Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Design and Implementation of Security Based Automatic Teller Machine against Intruders

Author : Niranjan L 1 Sushma S 2 Shreekanth R 3 Santhoshilakshmi G S 4

Date of Publication :15th June 2017

Abstract: This paper explores The Idea of Designing and Implementation of Security Based ATM against intruder are born with the observation in our real-life incidents happening around us. This paper deals with prevention of intruder from robbery and to overcome the drawback found in existing technology in our society. Whenever an intruder tries to attack a citizen in the ATM unit, the citizen used the panic button which is places next to the keyboard which sends the SMS to the concerned bank manager and the nearest police station and alarm goes on. And whenever the intruder tries to steal the ATM money box in the ATM unit metal detector senses this which is placed near by the ATM money box and sends the SMS to the concerned bank manager and nearby police station and alarm goes on. There by locking down the ATM with the magnetic door lock present at the top of the ATM door till the police attends the place

Reference :

    1. The ATM Forum Technical Committee, „ATM Security Framework 1.0‟, AF-SEC-0096.000, February 1998.
    2. The ATM Forum TechnicalCommittee,„ATM Security Specification 1.0‟, ATM-SEC-0100.001, February 1999.
    3. Lyndon G. Pierson, Edward L. Witzke, Sandia National Laboratories, Mark O. Bean, and Gerry J. Trombley, National Security Agency, „Context-Agile Encryptio for High Speed Communication Networks‟, Computer Communication Review, ISSN 0146-4233, Volume 29, Number 1, pages 35-49, January 1999.
    4.  Which?, “Fraud victims struggle toget money back,” June 2009. [Online]. Available: http:// www.which.co.uk /news /2009/06/fraudnt victimsstruggle-to-get-money-back-179150.jsp
    5. S. Drimer and S. J. Murdoch, “Keep your enemies close: Distance bounding against smartcard relay attacks,” in USENIX Security Symposium,August2007.
    6. S. Drimer, S. J. Murdoch, and R. Anderson, “Thinking inside the box: system-level failures of tamper proofing,” inIEEE Symposium on Security and Privacy (Oakland), May2008, pp. 281–295. [Online]. Available: http:// www. cl. Cam . ac . uk / ∼sd410/ papers /per attacks.pdf.
    7. Schwiderski-Grosche and H. Knospe. Securem-commerce. 2004.
    8. D. V. Thanh. Security issues in mobile ecommerce.mFirst International Conference on Electronic Commerce and Web Technologies, pages 467 { 476, 2000.
    9. Wishart and Neville. Micro-payment systems and their application to mobile networks. 2006.
    10. Biswas S., Bardhan Roy A., Ghosh K. And Dey N.,”A Biometric Authentication Based Secured ATM Banking System”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012

Recent Article