION AND TICKETING USING PIC MICROCONTROLLER

Embedded Security System using RFID & GSM

DESIGN OF SMS ENABLED CAR SECURITY SYSTEM

ENERGY EFFICIENT WIRELESS CLASSROOM AND BUS MONITORING SYSTEM

Chapter 5 Understanding Input. Discovering Computers Your Interactive Guide to the Digital World

A REMOTE MONITORING SYSTEM FOR A THREE-PHASE 10-KVA SWITCHABLE DISTRIBUTION TRANSFORMER USING ZIGBEE WIRELESS NETWORK

Advanced Car Parking System with GSM Supported Slot Messenger

Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework

Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller

Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN

ISSN: (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

Radio Frequency Identification (RFID)

Development of an Internet based Embedded System for Smart House Controlling and Monitoring

AN EMBEDDED REAL TIME FINGER VEIN RECOGNITION SYSTEM FOR ATM SECURITY

Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms

ADVANCED EMBEDDED SYSTEM ASSISTED GSM AND RFID BASED SMART SCHOOL MANAGEMENT SYSTEM

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES

LibRFID: Automation Software for Library Management System Using RFID Technology

Tk20 Network Infrastructure

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

GPS based Automated Public Transport Fare Collection Systems Based on Distance Travelled by Passenger Using Smart Card

Intelligent Fleet Management System Using Active RFID

Security & Chip Card ICs SLE 44R35S / Mifare

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

Android based Secured Vehicle Key Finder System

DEVELOPMENT OF HOME SECURITY SYSTEM USING GSM MODULE

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Design and Implementation of an Accidental Fall Detection System for Elderly

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.

Design and Development of Suraksha -A Women Safety Device

FPGA Based Home Security System

International Journal of Computer Engineering Science (IJCES)

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES

GSM Based Electrical Control System for Smart Home Application

Design,DevelopmentandPerformanceStudyofL-HomeSecuritySystem

W.A.R.N. Passive Biometric ID Card Solution

Human Detection Robot using PIR Sensors

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

TX GSM SMS Auto-dial Alarm System. Installation and User Manual

ATM Transaction Security Using Fingerprint/OTP

Futuristic Cart For Shopping With Product Inventory Management System

Computerized RTBS System

Review of RFID & GSM Based Automatic Ration Distribution System

3. Identification of water pumps through RFID technology. 4. Wireless control of remote water pump using RF technology.

ENERGY HARVESTED ELECTRONIC SHELF LABEL

Development of Industrial Intrusion Detection and Monitoring Using Internet of Things P. Gokul Sai Sreeram 1, Chandra Mohan Reddy Sivappagari 2

Wireless Security Camera

Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module

RFID SECURITY. February The Government of the Hong Kong Special Administrative Region

Choosing and Using a Checking Account

A Foolproof Biometric Attendance Management System

RFID, GPS & GSM Based Vehicle Tracing & Employee Security System

DC-8706K Auto Dial Alarm System

Transcription:

