Professional Documents
Culture Documents
Master’s Program
Prepared by:
Name: Sewbewsew Yimer
ID: GSR/2610/16
The traditional authentication method used in ATM systems has certain drawbacks.
1. The use of ATM cards and passwords fails to provide accurate verification of the client's identity.
2. It does not offer adequate protection to the card user against theft.
3. Fraudsters can easily obtain the PIN and carry out fraudulent transactions.
4. It can’t protect customers from Vulnerabilities and the increasing wave of criminal activities
occurring at Automated Teller Machines (ATMs.)
The need for enhanced security measures at ATM terminals has led to the exploration of more secure
methods of authentication. One potential technique that has gained attention is biometrics-based
authentication. Among the various biometric methods available, fingerprint-based identification stands
out as a mature and well-established approach. The term "biometric" originates from Greek, where "bio"
refers to life and "metric" means to measuring objects that possess life. Biometric technology
encompasses the measurement of both physiological and behavioral characteristics. These characteristics
include fingerprints, voice patterns, hand measurements, irises, and others. By utilizing these unique
traits, biometrics enables the identification of individuals in a manner that is inherently connected to them
and cannot be easily forgotten, stolen, shared, or hacked like traditional passwords.
Finger Print technology serves as the foundational science of biometrics, utilizing the distinct features
of an individual's fingerprint to authenticate and verify their identity. It is the most widely employed
biometric technology, finding applications in both physical and logical access control. Each person
possesses unique characteristics and patterns within their fingerprints. These patterns consist of ridges,
which are the lines, and valleys, which are the spaces between the ridges. During the verification and
authorization process, these ridges and valleys are compared for matching. The specific traits within a
fingerprint, known as "minutiae," are used for these comparisons. In recent years, there has been a
notable increase in the adoption of biometric-based user authentication systems due to the numerous
advantages they offer over other authentication methods. Biometrics offers several advantages, including
1. The uniqueness of information for each individual and its ability to identify individuals despite
variations over time.
2. It provides strong authentication and can be easily implemented on existing systems.
3. The chances of two people having the same fingerprint are very low.
Fingerprint technology is currently utilized in various security applications such as voting, bank
account operations, and access control to highly secure areas like offices and equipment rooms. The
proposed system aims to be self-manipulative, simple, fast, and significantly more secure. It will enhance
security measures for online transactions, protecting users against ATM card fraud.
1.2 Statement of the Problem
The current system is confronted with several issues. Firstly, conventional authentication systems lack the
ability to differentiate between an imposter who deceitfully acquires access privileges and the genuine
owner. This poses a significant security risk as unauthorized individuals can gain unauthorized access
without being detected.
Secondly, passwords and PINs can be obtained through illicit means such as direct covert observation.
This method allows malicious individuals to acquire sensitive information without the knowledge or
consent of the rightful owner, further compromising the security of the system.
Moreover, easily guessable PINs and passwords, such as those based on personal information like
birthdays or simple numerical sequences like "1234," contribute to the vulnerability of the system. These
weak authentication credentials make it easier for unauthorized individuals to gain access to protected
resources.
Lastly, fraudsters can exploit the system by placing malware at the ATM terminal. This malicious
software is designed to capture magnetic stripe data and PIN codes from the private memory space of the
transaction processing application installed on the ATM. This unauthorized access to sensitive
information can lead to financial loss and compromise the integrity of the system.
Addressing these problems is crucial to enhance the security and reliability of the existing system.
Reference
1. Duvey A.A..ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition &
GSM Technology: Pravara Rural engineering college, loni, Maharashtra, India. Accessed from
http://www.ijetae.com/files/Volume4Issue2/IJETAE_0214_147.pdf
2. K.Senthil Kumar and Dr.S.Vijayaragavan. New Secured Architecture for Authenticationin
Banking Application: Paavai Engineering College, Nammakal, India. Retrieved from
http://www.ijirset.com/upload/2014/february/23_New.pdf