SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1390
Using Fingerprint, Pycrypto, and Mobile Banking App, to withdraw
cash from ATMs in Developing Countries.
(A Confrontation to Eavesdropping Attack based on One-time
Password (OTP))
Nachaat AbdElatif Mohamed1, Aman Jantan2, Abiodun Esther Omolara3
1, 3 Students Ph.D. First Year School of Computer Sciences. Universiti Sains Malaysia
Penang, Malaysia
2Second Professor School of Computer Sciences. Universiti Sains Malaysia
Penang, Malaysia
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Automated Teller Machines (ATM) has always
been a major target for criminals. Securing ATMs remains a
principal concern for the ATM manufacturers and most of the
banks in the world. In the past, hunting an ATM machine
involved using heavy, sophisticated tools and hardware such
as explosives. However, the emergence of Digital Age changed
how attacks on ATMs are perpetrated. Recent events have
shown how ATMs can be robbed without even gettingphysical
access to any hardware. While trying to addressthischallenge,
a few methodologies and frameworks have been proposed by
specialists and scientists in security. Nevertheless, some
threats and vulnerabilities to ATM machines remainunsolved.
In this paper, we propose how to improve the security of ATM
systems using biometric fingerprint, Mobile Application, and
PY crypto application. We demonstrate how to withdrawcash
using this proposed system. Moreover, we increased the speed
with which each transaction take place from about30seconds
to 5 seconds. Considering that the frequency of fraud in the
banking industry in developing countries keeps escalating,the
methodology of this research cannot be disregarded.
Key Words: ATM, Pycrypto, Eavesdropping Attack, OTP,
attack, IoT.
1. INTRODUCTION
The use of Automated Teller Machines(ATM) hasdeveloped
quickly in fame due to its low banks' transaction cost and
clients' convenience which has made it a fundamental
component of today's financial service delivery. This
progress is also attributed to the convenience of transacting
at anywhere or anytime, coupled with the fact that time is
saved and energy reserved for other activities. Nevertheless,
the ATM which is intended to serve the clients better is now
turning into a serious nightmare for clients due to the
number of fraud sustained in their accounts during ATM
transactions. ATM crime has grown to become a worldwide
issue that affects not solely customers but also bank
administrators. This vexatiousexperience byclientsisoneof
the challenges of deploying an ATM in the banking industry.
In view of the issues experienced with ATM card fraud,
banks have attempted to address this problem using
encryption on the PIN on the card to deter criminal and
hackersefforts at siphoning peoplesmoney.Evenso,hackers
still find sophisticated tools, tactics, and techniquestoevade
this security and acquire peoples money.
Recent occurence of the Carbanak Cyber crime is a clear
indication that hackers have gone haywire with their
sophisticated techniques in siphoning cash [16]. The
Carbanak attackers used remotecommandstoinstructATMs
to dispense cash without any interaction with theATM itself.
Mules were then used to collect the cash from the ATM.
This research proposes an improved way of securing ATM
machine transactions and show how to increase thespeedat
which transactions occur. The two major contributions of
this research are:
 We show how to withdraw cash by fingerprint with
mobile application and save the user time
 Secondly, we pictoriacally demonstrate how to
increase the security of the bank, customer, ATM
Machine and improve the one-time password pin
used for transactions.
In this Paper, we present a structure which uses a software,
Pycrypto, OTP, and fingerprint to allow a user to withdraw
cash only in 5 seconds. Knowing that to get the cash by the
traditional way takes at least 30 seconds or more, [3] this is
surely an improvement on a conventional system.
If the proposed system is applied correctly in developing,
and developed countries, it can save massive amount from
being siphoned. The objectivesof World Bank`sby2020isto
foster financial inclusion, but the traditionalaccesschannels,
likeATMsMachine, are very limited in developingcountries.
For instance, a country like Egypt, [2] is limited in this area
asnearly half adult urban population in Egypt doesnot have
credit cards, completely unbanked. Studiesshowedthatonly
17% own a payment card and that 97% of Egyptian
employees. Receive their salaries in cash. This statistic was
taking from urban areas. What about the countryside? [7].
The question is, what will happen if these hugepercentageof
people requested to be banking? Egypt is one of the fastest
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1391
growing Visa market in the Middle East and North Africa
(MENA) region. Egypt’s growth in card numbersfar exceeds
the 30% average regional increase for MENA. Moreover, the
results show an increase in the number of visa card
acceptance in Egypt by 6% to reach a total of 27,663
locations, including 23,910 merchant outlets (up 4% year-
on-year) and 1,912 ATMs (up 46% year-on-year), [7]. Most
researchers have tried to improve the functionality of ATMs
[3]. On the other hand, our work will reflect on ECC (Elliptic-
curve cryptography) which leverage on secure OTP,toavoid
eavesdropping, social engineering, and bruteforceattacksat
ECC, [1]. As we know every single electronic device
connected to the internet is at risk of penetration. In
retrospect, we propose an alternative approach for fast and
secure operations during ATM transactions. Figure 1
presents a taxonomy of the ATM setting. The system