pp. 1039-1044 A Prototype Model to Improve the Security System of an ATM S. Ganesh kumaran Assistant Professor, Arunai Engineering College, Tiruvannamalai, Tamil Nadu, India. ganeshphd4u@gmail.com Dr. S. Singaravelu Professor, Department of EEE Annamalai University, Annamalai Nagar, Tamil Nadu, India. C. Priya PG Scholar, Arunai Engineering College, Tiruvannamalai, Tamil Nadu, India Dr.T.S.Sivakumaran Profesor&Dean PG Studies, Arunai College of Engineering, Tiruvannamalai, Tamil Nadu, India Abstract An automated or automatic teller machine (ATM), also known as the automated banking machine, is a computerized telecommunicating device. In this busy world people run out of cash with the only hope of finding an ATM machine. People known about the ATM working condition in our place without going to ATM. So GSM (Global System for Mobile Communication) is interfaced with the ATM network that can be sends all information to user s mobile. Problems like out of order ; out of cash ; network jam can be well versed before stepping into ATM. It also comes with a strip of LED Light which alerts people few meters ahead, about the working condition of the ATM machine. So that next time it is not needed to waste time in stepping in, inserting our card and pin in an ATM machine which is out of order, or out of cash. In addition we must prevent the misuse of the ATM enters by the strangers while someone is using it. So we propose the idea of using the counter circuit and metal detectors at the doors to detect the weapons (knife, gun, etc) carried by the strangers and we suggest that the number of persons entering the ATM should be limited to ONE at a time. Index Terms GSM, Door sensors, Metal Detectors, Biometric System, Password, power saving, Secure ATM, Smart ATM. I. INTRODUCTION A. Evolution of ATM Machine Y. Wang et al said that the first modern ATMs came into use in December 1972 in the UK; the IBM 2984 was designed at the request of Lloyds Bank. The 2984 CIT (Cash Issuing Terminal) was the first true Cash point, similar in function to today's machines; Cash point is still a registered trademark of Lloyds TSB in the UK. All were online and issued a variable amount which was immediately deducted from the account. A small number of 2984s were supplied to a US bank.[1] A couple of well-known historical models of ATMs include the IBM 3624 and 473x series, Diebold 10xx and TABS 9000 series, NCR 1780 and earlier NCR 770 series. B. Problems in ATM Centers ATM networks are vulnerable to many kinds of attacks and very often the possibilities are underestimated. Now-a-days the problem on using ATM center is being drastically increased due to the strangers. Due the modernization of the INDIAN culture the number of persons using the ATM for the withdrawal of money and exchange of cashes is being increased. Most of the companies pay salaries to the employees through the banking. So the security level of the ATM centers is to be improved.[5] C. Advantages and Disadvantages of the Existing Model The current model of the ATM has been very successful and is been under technological advancement time by time. It uses advanced traffic management, and network architecture for more user friendly environment on consumer and application sides. But minor problems like network jamming, out of cash, out of order, and other fundamental synopsis of problems are unavoidable. D. Identification of the Problem First problem in older ATM centre has less security. [8] Unauthorized person access the account very easily, avoid that access biometric authentication are used. But the user after withdraw the amount, criminals enter the ATM attack the user and take the money. Now-a-days most of the companies pay salary to the employee through banking.[6] So the security level of the ATM centre is to be improved.[7] Another problem is wasting the time with not working ATM. User s enter the ATM centre insert the card and PIN then only know ATM is out of order, out of cash, printer not working problem. So the user s waste is time in his busy world and traffic jam is happened infront of ATM centre. II. OBJECTIVES The work was mostly designed by us through an original idea which is not used elsewhere, so we use less number of reference paper for our proposed work. This project is proposed to interface the ATM machine with a wireless GSM which displays all the information about the problems. When user call that unique number which is assigned to a GSM phone that sends all information about the ATM to user phone such as ATM out of order, ATM working, out of balance, printer not working and also distance information. In this method ATM server s connected in centralized server. It feeds the information about ATM machine working condition and also distance information. Assign GSM number to centralized server. This server collect the nearer ATM information and give the first preference to own bank ATM. GSM sends first own bank ATM information, it is not working condition and

