smart atm access and security system using rfid and gsm
TRANSCRIPT
Smart ATM Access and Security System
using RFID and GSM Technology
Abstract—The aim of this paper is to implement smart ATM
card. Now-a-days we use ATM card frequently for
shopping , cash withdrawal etc..A single user may have
different bank accounts, so the user obviously have many
ATM cards .For user friendly access , instead of many ATM
cards we compact all into a single ATM card with enhanced
security by providing OTP. We also avoid the problem of
skimming.
The enhanced security of money transaction in ATM
system is carried out by RFID. After getting entry customer
has to place ATM smart card in ATM machine. Then ATM
machine will automatically generates a 4-digit code i.e. OTP.
And that code will be message to the customer’s registered
mobile number through GSM modem which is connected to
ARM 7. Here customer has to enter this code. After entering
OTP, System will check whether entered code is a valid one
or not. And if it is valid, a list of bank displays, select a bank
and it will ask for 4-digit ATM pin, which is fixed. If that 4-
digit code match with the entered pin code then system is
allowed for further accessing. ATM will show options like
cash withdrawal, cash deposit etc..
Keywords—ARM 7, RFID, GSM, OTP, Embedded C,KEIL.
I. INTRODUCTION
With the development of computer network technology
and e-commerce, the self-service banking system has got
extensive popularization with the characteristic offering
high-quality 24 hours service for customer. Nowadays, using
the ATM (Automatic Teller Machine) which provides
customers with the convenient banknote trading is very
common. However, the financial crime case rises repeatedly
in recent years; a lot of criminals tamper with the ATM
terminal and steal user's credit card and password by illegal
means. Once user's bank card is lost and the password is
stolen, the criminal will draw all cash in the shortest time,
which will bring enormous financial losses to customer.
How to carry on the valid identity to the customer
becomes the focus in current financial circle. Traditional
ATM systems authenticate generally by using the credit card
and the password, the method has some defects[4]. Using
credit card and password cannot verify the client's identity
exactly. Anyone who knows the PIN and have the ATM
card can easily access the user account.
Figure1. ATM machine
This paper describes a new method combining with the
traditional method. Here RFID and GSM is used to improve
the security of the transaction[2][3]. To overcome the
disadvantages of inserting the ATM card into the ATM
machine, RFID card is used. It reads the user information by
sensing and it also manages different banks accounts in a
single RFID card. The GSM is used to improve the security
by providing OTP and also informs the user by an SMS in
case the entered password is wrong[1].
1ARJUN K, 2KALAISELVAN R
UG Scholar
Department of Electronics and Communication Engineering
TRP Engineering College (SRM GROUP),
Tiruchirappalli – 621 105, India
ARUNA JAYASHREE R
Assistant Professor
Department of Electronics and Communication Engineering
TRP Engineering College (SRM GROUP),
Tiruchirappalli – 621 105, India
II. DETAILED STUDY AND ANALYSIS
The security levels of ATM counter are increased day by
day at different ways. Some of the authentication techniques
added in password protections is analyzed below.
A. Fingerprints
A customer will be required to enter a login id and
authenticate his finger print and both will be sent to the bank
for validation as part of every transaction. This makes the
developed ATM software further secure as compared to the
software that authenticates the user merely by using a PIN or
password.[2]
B. Face recognition
The proof of identity of a person by their facial image can
be done in a number of different ways such as by capturing
an image of the face in the visible spectrum using an optical
camera or by using the infrared patterns of facial heat
emission. Some of the dares of facial recognition in the
visual spectrum include decreasing the impact of variable
lighting and detecting a mask or photograph. Foremost
benefits of facial recognition are that it is non-intrusive,
hands-free and continuously accepted by most users.[6]
C. Voice or speech recognition
The capability of a machine or program is to receive and
interpret dictation to recognize and carry out spoken
commands. Severely speaking, voice is also a physiological
quality because every person has a different pitch level but
voice recognition is mainly based on the study of the way a
person speaks, commonly classified as behavioural. The
voice based security fails sometimes at a person affected by
fever or any vocal sound problem.[8]
III. Proposed System
Figure2. Block Diagram
In this project we use a single smart ATM card(RFID
Card).We use RFID recognition for sensing the card. Once
the card is detected ,it gets the information from the user. If
the card is matched then by using the GSM technology OTP
is generated and send to the user. In case of mismatch the
access to the card is denied. The list of bank accounts are
displayed. The selection of bank account is made and the
transaction is carried out.
Figure3. Process Diagram
III. HARDWARE DESCRIPTION
A. ARM 7
LPC2148 is the widely used IC from ARM-7 family. It
controls all the peripherals which are connected to it, such as
RFID,LCD, GSM, Motor. The LPC2148 chip is used as the
core of hardware. LPC2148 works on 3.3 V power supply.
LM 117 can be used for generating 3.3 V supply. However,
basic peripherals like LCD, motor etc. works on 5V.Hence
5V power supply is required for operation.
