[go: up one dir, main page]

0% found this document useful (0 votes)
40 views13 pages

Atm Security Using GSM Technology

Uploaded by

Sudhakar Hallur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views13 pages

Atm Security Using GSM Technology

Uploaded by

Sudhakar Hallur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

ATM SECURITY USING GSM TECHNOLOGY


Sudhakar Hallur1,Manjunath Bajantri2, Sagar Santaji3
1,3Assistant Professor, Dept. of ECE, KLSGIT, Belagavi
2Associate Software Engineer, L&T, Bengaluru
--------------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: Automated Teller Machine (ATM)’s now a days form of bank notes and to debit corresponding bank
are extensively used all over the world for the withdrawal account. Cards were used to identify the user. As for
of cash. A unique card is issued for each user along with withdrawal of money, different methods are used. For
the unique code provided to him so as to the person may instance, punched cards were used. By the use of such
do all his transactions personally without anyone getting cards, only one payment was authorized. Thereby, a user
known. Since transactions are extensively secure there is had to get a supply of cards from his/her bank because the
no much more security required but in countries like India punched cards were not returned to the user. Another
its very necessary to have a physical security to the example was the use of a magnetic card which had a limited
machine. A provision to give physical security to the life. The use of such cards allowed; for instance twenty
machine is being discussed over here in this paper withdrawals of money. For beginning, personal
presented over here. identification number (PIN) has been of very great
importance in the overall operation.
Keywords: ATM, security, power saving, transmission,
control. 1.2. Keypad

1. INTRODUCTION To do the transactions in an ATM, its very much


necessary to have a keypad consisting of alphabets and
Since ATM’s have been getting theft these recent days, it numbers. Such a keypad is also known as an Alphanumeric
has become very much necessary to increase the security of Keypad. Each number in the keypad has a particular
the ATM machines. A single CCTV camera situated at the frequency associated with it through which the number
corner of the ATM isn’t enough to provide much security pressed gets detected. The figure below shows keypad.
since it only captures the video footage of what have been
going on in the ATM but doesn’t take any measures as such
the thief is imprisoned and handovered to the law. Since
the thief shouldn’t escape from the ATM machine, the
objective of this project is to handover the culprit to the
police by making him stay inside by automatically closing of
the door due to the damage done to the machine and
simultaneously making him unconscious using toxic gas Fig 1. Keypad of an ATM Machine
and at the same time informing the bank and police station
about the activities that has been occurring in the ATM 1.3. Internal Structure of an ATM
cabin.
The internal structure of the ATM is as described as
1.1. ATM Machine shown in the fig 2. It consists of 5 main parts. They are as
follows: Display, Card Reader, CPU, Cash Cartridge and
In modern era ATM system is very essential part of our Vault Housing.
life. It makes very easy our transactions which was very
tedious in early time. It was first used in 1939. Nowadays,
about 1.5 million are installed worldwide.

In consideration of ATM, there are different


aspects that should be considered. First, one has to have an
idea about the communication within ATMs. Second the
issue of security is of paramount importance because all
over the world, there is increasing use of ATMs and the risk
of hacking turn to a reality more than ever before. In the
Fig 2. ATM Internal Structure
past, the function of the ATM was to deliver cash in the

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

1.4. Personal Identification Number by volume, or 2 milligrams per liter of mist, fume, or dust,
when administered by continuous inhalation for some few
Each user is given a personal identification number or a seconds causes unconsciousness for an hour or two but
unique identification number to access the accounts. The doesn’t result in a death of a person. Ex: Chloroform.
personal identification number may be in the format as
XXXX which may be reset in cases of emergency like theft 2. LITERATURE SURVEY
etc.
Madu and Maggie (2002) pointed out that the concern of
1.5. Types of Attacks on the ATM Machine customers about security and privacy, while using this
service, is a major cause of their dissatisfaction. Ihejiahi
The ATM Machines are not secure unless and until some (2009) expressed concern about the lack of cooperation
physical protection methods are provided. The various among banks in the fight to stem the incidence of ATM
types of attacks are as listed in the figure 3. frauds now plaguing the industry. He expressed that the
silence among banks on ATM frauds makes it difficult for
banks to share vital information that will help curb the
menace. Obiano (2009) blamed the menace of ATM frauds
on indiscriminate issue of ATM card without regard to the
customer’s literacy level. According to him one of the
Fig 3. Attacks on ATM Machine frequent causes of fraud is when customers are careless
with their cards and PIN numbers as well as their response
1.6. GSM Technology to unsolicited e-mail and text messages to provide their
card details. Omankhanleu (2009) opined that the current
Global System for Mobile Communications (GSM) is a upsurge and nefarious activities of Automated Teller
standard set developed by the European Telecom Machine (ATM) fraudster is threatening electronic
Standards Institute (ETSI) to describe protocols for second payment system in the nation’s banking sector with users
generation (2G) digital cellular networks used by mobile threatening massive dumping of the cards if the
phones. The GSM standard was developed as a unwholesome act is not checked. Adeloye (2008) identified
replacement for first generation (1G) analog cellular security as well as power outage as major challenges
networks, and originally described a digital, circuit facing the ATM users in Nigeria. Brunner et al. (2004) in
switched network optimized for duplex voice telephony. their study concluded that the location of ATM is a high
This was expanded over time to include data determinant to fraud or crime carried out at ATM point.
communications, first by circuit switched transport, then From this research over 75% of the respondents affirm
packet data transport via GPRS (General Packet Radio that the location of ATM in secluded place contribute to the
Services) and EDGE (Enhanced Data rates for GSM fraud perpetuated at ATM point. ATM within the banking
Evolution or EGPRS). This was further used to implement premises is more secure than ATMs outside the bank
3G, 4G and 5G networks. The GSM time frame is being premises. Also, it is obvious that the location of ATM in
given in the figure 4. attractive place does not make it prone for fraud. Diebold
(2002) in his view states that the major form of ATM fraud
is PIN theft which is carried out by various means;
skimming, shoulder surfing, camera, key pad recorder etc.
This study elucidates that the common type of fraud
perpetuated is PIN theft which is mostly as a result of
congestion at ATM points. Other forms of fraud that were
enumerated by respondents were; force withdrawal, card
theft, and skimming and congestion method fraud at ATM.
Cynthia (2000) states that the 24 hours access to the ATM
machine is a double edge sword, it has both advantage and
disadvantage. Roli Bansal et al (2011) pointed out that
amongst all the fingerprint features, minutia point features
Fig 4. GSM Time slot
with corresponding orientation maps are unique enough
1.7. Toxic Gases to discriminate amongst fingerprints robustly; the
minutiae feature representation reduces the complex
A compressed gas or vapor that has a median lethal fingerprint recognition problem to a point pattern
concentration (LC50) in air of 200 parts per million (ppm) matching problem.

