+ All Categories
Home > Documents > Smart ATM Access and Security System using RFID and GSM ...

Smart ATM Access and Security System using RFID and GSM ...

Date post: 10-Feb-2017
Category:
Upload: vumien
View: 252 times
Download: 3 times
Share this document with a friend
4
Smart ATM Access and Security System using RFID and GSM Technology AbstractThe aim of this paper is to implement smart ATM card. Now-a-days we use ATM card frequently for shopping , cash withdrawal etc..A single user may have different bank accounts, so the user obviously have many ATM cards .For user friendly access , instead of many ATM cards we compact all into a single ATM card with enhanced security by providing OTP. We also avoid the problem of skimming. The enhanced security of money transaction in ATM system is carried out by RFID. After getting entry customer has to place ATM smart card in ATM machine. Then ATM machine will automatically generates a 4-digit code i.e. OTP. And that code will be message to the customer’s registered mobile number through GSM modem which is connected to ARM 7. Here customer has to enter this code. After entering OTP, System will check whether entered code is a valid one or not. And if it is valid, a list of bank displays, select a bank and it will ask for 4-digit ATM pin, which is fixed. If that 4- digit code match with the entered pin code then system is allowed for further accessing. ATM will show options like cash withdrawal, cash deposit etc.. KeywordsARM 7, RFID, GSM, OTP, Embedded C,KEIL. I. INTRODUCTION With the development of computer network technology and e-commerce, the self-service banking system has got extensive popularization with the characteristic offering high-quality 24 hours service for customer. Nowadays, using the ATM (Automatic Teller Machine) which provides customers with the convenient banknote trading is very common. However, the financial crime case rises repeatedly in recent years; a lot of criminals tamper with the ATM terminal and steal user's credit card and password by illegal means. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer. How to carry on the valid identity to the customer becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects[4]. Using credit card and password cannot verify the client's identity exactly. Anyone who knows the PIN and have the ATM card can easily access the user account. Figure1. ATM machine This paper describes a new method combining with the traditional method. Here RFID and GSM is used to improve the security of the transaction[2][3]. To overcome the disadvantages of inserting the ATM card into the ATM machine, RFID card is used. It reads the user information by sensing and it also manages different banks accounts in a single RFID card. The GSM is used to improve the security by providing OTP and also informs the user by an SMS in case the entered password is wrong[1]. 1 ARJUN K, 2 KALAISELVAN R UG Scholar Department of Electronics and Communication Engineering TRP Engineering College (SRM GROUP), Tiruchirappalli 621 105, India [email protected] [email protected] ARUNA JAYASHREE R Assistant Professor Department of Electronics and Communication Engineering TRP Engineering College (SRM GROUP), Tiruchirappalli 621 105, India [email protected]
Transcript

Smart ATM Access and Security System

using RFID and GSM Technology

Abstract—The aim of this paper is to implement smart ATM

card. Now-a-days we use ATM card frequently for

shopping , cash withdrawal etc..A single user may have

different bank accounts, so the user obviously have many

ATM cards .For user friendly access , instead of many ATM

cards we compact all into a single ATM card with enhanced

security by providing OTP. We also avoid the problem of

skimming.

The enhanced security of money transaction in ATM

system is carried out by RFID. After getting entry customer

has to place ATM smart card in ATM machine. Then ATM

machine will automatically generates a 4-digit code i.e. OTP.

And that code will be message to the customer’s registered

mobile number through GSM modem which is connected to

ARM 7. Here customer has to enter this code. After entering

OTP, System will check whether entered code is a valid one

or not. And if it is valid, a list of bank displays, select a bank

and it will ask for 4-digit ATM pin, which is fixed. If that 4-

digit code match with the entered pin code then system is

allowed for further accessing. ATM will show options like

cash withdrawal, cash deposit etc..

Keywords—ARM 7, RFID, GSM, OTP, Embedded C,KEIL.

I. INTRODUCTION

With the development of computer network technology

and e-commerce, the self-service banking system has got

extensive popularization with the characteristic offering

high-quality 24 hours service for customer. Nowadays, using

the ATM (Automatic Teller Machine) which provides

customers with the convenient banknote trading is very

common. However, the financial crime case rises repeatedly

in recent years; a lot of criminals tamper with the ATM

terminal and steal user's credit card and password by illegal

means. Once user's bank card is lost and the password is

stolen, the criminal will draw all cash in the shortest time,

which will bring enormous financial losses to customer.