consists of an integration of work at different levels; user,
application, database, and security. Moreover, the system
will be integrated with IoT. In conclusion, a great leap in
saving customer time, effort, and an improvement in the
security will be achieved.
Fig -1 our Project design.
2. State-of-the-Art
Nowadays most transactions are carried out through
mobile devices because it saves time and effort, but
unfortunately to withdraw cash remains a dilemma for
majority of the people in the world. You can withdraw cash
from anywhere, but still you must wait in the queue in front
of ATM. In some cases, it gets more annoying because you
have to select and filter through unwanted options like
language, amount, and print options. Recent studies have
shown how money can be withdrawn faster using QR-code
via the mobile banking Application [3]. Relatively, there are
banking manual service and E-Banking services, though E-
Banking services are deemed better, but do not provide
satisfactory quality, [4]. There areseveralvulnerabilitywhen
using card on ATM. When a customer stands behind ATM
machine, another one can watchhispassword/passcode,and
this code can be exploited easily by hackers to recover the
customers money. To overcome this problem, several
suggestions has been made such as using cognitive systems
like Face recognition system, face expression, DNA, gaits,
fingerprint identification, et cetera [5]. Also, we can use
micro bank service to automate withdrawal and deposit
money and connect it with bank server through
(RASPBERRY-PI). The customer can then call customer care
division, and inform where he want towithdraw/depositthe
money. The bank then chooses a micro bank unit, and send
query message. The micro-unit will reply acknowledgment,
then bank server will send OTP to customer, micromachine
will receive the same OTP, the microbank system always
connected with central banking server using GSM
communication, [6].
3. Project Proposal
The motivation of withdrawing money by mobile banking
Application to save the customer time,effort,andimproveall
of the security elements during this operation, of course,
some people converse about this project. I will take up the
subject creatively, and try to cover all aspects, beginning
with the customer request withdraw service until he
receives the amount from ATM. This Project based on
Encryption/Decryption PY Crypto. “The various IM clients
can be classified into three types according to theirprovided
encryption protocols: no encryption, client-to-server
encryption, and client-to-client or end-to-end encryption
(E2EE)”, [8]. Frist of all, Bank must request from all
customersto update them data, to allow thebankregistering
customer fingerprints in the bank database, then, customer
will demand a withdrawal amount through his mobile
banking application, in related request customer location
will be sent to the bank, bank will select the ATMs that
located in the same area, and then determine the number of
people front of each machine through cameras installed (
this operation will be done automatically), the Application
must suggest the best solutions in termsof distancefromthe
client and the smallest number of people, thenbindstheOTP
with customer fingerprint which will be incepted through
PYcrypto, customer will receive the message ask him go to
the nearest ATM which be mentioned in the message with
request button in same message ask him ( when youfrontof
ATM, confirm that), after the customer arrived at ATM will
pressthe button in the massage the bank will replywithOTP
( but the good news is, customer will not use at all OTP ),
only he will use his fingerprint to take the amount directly,
also w have another good news at this point, if any hacker
eavesdropped the OTP he cannot do anything by this
number, because this number only to inform the customer
that your amount is ready. Imagine the worst case, any
hacker succeeded to eavesdrop the massage which includes
the location of ATM, the third good news is, he cannot
receive any cash, because the money only receives by
customer fingerprint.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1392
4. Terms and background
Pycrypto is Python toolkit, with a selection of
implementations of cryptographic algorithms including a
random number generator. Itistime-savingandincreasesthe
Security, [9]. Other subpackages of the Pycrypto includes;
Crypto.Cipher, Crypto.Hash, Crypto.Protocol,
Crypto.PublicKey, Crypto.Signature, and Crypto.Util.
Eavesdropping Attack is the unauthorized interception of
private communications between two parties. This could
include messages, phone call, video or fax transmission. It
looks like someone standing under the eaves of a house and
listening to conversation been made. The conversation
between tow device containing many nods, if a hacker
compromises only one node, he can access the IP packets
flowing through that node, many tools can allow striker to
save a conversation, [10]. Encryption is one of the best
Countermeasures to face eavesdropping attack, [10].
OTP (OneTime Password)is a password thatisvalidforonly
one session at the digital system service, it is a secure and
fixed password which is not vulnerable to replay attacks. To
receive an OTP, a customer is prompted to the enter his
username/email address or registration number or both
(based on application policy). If he supplies correct
credentials, then his account will be enabled to receive the
OTP. Once the user is authenticated, he gets the One-Time
password, [11].
IoT (Internet of Things) is the network of physical devices,
vehicles, mobile, tablets, laptop, home appliances and other
