CFP last date
20 December 2024
Reseach Article

Multi-Level Security for ATM Transaction

Published on February 2015 by Anusha Salam, Asha Ali
Advanced Computing and Communication Techniques for High Performance Applications
Foundation of Computer Science USA
ICACCTHPA2014 - Number 5
February 2015
Authors: Anusha Salam, Asha Ali
9b6055d7-dc4b-447d-a9a2-5516982cf44d

Anusha Salam, Asha Ali . Multi-Level Security for ATM Transaction. Advanced Computing and Communication Techniques for High Performance Applications. ICACCTHPA2014, 5 (February 2015), 27-29.

@article{
author = { Anusha Salam, Asha Ali },
title = { Multi-Level Security for ATM Transaction },
journal = { Advanced Computing and Communication Techniques for High Performance Applications },
issue_date = { February 2015 },
volume = { ICACCTHPA2014 },
number = { 5 },
month = { February },
year = { 2015 },
issn = 0975-8887,
pages = { 27-29 },
numpages = 3,
url = { /proceedings/icaccthpa2014/number5/19465-6062/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Advanced Computing and Communication Techniques for High Performance Applications
%A Anusha Salam
%A Asha Ali
%T Multi-Level Security for ATM Transaction
%J Advanced Computing and Communication Techniques for High Performance Applications
%@ 0975-8887
%V ICACCTHPA2014
%N 5
%P 27-29
%D 2015
%I International Journal of Computer Applications
Abstract

Automated Teller Machines (ATM) have become a part of prestige of the banks all over the world. As the banks compete by opening more and more ATM's every year, research is going on of several aspects of ATM especially security. In real time ATM, user is authenticated only by a four digit Personal Identification Number (PIN) which can be compromised easily. Since this single level is vulnerable to attack, this paper proposes multiple security levels that can minimize the first financial risk to customers. The multiple security levels comprises of an extra user authentication and location aware transaction verification mechanisms Since possessing a smartphone has become a trend in current scenario, to use this functionality user is assumed to have a smartphone with good GPS functionality. Unlike prior research, this concept is a cost effective way that can be easily integrated into the current ATM functionality. Moreover, there is a provision for the user to directly block his card in context of misuse rather than dialing or contacting a third party.

References
  1. Yingxu Wang, "The Formal Design Model of an Automated Teller Machine," IEEE CCECE, vol. 2, pp. 1255–1258, 2003.
  2. Kjell. J. Hole, Veblorn Moen,Andre N. Klingsheim ,and Knut M. Tande , "Lessons from the Norwegian ATM system," IEEE Security and Privacy," vol. 5,no. 6, pp. 25–31, 2007.
  3. Kopparapu Srivasta ,Madamshetti Yashwanth and A. Parvathy, "RFID & mobile Fusion for authenticated ATM transaction," IJCA, vol. 3, no. 5,2010.
  4. Nan Li and Guanling Chen, "Sharing Location in Online Social Networks," IEEE Network, vol. 24, no. 5, pp. 20–25, 2010.
  5. R. Petric, "Integrity protection for automated Teller Machines ," IEEE 10th international Conference on TrustCom, pp. 829–834, 2011.
  6. Nitesh Saxena ,Md. Borhan Uddin, Jonatahan Voris, and N. Asokan,"Vibrate-to-Unlock: Mobile Phone Assisted User Authentication to Multiple Personal RFID Tags," IEEE international Conference on Pervasive Computing and Communications, vol. 2, no. 4, pp. 181–188, 2011
  7. Ghulam Mujtaba and Dr. Tariq Mahmood, "Adaptive Automated Teller Machines-Part II," International Conference on Information and Communication Technologies, pp. 1–6, 2011.
  8. Feng Zhang,Aron Kondoro,and Sead Muttic,"Location-based Authentication and Authorization Using Smart Phones," IEEE 11th International Conference on TrustCom, pp. 1285–1292, 2012.
  9. Yong Xiao ,Chung-Chih Li,Ming Lei,and Susan V. Vrbsky, "Differential Virtual Passwords,Secret Little Functions, and codebooks for protecting Users from Password Theft," IEEE Systems Journal, vol. PP, no. 99, pp. 1, 2012
  10. Taekyoung Kwon, Sooyeon Shin, and Sarang Na, "Covert Attentional shoulder Surfing:Human Adversaries are More Powerful Than Expected," IEEE Transactions on Systems,Man and Cybernetics Systems, vol. PP, no. 99, pp. 1, 2013.
  11. P. Prem Kishan ,Neerugatti Vishwanath, Vasudheva Reddy Nandhigama ,K. Khamaruddeen,Anirudh Kasibhatla,D. Pavani, and G. Swetha, and "Real Time SMS-Based Hashing Scheme For Securing Financial Transactions on ATM Terminal," IJRES, vol. 1, no. 3, pp. 27–33, 2013.
  12. Lei Zhang, Jiangchuan Liu , Hongbo Jiang and Yong Guan, "SensTrack: Energy-Efficient location Tracking with Smartphone Sensors," IEEE Sensors Journal , vol. 13, no. 10, pp. 3375–3784, 2013.
  13. Di Ma, N Saxena,Tuo Xiang, and Yan Zhu, "Location-Aware and Safer Cards: Enhancing RFID security and Privacy via Location Sensing," IEEE Transaction on Dependable and Secure computing , vol. 10, no. 2,pp. 57-69, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Multi-level Security Atm Card Misuse Location-aware Transaction Verification Smartphone Application Gps