then send nearest ATM information in a single SMS. This method is used to avoid user come to an ATM in his busy time It consists of using the metal detectors at the doors to detect the harmful weapons and also we suggest that number of persons entering the ATM must be limited by one. This can make the transaction safer. When number of persons is greater than one i.e (IF N>1) then the keyboard and the monitor will be made inactive or if a stranger is carrying the weapon to attack the person using the ATM to get money from him/her we need help. But it is not possible to get help instantly so we fix a metal detector at the door which makes the monitor inactive and capture that person, that image is send to nearby police station by using front camera which is fixed in the entrance of the door itself. A. Modeling the Solution for Identified Problem In this project we use a Transmitting circuit for collecting information from the ATM network, for collecting the required data sources as an input for the external display unit (Receiving Unit). This Transmitting unit has to be interfaced with the ATM machine. As so it is complicated to work with an ATM machine, we use a microcontroller primarily for sending the input signals instead of an ATM machine. This prototype may help in briefing our idea more clearly, considering all the advantages and disadvantages of the project, including all the hardware modules and the programming codes. TABLE I. OUR PROPOSED IDEA FOR IMPLEMENTATION FOR DIFFERENT CONDITIONS Sl no Condition Actions to be Followed 1 More than one person or no person in ATM (if N>1 and N= 0) N- No. of Persons inside the ATM 2 Metal Detector 3 If the person not having knowledge about ATM Then, ATM monitor and Keyboard will be Inactive To scan the weapons (knife, gun, etc) carried by the strangers if found ATM monitor and Keyboard will be Inactive We gave authority to the security person only. He can access the ATM by using Bio-Metric system III. METHODOLOGY A. Actions to Be Followed If N>1 and N=0 The idea behind is allowing only one person at a time inside an ATM centre which having a single currency dispensing machine is not only to ensure the customer s privacy but also his card s security. Still, it is common to see people standing behind customers withdrawing cash from the machine at many centers. so as to avoid this type of situation we implement a idea called Switching Both the ATM display and Keyboard to be inactive by using program. B. Metal Detector Metal detectors based on pulse induction (PI) can be used here. Typical PI systems use a coil of wire on one side of the arch as the transmitter and receiver. This technology sends powerful, short bursts (pulses) of current through the coil of wire. Each pulse generates a brief magnetic field. When the pulse ends, the magnetic field reverses polarity and collapses very suddenly, resulting in a sharp electrical spike. This spike lasts a few microseconds (millionths of a second) and causes another current to run through the coil. This subsequent current is called the reflected pulse and lasts only about 30 microseconds. Another pulse is then sent and the process repeats. A typical PI-based metal detector sends about 100 pulses per second, but the number can vary greatly based on the manufacturer and model, ranging from about 25 pulses per second to over 1,000. If a metal object passes through the metal detector, the pulse creates an opposite magnetic field in the object. When the pulse's magnetic field collapses, causing the reflected pulse, the magnetic field of the object makes it take longer for the reflected pulse to completely disappear. This process works something like echoes: If you yell in a room with only a few hard surfaces, you probably hear only a very brief echo, or you may not hear one at all. But if you yell into a room with a lot of hard surfaces, the echo lasts longer. In a PI metal detector, the magnetic fields from target objects add their "echo" to the reflected pulse, making it last a fraction longer than it would without them. A sampling circuit in the metal detector is set to monitor the length of the reflected pulse. By comparing it to the expected length, the circuit can determine if another magnetic field has caused the reflected pulse to take longer to decay. If the decay of the reflected pulse takes more than a few microseconds longer than normal, there is probably a metal object interfering with it. If we caught the person by sensing we made ATM display and Keyboard to be inactive by using Programming code and capture the person using entrance camera and they send to nearby police station. 4 If User Hijacked by the strangers, Use of Two Password option. 1. One For Transaction Purpose only 2. Another For creating abnormal account to withdraw minimum amount from the ATM to avoid attention of the Stranger 1040

Fig. 1. Block diagram showing the interfacing of door and monitor The interfacing process is carried out with the circuit shown above. It consists of the metal detector fixed with the door which is being interfaced with the computer monitor and the keyboard. C. Use of Bio-Metric System In addition to all these securities we can use the bio- metric sensor in addition to the metal detector circuit to increase the safety level in the ATM.[2] [11] If user is not well educated or not aware about ATM means at that time, We gave authority to the security person only to help the customer.[3] His Bio- Metric is fed by a bank Authority.[4] [9] [10] that time the keyboard, monitor, and one light will be on. It is also for the power saving purpose and security. E. Two Password System Till now our government providing Single password for transaction, we had an alternate idea, by issuing two password for two different purpose. One For Transaction Purpose only and another password is used in emergency time. For example user is hijacked by the stranger and asked to take money from the ATM, here in this situation user as to use second password, after entering the password money 5000 in original account transferred to second abnormal account in M>5000 condition(m-money in user account). In this second upto 24 hours these account should be access for security. After 24 hours using the abnormal (second) password again transferred 5000 to abnormal account only emergency time. Suppose user have less than 5000 that time access original account in M<5000 condition. Otherwise we use first password for normal transaction. It is implemented in ATM security is much improved.[12] IV. BLOCK DIAGRAM Fig. 2. Use of bio-metric system D. Door Sensor A sensor is attached to the door to count the number of persons entering the ATM at a time. If the number of persons entering the ATM is more than one the monitor and keyboard become inactive and lights will be off. When card inserted into ATM machine the door will be automatically closed and finishing all his transaction the door automatically opens. Uneducated person will get help from the security. Security enters into the ATM by using biometric fingerprint that time only two persons allowed. Otherwise only one person allowed in ATM centre that time the keyboard, monitor, and one light will be on. It is also for the power saving purpose and security. Transaction the door automatically opens. Uneducated person will get help from the security. Security enters into the ATM by using biometric fingerprint that time only two persons allowed. Otherwise only one person allowed in ATM centre Fig.3.Block diagram for ATM security system PIC act as ATM, it operates at 5v DC. IR sensor is used to allow one person at a time. When it allows more than one person the keypad and monitor is inactive. RFID reader reads the tag card(atm card) the door is automatically closed. For this purpose the DC motor rotates forward direction. When the transaction is completed the door is automatically open. For this purpose the DC motor rotates reverse direction. DC motor operates 12v but PIC operates 5v, so it is interfaced through relay driver. Relay driver provides external power supply. When metal sensor detects metals the keypad and monitor is inactive. Encoder encodes the information and to RF transmitter for future purpose. V. HARDWARE CIRCUIT DIAGRAM The hardware circuit diagram designed using proteus software. It is used to design and implement the circuit. Some 1041