B. GSM
Figure4. GSM Module
A GSM is a specialized type of hardware which accepts
a SIM card, and operates over a subscription to a mobile
operator, just like a mobile phone. From the mobile operator
perspective, a GSM looks just like a mobile phone. When a
GSM modem is connected to a computer, this allows the
computer to use the GSM modem to communicate over the
mobile network. While these GSM modems are most
frequently used to provide mobile internet connectivity,
many of them can also be used for sending and receiving
SMS and MMS messages.
C. LCD DISPLAY
LCDs are common because they offer some real
advantages over other display technologies. They are thinner
and lighter and draw much less power than cathode ray
tubes(CRTs).Here we use 20*4 LCD Display.
Figure5. LCD Display
D. KEYPAD
A keypad is a set of buttons arranged in a block or "pad"
which usually bear digits, symbols and usually a complete
set of alphabetical letters. If it mostly contains numbers then
it can also be called a numeric keypad. The keypad Switches
are connected in a matrix of rows and columns. The rows of
the matrix are connected to four output port lines. The
columns of the matrix are connected to four input port lines.
Figure6. Keypad
IV. SOFTWARE DESCRIPTION
A. KEIL MICRO VISION
The Keil 8051 Development Tools are designed to solve
the complex problems facing embedded software developers
hen starting a new project, simply select the microcontroller
you use from the Device Database and the µVision IDE sets
all compiler, assembler, linker, and memory options for us.
The Keil µVision Debugger accurately simulates on-chip
peripherals (I²C, CAN, UART, SPI, Interrupts, I/O Ports,
A/D Converter, D/A Converter, and PWM Modules) of your
8051 device. Simulation helps you understand hardware
configurations and avoids time wasted on setup problems.
Additionally, with simulation, you can write and test
applications before target hardware is available.
B. EMBEDDED C PROGRAMMING
The ‘C’ Programming Language was originally
developed for and implemented on the UNIX operating
system, by Dennis Ritchie in 1971. One of the best features
of C is that it is not tied to any particular hardware or system.
This makes it easy for a user to write programs that will run
without any changes on practically all machines. C is often
called a middle-level computer language as it combines the
elements of high-level languages with the functionalism of
assembly language. To produce the most efficient machine
code, the programmer must not only create an efficient high
level design, but also pay attention to the detailed
implementation.
V. RESULT
Figure7. Kit Module
At present the transaction process in the ATM is not
secured because of the same secure pin usage. So in this
project OTP is introduced, which has improved the security
of money transaction through ATM to a higher level. The
RFID and GSM technology, embedded C programming has
helped to improve the project.
VI. CONCLUSION
This whole implementation ensures us a secured and
authenticated transaction through RFID and GSM technique
with lowest cost and minimum maintenance. Mankind will
utilize new and secured type of money transactions. The
only thing is that initial cost of RFID conversion of the
entire system is the required one time investment. The value
added service that this system provides increases the
credibility of the financial institutions, the banks improves
the convenience to its customer. Hence as the world
progresses through the inevitable and an indomitable quest
for knowledge, the aspect of security bound systems are
bound to concede with the growing innovations and
obviously more vulnerabilities. Hence our application might
well solve the aspect of transaction security to a precise and
great extent.
REFERENCES
[1] G.Udaya Sree, M.Vinusha “ Real Time SMS-Based
Hashing Scheme for Securing Financial Transactions on
ATM Terminal” ,IJSETR, ISSN 2319-8885 Vol.02,Issue.12,
September-2013, Pages:1223-1227. [2] Khatmode Ranjit P, Kulkarni Ramchandra V, “ARM7
Based Smart ATM Access & Security System Using
Fingerprint Recognition & GSM Technology”, ISSN 2250-
2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 2,
February 2014.
.[3] M.R.Dineshkumar,M.S.Geethanjali,“Protected Cash
Withdrawal in ATM Using Mobile Phone”, International
Journal Of Engineering And Computer Science ISSN:2319-
7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350.
[4] Zaid Imran,Rafay Nizaami ,”Advance Secure Login”,
International Journal For Science and Research
Publications, Volume 1,Issue 1,December 2011.
[5] M. Ajaykumar and N. Bharath Kumar,” Anti-Theft ATM
Machine Using Vibration Detection Sensor”, IJARCSSC
Volume 3, Issue 12, December 2013 ISSN: 2277 128X.
[6] SURAJ B S and Dr. R GIRISHA, “ ARM7 based Smart
ATM Access System”, International Journal on Recent and
Innovation Trends in Computing and Communication ISSN:
2321-8169 Volume: 3 Issue: 5.
[7] K.annan K, “Microcontroller Based Secure Pin Entry
Method For ATM”, International Journal of Scientific &
Engineering Research, Volume 4, Issue 8, August-2013
ISSN 2229-5518.
[8] Hyung-Woo Lee,“Security in Wireless Sensor Networks:
Issues and Challenges”, ICACT, ISBN 89-5519-129-4, Feb.
20-22, 2006.