How to carry on the valid identity to the customer

becomes the focus in current financial circle. Traditional

ATM systems authenticate generally by using the credit card

and the password, the method has some defects[4]. Using

credit card and password cannot verify the client's identity

exactly. Anyone who knows the PIN and have the ATM

card can easily access the user account.

Figure1. ATM machine

This paper describes a new method combining with the

traditional method. Here RFID and GSM is used to improve

the security of the transaction[2][3]. To overcome the

disadvantages of inserting the ATM card into the ATM

machine, RFID card is used. It reads the user information by

sensing and it also manages different banks accounts in a

single RFID card. The GSM is used to improve the security

by providing OTP and also informs the user by an SMS in

case the entered password is wrong[1].

1ARJUN K, 2KALAISELVAN R

UG Scholar

Department of Electronics and Communication Engineering

TRP Engineering College (SRM GROUP),

Tiruchirappalli – 621 105, India

[email protected]

[email protected]

ARUNA JAYASHREE R

Assistant Professor

Department of Electronics and Communication Engineering

TRP Engineering College (SRM GROUP),

Tiruchirappalli – 621 105, India

[email protected]

K DURAISAMY
Text Box
International Conference on Explorations and Innovations in Engineering & Technology (ICEIET - 2016)
K DURAISAMY
Text Box
K DURAISAMY
Text Box
K DURAISAMY
Text Box
ISSN: 2348 - 8549 http://www.internationaljournalssrg.org Page 135

II. DETAILED STUDY AND ANALYSIS

The security levels of ATM counter are increased day by

day at different ways. Some of the authentication techniques

added in password protections is analyzed below.

A. Fingerprints

A customer will be required to enter a login id and

authenticate his finger print and both will be sent to the bank

for validation as part of every transaction. This makes the

developed ATM software further secure as compared to the

software that authenticates the user merely by using a PIN or

password.[2]

B. Face recognition

The proof of identity of a person by their facial image can

be done in a number of different ways such as by capturing

an image of the face in the visible spectrum using an optical

camera or by using the infrared patterns of facial heat

emission. Some of the dares of facial recognition in the

visual spectrum include decreasing the impact of variable

lighting and detecting a mask or photograph. Foremost

benefits of facial recognition are that it is non-intrusive,

hands-free and continuously accepted by most users.[6]

C. Voice or speech recognition

The capability of a machine or program is to receive and

interpret dictation to recognize and carry out spoken

commands. Severely speaking, voice is also a physiological

quality because every person has a different pitch level but

voice recognition is mainly based on the study of the way a

person speaks, commonly classified as behavioural. The

voice based security fails sometimes at a person affected by

fever or any vocal sound problem.[8]

III. Proposed System

Figure2. Block Diagram

In this project we use a single smart ATM card(RFID

Card).We use RFID recognition for sensing the card. Once

the card is detected ,it gets the information from the user. If

the card is matched then by using the GSM technology OTP

is generated and send to the user. In case of mismatch the

access to the card is denied. The list of bank accounts are

displayed. The selection of bank account is made and the

transaction is carried out.

Figure3. Process Diagram

III. HARDWARE DESCRIPTION

A. ARM 7

LPC2148 is the widely used IC from ARM-7 family. It

controls all the peripherals which are connected to it, such as

RFID,LCD, GSM, Motor. The LPC2148 chip is used as the

core of hardware. LPC2148 works on 3.3 V power supply.

LM 117 can be used for generating 3.3 V supply. However,

basic peripherals like LCD, motor etc. works on 5V.Hence

5V power supply is required for operation.

B. GSM

Figure4. GSM Module

A GSM is a specialized type of hardware which accepts

a SIM card, and operates over a subscription to a mobile

operator, just like a mobile phone. From the mobile operator

K DURAISAMY
Text Box
International Conference on Explorations and Innovations in Engineering & Technology (ICEIET - 2016)
K DURAISAMY
Text Box
ISSN: 2348 - 8549 http://www.internationaljournalssrg.org Page 136

perspective, a GSM looks just like a mobile phone. When a

GSM modem is connected to a computer, this allows the

computer to use the GSM modem to communicate over the

mobile network. While these GSM modems are most

frequently used to provide mobile internet connectivity,

many of them can also be used for sending and receiving

SMS and MMS messages.

C. LCD DISPLAY

LCDs are common because they offer some real

advantages over other display technologies. They are thinner

and lighter and draw much less power than cathode ray

tubes(CRTs).Here we use 20*4 LCD Display.

Figure5. LCD Display

D. KEYPAD

A keypad is a set of buttons arranged in a block or "pad"

which usually bear digits, symbols and usually a complete

set of alphabetical letters. If it mostly contains numbers then

it can also be called a numeric keypad. The keypad Switches

are connected in a matrix of rows and columns. The rows of

the matrix are connected to four output port lines. The

columns of the matrix are connected to four input port lines.

