You are on page 1of 6

An NFC featured three level authentication system for

tenable transaction and abridgment of ATM card


blocking intricacies

Anusha Mandalapu Daffney Deepa V Laxman Deepak Raj Anish Dev J


Dept. of I.T., Dept. of I.T., Dept.of C.S.E., Dept. of C.S.E,
Panimalar Engineering College, Panimalar Engineering College, College of Engineering, Guindy, College of Engineering, Guindy,
Anna University, India Anna University, India Anna University, India Anna University, India
anushamandalapu91@gmail.com daffydeepa0312@gmail.com drrocks90@gmail.com anishdjd@yahoo.com

Abstract— The flexible use of credit and debit card transactions or a PIN, which is entirely pivotal to keeping to memory or safe
has become increasingly ubiquitous and so have the associated storage of an authentication key.
vulnerabilities that make them a common target for cyber
criminals. Furthermore, a prevalent complication associated with Since conventional card blocking processes tend to be
blocking of ATM cards involves tedious interactive processes and
cumbersome and time consuming, our system was designed both
even possibly long waiting times during interaction with customer
care services. Using a three factor authentication scheme employing to overcome afore mentioned security issues and to additionally
NFC (Near Field Communication: an emerging technology evolved eliminate common inconveniences by facilitating blocking of
from a combination of contact-less identification and cards from ATMs nearest to the user. This is implemented by
interconnection providing data exchange), Dash Matrix Algorithm QR code authentication [1]. Essential functioning of our
and One-time password, we describe and quantify the potential to proposed system involves 4 key processes enumerated below:
overcome common transaction liabilities (brute force attack,
shoulder surfing, skimming of ATM cards, etc.). The auxiliary A. Secured ATM transactions using NFC
feature of blocking ATM cards is implemented using a QR code
authentication scheme and NFC technology, implemented both in B. Blocking of lost ATM cards
NFC enabled phones and non-NFC phones (with the help of an
C. NFC registration
NFC transmitter, receiver and Bluetooth). The proposed system,
therefore, ensures both secure usage of ATM cards and cost D. Facilitation of NFC using non-NFC mobile phones
effectiveness by utility of novel and increasingly common
technology, when also simultaneously proving to be user friendly.
The rest of the paper is organized as follows- Section II
Keywords— ATM transaction, Blocking of ATM Card, Dash discusses related works and relevant derivatives used in our
Matrix Algorithm, NFC, One-Time Password, Negative Pattern system. Section III describes the proposed methodology,
Password, Non-NFC enabled phones, Bluetooth, NFC-Transmitter, detailed processes involved, and various supporting features and
NFC-Receiver, Microcontroller their implementations. Section IV analyses and compares
performance results obtained from both simulations and
I. INTRODUCTION experiments conducted in real time. Section V concludes the
A fairly and increasingly common loss involving theft in paper with future work and comments on implementation details
digital commerce is stealing or skimming of ATM cards. Unlike and the system’s advantages over contemporary counterparts.
most other means of theft, this is an innate vulnerability of the
ATM system and network itself. In order to overcome this
II. RELATED WORKS
inherent weakness, we describe system using a relatively new
technology called NFC to enforce security during transaction and Using references [1] to [6], we derived various design
usage. This paper’s methodology aims at using both NFC- aspects used in our system, primarily featuring novel usage of
enabled and non-enabled cell phones for designing a dedicated NFC. Each of these sources are mentioned below along and their
application that can communicate with the ATM machine. Due derivatives in our system summarily explained
to inherently short range capabilities of NFC, cell phones can
communicate with ATM machines only within close proximity. Young-Gon Kim et al [1], suggests a methodology utilizing
Our proposed system eliminates the requirement of a password OR code as a password authentication technique that simply