items embedded with electronics, software, sensors,
actuators, and connectivity which allows these objects to
communicate and exchange data. Recent research predicted
that by the year 2020, about fifty (50) billion of such devices
are expected to be deployed [12].
ECC (Elliptic Curve Cryptography) is analgorithmthatallows
key sharing, information transferring and mutual
authentication between clients or users and the central
server in a secure manner, [13].
5. Challenges
In our research, we faced a challenge as banks refused to
cooperate with us due to, we need cooperation with some
banks to study the real situation, cost, Legislation to obtain
customer fingerprint, devices.
6. Research goal
Themost significant two aimsof this research are, saving the
customer time while carrying out transaction, and an
increase inthe securitylevelwhichcurrentlyisnotsupported
in traditional ATM setting. Usually, a customer needs about
thirty (30) seconds or more to get his cash from ATMs, but
the method proposed in this paper will allow the same
transaction for a shorter period of five (5) seconds. On the
other hand, we will improve the security, in protecting
private communication between customers, mobile app,and
ATMs. We willmake a relation betweencustomerfingerprint
and OTP (one-time password), then generate a secured
number based on customer fingerprint, he will use it only to
withdraw his money in 5 second. This feature will add value
to the bank's services, the bank can market it to attract the
customer.
7. Critical scenario
1- Use fingerprint to withdraw cash.
2- Use D.QR-code to withdraw cash
3- Use Barcode to withdraw cash
4- Use finger eye to withdraw cash.
Fig -2 Before Implement our project.
Fig -3 after Implement our new contribution.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1393
8. Expected results
This research aims to design, implement, and evaluate a new
concept to withdraw money through Pycrypto, fingerprint,
and mobile banking Application. The proposed system
guarantees a high efficiency to save a customer’s time and
improve the security to protect a customer’s privacy, and
credential data. In the case of ATM security, the proposed
system enhances the ATMs security and more privacy
protection for the customer during any transactional
operation. In addition, we improved the current OTP (one-
time password) by connecting it with fingerprint number
which will be secured by PY Crypto. Then we will use PY to
encrypt and decrypt the sensitive numbers in this project.
There is no time wasted in carrying out a transactionasinthe
traditional way, and no needto stand in the queuetogetcash.
This research is highly profitable for industries especially if
implemented in specific country’s (developing countries).
Finally,we can customize the project asappropriate for each
country, andthe system can be integratedwiththeInternetof
things (IoT).
9. Conclusion
In this paper, we have explored a criticalscenario,D.QR-code,
Barcode, finger eye, and fingerprint to withdraw cash. We
focused on how to be using py crypto, a fingerprint to get
your cash, and described the Encryption is one of the best
Countermeasures to face eavesdropping attack, we used it
with parametric to give maximum protection through
withdraw cash operation.
ACKNOWLEGMENT
The authors gratefully acknowledge the anonymous
reviewers for their constructive comments, ideas and
suggestions.
REFERENCE
[1] Yadav, Deepak, et al. "Intensify the security of one-time
password using elliptic curve cryptography with
fingerprint for e-commerce application." International
Journal of Engineering Science 5480 (2017).
[2] Cámara, Noelia, David Tuesta, and Pablo Urbiola.
Extending access to the formal financial system: the
banking correspondent businessmodel.No.1510.2015.
[3] Hajare, Uday, et al. "Efficient CashWithdrawalfromATM
machine using Mobile Banking." (2018).
[4] Rahman, Mahbub, et al. "Problems and prospects of
electronic banking in Bangladesh: A case study on
Dutch-Bangla Bank Limited." American Journal of
Operations Management and Information Systems 2.1
(2017): 42-53.
[5] Risodkar, Y. R., et al. "ATM Authentication with Enhance
Security Using GSM." Journal of Science and Technology
(JST) 2.5 (2017): 01-05.
[6] Kumar, V. Naveen. "Research Scholar “Advanced
Handheld Electronic banking System using Raspberry
pi." Advanced Research Journals of Science and
Technology (ARJST) 4 (2017): 276-279.
[7] El-Gawady, Zeinab Mohamed. "Relationship betweenE-
money and Monetary Policy in Egypt." (2018).
[8] Lee, Jeeun, et al. "Security Analysis of End-to-End
Encryption in Telegram." SCIS 2017 (2017).
[9] Butschek, Caroline. Using Autocorrelations to Detect
Potential Side-Channels. Diss.
[10] Velianitis, Georgios, et al. "Comparison of VoIP and
TETRA regarding security in a safety critical
environment." Journal of Computers 13.3 (2018): 279-
287.
[11] JIni, MrsA. Jackulin Sam, et al. "TENABLE ONLINEISSUE
OF BIRTH CERTIFICATE FOR REGIME
CONGLOMERATE." (2018).
[12] Sheth, Amit, Biplav Srivastava, and Florian Michahelles.
"IoT-Enhanced Human Experience." IEEE Internet
Computing 1 (2018): 4-7.
[13] Jegadeesan, S., et al. "ECC based Algorithms for Secure
Water Quality Monitoring System UsingWirelessSensor
Networks." (2018).
[14] Pal, Joyojeet, et al. "Digital payment and its discontents:
Street shops and the Indian government’s push for
cashless transactions." (2018).
[15] Oye, N. D., and Jemimah Nathaniel. "Fraud Detectionand
Control System in Bank Using Finger Print Simulation."
(2018).
[16] Johnson, Ariana L. "Cybersecurity for financial
institutions: The integral role of information sharing in
cyber attack mitigation." NC Banking Inst. 20 (2016):
277.