hardware devices and IC chips are available in proteus software. Output also checked using this software. Fig.4. Circuit Diagram using Proteus feed the display unit.[14] It has 5 ports each act as bidirectional port. It has some following features: Operating speed:20mhz, 200ns instruction cycle Operating voltage:4.0-5.5volts Flash memory:14.3kb(8192 words) Self-reprogrammable under software control 33 Programmable I/O Lines 40-pin PDIP C. IR Sensor K. Hashimoto et al said that IR sensor is used to monitor the person entering and exiting the room.[13] It consists of emitter and receiver, emitter continuously passes the rays and receiver connected to controller. When the beam is cut that information send to IR receivers. Controller then accordingly comes to know if the person is entering or exiting and then accordingly increments or decrements the count. It normally operates 5v when beam is cut it operates 0v. VI. HARDWARE SETUP A. Hardware Needed To develop the user friendly ATM machine some of the hardware s needed are listed below: PIC 16F877A IR Sensor Metal Sensor RF Transmitter RFID Encoder DC Motor Fig.5. ATM Security System B. PIC 16F877A Controller M. Hamad et al said that it is the 64-bit Microcontroller with high performance RISC processor. Controllers are used to support the receiving and transmitting of information and to Fig.6. IR sensor D. Metal Sensor Metal sensor is used to detect metals in ATM centres. It normally operates 0v when detect metals it operates 5v. When it detect metals the ATM will be blocked. E. RF Transmitter RF stands for radio frequency. The transmitter/receiver pair operates at a frequency of 434 MHZ. An RF transmitter receives serial data and transmits it wirelessly through RF through its antenna connected at pin4. The transmission occurs at the rate of 1kbps- 10kbps. The transmitted data is received by an RF receiver operating at the same frequency as that of the transmitter. Transmitter transmits the ATM working condition message for future purpose. F. Encoder An encoder is a device used to change a signal (such as a bitstream) or data into a code. The code may serve any of a number of purposes such as compressing information for transmission or storage, encrypting or adding redundancies to the input code, or translating from one code to another. In digital electronics this would mean that a encoder is a multiple- 1042

input, multiple-output logic circuit(2n-n). HT12E encoder is used in hardware prototype module. It has 18 pins and operates at 2.4v-12v. It encodes the information and sends to RF transmitter using 4 data pins. Fig.8.Sensor result B. RFID Output When RFID reads ATM card the following outputs are obtained. Fig.7. Encoder and RF Transmitter G. RFID RFID stands for Radio Frequency Identification. Radiofrequency identification. RFID is used primarily for identification. A nearby reader unit transmits a high-power RF signal to power passive (unpowered) tags and then read the data stored in their memory. RFID tags are small, flat, and cheap and can be attached to anything that must be tracked or identified. They have replaced bar codes in some applications. RFID uses the 13.56-MHz ISM frequency. When RFID reads the ATM card or tag card at that time the door is automatically locking and transaction is completed the door is automatically open. For this purpose the DC Motor is used. When RFID reads the ATM card the motor rotates forward direction for door locking. After the transaction is completed motor rotates reverse direction for door unlocking. Normally DC Motor operates 12v but PIC operates 5v. So motor interfaced with controller through relay driver. Relay driver is used to provide external power supply. Fig.9. RFID results Fig.10. RFID results after read tag card VII. SOFTWARES REQUIRED MP LAB Compiler PIC Kit 3 Programmer MP LAB Compiler is used to write the Embedded C program. The PIC Kit 3 is microchip s newest official PIC programmer. It is used to download the program from system to controller memory. VIII. OUTPUT IMAGES A. Sensors Output When IR Sensor allow more than one person and metal detector detects metal at that time ATM will be locked. Fig.11.Normal password result 1043