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 898
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

3. METHODOLOGY weight sensor). Person inserts his smart card. After


inserting smart card, the opamp 741 used as a comparator
The work has been carried out in various phases. compares the information present on the smart card with
The various phases are as mentioned below: the info present within the machine. If the information is
valid then there will be normal working of the ATM
a) Literature Survey and Feasibility Check: Machine. Once the transaction made by the authoritative
person gets over, he/she walks out. All the electronic
Initially at the beginning of the work, the drawback in equipments go to “STANDBY” mode once the person walks
the current system are studied. To overcome the out.
drawbacks, similar kind of implementations are studied
via different papers published by different authors. Based b. Case 2: Theft and Harm
on the exhaustive study made of the current
implementations, a solution to overcome the problem is The Machine is placed within the walls so as to provide
found. A feasibility check was done on the solution found the security to the machine. The Shutter is initially kept
for the problem. The feasibility worked and was idea open.
proposed was proceeded with the implementation.
The machine works properly when an authoritative person
b) Design: handling it else no. Sensors are placed at the just beneath
of the physical layer of the machine. These sensors play a
Once the feasibility is checked, the design for the major role in detecting whether any harm is being done.
solution was developed using various circuits and its For detection of damages the vibration sensors are used
corresponding software required. here which goes to detect the damages to the machine the
sensor is interfaced to op amp 741 which is arranged in
c) Implementation and Testing: comparator mode.
After the design part was complete, it was implemented As soon as the vibration detected the output of op amp
using the Embedded C language on Keil uVision software goes high.
on the software part for the programming purpose and is
implemented using the designed circuit on the hardware For the purpose detection of lifting, the machine is
side. The implemented design is then tested using various mounted on trigger switch sensor. As soon as the machine
test cases and the outputs are verified. is lifted from its position the sensor gets activated and the
signal is passed on to next stage for further action. Upon
4. BLOCK DIAGRAM harm to the physical surface of the machine, the o/p
drives the alarm unit which generates a loud alarm such
4.1. Transmitter: that the people around the ATM can be alerted. The same
o/p is connected to the ATM door shield which is
controlled by the servo motor control mechanism and
which disables upon the physical damage to the machine.

Now the person trying to damage the machine is inside


only. Meanwhile the release of the harmful toxic gas in the
machine makes the person unconscious which prevents
the further activities inside the ATM The latching unit is
also connected to the encoder which encodes the status of
Fig 5. Block diagram of Transmitter Section the ATM in binary mode and modulation of the signal is
done using ASK Modulation at a frequency of 433MHz and
a. Case 1: Normal Working transmitted via the transmitting antenna.The sensors and
trigger switch can be connected to the same detecting end
The Machine is placed within the walls so of opamp The unlatching of the ATM status can only be
as to provide the security to the machine. The Shutter is done using by an authoritative person.
initially kept open. The machine works properly when an
authoritative person handling it. The lights, fans, air 4.2. Receiver:
conditioner or any electronic equipments placed within
the ATM cabin goes to “ON” mode only after the person The receiver constitutes a receiving antenna, a receiver,
steps up on the trigger switch (here used as a recognizable demodulator, decoder, 89c51 microcontroller, a LCD

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 899
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

display and an alarm. The block diagram for receiver is 5. WORKING


being shown below in the fig 6.
5.1. Transmitter Side:

Fig 6. Block Diagram of the Receiver Side

A similar kind of receiver unit is being synchronized Fig 7. Microcontroller Part of Transmitter Section
with the frequency of the transmitter i.e. 433MHz. The
received signal is then given to the demodulator wherein The Microcontroller part is very much necessary to
the received signal is demodulated. The demodulated control many activities on the transmitter side. The
signal is then given to the decoder where the information activities may include execution of the program according
sent from the transmitter is decoded. to the conditions occurred, encoding the information,
transmitting, resetting the relay, etc. The operations of
The decoded information is then given to the various parts of the microcontroller section of transmitter
microcontroller for displaying it on the LCD and for are explained below.
alerting the alarm within the main branch such that the
main branch head initiates a further action. 5.1.1. Voltage Regulation Circuit

An extra action that is in hands of main branch head is a. Voltage Step Down:
that he can unlatch the status of the ATM. A similar kind of
receiver system is placed in the Police Station such that One method is a 12-0-12 1A Transformer can be used
they too can take immediate action. for stepping down the voltage directly from 230V/50Hz to
about 12V/50Hz. The current rating of the transformer
The Communication in between the transmitter and used here is about 1A which is sufficient for the electronic
receiver is being done with the help of GSM modem using devices connected. The stepped down output is in the AC
frequencies in the ranges of 900/1800 KHz. Thus the form which is converted to DC using a Bridge wave
unauthorized person i.e. thief is handover to the police. rectifier as discussed below. Conversion of AC to DC is
Thus the system is retained back to its original state by known as Rectification. The connections for the
giving it the necessary repairs after unlatching it. transformer is as shown in the figure 7.

For the purpose of power saving, card is detected the


power supply for fans and lightings are connected through
relay switching unit. For this purpose a comparator
analyses the weight by using the trigger switch places
below the footage of the person where he/she stands
when the transaction is to be made and thus enable the
switching unit so that the lights and fans starts working
and as soon as the weight detected becomes nil, the fans
goes off and lights go to the standby mode automatically Fig 7. Voltage Step Down using a 12-0-12 Transformer
which saves a lots of power consumption
b. Bridge Wave Rectifier:

A Bridge wave rectifier can be used wherein one


half cycle is converted by 2 diodes and for the rest half
cycle, other 2 diodes conduct to convert the input from AC
to DC. The design is as shown below for a Bridge wave
rectifier.

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 900
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

The stepped down output is then being given to T = Time Period


the diodes which are then being connected in the form of
the Bridge Wave Rectifier. The diodes used are 1N4007 ΔV = Difference in Voltage or Tolerance
which can withstand up-to 1000V as a peak voltage. Then a
Bridge Wave Rectifier (BWR) needs to be designed as the C = (1 Ampere x 0.02) / ((12 – 10) x 1000)
input works only on DC Voltage. The rectifier is a device
that converts the AC to DC. Thus a diode needs to be used.
The Bridge wave rectifier is as shown in the fig 8 below.
d. Using a 7805 Regulator

The main reason is to use 7805 regulator is that it


steps down the voltage and gives a stable output as needed
for the electronic components to be used further.

A 7805 regulator is a 3 terminal device which is capable


of stabilizing the voltage not to exceed more than 5V. The
connections of a 3 terminal include input, ground and then
Fig 8. Bridge Wave Rectifier. output. The voltage exceeding 5V is dropped and grounded
and only a stabilized 5V is given as the output. The circuit
A filter capacitor is added to remove the ripples
for the 7805 connections may be as shown in the figure 9
present in the stepped down output. Also the same
below.
capacitor is used for maintaining the voltage. The DC
Voltage is always RMS and so the DC voltage in the circuit
is

VRMS = VIN. * 1.41

Thus 10µF/450V capacitor is used. The design of


the capacitor is shown below.

c. Capacitor Design: Fig 9. Voltage Regulation using a 7805 Regulator

Input from the AC line power source = 230V/50Hz e. Using a 7812 Regulator

Stepping down from 230V to 12V causes only voltage to 7812 regulator is very much necessary for triggering a
change but the frequency remains the same. So the Relay circuit which always works on 12V input. A 7812
frequency remains 50Hz. regulator is a 3 terminal device which is capable of
stabilizing the voltage not to exceed more than 12V. The
Time Period of a wave is the reciprocal of frequency i.e. connections of a 3 terminal include input, ground and then
output. The voltage exceeding 5V is dropped and grounded
T = 1/f and only a stabilized 5V is given as the output. The circuit
for the 7812 along with 7805 connections may be as shown
Given f = 50Hz
in the figure 10 below.
T = 1/50Hz

Now By Formula we have,

C = (I x T) / ΔV

Where, C = Capacitor Value


Fig 10. Voltage Regulation using a 7812 Regulator
I = Current Rating of Transformer

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 901
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

The Hardware implementation of the Voltage Microcontroller 89C51 is made up of CMOS which
Regulation Circuit is as shown in the figure 11. contains flash memory (EEPROM) capable of storing the
program information such as codes and instructions. Since
inbuilt memory is used the pin 14th is connected to VCC. If
external memory is used then pin 14th would have been
connected to GND. The pin no 6 is connected to the relay
part used to control various applications of the project.
Transmitter module is connected to 10th pin of the
microcontroller on the transmitter side. Similarly receiver
module is connected to 11th pin of the microcontroller on
the receiver side.