Mais conteúdo relacionado

Mais procurados

Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionIOSR Journals
 
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESE-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESVinit Varma
 
Unit v e-banking
Unit v e-bankingUnit v e-banking
Unit v e-banking4512452
 
Use of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of BangladeshUse of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of BangladeshMasum Hussain
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsSartha Gupta
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
An empiric path towards fraud detection and protection for NFC-enabled mobile...
An empiric path towards fraud detection and protection for NFC-enabled mobile...An empiric path towards fraud detection and protection for NFC-enabled mobile...
An empiric path towards fraud detection and protection for NFC-enabled mobile...TELKOMNIKA JOURNAL
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
E banking-techonology and prospect in bBangladesh
E banking-techonology and prospect in bBangladeshE banking-techonology and prospect in bBangladesh
E banking-techonology and prospect in bBangladeshMD. Baharul Alam
 
Analysis of e banking
Analysis of e bankingAnalysis of e banking
Analysis of e bankingwahidsajol
 
E-Banking Services and Challenges in India
E-Banking Services and Challenges in IndiaE-Banking Services and Challenges in India
E-Banking Services and Challenges in IndiaDheeraj Kumar Tiwari
 
Technology In Indian Banking 2008
Technology In Indian Banking 2008Technology In Indian Banking 2008
Technology In Indian Banking 2008Chowdari Prasad
 
Uniform payment system_for_banking_indus
Uniform payment system_for_banking_indusUniform payment system_for_banking_indus
Uniform payment system_for_banking_industhemightycissp
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 

Mais procurados (20)

Secure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial RecognitionSecure Authentication for Mobile Banking Using Facial Recognition
Secure Authentication for Mobile Banking Using Facial Recognition
 
E Banking
E BankingE Banking
E Banking
 
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIESE-BANKING EMERGING ISSUES AND OPPORTUNITIES
E-BANKING EMERGING ISSUES AND OPPORTUNITIES
 
Unit v e-banking
Unit v e-bankingUnit v e-banking
Unit v e-banking
 
Use of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of BangladeshUse of technologies in the banking sector of Bangladesh
Use of technologies in the banking sector of Bangladesh
 
E-banking FOR CLASS 10 students
E-banking FOR CLASS 10 studentsE-banking FOR CLASS 10 students
E-banking FOR CLASS 10 students
 
E Banking
E BankingE Banking
E Banking
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
An empiric path towards fraud detection and protection for NFC-enabled mobile...
An empiric path towards fraud detection and protection for NFC-enabled mobile...An empiric path towards fraud detection and protection for NFC-enabled mobile...
An empiric path towards fraud detection and protection for NFC-enabled mobile...
 