978-1-4799-6908-1/15/$31.00 ©2015 IEEE


read images and transmits them to the server. Its effectiveness A. Secured ATM transactions using NFC
against several attacks such as brute-force attack, man-in the- This process aims at faster and reliable dealings with banks
middle attack and keyboard hacking are examined and degrees and ensures ease of use for ATM users. This process is further
of vulnerabilities are compared. divided into two sub segmented processes:
Hung-Min Sun et al [2], proposes a method which leverages 1) The first level of authentication involves ATM card
a user's cell phone and short message service to thwart password swiping or manual ATM card number entry in case of card
stealing and password reuse attacks. Through oPass, users only
detection failure, damage to the card, or just its absence.
need to remember a long-term password for login on all
The latter is suggested as an optional method to avoid ATM
websites. Evaluations of the oPass prototype concluded the
system as being efficient and affordable compared with the card skimming.
conventional web authentication mechanisms.
2) The successive process features the use of an NFC
Blake Ross et al [3], describes a browser extension, enabled cell phone having access to Internet. The user is
PwdHash that transparently produces a different password for required to tap the cell phone on the NFC tag fixed on the
each site, improving web password security and defending ATM. Upon successful NFC tagging, a webpage on the Cell
against password phishing and other attacks. phone’s browser requests for a pre-registered phone number
Chris Karlof et al [4], proposes a novel technology called as a user input. Following this step, the user is required to
dynamic pharming. Dynamic pharming enables the adversary to enter a Pattern Password that was previously registered
eavesdrop on sensitive content, forge transactions, sniff online during the registration process to use NFC, discussed
secondary passwords, etc. To counter dynamic pharming in Section III (C). The pattern password
attacks, they proposed two locked same-origin policies for web (Fig. 2.), appears as a random set of numbers. The OTP is
browsers. then generated on a subsequent page, which is then entered
Min Wu et al [5], presents a solution to the problem of on the ATM’s screen before a preset timeout.
reusing passwords saved in computers using mobile phones as
hand-held authentication tokens, and a security proxy which
allows the system to be used with unmodified third-party web
services to develop a system that is both secure and highly
versatile.
N. Provos et al [6], identifies the four prevalent mechanisms
used to inject malicious content on popular web sites: web
server security, user contributed content, advertising and third-
party widgets. For each of these areas, they present examples of
abuse found on the Internet. They also present the state of
malware on the Web and emphasize the importance of the threat.

III. PROPOSED WORK


This section presents the proposed system, setup, and
detailed explanation of essential processes involved. An
overview of the system is shown in Fig.1

Fig. 2. Dash Martix Fig. 3. OTP generation

The afore mentioned sub-segment processes (2) makes use


of the following procedures which are elaborated below:
a) NFC Tag reading
The user reads the NFC–TAG, by swiping the cell phone
over the NFC tag on the ATM. The tag consists of a restricted
URL [7] (For experimental study:
“http://www.atm.creatist.in/transaction”), designed for
secured password input through the mobile device.
Fig. 1. System Overview
b) Dash Matrix algorithm 2) Upon its activation, the user is required to enter the
Once the user reads the NFC tag using the NFC enabled registered Card number and Negative Pattern Password
mobile phone, the mobile web browser opens the secure URL (NPP). The NPP is sent by the bank server during
stored in the tag, wherein, the user is required to enter the pre- registration (as discussed in Section III C) of the pattern as in
registered mobile phone number as the first step. Upon phone Fig .8.
number verification, the user is required to enter the dummy
values on the mobile device [2] that appears on the screen, based 3) On validation of the PVP, a Quick Response (QR) code is
on a pattern that was registered initially at a preset website (For generated on the ATM screen. The QR code is scanned in the
experimental study: http://atm.creatist.in/register). phone and a unique URL is generated. After opening it in the
mobile browser, a confirmation page is requested to the user.
The Pattern Password concept involves a new algorithm On user confirmation, a success screen is displayed.
called the Dash Matrix Algorithm (DMA), which is based on the Simultaneously, the intimation of this request to block the
location points of the registered pattern and its generated dummy card is sent to the bank server (For experimental study:
values. It appears as a random set of 3*3 matrix values called the http://atm.creatist.in/bank/interfaces). Account ownership
Dash pattern. The Dash pattern of the 3*3 matrix changes can be ensured through phone call verification by the bank
dynamically every time the user tries to make a transaction [3]. once the request is registered. Further steps are taken to
Only the values that appear on the matrix are to be entered as the deactivate the account as per bank rules.
input in the mobile device and it is called as the Pattern Value
Password (PVP). The user need not draw the pattern on the
screen. By this, the pattern cannot be reused from the system
[5]-[6]. The user has to, therefore, only temporarily remember
the pattern and enter dummy values, in accordance to the pattern
he had registered. This confirms the second step of the
authentication procedure.

