ATM Transaction Security Using Fingerprint/OTP



Similar documents
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

An Embedded ATM Security Design using ARM Processor with Fingerprint recognition and GSM

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES

Framework for Biometric Enabled Unified Core Banking

Multimodal Biometric Recognition Security System

A Comparative Study on ATM Security with Multimodal Biometric System

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2

Protected Cash Withdrawal in Atm Using Mobile Phone

RFID Based Real Time Password Authentication System for ATM

TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS

Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner

ATM Transaction Using Biometric Fingerprint Technology Mr. Mahesh A. Patil Mr.Sachin P.Wanere Mr.Rupesh P.Maighane Mr.Aashay R.

Voice Authentication for ATM Security

Intelligent Home Automation and Security System

Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN

A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols

Design of Highly Secured Automatic Teller Machine System by Using Aadhaar Card and Fingerprint

How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone

Development of Academic Attendence Monitoring System Using Fingerprint Identification

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN

Integration of Sound Signature in 3D Password Authentication System

AN EMBEDDED REAL TIME FINGER VEIN RECOGNITION SYSTEM FOR ATM SECURITY

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Dynamic Query Updation for User Authentication in cloud Environment

Keywords: GPS, GSM, AVR Microcontroller, SMS.

An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach

Keywords: fingerprints, attendance, enrollment, authentication, identification

Accessing the bank account without card and password in ATM using biometric technology

True Identity solution

How To Improve Security Of An Atm

Raghavendra Reddy D 1, G Kumara Swamy 2

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

An Implementation of Secure Online Voting System

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS

ONLINE HEALTH MONITORING SYSTEM USING ZIGBEE

Design of Wireless Home automation and security system using PIC Microcontroller

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

EaSy: Efficient and Secure System for Utility Service Registration

solutions Biometrics integration

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology

Penetration Testing Biometric System

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

Smart Queue Management System Using GSM Technology

Security Issues in ATM Smart Card Technology

Enhanced Cloud Security through KFAC

Development of Customized Bank Software and Survey on Customized Design Phase Issues on BMS

WHITE PAPER. Let s do BI (Biometric Identification)

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan

SMS banking using Cell phone

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

May For other information please contact:

Artificial Neural Network and Location Coordinates based Security in Credit Cards

Application-Specific Biometric Templates

Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm

Trends in Finger Vein Authentication and Deployment in Europe

Use of biometrics to tackle ATM fraud

Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

DEVELOPMENT OF E-PUBLIC DISTRIBUTION SYSTEM (E-PDS) USING SMART CARD

Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642

Development of Low Cost Private Office Access Control System(OACS)

International Journal of Software and Web Sciences (IJSWS)

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

How To Build A Gps Vehicle Tracking System On Android App.Com

An Enhanced ATM Security System using Second-Level Authentication

Development of Attendance Management System using Biometrics.

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

- BIOMETRIC. Tel : Website : marketing@litestar.com.sg

An Intelligent Parking Guidance and Information System by using image processing technique

Design and Implementation of an Accidental Fall Detection System for Elderly

Multi-factor authentication

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Fig. 1 BAN Architecture III. ATMEL BOARD

Fingerprint Based Biometric Attendance System

NFC & Biometrics. Christophe Rosenberger

Microcontroller Based Low Cost Portable PC Mouse and Keyboard Tester

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Original Research Articles

How To Protect An Atm From Fraud

Android based Secured Vehicle Key Finder System

A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES

Face Reorganization Method for Cyber Security System in Financial Sector Using FPGA Implementation

Entrust IdentityGuard

Secured Employee Attendance Management System Using Fingerprint

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

Implementation of Knock Based Security System

ATM FRAUD AND COUNTER MEASURES

Multi-factor Authentication in Banking Sector

ARM 7 BASED MULTI LEVEL SECURITY FOR ATM ACCESS USING FINGER PRINT AND GSM TECHNOLOGY

Real Time Vehicle Theft Identity and Control System Based on ARM 9

W.A.R.N. Passive Biometric ID Card Solution

Intelligent Database Monitoring System using ARM9 with QR Code

Secure Data Exchange Solution

Transcription:

ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering & Technology Greater Noida, Uttar Pradesh- 201308, India Abstract- This paper deals with the solutions related to the ATM security. We are going to make use of fingerprint or One Time Password (OTP) verification along with the use of ATM pin. In this system, the user can have third party authentication either temporary or permanent. In the whole process, the first party i.e. the banker will maintain a database of the customer including fingerprint and mobile number. The banker will provide the ATM card along with its PIN. For the transaction after entering the ATM pin, the customer will be asked to choose an option either fingerprint or OTP verification. The OTP will be sent to the registered mobile number of the customer through GSM module connected to the system. After authorised verification, the customer will be able to proceed for transaction else after three successive wrong attempts, the ATM card will be blocked for 24 hours and a message will be sent to the registered mobile number. Keywords- ATM, OTP, fingerprint, ATM pin, mobile number, microcontroller. I. INTRODUCTION With the advent of modern technology, there is a drastic increase in fraud. One easy way is ATM fraud which includes fraudulent cash transactions so there is a need to regularly develop consumer favourable systems to deal with these frauds related to ATM transactions may be of several ways viz. Eavesdropping, Spoofing, Skimming Attack, Card Trapping, PIN Cracking, Phishing Attack, ATM Malware, ATM hacking [5],[6]. Several biometric authentication methods can be used to minimise such cases which includes fingerprints, face, iris before any transaction through ATM. Fig.1 Chart Representing Global Card Fraud One approach to deal with ATM frauds is face detection technology [1]. Here the transaction is allowed if and only if the face of the user is detectable. But it has a drawback that it does not authenticate the legal user of the ATM and instead it just asks for detectable face of suspects who tend to hide their face. Another approach is the iris recognition system. It has very high accuracy in verifying an individual s identity [2]. It works on four steps- image acquisition, segmentation, encoding and matching but work is still going on to make this technology feasible and cost effective. The third approach is Palm Vein Technology to run financial transactions. In this system, the user is required to provide his/her palm vein since these veins are unique for each individual. It is being practised in Japan. But it requires an overall update of database which is a tedious and costly process [3]. A better approach is a combination of fingerprint and One Time Password (OTP) authentication along with ATM pin. It is cost effective and user friendly method since all the required data is already available in the database of the banker [5],[7][8],[10]. In this system, the user is required to enter the ATM pin, after inserting the ATM card. Immediately after that the user will be asked to choose between two methods, either fingerprint or OTP. By selecting the fingerprint option the user will get two options- Admin mode and Transaction mode. The user may proceed with transaction mode to carry out financial transactions. In admin mode, user can add another authorised person by adding his/her fingerprint (only for transaction purpose). Also user can add/change the customer s registered mobile number [4],[5]. JETIR1503007 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 448

If the user selects the OTP option, he/she will be authorised for financial transaction purpose only after OTP verification. The OTP will be received at the customer s registered mobile number. This OTP will be valid for only one transaction. In this mode the user does not have the admin control. After three successive wrong attempts in either fingerprint or OTP method the account will get automatically blocked for next 24 hours and an SMS will be sent to the registered mobile number. II. FINGERPRINT- AN OVERVIEW A fingerprint is a print made by an impression of the ridges in the skin of a finger; often used for biometric identification. A ridge is a raised portion of the epidermis on the fingers, toes and the palm of the hand. These epidermal ridges serve to amplify the vibrations, for example, when fingertips sweep across a rough surface, the signals are transmitted to sensory nerves involved in fine texture perception. Impressions of fingerprints may be left behind on a surface by the natural secretions of sweat from the eccrine glands that are present in friction ridge skin [3],[6]. Some of the fingerprint patterns is shown in fig.2&3. Fig.2 Different shapes of fingerprint impression A. Advantages of Fingerprint over other Biometric Methods (a) (b) Fig.3 (a) Greyscale fingerprint (b) Binarized fingerprint It is unique for every individual. Easy to install compared with other biometrics. Robust and easy to use. Low maintenance cost. Since is already available in the banker s database, so no extra cost for database management. A comparative survey of biometric methods as shown in fig.3, shows that the use of fingerprint dominates over other kinds of biometrics such as iris, face, palm vein, etc. for identification. JETIR1503007 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 449

III. PROPOSED METHOD Fig.4 A comparative study of different types of biometrics used After complete analysis of the advantages of the fingerprint biometrics system, we propose an advanced ATM security system by making combined use of fingerprint with One Time Password (OTP) authentication. Here we are going to explain our hardware and software model. A. Hardware Description We are going to design this model after analysing all the existing embedded ATM client authentication system. We have studied all previously used components of existing designs and we are proposing the best hardware description. We make use of S3C2440 chip and the LCD, keyboard, alarm, fingerprint scanner are connected to this chip along with SRAM and FLASH. 1) LCD Module: OMAP5910 is used in this module as a LCD controller; it supported 1024*1024 image of 15 Grey-scale or 3375 colours. 2) Keyboard Module: It is of numeric type to input numeric values. 3) SRAM and FLASH: A 16-bit FLASH chip and a 32-bit SRAM chip are used to store the running code, the information of fingerprint and the algorithm. 4) Fingerprint Scanner Module: A 500dpi resolution, anti-press, anti-static fingerprint scanner is used. 5) Ethernet Switch Controller: A 10/100 Mbps RMII Ethernet port is used to connect with the remote data server. 6) GSM module: A GSM modem is used to send the OTP to the registered mobile number. The proposed hardware model of this system is shown in fig.5. Fig.5 Hardware model of the system JETIR1503007 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 450