g. Buffer
Fig 11. Voltage Regulation Circuit
Buffer (74LS245) may be used on the transmitting side
f. Microcontroller for the amplification of the voltage that comes as output
from microcontroller or may be used as a 1-bit storage
Microcontroller 89C51 works on 5V DC supply (Upto
device. Resistors used here are pull-up resistors whose
6.6V tolerable). Among the four ports of the
function is to reduce the voltage that goes to the buffer as
microcontroller, port P1 is used for input and port P2 is
well as microcontroller.
used for output purpose as designed in the program.
h. Bistable Circuit
Initially when the circuit is turned “ON”, a high pulse is
given from 10µF capacitor to the 9th pin of microcontroller
and thus microcontroller is reset. This high pulse occurs
due to discharge of the charge stored in the 10µF capacitor
placed beside the reset switch. This is an automatically
occuring mechanism. Thus the microcontroller resets from
any intermediate state to the start of the program for the
execution from the beginning. Since the 10µF capacitor
helps the microcontroller in resetting initially after the
start its also known as “Autoreset Capacitor”. This resetting
of the microcontroller should be done manually whenever
Fig 12. Bistable Circuit
required.
A monostable multivibrator has a single stable state,
The port P3 of the microcontroller is used for the
once in the process it goes to a stable state and will again
special purposes such as counters, timers, interrups,
enter the astable state and thus the shutter door of the ATM
transmission, reception, crystal oscillators,etc. Since the
will open and easily the thief can escape. Astable
port P3 uses full dupleix transfer of data, it is used for
multivibrator doesn’t have any stable state and thus the
transmission and reception of the information regarding
output of this always goes high and low and thus the ATM
the security of the ATM.
door shutter keeps opening and closing and thus the culprit
Crystal oscillator is very much necessary for the can escape. A Bistable multivibrator has 2 stable states i.e.
execution of the programs since it provides machine cycles high and low. This is the very purpose of using in the
which are very necessary for the executions of the project. Thus when once externally triggered the state of
instructions dumped into the microcontroller. The crystal the multivibrator goes high and the door of the ATM gets
oscillator is connected to pin 18 and 19 of the closed until the Bank manager resets the multivibrator i.e.
microcontroller which corresponds to 11.0592MHz. The it comes back to the low state and thus the ATM door opens
crystal oscillator is used externally because it can be used and the culprit can be handovered to the police.
for many applications. If built internally the crystal
The bistable multivibrator circuit is built with 555
oscillator cant be used for the use of many applications.
Timer IC. A trigger switch is connected. This multivibrator
Depending on the application 11,12,14,18 MHz crystal
circuit is placed into the ATM machine and this the ATM is
oscillators can be used. Crystal oscillator creates
placed on the trigger switch. If in case the ATM is lifted, the
oscillations, thus when these oscillations are to be
bistable multivibrator is triggered and this in turn is
generated there are noises developed. Thus to remove
connected to relay and thus the relay gets triggered. All the
these noises a 33µF capacitor is used.
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 902
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

relays are shorted together and thus all the relays trigger at consists of primary coil, 2 contacts, one is normally open
the same time. Thus when the bistable and relays are contact “NO” & the other is normally closed contact “NC”&
triggered the alarm attached at the transmitter side starts pole normally identified a common. When relay is in off
making the alarm indicating that something wrong has state the pole (common) is connected to normally closed
been occurring in the ATM. (NC contact). The load may be a fan or dc motor or heater
coil, when transistor starts conducting current starts
i. Relay Switch flowing through the coil. Which develops its own magnetic
flux when the strength of current is suitable; whenever a
sufficient flux is produced it attracts the pole to make
contact with normally open position ‘NO’. Hence the load
connected to it performs its operation until the contact is
broken. A diode connected in parallel across the primary
coil is to eliminate the effect of back EMF on the transistor.
Relays have great application in industry. Using the
principle of energizing an Electromagnet we can handle
large voltages & current application. Without the risk of
Fig 13. Relay Switch shocks.

The relay works on 9V DC and thus the voltage supplied Here 2 relays are initially shorted such that the NO of
to all the other circuits in the project is 5V DC which is not 1st relay is shorted with NC of the 2nd relay and NO of 2nd
sufficient for the relay circuit to work. Thus a separate step relay is shorted with the NC of 1st relay and is made
down transformer having a rating of 18V (9-0-9), 500mA is looping. One end of the loop is given to the VCC and the
used. The voltage 9V for relay purposes is used directly other end is given to GND and then the loop is then
after stepping down from the transformer but before giving commonly used for the control of opening and closing the
it to the regulator. Since the relay works on DC, the door of the ATM (i.e. connected to servo motor). This
incoming step down voltage should be converted from AC looping becomes necessary since the motor should rotate
to DC and thus full wave rectifier is used. The full wave in the clockwise and anticlockwise direction for the
rectifier output will be then given to voltage regulator 7805 purpose of opening and closing of the door of the ATM
and then 5V is given to the motor. when triggered. When the relay gets ON the door closes and
opens when the relay gets OFF.
The same transformer connected to the microcontroller
part could have been used for relays but since it causes
overloading on the transformer and no other components
5V INPUT

