You are on page 1of 5

e-ISSN: 2582-5208

International Research Journal of Modernization in Engineering Technology and Science


( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com

SMART ATM PIN RECOVERY USING OTP


Dr. K. Geetha*1, Muralitharan R*2, Poornima A*3,
Sanjai Kumar S*4, Surya N*5
*1Professor, Dept Of Computer Science And Engineering, Excel Engineering College,
Komarapalayam, Tamilnadu, India.
*2,3,4,5B.E Computer Science And Engineering, Excel Engineering College,
Komarapalayam, Tamilnadu, India.
DOI : https://www.doi.org/10.56726/IRJMETS34746
ABSTRACT
In today’s world, money can be required at anytime or anywhere such as shopping, travelling or health
emergencies etc. The need of money can only be satisfied when you are carrying money with you . That also
increases the risk of getting robed. Bank is a safest place to keep money. Bank provides Automated teller
machine (ATM) which can provide money any where you want. ATM is an easy way to get money, you just need
to insert card and password and you just got the money . But what if someone will steal your card and
somehow he/she will know your password, it will grant him/her full access to your money. That raise question
on present security and demands something new in the system that can provide second level of security One
time password (OTP) is password that validates an authentic user for only one login to the respective system . If
user is unauthorized, system will not allow further access. OTP can be generated by using different
cryptographic hash functions that provides a fixed string which can be used as second level security at ATM . In
generation of OTP there are many factors that can make OTP unique every time it is generated.
Keywords: OTP, Hash Function, ATM, Password.
I. INTRODUCTION
PIN based verification is mostly done in the automatic teller machine transactions. Enhancing this security, user
authentication process is an important activity. The major problems include shoulder-surfing attacks, replay
attacks, card cloning, and PIN sharing. Multiple researches have also been conducted to create systems
supporting card-less transactions .These are getting popular, where users can use additional personal devices
,such as mobiles phones, to perform ATM transactions. Shoulder-surfing attacks, also known as observation
attacks, are most common threat for ATM authentication. In this case, the attacker simply views the entry
procedure of the PIN by the authorized user to get hold of the secret information. Credit card and debit card
frauds due to identity thefts are increasing every year. Additionally, there are scamming techniques using fake
terminals, credit card cloning, and remote relay which make the process of user protection harder. The attacker
can be standing in queue behind the. authenticating person and looking at the PIN entry and execute a
shoulder-surfing or observation attack The attacker may also install a small camera on the top surface of the
ATM terminal to record PIN entries of users at the point-of-service. The attacker can install a card skimming
device on the ATM machine to get hold of the user’s card information. Such devices fit at the card slot on ATM
machines and record the card information as the user slides in their card .The security level is thus improved by
providing a PIN authentication protocol for ATM using mobile applications in smart phones. Image processing
technique is further used for user identity checking process when a maximum of three PIN attempts is made by
the user.
II. PROBLEM STATEMENT
The problem with current ATM banking is, every day there is something new that make bad impact on security
related to ATM banking. This leads to necessity of new techniques or algorithms to deal with new possible
attacks that can happen. This proposed work will give a good way to solve problems like card fraud, skimming,
card data stealing/trapping.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[2961]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com
III. EXISTING SYSTEM
In the existing system has no security measure against logging in and no checks are made for authorized users.
The card details, the deposit details, the withdrawal details, the account balance details are maintained
manually. The study of the existing system revealed that the system has several drawbacks.
IV. PROPOSED SYSTEM
The Proposed system should overcome the entire disadvantage faced by the existing system. The main
objectives of the proposed system are to reduce the human work, reduce the maintenance time, and to make
the system more user friendly, efficient, more accurate and fast processing. The user enters the account number
and pin for transactions. if the user enters the invalid pin three times. an alert message will be displayed in the
popup window. it displays you entered wrong pin .user gave their registered acc no and password for create
new pin. it validates that OTP.
V. ADVANTAGES
 Avoid user visiting bank.
 Less time consuming.
 The system suitable for emergency situation.
 To reactivate the atm card at any time and any where.
VI. MODULES
Admin
 Authentication.
 New Account.
 Account Details.
 Branch Details.
User
 Registration.
 Login.
 Balance Enquiry.
 Money Transfer and Transaction Details.
VII. SYSTEM SPECIFICATION
 SYSTEM SPECIFICATION.
 HARDWARE REQUIREMENTS.
 System: Pentium Dual Core.
 Hard Disk: 500 GB.
 Monitor : 15’’ LED.
 Input Devices : Keyboard, Mouse.
 Ram : 4 GB.
VIII. SOFTWARE REQUIREMENTS
 Operating system: Windows 10.
 Front end: PHP.
 Back end: MYSQL
 Software : WAMP Server
 Designing Tool: Macromedia Dreamweaver

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[2962]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com
IX. OUTPUT SCREEN
HOME PAGE

ADMIN LOGIN

ADMIN HOME

ADMIN ACCOUNT CREATION

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[2963]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com
USER REACTIVATING PASSWORD

USER LOGIN

USER HOME PAGE

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[2964]
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal )
Volume:05/Issue:03/March-2023 Impact Factor- 7.868 www.irjmets.com

OTP GENERATION

X. CONCLUSION
This proposed work is developed on the basis of more need of security in ATM banking system. Now-a-day’s
ATM is getting less secure with emerging ways to hack/crack ATM PIN or ATM card. This proposed work is
using SHA-1 algorithm to generate OTP with more randomness provided in proposed system after generation
of SHA-1 hash string. And that OTP will be used to access ATM transactions.
XI. FUTURE WORK
In future work this proposed work can use enhanced and more accurate equipments with better algorithms.
More efficient biometric methods can be used like iris scanner, voice recognition etc. Latest algorithms like
SHA-3 can be used to generate OTPs.
XII. REFERENCES
[1] European ATM security [Online]. Available: https://www.european-atm-security.eu/atm-industry.
[Accessed: 12 Nov 2014].
[2] Kristin s. Fuglerud and Oystein dale “Secure and Inclusive Authentication with a Talking Mobile One-
Time-Password Client” IEEE J. Security & Privacy, Volume: 9, Issue: 2, Pages 27-34, March-April 2011.
[3] N. Haller, C. Metz, P. Nesser, One-Time Password System, RFC 2289, February 1998.
[4] Aastha Bhargava, Priya Jain “Biometric; an Effective Shield in Today’s Scenario” RGPV International
Conference on Cloud, Big Data and Trust 2013, Nov 13- 15.
[5] Secure Hash Standard (SHS), FIBS PUB180-4, March 2012. [6] D. Eastlake, P. Jones. A US Secure Hash
Algorithm 1 (SHA1), RFC 3174, September 2001.
[6] D. Eastlake, P. Jones. A US Secure Hash Algorithm 1 (SHA1), RFC 3174, September 2001.

www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science


[2965]

You might also like