E banking
E   bankingE   banking
E banking
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
E banking-techonology and prospect in bBangladesh
E banking-techonology and prospect in bBangladeshE banking-techonology and prospect in bBangladesh
E banking-techonology and prospect in bBangladesh
 
Analysis of e banking
Analysis of e bankingAnalysis of e banking
Analysis of e banking
 
E-Banking Services and Challenges in India
E-Banking Services and Challenges in IndiaE-Banking Services and Challenges in India
E-Banking Services and Challenges in India
 
E banking
E bankingE banking
E banking
 
Technology In Indian Banking 2008
Technology In Indian Banking 2008Technology In Indian Banking 2008
Technology In Indian Banking 2008
 
E Banking
E BankingE Banking
E Banking
 
Uniform payment system_for_banking_indus
Uniform payment system_for_banking_indusUniform payment system_for_banking_indus
Uniform payment system_for_banking_indus
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 

Semelhante a IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash from ATMS in Developing Countries. (A Confrontation to Eavesdropping Attack Based on One-Time Password (OTP))

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The i-Capital Africa Institute
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
Assessing Bank Customers Perception and Ease of using Automated Teller Machin...
Assessing Bank Customers Perception and Ease of using Automated Teller Machin...Assessing Bank Customers Perception and Ease of using Automated Teller Machin...
Assessing Bank Customers Perception and Ease of using Automated Teller Machin...ijtsrd
 
ATM Outsourcing in India and Global Trends (Whitepaper)
ATM Outsourcing in India and Global Trends (Whitepaper)ATM Outsourcing in India and Global Trends (Whitepaper)
ATM Outsourcing in India and Global Trends (Whitepaper)Thinksoft Global
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
 
IRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 

Semelhante a IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash from ATMS in Developing Countries. (A Confrontation to Eavesdropping Attack Based on One-Time Password (OTP)) (20)

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
The potentials for e-Commerce payments' growth in Ethiopia and the need for s...
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
ATM2.pdf.pdf
ATM2.pdf.pdfATM2.pdf.pdf
ATM2.pdf.pdf
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Assessing Bank Customers Perception and Ease of using Automated Teller Machin...
Assessing Bank Customers Perception and Ease of using Automated Teller Machin...Assessing Bank Customers Perception and Ease of using Automated Teller Machin...
Assessing Bank Customers Perception and Ease of using Automated Teller Machin...
 
ATM Outsourcing in India and Global Trends (Whitepaper)
ATM Outsourcing in India and Global Trends (Whitepaper)ATM Outsourcing in India and Global Trends (Whitepaper)
ATM Outsourcing in India and Global Trends (Whitepaper)
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
IRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM TechnologyIRJET-ATM Security using GSM Technology
IRJET-ATM Security using GSM Technology
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
N044057478
N044057478N044057478
N044057478
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Último (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash from ATMS in Developing Countries. (A Confrontation to Eavesdropping Attack Based on One-Time Password (OTP))