will work properly and thus it is avoided. +


1
-
-
2

RELAY1C
6V
NO
220ohm
Q1 COMMON
IO1 D1
FROM 1kohm
BC548 LED1
MC PORTS IN4007 NC

VCC

RELAY1C
6V
NO1

220ohm
COMMON1
IO2 1kohm Q2
FROM D2 NC1
MC PORTS BC548

K2 K1
IN4007
LED2

N/C

COM

N/O
RE LAY 1 C RE LAY 1 C

A B

M1
M OTOR_ V IRTUAL

Fig 14. Opening and Closing Door Mechanism

The above Figure shows the circuit diagram of bi-


directional door motor controller. The circuit uses two
change over relay (Double contact relay) and bi-directional
Fig 13. Interfacing of Relay Driver Circuit.
motor. The motor terminals A and B are connected to the
When the logic signal from controller or any other COM terminals of the double contact relay .The motor gets
circuits like timers applied to base of the transistor resistor external voltage from the COM and N/C contacts. At normal
1KOhm. When base signal is high, transistor saturates and condition the relay coil is not energized, so the motor
it energizes the relay. The transistor act as a small signal terminal A gets positive voltage and B gets negative voltage.
amplifier resistor of 1KOhm is used to provide proper Because of this motor rotates in the forward direction and
emitter base voltage to the transistor to come to ON state door remains close.When relay gets input from another
from OFF stateRelay is an electromechanical switch & it circuit, the coil energizes and at this instant COM and N/O
works on the principle of energizing an electromagnet. It terminals are closed circuit and relation of terminals COM

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 903
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

and N/C is open. Now the motor terminal A gets negative


voltage and B gets positive voltage from COM and N/O
terminals of the relay. This makes the motor to rotate in the j. GSM Module
reverse direction and door is opened.

The 3rd relay is used for generation of the toxic gas


inside the ATM cabin. A high temperature heating and
soldering coil is made use to generate the gas. This
generation of the gas is here initialized by dipping the
soldering coil into the powder. Since this soldering coil
work on AC a direct connection is given from the step down Fig 15. GSM Modem (SIM 300)
transformer. So when the trigger switch is triggered, the
When sending any information from the components
relay gets activated and the soldering coil attached to it
such as microcontroller, etc from one place to another an
starts heating and this the gas is generated inside the ATM
external media is required. To transmit the information any
chamber.
other medium could have been used instead of GSM but
If in case the bank is holiday, then intimations have to each one has their own limitations. GSM is used here
be sent to the Bank manager as well as to the Police, thus because it doesn’t have any limitations since information
SMS sending becomes necessary. Thus the 4th relay is used can be transmitted to all over the world via SMS (as in this
for SMS sending purpose which is shorted with the GSM case). CDMA cant be used since the sim is registered with
module. the IMEI number of only one device and this can be only
used with only that device and no sim card can be changed
One relay among the 4 is also connected to the weight and thus GSM is used. The frequency ranges here used are
sensor (here used is trigger switch again) which is placed in 800MHz/900MHz.
front of the ATM machine such that all the electronic
equipments will go to the “ON” state when the weight is The SIM 300 GSM module works on 9V DC and hence
applied over it. Until the person completes his transactions connections are made directly from the step down
and gets down the lights, AC’s and all the electronic transformer.The Tx and Rx pin of the GSM modem is
equipments will be “ON” and once the person steps down, connected to the Tx and Rx pin of the microcontroller for
all electronic equipments go to standby state. communication purpose. The relay is shorted with 6th pin
of microcontroller for the purpose of sending SMS.
Here the last 4 resistors are 10KΩ and are called base
drive resistors since they are used to drive the transistor The microcontroller is programmed such that SMS have
BC548. The resistors are used of 10KΩ coz this value is to be sent to 2 persons in cases of emergency i.e. In cases of
suitable for driving the transistor and triggering it. When Holidays. So 2 mobile numbers are included in the program
this triggers it drives the relay ON. If the low value resistors which is written in Embedded C language and then is
are used for base driving purpose then the transistors will dumped onto the microcontroller using Flashmagic
not trigger and hence the relay doesn’t turn ON. The other 4 software.
resistors are 1KΩ and are called as voltage dropping
k. Interfacing of GSM and Microcontroller using
resistors used to drop the voltage from 5V to 3V for the
indication purposes of the LED such that if the voltage MAX232/ RS232 IC:
exceeds 3V then the LED’s will burn off . If more valure of The GSM Module used to send the information of the
resistors are used then the LED’s will glow dim and this ATM via SMS cannot be directly interfaced with the
output state may not be known so while designing a proper microcontroller 89C51. The data has to be sent from one
value of the resistor is selected and is used. BC548 is a unit to the other. Like here the data that GSM receives has
negative driving transistor and thus all negative terninals to be sent to the microcontroller and also the data has to be
are switched to their respective relay. The relays which are sent from the microcontroller to the GSM for the controlling
shorted to each other is then connected to the 1st pin of the purpose. The communication between GSM to
microcontroller. Thus when relays are triggered then the microcontroller and vice versa has to be done serially. The
execution of the instructions placed in the ROM starts logic levels of the GSM (9V) and microcontroller (5V) are
begins form the beginning. different hence to make the GSM and microcontroller
compatible we require MAX232 compatible device.

