Professional Documents
Culture Documents
Abstract— The flexible use of credit and debit card transactions or a PIN, which is entirely pivotal to keeping to memory or safe
has become increasingly ubiquitous and so have the associated storage of an authentication key.
vulnerabilities that make them a common target for cyber
criminals. Furthermore, a prevalent complication associated with Since conventional card blocking processes tend to be
blocking of ATM cards involves tedious interactive processes and
cumbersome and time consuming, our system was designed both
even possibly long waiting times during interaction with customer
care services. Using a three factor authentication scheme employing to overcome afore mentioned security issues and to additionally
NFC (Near Field Communication: an emerging technology evolved eliminate common inconveniences by facilitating blocking of
from a combination of contact-less identification and cards from ATMs nearest to the user. This is implemented by
interconnection providing data exchange), Dash Matrix Algorithm QR code authentication [1]. Essential functioning of our
and One-time password, we describe and quantify the potential to proposed system involves 4 key processes enumerated below:
overcome common transaction liabilities (brute force attack,
shoulder surfing, skimming of ATM cards, etc.). The auxiliary A. Secured ATM transactions using NFC
feature of blocking ATM cards is implemented using a QR code
authentication scheme and NFC technology, implemented both in B. Blocking of lost ATM cards
NFC enabled phones and non-NFC phones (with the help of an
C. NFC registration
NFC transmitter, receiver and Bluetooth). The proposed system,
therefore, ensures both secure usage of ATM cards and cost D. Facilitation of NFC using non-NFC mobile phones
effectiveness by utility of novel and increasingly common
technology, when also simultaneously proving to be user friendly.
The rest of the paper is organized as follows- Section II
Keywords— ATM transaction, Blocking of ATM Card, Dash discusses related works and relevant derivatives used in our
Matrix Algorithm, NFC, One-Time Password, Negative Pattern system. Section III describes the proposed methodology,
Password, Non-NFC enabled phones, Bluetooth, NFC-Transmitter, detailed processes involved, and various supporting features and
NFC-Receiver, Microcontroller their implementations. Section IV analyses and compares
performance results obtained from both simulations and
I. INTRODUCTION experiments conducted in real time. Section V concludes the
A fairly and increasingly common loss involving theft in paper with future work and comments on implementation details
digital commerce is stealing or skimming of ATM cards. Unlike and the system’s advantages over contemporary counterparts.
most other means of theft, this is an innate vulnerability of the
ATM system and network itself. In order to overcome this
II. RELATED WORKS
inherent weakness, we describe system using a relatively new
technology called NFC to enforce security during transaction and Using references [1] to [6], we derived various design
usage. This paper’s methodology aims at using both NFC- aspects used in our system, primarily featuring novel usage of
enabled and non-enabled cell phones for designing a dedicated NFC. Each of these sources are mentioned below along and their
application that can communicate with the ATM machine. Due derivatives in our system summarily explained
to inherently short range capabilities of NFC, cell phones can
communicate with ATM machines only within close proximity. Young-Gon Kim et al [1], suggests a methodology utilizing
Our proposed system eliminates the requirement of a password OR code as a password authentication technique that simply
Fig. 6. Bank Interface where the card block request can be viewed
2) During the transaction process while using NFC, the 3) Mobile Bluetooth
Bluetooth is enabled in the kit once the tag is read and it
user has to register the Pattern Password which acts as the
triggers the Bluetooth of the mobile device. The URL written in
authentication key. The pattern is drawn by holding down a
the tag now opens in the web browser of the mobile device
touch click, during which the cursor is moved along the
with an application. The hardware kit with the microcontroller
path in a single stroke without being lifted until completion.
and the Bluetooth chip is shown in Fig. 10.
[8]. It is the same as drawing the pattern on a mobile device
as Fig. 8.
IV. RESULTS
The entire process from swiping the card to entering the OTP
on the screen was tested under simulation. Real time testing was
conducted on a test bed machine possessing average home
computer hardware specifications and running on Windows 7.
Fig. 11. Writing Data into NFC card The cell phone used during the test was furnished with internet
connectivity having a connection speed of 2.14 Mbps.
The microcontroller is coded in Embedded C programming
language to enable Bluetooth once the tag is read. This
Bluetooth will enable to interact with the Bluetooth of the
mobile device. A pop up notification is triggered to enable
Bluetooth in the mobile phone as in Fig. 12.(a) and 12.(b).
Table.1. Time taken in seconds considering both NFC enabled and Non-NFC
mobile phones
Table Conventions