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1390 Using Fingerprint, Pycrypto, and Mobile Banking App, to withdraw cash from ATMs in Developing Countries. (A Confrontation to Eavesdropping Attack based on One-time Password (OTP)) Nachaat AbdElatif Mohamed1, Aman Jantan2, Abiodun Esther Omolara3 1, 3 Students Ph.D. First Year School of Computer Sciences. Universiti Sains Malaysia Penang, Malaysia 2Second Professor School of Computer Sciences. Universiti Sains Malaysia Penang, Malaysia ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Automated Teller Machines (ATM) has always been a major target for criminals. Securing ATMs remains a principal concern for the ATM manufacturers and most of the banks in the world. In the past, hunting an ATM machine involved using heavy, sophisticated tools and hardware such as explosives. However, the emergence of Digital Age changed how attacks on ATMs are perpetrated. Recent events have shown how ATMs can be robbed without even gettingphysical access to any hardware. While trying to addressthischallenge, a few methodologies and frameworks have been proposed by specialists and scientists in security. Nevertheless, some threats and vulnerabilities to ATM machines remainunsolved. In this paper, we propose how to improve the security of ATM systems using biometric fingerprint, Mobile Application, and PY crypto application. We demonstrate how to withdrawcash using this proposed system. Moreover, we increased the speed with which each transaction take place from about30seconds to 5 seconds. Considering that the frequency of fraud in the banking industry in developing countries keeps escalating,the methodology of this research cannot be disregarded. Key Words: ATM, Pycrypto, Eavesdropping Attack, OTP, attack, IoT. 1. INTRODUCTION The use of Automated Teller Machines(ATM) hasdeveloped quickly in fame due to its low banks' transaction cost and clients' convenience which has made it a fundamental component of today's financial service delivery. This progress is also attributed to the convenience of transacting at anywhere or anytime, coupled with the fact that time is saved and energy reserved for other activities. Nevertheless, the ATM which is intended to serve the clients better is now turning into a serious nightmare for clients due to the number of fraud sustained in their accounts during ATM transactions. ATM crime has grown to become a worldwide issue that affects not solely customers but also bank administrators. This vexatiousexperience byclientsisoneof the challenges of deploying an ATM in the banking industry. In view of the issues experienced with ATM card fraud, banks have attempted to address this problem using encryption on the PIN on the card to deter criminal and hackersefforts at siphoning peoplesmoney.Evenso,hackers still find sophisticated tools, tactics, and techniquestoevade this security and acquire peoples money. Recent occurence of the Carbanak Cyber crime is a clear indication that hackers have gone haywire with their sophisticated techniques in siphoning cash [16]. The Carbanak attackers used remotecommandstoinstructATMs to dispense cash without any interaction with theATM itself. Mules were then used to collect the cash from the ATM. This research proposes an improved way of securing ATM machine transactions and show how to increase thespeedat which transactions occur. The two major contributions of this research are:  We show how to withdraw cash by fingerprint with mobile application and save the user time  Secondly, we pictoriacally demonstrate how to increase the security of the bank, customer, ATM Machine and improve the one-time password pin used for transactions. In this Paper, we present a structure which uses a software, Pycrypto, OTP, and fingerprint to allow a user to withdraw cash only in 5 seconds. Knowing that to get the cash by the traditional way takes at least 30 seconds or more, [3] this is surely an improvement on a conventional system. If the proposed system is applied correctly in developing, and developed countries, it can save massive amount from being siphoned. The objectivesof World Bank`sby2020isto foster financial inclusion, but the traditionalaccesschannels, likeATMsMachine, are very limited in developingcountries. For instance, a country like Egypt, [2] is limited in this area asnearly half adult urban population in Egypt doesnot have credit cards, completely unbanked. Studiesshowedthatonly 17% own a payment card and that 97% of Egyptian employees. Receive their salaries in cash. This statistic was taking from urban areas. What about the countryside? [7]. The question is, what will happen if these hugepercentageof people requested to be banking? Egypt is one of the fastest
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1391 growing Visa market in the Middle East and North Africa (MENA) region. Egypt’s growth in card numbersfar exceeds the 30% average regional increase for MENA. Moreover, the results show an increase in the number of visa card acceptance in Egypt by 6% to reach a total of 27,663 locations, including 23,910 merchant outlets (up 4% year- on-year) and 1,912 ATMs (up 46% year-on-year), [7]. Most researchers have tried to improve the functionality of ATMs [3]. On the other hand, our work will reflect on ECC (Elliptic- curve cryptography) which leverage on secure OTP,toavoid eavesdropping, social engineering, and bruteforceattacksat ECC, [1]. As we know every single electronic device connected to the internet is at risk of penetration. In retrospect, we propose an alternative approach for fast and secure operations during ATM transactions. Figure 1 presents a taxonomy of the ATM setting. The system consists of an integration of work at different levels; user, application, database, and security. Moreover, the system will be integrated with IoT. In conclusion, a great leap in saving customer time, effort, and an improvement in the security will be achieved. Fig -1 our Project design. 