Banking System, IEEE Conference, vol. 1, no. 5, pp. 197 203, 2011. [11] L. A. Mohammed, Use of biometrics to tackle ATM fraud, IEEE Journal, vol. 1, pp. 331 335, 2011. [12] N. Soni, ATM Security By Using Fingerprint Recognition 1, IEEE Conference, vol. 7, no. 11, 2012. [13] H. Lasisi,A.A. Ajisafe, Development of Stripe Biometric Based Fingerprint Authentications Systems in Automated Teller Machine, IEEE Conference, pp.72-175, 2012. [14] Yang Xiao, Chung-ChinLi, Ming Lei, S.V. Urbsky, Differential Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users from Password Theft,IEEE Journals, Vol-8, Issue-2, pp.406-416, 2014. Fig.12. Emergency password result IX. CONCLUSION Advantages of this Project are more secure and protect the privacy and confidential information. Time saving, user friendly. It can be easily interfaced with any ATM machine and can be upgraded for future progress. Helps people to avoid getting into a jammed ATM machine at times of busy schedule, or at traffic road junctions. It makes the use of the ATM in safe and secured way. Future scope of this project has over viewed the process of notifying the process and service of the ATM machine in advance to solve the present fundamental problems. People know about ATM working condition with help of GSM without going to ATM centre will be implemented in future. REFERENCES [1] K. Hashimoto, Human Environ. Res. Lab. Matsushita Electr. Ind. Co. Ltd. Osaka, K. Morinoko, N. Yoshiike,C. Kawaguchi, People count system using multisensing application,ieee Conference, Vol-2, pp.1291 1294, 16 JUNE 1997. [2] H. Lertold, V. Payer, R. Posch, A Hardware Independent Encryption Model for ATM Devices,IEEE Conference, pp.205-211, 1998. [3] H. Sako, T. Miyatake, Image Recognition Technologies towards Advanced Automated Teller Machine, IEEE Conference, Vol-3, pp.282-285, 2004. [4] M. Hamad, A. Kassem, C. Bechara, PIC Based Microcontroller Design Laboratory,IEEE Conference, pp.66-69, 2006. [5] Hendy, K. Xu, M. Welsman-dinelle, P. Viriyakattiyaporn, and S. Zoghbi, Next-Generation ATM, IEEE Conference, pp.1-5, 2007. [6] N.G. Richard Yew Fatt, Tay, Yong Haur, Kai Ming Mok, A Review of Iris Recognition Algorithms,IEEE Symposium, Vol-2, pp.1-7, 2008. [7] Y. Wang, Y. Zhang, P. C. Y. Sheu, X. Li, and H. Guo, The Formal Design Model of an Automatic Teller Machine (ATM), Int. J. Softw. Sci. Comput. Intell, IEEE Conference, vol. 2, no. 1, pp. 102 131, 2010. [8] Chang Soon Kim, Mun-Kyu Lee, Secure and User Friendly PIN Entry Method,IEEE Conference, pp.203-204, 2010. [9] U. Onwudebelu, O. Longe, S. Fasola, N.C. Obi, O.B. Alaba, Real time SMS based hashing scheme for securing financial transactions on ATM systems,ieee Conference, pp.1-6, 2010. [10] S. S. Das and S. J. Debbarma, Designing a Biometric Strategy ( Fingerprint ) Measure for Enhancing ATM Security in Indian E- BIOGRAPHY S.Ganesh kumaarn received Bachelor of Technology in Electrical and Electronics Engineering in 2008, Master of Engineering in Power System Engineering in 2011 from Annamalai University, Annamalainagar, Tamilnadu, India. He is currently pursing Ph.D degree in the Department of Electrical Engineering, Annamalai University. He is Assistant Professor in the Electrical Engineering department at Arunai Engineering College. His research interests are in Smart Grid, Power Systems, and wind/solar energy applications. S.Singaravelu received Bachelor of Engineering in Electrical and Electronics Engineering in 1990, Master of Engineering in Power System Engineering in 1992 and Ph.D in 2007 from Annamalai University, Annamalainagar, Tamilnadu, India. He is Professor in the Department of Electrical Engineering at Annamalai University. His research interests are in Smart Grid power electronics, power systems, electrical machines, wind/solar energy applications and high voltage DC transmission. C. Priya received Bachelor of Engineering in Electronics and communication Engineering in 2013, She is currently pursing Master of Engineering in Embedded system and technologies in the Department of Electrical and Electronics Engineering, Arunai Engineering College. Her research interests are in Wireless communication. Dr.T.S Sivakumaran is currently working as a Professor and Dean of PG Studies in the Department of Electrical Engineering at Arunai College of Engineering. He received his received Bachelor of Engineering in Electrical and Electronics Engineering in 1998, Master of Engineering in Power Electronics in 2003 and Ph.D in 2009 from Annamalai University,Annamalai nagar,tamilnadu, India. His research interests are in Smart Grid Power Electronics, Resonant Converter. 1044