Data transfer/communication is generally done in


two ways: parallel and serial. In the parallel mode, data
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 904
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

transfer is fast and uses more number of lines. This mode is to 5V TTL/CMOS levels. The drivers (T1 & T2), also called
good for short range data transfer. Serial communication transmitters, convert the TTL/CMOS input level into RS232
on the other hand, uses only one or two data lines to level. The transmitters take input from controllers serial.
transfer data and is generally used for long distance Transmission pins and sends the output to GSM receiver.
communication. In serial communication the data is sent as The receivers, on the other hand, take input from
one bit at a time. This article describes the interfacing of transmission pin of serial port and give serial output to
89C51 microcontroller with a GSM via serial port, RS232. microcontroller’s receiver pin. MAX232 needs four external
capacitors whose value ranges from 1µF to 22µF.
MAX-232 version of serial I/O standard, which is most
widely used in PCs, GSM and several devices. In MAX232, l. Transmitter Module
high and low bits are represented by flowing voltage
ranges. Therefore, while connecting a GSM to
microcontroller system, a voltage converter is required.
This converter converts the microcontroller output level to
the GSM voltage levels, and vice versa. IC MAX232 also
known as line driver is very commonly used for this
purpose. The simplest connection between a GSM and
microcontroller requires a minimum of three pins, RxD
(receiver, pin2), TxD (transmitter, pin3) and ground (pin5) Fig 17. Transmitter module (ST-TX01-ASK)
of the serial port of GSM.
The transmitter module here is placed on the
MAX232 has two sets of line drivers for transferring and ATM cabin side so as whatever damage that is occuring in
receiving data. The line drivers used for transmission are the ATM needs to be intimated to the bank and to the
called T1 and T2, where as the line drivers for receiver are police station.
designated as R1 and R2.
Simultaneously when the relay is triggered, the
transmitter module is activated and thus the information is
encoded and is then transmitted through the transmitter.
Prior to the sending of the information, whatever the
damage has been happened is detected and the location of
the ATM with what name it is loaded in the
microcontroller is encoded with the help of the Encoder.

Fig 16. RS232 Connectivity

SIM 300 is used as a GSM module. An important


parameter considered while interfacing serial port is the
Baud rate which is the speed at which data is transmitted
serially. It is defined as number of bits transmitted or
received per second. It is generally expressed in bps (bits
per second). AT89C51 microcontroller can be set to
transfer and receive serial data at different baud rates Fig 18. Encoder interfaced with Transmitter Module
using software instructions. The MAX232 IC is used to
convert the TTL/CMOS logic levels to RS232 logic levels The encoders of this type are capable of encoding
during serial communication of microcontrollers with GSM. 12bits, consisting of N address bits and 12-N data bits. The
The controller operates at TTL logic level (0-5V) whereas HT12E has 8 address bits and 4 data bits. The data that is
the serial communication with GSM works at 9V. This set on these data lines is sent serially along with the bits
makes it difficult to establish a direct link between them to set on the address lines. The address bits are sent in prior
communicate with each other, hence max232 IC works as to the data bits. The data as well as the address is
voltage level converter for both the GSM and transmitted in four successions. The data consists of
microcontroller. The intermediate link is provided through differing lengths of positive going pulses for ‘1’ and ‘0’.The
MAX232. It is a dual driver/receiver that includes a pulse width for ‘0’ is twice the pulse width of ‘0’.The
capacitive voltage generator to supply RS232 voltage levels frequency of these pulses may lie in between 1.5KHz to
from a single 5V supply. Each receiver converts GSM inputs 7KHz, depending on the oscillator frequency. This encoder
can encode upto 8 “data information” or in other words,
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 905
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

this encoder can encode 8 different situations occurring in the transmitter ST-TX-01-ASK along with decoder HT-12D.
the same ATM and send the information. Bt here only a The ST- RX01-ASK is an ASK Super heterodyne receiver
single information is loaded “ATM BREAK” in the module with PLL synthesizer and crystal oscillator, which
microcontroller program. This encoder is connected to the is used as a low-cost ASK/OOK receiver module. The RX01-
ASK Transmitter chip (ST-TX01-ASK) which then ASK is a low power RF Receiver module that was
transmits the information to the receiver chip at the bank developed for wireless data communication devices. Its
side. operating frequency 433MHz, with an intermediate
frequency of 10.7KHz. The module ST-RX-01-ASK has eight
The ST-TX01-ASK is an ASK Hybrid transmitter pins. This receiver receives the information and then
module, designed by the Saw Resonator. Its operating demodulates it and then gives it to the decoder for
frequency is 315/ 433 MHz. It uses the digital modulation decoding the information
(ASK) scheme; Here during the transmission of a binary
‘0’, the carrier wave is fully suppressed i.e. completely OFF,
and during the transmission of ‘1’ the carrier wave is ON.
Since it operates in the radio frequency range (above 300
MHz), it is known as RF-Transmitter. O/p Power is 4-12
dB. Operating Voltage is 3-6 V and Data rate is 1K-3K bps.