c) One Time Password (OTP)


Once the second step is successfully verified, a four digit
One-Time Password (OTP) is generated on the mobile screen
with a timeout which is valid only for few seconds, say 60
seconds as in Fig. 3. If it exceeds the timeout, then a new OTP is
generated. The OTP has to be entered on the second screen of Fig. 5. Unique Card block URL
the ATM which appears after swiping or entering the ATM card
number. If both the passwords match, the user can continue his
transactions henceforth. This corroborates the third-level of
authentication.

B. Blocking of lost ATM cards

Fig. 6. Bank Interface where the card block request can be viewed

Fig. 4. ATM Card blocking overview

An overview of the methodology implemented to facilitate


easy blocking of cards is shown in Fig. 4. Elaboration of the
steps involved in the process follows below:
1) An ATM card blocking function is made available on the
ATM home screen without the requirement of having to log
in for usage.
Fig. 9. e-mail sent with Negative Pattern Password

D. Facilitation of NFC using non-NFC mobile phones


Issues concerning portability of the proposed system onto
mobile devices, not having NFC, can be dealt with by a bridging
system. A broken down, component-wise description of this
system is described below:
1) NFC Transmitter
Fig. 7. Database details of cards initiated for blocking
A hardware kit which has an NFC transmitter, as given
in Fig. 10, has a Microcontroller ARM 2103 and a receiver.
C. NFC Registration
The process of online registration to enable transactions 2) NFC Tag(MIFARE Classic Card)
using NFC comprise of the following procedures: An NFC MIFARE card is used to write the private URL
that the mobile application opens in a browser after NFC
1) A website for registration is developed for registering
tagging. The MIFARE Classic 1K tag (used for study) offers
the personal details of the user.(For experimental study
1024 bytes of data storage.
http://atm.creatist.in/register/init)

2) During the transaction process while using NFC, the 3) Mobile Bluetooth
Bluetooth is enabled in the kit once the tag is read and it
user has to register the Pattern Password which acts as the
triggers the Bluetooth of the mobile device. The URL written in
authentication key. The pattern is drawn by holding down a
the tag now opens in the web browser of the mobile device
touch click, during which the cursor is moved along the
with an application. The hardware kit with the microcontroller
path in a single stroke without being lifted until completion.
and the Bluetooth chip is shown in Fig. 10.
[8]. It is the same as drawing the pattern on a mobile device
as Fig. 8.

3) On completion of this process, the user will receive an


acknowledgement to the registered e-mail id that will
contain a negative pin which is a Negative Pattern Password
(NPP) in this discussion as Fig. 9. This NPP is used to block
the ATM card. In this way, card blocking is upgraded to
feature greater ease of use and higher levels of safety.

Fig. 10. NFC Transmitter Hardware Kit

Fig. 8. Register pattern


The MIFARE card is written with data using an NFC writer.
The one used in our study is a starter kit CD by Digant
Technologies that has an installation drive. The drive runs an
application that enables to do certain functions as shown
in Fig. 11.

Fig. 12 (c) Fig. 12 (d)

IV. RESULTS
The entire process from swiping the card to entering the OTP
on the screen was tested under simulation. Real time testing was
conducted on a test bed machine possessing average home
computer hardware specifications and running on Windows 7.
Fig. 11. Writing Data into NFC card The cell phone used during the test was furnished with internet
connectivity having a connection speed of 2.14 Mbps.
The microcontroller is coded in Embedded C programming
language to enable Bluetooth once the tag is read. This
Bluetooth will enable to interact with the Bluetooth of the
mobile device. A pop up notification is triggered to enable
Bluetooth in the mobile phone as in Fig. 12.(a) and 12.(b).