2. State-of-the-Art Nowadays most transactions are carried out through mobile devices because it saves time and effort, but unfortunately to withdraw cash remains a dilemma for majority of the people in the world. You can withdraw cash from anywhere, but still you must wait in the queue in front of ATM. In some cases, it gets more annoying because you have to select and filter through unwanted options like language, amount, and print options. Recent studies have shown how money can be withdrawn faster using QR-code via the mobile banking Application [3]. Relatively, there are banking manual service and E-Banking services, though E- Banking services are deemed better, but do not provide satisfactory quality, [4]. There areseveralvulnerabilitywhen using card on ATM. When a customer stands behind ATM machine, another one can watchhispassword/passcode,and this code can be exploited easily by hackers to recover the customers money. To overcome this problem, several suggestions has been made such as using cognitive systems like Face recognition system, face expression, DNA, gaits, fingerprint identification, et cetera [5]. Also, we can use micro bank service to automate withdrawal and deposit money and connect it with bank server through (RASPBERRY-PI). The customer can then call customer care division, and inform where he want towithdraw/depositthe money. The bank then chooses a micro bank unit, and send query message. The micro-unit will reply acknowledgment, then bank server will send OTP to customer, micromachine will receive the same OTP, the microbank system always connected with central banking server using GSM communication, [6]. 3. Project Proposal The motivation of withdrawing money by mobile banking Application to save the customer time,effort,andimproveall of the security elements during this operation, of course, some people converse about this project. I will take up the subject creatively, and try to cover all aspects, beginning with the customer request withdraw service until he receives the amount from ATM. This Project based on Encryption/Decryption PY Crypto. “The various IM clients can be classified into three types according to theirprovided encryption protocols: no encryption, client-to-server encryption, and client-to-client or end-to-end encryption (E2EE)”, [8]. Frist of all, Bank must request from all customersto update them data, to allow thebankregistering customer fingerprints in the bank database, then, customer will demand a withdrawal amount through his mobile banking application, in related request customer location will be sent to the bank, bank will select the ATMs that located in the same area, and then determine the number of people front of each machine through cameras installed ( this operation will be done automatically), the Application must suggest the best solutions in termsof distancefromthe client and the smallest number of people, thenbindstheOTP with customer fingerprint which will be incepted through PYcrypto, customer will receive the message ask him go to the nearest ATM which be mentioned in the message with request button in same message ask him ( when youfrontof ATM, confirm that), after the customer arrived at ATM will pressthe button in the massage the bank will replywithOTP ( but the good news is, customer will not use at all OTP ), only he will use his fingerprint to take the amount directly, also w have another good news at this point, if any hacker eavesdropped the OTP he cannot do anything by this number, because this number only to inform the customer that your amount is ready. Imagine the worst case, any hacker succeeded to eavesdrop the massage which includes the location of ATM, the third good news is, he cannot receive any cash, because the money only receives by customer fingerprint.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1392 4. Terms and background Pycrypto is Python toolkit, with a selection of implementations of cryptographic algorithms including a random number generator. Itistime-savingandincreasesthe Security, [9]. Other subpackages of the Pycrypto includes; Crypto.Cipher, Crypto.Hash, Crypto.Protocol, Crypto.PublicKey, Crypto.Signature, and Crypto.Util. Eavesdropping Attack is the unauthorized interception of private communications between two parties. This could include messages, phone call, video or fax transmission. It looks like someone standing under the eaves of a house and listening to conversation been made. The conversation between tow device containing many nods, if a hacker compromises only one node, he can access the IP packets flowing through that node, many tools can allow striker to save a conversation, [10]. Encryption is one of the best Countermeasures to face eavesdropping attack, [10]. OTP (OneTime Password)is a password thatisvalidforonly one session at the digital system service, it is a secure and fixed password which is not vulnerable to replay attacks. To receive an OTP, a customer is prompted to the enter his username/email address or registration number or both (based on application policy). If he supplies correct credentials, then his account will be enabled to receive the OTP. Once the user is authenticated, he gets the One-Time password, [11]. IoT (Internet of Things) is the network of physical devices, vehicles, mobile, tablets, laptop, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which allows these objects to communicate and exchange data. Recent research predicted that by the year 2020, about fifty (50) billion of such devices are expected to be deployed [12]. ECC (Elliptic Curve Cryptography) is analgorithmthatallows key sharing, information transferring and mutual authentication between clients or users and the central server in a secure manner, [13]. 