B. Software Model The software design includes two stages. First of all the first module of code will be designed for user interface with ATM machine and other module of code will be for scanning and matching of fingerprint. The overall flow diagram of software design is given in fig.6. C. Process Of Scanning And Matching Of Fingerprint When the finger is pressed over the fingerprint scanner, this linear sensor captures the fingerprint image. This captured image is matched with the database on the remote server. This whole process is controlled by the central microcontroller chip. During the matching process the information is stored in SRAM. The flow diagram of the fingerprint recognition process is shown in fig.7. IV. CONCLUSION AND COMPARISON The method used in this paper is of significant use. As a result of the work proposed there will be benefit to human beings for the purpose of ATM security. The review paper submitted here is plan of our project which is still to be completed. As a result of this project, there will be tremendous change in ATM security system. As the research work in this area is still going on, we can expect a better outcome through our project than previous existing ones. Several works have been done in the field of ATM transaction security. A 3D password based system was proposed in 2008 but it was still traceable. In 2010, a face recognition based system was proposed which was only helpful for tracking suspects and it did not authorise the legal card holder. Again in 2012, a system was proposed using fingerprint and OTP together to authorise the user but there was no backup plan to overcome the failure of fingerprint or OTP system. Another method was proposed in 2012 using iris recognition technology, though it is highly accurate and secure but it has a high installation and maintenance cost. A system using only OTP as authentication purpose was also proposed in 2013, as mobile connectivity was necessary for such type of system therefore it was not reliable for every region. The detailed comparison of previous works along with their limitations is discussed briefly in table 1 [9],[1],[6],[2],[10]. Fig.6 Flowchart of overall software model JETIR1503007 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 451

Fig.7 Flow diagram for fingerprint scanning V. FUTURE SCOPE According to latest scenario ATM fraud is a very grave problem for banks. This project leads to establish authentication results which can be used by banks as well as various organisations. Now a days security system used in ATMs is completely based on PIN security system which is vulnerable. Banks provide four digit PIN to the user which can be changed later by the user. After first use, user usually changes the password and keeps password quite guessable. This is the main drawback of this PIN type ATM system. When ATM card is lost or stolen it is required to close the ATM card by contacting the bank immediately. To avoid the above stated problem a security model is being proposed. This system includes application of either fingerprint or OTP authentication. The user can choose between either of the methods according to his/her convenience. The main advantage of this method over the existing and other proposed methods is that it has low installation and maintenance cost and user friendly with a backup plan in case of a failure of one of the methods. In future this technology can be beneficial for each type of user and can be used for authentication in both banks as well industries wherever individual s identification is required. Title Three Dimensional password for more secure information Face Recognizability Evaluation for ATM applications with exceptional occlusion handling ATM security using fingerprint recognition and GSM Recognition technique for ATM based on IRIS technology TABLE I. COMPARATIVE STUDY OF PREVIOUS WORKS Author (Year of Publication) Fawaz A. Alsulaiman (08) Sungmin Eum (10) Pennam Krishnamurthy (12) K. Laxmi Narshima Rao (12) Method Significance Strength Limitations 3-D password Face Recognition Fingerprint and OTP Iris recognition Generation of graphical password using combination of alphanumeric-special characters Transaction proceeds only after recognizing the face of the user Both fingerprint and OTP are required at the time of transaction Iris of the user is verified Strong password Helpful in tracking of suspects Secure High accuracy and secure Possibility of password being traced. Does not authenticate the legal card holder. No backup plan suggested to overcome the failure of fingerprint or OTP system. High installation and maintenance cost Protected cash withdrawal in ATM using Mobile phone M. R. Dinesh Kumar (13) One Time Password (OTP) Sends an OTP to the registered mobile phone Secure Not feasible for everyone. JETIR1503007 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 452

REFERENCES [1] Sungmin Eum, Jae Kyu Suhr, and Jaihie Kim Face Recognizability Evaluation for ATM Applications With Exceptional Occlusion Handling School of Electrical and Electronic Engineering, Yonsei University,Republic of Korea [2] K. Laxmi Narshima Rao Recognition Technique for ATM Based on Iris Technology International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 11 (September 2012), PP. 39-45. [3] K. Lavanya A Comparative Study on ATM Security with Multimodal Biometric System International Journal of Computer Science & Engineering Technology (IJCSET) ISSN : 2229-3345 Vol. 4 No.06 Jun 2013 [4] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine intelligence. 1998, 20(8): 777-789. [5] Mahesh A. Patil ATM Transaction Using Biometric Fingerprint Technology International Journal of Electronics, Communication & Soft Computing Science and Engineering ISSN: 2277-9477, Volume 2, Issue 6. [6] Pennam Krishnamurthy, Mr. M. Maddhusudhan Redddy, Implementation of ATM Security by Using Fingerprint recognition and GSM, International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 071X,(2012). [7] G.Sambasiva Rao, C. NagaRaju, L. S. S. Reddy and E. V. Prasad, A Novel Fingerprints Identification System Based on the Edge Detection, International Journal of Computer Science and Network Security, vol. 8, pp. 394-397, (2008). [8] Jinwei Gu, Jie Zhou, and Chunyu Yang, Fingerprint Recognition by Combining Global Structure and Local Cues, IEEE Transactions on Image Processing, vol. 15, no. 7, pp. 1952 1964, (2006). [9] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik Three-Dimensional Password for More Secure Authentication IEEE Transactions On Instrumentation And Measurement, Vol. 57, No. 9, September 2008. [10] M.R.Dineshkumar Protected Cash Withdrawal in Atm Using Mobile Phone International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350. JETIR1503007 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 453