Figure 21. RF-Receiver module Decoder

b. HT12D Decoder

HT-12D decoder is capable of decoding 12 bits of


information that consists of N address bits and 12-N data
bits. It has 8 address and four data lies. For the proper
operation of the encoder/decoder pair, the address on the
Fig 19. Encoder along with transmitter module
address lines on both the ICs must be the same. The
decoder receives serial address and data from its
There are 4 LED’s on the transmitter side. These
corresponding series of encoders that are transmitted by
Light Emitting Diodes (LED’s) are numbered as 1,2,4,8 in
the RF transmitter. Then it compares the serial data
binary digits accordingly. These LED’s indicate whether
obtained twice continuously with its location address. If
which information is being transmitted from the
both of them are matched, the input data codes are
transmitter to the receiver. The four 1KΩ resistors are
decoded and transferred to the output pin. The VT pin also
called as Voltage Dropping resistors whose function is to
goes high to indicate the valid transmission. The internal
drop the voltage from 5V to 3V DC because the LED’s work
operating frequency is 50 times greater than the oscillating
on 3V. If high voltage occurs then the LED’s will burn off
frequency of HT12E depends on the values of timing
and thus again needs to be replaced. The other 2 10KΩ
register on the pin OSC1 and OSC2.
resistors are called as pull-up resistors whose function is
to limit the voltage to the transmitter module.
There are 4 LED’s on the receiver side. These Light
Emitting Diodes (LED’s) are numbered as 1,2,4,8 in binary
5.2. Receiver Side
digits accordingly. These LED’s indicate whether which
information is being received from the transmitter to the
receiver. The four 1KΩ resistors are called as Voltage
Dropping resistors whose function is to drop the voltage
from 5V to 3V DC because the LED’s work on 3V. If high
voltage occurs then the LED’s will burn off and thus again
needs to be replaced. The other 2 10KΩ resistors are called
as pull-up resistors whose function is to limit the voltage
Figure 20. Receiver module to the receiver module. Another LED called as
synchronization LED glows everytime whenever the
a. Receiver Module (ST RX01-ASK) information transmitted from transmitter to receiver is
synchronized state. If sync is absent then the LED is OFF.
Situated in the system at the BANK side. The receiver Thus this indicates that whatever information has been
used is the ST-RX-01-ASK module, which is analogous to transmitted, the same has been received at the receiver.

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 906
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

of LCD are connected to P2 (PORT 2) pin no 21 and 22 of


micro controller (89C51, 89C52) respectively. The display
backlight control is driven from +5V regulator supply. The
micro controller is loaded with program to initialize and
activate a LCD. The micro controller input port is taken as
P1 (PORT 1). According to the program the ASCII message
which is stored in DPTR, every time this data is loaded in
to P0 (PORT 0) to pass the data to P0 (PORT 0). When any
of the output keys or port bits gets detected (active low),
the corresponding message that is already stored in DPTR
Fig 22. Receiver along with decoder (Data Pointer a 16-bit register) which is loaded in to
accumulator and is available at P0 (PORT 0) of micro
The address of the receiver HT12D is set as the controller. If after sometime, any of the bits at Port 1 goes
same address as that of the encoder of the transmitter. The low (activate) means now according to program the
receiver receives the data and sends these to the decoder message at the particular label and which is at double
serially on its Din pin. The address part of the data quote sign (“ ”) gets loaded into DPTR.
received is compared with the levels on A0-A7 pins two
times in succession, and then the valid transmission pin 6. RESULTS
(VT) is taken high. AND the data’s on the pins AD8-AD11
of HT12E appears on the D8-D11 pins of HT12D Different cases are tested for the implementation. The
respectively. The data that is transmitted by the HT12E results obtaind are as follows:
from its data lines D8-D11 of HT12D. These data’s are fed
to the logic circuitry for the verification of the status of the
ATM. Thus the status of the ATM is read and thus this has
to be displayed on the LCD screen and thus is given to the
LCD display.

c. Microcontroller with LCD Display

Table 1. Results Observed

The corresponding graph for the success rate is as


shown below:

Fig 23. Microcontroller with the LCD Display

The decoded information is then given to the LCD


display for displaying of the information about the threat
occurring in the ATM. Power supply remains the same as
done at the side or receiver. A potentiometer is used here
in order to adjust the brightness of the LCD screen. The
value of the potentiometer used is 10KΩ. Fig 24. Success Rate for the Implementation

A 16C2 character 5*7 dots LCD is connected to 7. MERITS AND DEMERITS


PORT 0 and PORT 2 of a programmed micro controller.
The 16 pins are connected according to the LCD pin 7.1. Merits
specification. Its D0-D7 data pins get the ASCII messages
data from P0 (PORT 0) pins no 39-32 of micro controller .A The various merits of the implementation are
display control pin of LCD is connected to a preset 10KW. mentioned below:
The Register Select (RS) pin no4 and Enable (En) pin no6
 Enhanced security.