5. Challenges In our research, we faced a challenge as banks refused to cooperate with us due to, we need cooperation with some banks to study the real situation, cost, Legislation to obtain customer fingerprint, devices. 6. Research goal Themost significant two aimsof this research are, saving the customer time while carrying out transaction, and an increase inthe securitylevelwhichcurrentlyisnotsupported in traditional ATM setting. Usually, a customer needs about thirty (30) seconds or more to get his cash from ATMs, but the method proposed in this paper will allow the same transaction for a shorter period of five (5) seconds. On the other hand, we will improve the security, in protecting private communication between customers, mobile app,and ATMs. We willmake a relation betweencustomerfingerprint and OTP (one-time password), then generate a secured number based on customer fingerprint, he will use it only to withdraw his money in 5 second. This feature will add value to the bank's services, the bank can market it to attract the customer. 7. Critical scenario 1- Use fingerprint to withdraw cash. 2- Use D.QR-code to withdraw cash 3- Use Barcode to withdraw cash 4- Use finger eye to withdraw cash. Fig -2 Before Implement our project. Fig -3 after Implement our new contribution.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1393 8. Expected results This research aims to design, implement, and evaluate a new concept to withdraw money through Pycrypto, fingerprint, and mobile banking Application. The proposed system guarantees a high efficiency to save a customer’s time and improve the security to protect a customer’s privacy, and credential data. In the case of ATM security, the proposed system enhances the ATMs security and more privacy protection for the customer during any transactional operation. In addition, we improved the current OTP (one- time password) by connecting it with fingerprint number which will be secured by PY Crypto. Then we will use PY to encrypt and decrypt the sensitive numbers in this project. There is no time wasted in carrying out a transactionasinthe traditional way, and no needto stand in the queuetogetcash. This research is highly profitable for industries especially if implemented in specific country’s (developing countries). Finally,we can customize the project asappropriate for each country, andthe system can be integratedwiththeInternetof things (IoT). 9. Conclusion In this paper, we have explored a criticalscenario,D.QR-code, Barcode, finger eye, and fingerprint to withdraw cash. We focused on how to be using py crypto, a fingerprint to get your cash, and described the Encryption is one of the best Countermeasures to face eavesdropping attack, we used it with parametric to give maximum protection through withdraw cash operation. ACKNOWLEGMENT The authors gratefully acknowledge the anonymous reviewers for their constructive comments, ideas and suggestions. REFERENCE [1] Yadav, Deepak, et al. "Intensify the security of one-time password using elliptic curve cryptography with fingerprint for e-commerce application." International Journal of Engineering Science 5480 (2017). [2] Cámara, Noelia, David Tuesta, and Pablo Urbiola. Extending access to the formal financial system: the banking correspondent businessmodel.No.1510.2015. [3] Hajare, Uday, et al. "Efficient CashWithdrawalfromATM machine using Mobile Banking." (2018). [4] Rahman, Mahbub, et al. "Problems and prospects of electronic banking in Bangladesh: A case study on Dutch-Bangla Bank Limited." American Journal of Operations Management and Information Systems 2.1 (2017): 42-53. [5] Risodkar, Y. R., et al. "ATM Authentication with Enhance Security Using GSM." Journal of Science and Technology (JST) 2.5 (2017): 01-05. [6] Kumar, V. Naveen. "Research Scholar “Advanced Handheld Electronic banking System using Raspberry pi." Advanced Research Journals of Science and Technology (ARJST) 4 (2017): 276-279. [7] El-Gawady, Zeinab Mohamed. "Relationship betweenE- money and Monetary Policy in Egypt." (2018). [8] Lee, Jeeun, et al. "Security Analysis of End-to-End Encryption in Telegram." SCIS 2017 (2017). [9] Butschek, Caroline. Using Autocorrelations to Detect Potential Side-Channels. Diss. [10] Velianitis, Georgios, et al. "Comparison of VoIP and TETRA regarding security in a safety critical environment." Journal of Computers 13.3 (2018): 279- 287. [11] JIni, MrsA. Jackulin Sam, et al. "TENABLE ONLINEISSUE OF BIRTH CERTIFICATE FOR REGIME CONGLOMERATE." (2018). [12] Sheth, Amit, Biplav Srivastava, and Florian Michahelles. "IoT-Enhanced Human Experience." IEEE Internet Computing 1 (2018): 4-7. [13] Jegadeesan, S., et al. "ECC based Algorithms for Secure Water Quality Monitoring System UsingWirelessSensor Networks." (2018). [14] Pal, Joyojeet, et al. "Digital payment and its discontents: Street shops and the Indian government’s push for cashless transactions." (2018). [15] Oye, N. D., and Jemimah Nathaniel. "Fraud Detectionand Control System in Bank Using Finger Print Simulation." (2018). [16] Johnson, Ariana L. "Cybersecurity for financial institutions: The integral role of information sharing in cyber attack mitigation." NC Banking Inst. 20 (2016): 277.