Table.1. Time taken in seconds considering both NFC enabled and Non-NFC
mobile phones

Table Conventions

Fig. 12.(a) Fig. 12.(b) V. CONCLUSION AND FUTURE WORK


This new proposal is put forward to diminish the concept of
Once the Bluetooth is detected after making the device PIN as a password for the process in an ATM system. As the
discoverable and paired with the phone device, the restricted future is still vulnerable to password attacks such as Peeping
ATM transaction URL opens in the web browser with the help attacks, Brute-Force attack, Retrieving passwords from the
of an application. The procedure being the same as detailed systems, Skimmers, etc, all these aspects are oppressed by
earlier. The MIFARE cards can be issued to the NFC registered imparting this new method. On using NFC, it is easy to open a
customers to make use of it for secure transactions. These users webpage without the wastage of browsing time. By the use of
will need an Android phone, an active internet service, a web dummy password, i.e. PVP, the level of security is escalated and
browser and a QR code scanner.
avoids the slightest percentage of attacks. Usually the
acknowledgement of OTP through the erstwhile text messaging REFERENCES
causes delay in receiving it. To evade this issue, we generate an [1] Young-Gon Kim and Moon-Seog Jun, “A design of User Authentication
OTP on the webpage with a Timeout. Introduced here is an system using QR code identifying method”, 6th International Conference on
essential feature that alleviates user’s anxiety for blocking of Computer Science and Convergence,Information Technology, IEEE
Transactions, pp. 31-35, Nov-Dec 2011.
ATM Card by approaching the nearest ATM. This cuts down the Blake Ross, C. Jakson, N. Miyake, D. Boneh, and J.C. Mitchell, “Stronger
[2]
waiting time of the user on the customer care phone line, who password authentication using browser extensions,” in SSYM’05: Proc. 14th
may also be in a sense of grief. Conf. USENIX Security Symp., Berkeley, CA, pp. 2-2, USENIX
Association,2005.
[3] Zhengming Li, Lijie Xue and Fei Tan, “Face detection in complex
The QR code generation is also reliable as it generates a background based on skin color features and improved AdaBoost
unique URL in accordance to the card number. The Negative Algorithm” Progress in Informatics and Computing (PIC ), 2010 IEEE
Pattern Password will strengthen the confirmation of the International Conference, Vol. 2 , pp. 723-727, Dec. 2010.
legitimate user. This scheme not only presents as an advantage [4] Chris Karlof, U. Shankar, J. D. Tygar and D. Wagner, “Dynamic pharming
attacks and locked same- origin policies for web browsers” in
to the user, but also aids the Bank. The intimation received to CCS’07:proc. 14th ACM Conf. Computer Communications Security, New
them from the proposed interface, can provide to deactivate the York, 2007, pp. 58-71, ACM.
user’s account by placing an additional phone call for [5] Min Wu, S. Garfinkel and R. Miller, “Secure Web authentication with
confirmation. As a result, the NFC technology and the Dash mobile phones” in DIMACS Workshop usable Privacy Security Software,
Citeseer, 2004.
Matrix concept can be subsequently used for many relative N. Provos, D. Mcnamee, P. Mavrommatis, K. Wang and N. Modadugu, “
[6]
fields. Thus, NFC usage is less time consuming, feasible, The ghost in the browser: Analysis of Web based Malware” Proc. 1st Conf.
reliable and also cost efficient, given the cost of a single NFC Workshop Hot Topics in Understanding Botnets, Berkeley, CA, 2007.
MIFARE card being between $1.75 to $ 2.0 (1000 units).

Future proposals on enhancement would be the usage of


NTag21x family of tags, which is the latest advancement with
more security features and faster read capacity. Also MIFARE
DESFire EV2, MIFARE SAM AV2 cards can be used as they
provide AES and secure storage for cryptographic keys. The
tags can be tested for the NFC enabled phones while the latter
can be used for non-NFC mobile devices.

You might also like