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 907
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

 No risk of the thief and robbery.  Retina Scan and Heart Beat Scanning Technology can
 Exact time and location is identified. also be included.
 No need of security guard.  Charging of the battery and storing it after converting
 Person is identified and imprisoned. it to DC which is given directly from the supply.
 GPS Module can be added to know the exact location of
7.2. Demerits the ATM since there are many ATM centres in a
particular place.
Along with some merits, there are some demerits that  Gas Chambers can be implemented in real time
are as mentioned below: wherein to allow excess gas out it can be done using 2
DC motors wherein they work alternatively depending
 Failure of sensor result in the failure of whole security upon the timers set.
system.  Pressure and vibration sensors can also be added to
 An exact amount of toxic gas should be released so as sense the pressures and vibrations.
to only unconscious the thief, else excess amount may
kill the thief. References:
 Electricity is always necessary as power failure leads
to failure of whole system. [1] Armenian Luther George Simjian(. 17 April in 1920)
“Automatic Teller Machine The history of computing
8. CONCLUSION Project”. Thocp.net.
At present there are various techniques which are
[2] John Adrian Shepherd-Barron, British inventor(1960),
being successfully used for security of ATM Machine. An
“Development the cash machine Automated Teller
example is using CCTV camera for successfully recording
Machine or ATM ”.
the video footage of all the transactions activity in the ATM
but such simple security methods weren’t enough to
provide much security. Thus GSM technology intervened. [3] B. M. Nelligani, N. V. U. Reddy and N. Awasti, "Smart
ATM security system using FPR, GSM, GPS," 2016
The information related to the attack or the threat International Conference on Inventive Computation
occurring in the ATM is initially sensed and simultaneously Technologies (ICICT), Coimbatore, 2016.
the information is encoded and sent off to the receiver
using radio frequency signals. These radio frequency [4] Roli, B., Priti S. and Punam B. (2011): Minutiae
signals have wide range of transmission and thus can be Extraction from Fingerprint Images. International
placed at any distance. Door is closed and thus the thief Journal of Computer Science Issues, vol.8, Issue 5, No3.
can’t escape. Toxic gas generation unit is activated at the ISSN(online):1694
same time, the thief becomes unconscious thus the internal
activities that again occur in the ATM is prohibited. Power [5] Brunner, A., Decressin, J. and Kudela, B. (2004):
saving mode saves a lot of power. Alarm generation unit Germany’s Three-Pillar Banking System – Cross
alerts the surrounding people about the irregular activity Country Perspectives in Europe, Occasional Paper,
within the ATM. GSM provide a pathway for the delivery of International Monetary Fund, Washington DC.
the messages to 2 different people in case of holidays. The
bistable can finally be only reset by the head of the bank. [6] The Ankit Anil Agarwal, Saurabh Kumar, Sultania,
Thus the security features were enhanced largely for the Gourav Jaiswal, Prateek Jain(2011), “RFID Based ATM
stability and reliability of owner recognition. The method security is developed” .
of protecting the ATM machine can be said as a method
[7] Cynthia B. (2000). The measurement of white-collar
having no disadvantages. The whole system was build on
crime using Uniform Crime Reporting (UCR) Data. S
the technology of embedded system which makes the
department of Justice, Federal Bureau of Investigation,
system more safe, reliable and easy to use.
New York.
9. FUTURE SCOPE [8] Madu, C.N., & Madu, A.A. (2002). Dimensions of e-
quality. International Journal of Quality & Reliability
The future scopes of the implemented applications Management, 19(3), 246-58.
may be extended as follows:
[9] Implementation of ATM security system using GSM
 Finger Print Technology can be included for security and MEMS”, Swpnali Gunjal, Nikita Shete, Poonam
and valid authorization.

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 908
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072

Shete, Surekha Sarode, International Journal of


Research in Advent Technology (IJRAT), 2017.

[10] P.K. Amurthy and M.S. Redddy(2012),


“Implementation of ATM Security by Using Fingerprint
recognition and GSM”, International Journal of
Electronics Communication and Computer
Engineering vol.3, no. 1, pp. 83-86,.

[11] ATM Security using GSM and Fingerprint with


Authorized Permission for Transaction,
T.N.S.Pallavadhar, V.Srinivas, International Journal of
Emerging Engineering Research and Technology
Volume 3, Issue 11, November 2015.

[12] ATM Authentication with Enhance Security Using


GSM, Prof. Y. R. Risodkar , Ashwini. B. Pawar, Sampada.
N. Chavanke, Ashwini. S. Pawar

[13] Sakr, Sharif. "ARM co-founder John Biggs".


Engadget. Retrieved December 23, 2011. "[...] the
ARM7- TDMI was licensed by Texas Instruments and
designed into the Nokia 6110, which was the first ARM
powered GSM phone."
electricmotors.machinedesign.com.

[14] Kim, Bo-Ra, “Domestic ATM status and meanings”,


Payment and Settlement, and IT, Vol. 44, pp. 76, 2011.

© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 909

You might also like