Figure6. Keypad

IV. SOFTWARE DESCRIPTION

A. KEIL MICRO VISION

The Keil 8051 Development Tools are designed to solve

the complex problems facing embedded software developers

hen starting a new project, simply select the microcontroller

you use from the Device Database and the µVision IDE sets

all compiler, assembler, linker, and memory options for us.

The Keil µVision Debugger accurately simulates on-chip

peripherals (I²C, CAN, UART, SPI, Interrupts, I/O Ports,

A/D Converter, D/A Converter, and PWM Modules) of your

8051 device. Simulation helps you understand hardware

configurations and avoids time wasted on setup problems.

Additionally, with simulation, you can write and test

applications before target hardware is available.

B. EMBEDDED C PROGRAMMING

The ‘C’ Programming Language was originally

developed for and implemented on the UNIX operating

system, by Dennis Ritchie in 1971. One of the best features

of C is that it is not tied to any particular hardware or system.

This makes it easy for a user to write programs that will run

without any changes on practically all machines. C is often

called a middle-level computer language as it combines the

elements of high-level languages with the functionalism of

assembly language. To produce the most efficient machine

code, the programmer must not only create an efficient high

level design, but also pay attention to the detailed

implementation.

V. RESULT

Figure7. Kit Module

At present the transaction process in the ATM is not

secured because of the same secure pin usage. So in this

project OTP is introduced, which has improved the security

of money transaction through ATM to a higher level. The

RFID and GSM technology, embedded C programming has

helped to improve the project.

VI. CONCLUSION

This whole implementation ensures us a secured and

authenticated transaction through RFID and GSM technique

with lowest cost and minimum maintenance. Mankind will

utilize new and secured type of money transactions. The

only thing is that initial cost of RFID conversion of the

entire system is the required one time investment. The value

added service that this system provides increases the

credibility of the financial institutions, the banks improves

the convenience to its customer. Hence as the world

K DURAISAMY
Text Box
International Conference on Explorations and Innovations in Engineering & Technology (ICEIET - 2016)
K DURAISAMY
Text Box
ISSN: 2348 - 8549 http://www.internationaljournalssrg.org Page 137

progresses through the inevitable and an indomitable quest

for knowledge, the aspect of security bound systems are

bound to concede with the growing innovations and

obviously more vulnerabilities. Hence our application might

well solve the aspect of transaction security to a precise and

great extent.

REFERENCES

[1] G.Udaya Sree, M.Vinusha “ Real Time SMS-Based

Hashing Scheme for Securing Financial Transactions on

ATM Terminal” ,IJSETR, ISSN 2319-8885 Vol.02,Issue.12,

September-2013, Pages:1223-1227. [2] Khatmode Ranjit P, Kulkarni Ramchandra V, “ARM7

Based Smart ATM Access & Security System Using

Fingerprint Recognition & GSM Technology”, ISSN 2250-

2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 2,

February 2014.

.[3] M.R.Dineshkumar,M.S.Geethanjali,“Protected Cash

Withdrawal in ATM Using Mobile Phone”, International

Journal Of Engineering And Computer Science ISSN:2319-

7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350.

[4] Zaid Imran,Rafay Nizaami ,”Advance Secure Login”,

International Journal For Science and Research

Publications, Volume 1,Issue 1,December 2011.

[5] M. Ajaykumar and N. Bharath Kumar,” Anti-Theft ATM

Machine Using Vibration Detection Sensor”, IJARCSSC

Volume 3, Issue 12, December 2013 ISSN: 2277 128X.

[6] SURAJ B S and Dr. R GIRISHA, “ ARM7 based Smart

ATM Access System”, International Journal on Recent and

Innovation Trends in Computing and Communication ISSN:

2321-8169 Volume: 3 Issue: 5.

[7] K.annan K, “Microcontroller Based Secure Pin Entry

Method For ATM”, International Journal of Scientific &

Engineering Research, Volume 4, Issue 8, August-2013

ISSN 2229-5518.

[8] Hyung-Woo Lee,“Security in Wireless Sensor Networks:

Issues and Challenges”, ICACT, ISBN 89-5519-129-4, Feb.

20-22, 2006.

K DURAISAMY
Text Box
International Conference on Explorations and Innovations in Engineering & Technology (ICEIET - 2016)
K DURAISAMY
Text Box
ISSN: 2348 - 8549 http://www.internationaljournalssrg.org Page 138

Recommended