Atm Security Using GSM Technology
Atm Security Using GSM Technology
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 897
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
1.4. Personal Identification Number by volume, or 2 milligrams per liter of mist, fume, or dust,
when administered by continuous inhalation for some few
Each user is given a personal identification number or a seconds causes unconsciousness for an hour or two but
unique identification number to access the accounts. The doesn’t result in a death of a person. Ex: Chloroform.
personal identification number may be in the format as
XXXX which may be reset in cases of emergency like theft 2. LITERATURE SURVEY
etc.
Madu and Maggie (2002) pointed out that the concern of
1.5. Types of Attacks on the ATM Machine customers about security and privacy, while using this
service, is a major cause of their dissatisfaction. Ihejiahi
The ATM Machines are not secure unless and until some (2009) expressed concern about the lack of cooperation
physical protection methods are provided. The various among banks in the fight to stem the incidence of ATM
types of attacks are as listed in the figure 3. frauds now plaguing the industry. He expressed that the
silence among banks on ATM frauds makes it difficult for
banks to share vital information that will help curb the
menace. Obiano (2009) blamed the menace of ATM frauds
on indiscriminate issue of ATM card without regard to the
customer’s literacy level. According to him one of the
Fig 3. Attacks on ATM Machine frequent causes of fraud is when customers are careless
with their cards and PIN numbers as well as their response
1.6. GSM Technology to unsolicited e-mail and text messages to provide their
card details. Omankhanleu (2009) opined that the current
Global System for Mobile Communications (GSM) is a upsurge and nefarious activities of Automated Teller
standard set developed by the European Telecom Machine (ATM) fraudster is threatening electronic
Standards Institute (ETSI) to describe protocols for second payment system in the nation’s banking sector with users
generation (2G) digital cellular networks used by mobile threatening massive dumping of the cards if the
phones. The GSM standard was developed as a unwholesome act is not checked. Adeloye (2008) identified
replacement for first generation (1G) analog cellular security as well as power outage as major challenges
networks, and originally described a digital, circuit facing the ATM users in Nigeria. Brunner et al. (2004) in
switched network optimized for duplex voice telephony. their study concluded that the location of ATM is a high
This was expanded over time to include data determinant to fraud or crime carried out at ATM point.
communications, first by circuit switched transport, then From this research over 75% of the respondents affirm
packet data transport via GPRS (General Packet Radio that the location of ATM in secluded place contribute to the
Services) and EDGE (Enhanced Data rates for GSM fraud perpetuated at ATM point. ATM within the banking
Evolution or EGPRS). This was further used to implement premises is more secure than ATMs outside the bank
3G, 4G and 5G networks. The GSM time frame is being premises. Also, it is obvious that the location of ATM in
given in the figure 4. attractive place does not make it prone for fraud. Diebold
(2002) in his view states that the major form of ATM fraud
is PIN theft which is carried out by various means;
skimming, shoulder surfing, camera, key pad recorder etc.
This study elucidates that the common type of fraud
perpetuated is PIN theft which is mostly as a result of
congestion at ATM points. Other forms of fraud that were
enumerated by respondents were; force withdrawal, card
theft, and skimming and congestion method fraud at ATM.
Cynthia (2000) states that the 24 hours access to the ATM
machine is a double edge sword, it has both advantage and
disadvantage. Roli Bansal et al (2011) pointed out that
amongst all the fingerprint features, minutia point features
Fig 4. GSM Time slot
with corresponding orientation maps are unique enough
1.7. Toxic Gases to discriminate amongst fingerprints robustly; the
minutiae feature representation reduces the complex
A compressed gas or vapor that has a median lethal fingerprint recognition problem to a point pattern
concentration (LC50) in air of 200 parts per million (ppm) matching problem.
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 898
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 899
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
A similar kind of receiver unit is being synchronized Fig 7. Microcontroller Part of Transmitter Section
with the frequency of the transmitter i.e. 433MHz. The
received signal is then given to the demodulator wherein The Microcontroller part is very much necessary to
the received signal is demodulated. The demodulated control many activities on the transmitter side. The
signal is then given to the decoder where the information activities may include execution of the program according
sent from the transmitter is decoded. to the conditions occurred, encoding the information,
transmitting, resetting the relay, etc. The operations of
The decoded information is then given to the various parts of the microcontroller section of transmitter
microcontroller for displaying it on the LCD and for are explained below.
alerting the alarm within the main branch such that the
main branch head initiates a further action. 5.1.1. Voltage Regulation Circuit
An extra action that is in hands of main branch head is a. Voltage Step Down:
that he can unlatch the status of the ATM. A similar kind of
receiver system is placed in the Police Station such that One method is a 12-0-12 1A Transformer can be used
they too can take immediate action. for stepping down the voltage directly from 230V/50Hz to
about 12V/50Hz. The current rating of the transformer
The Communication in between the transmitter and used here is about 1A which is sufficient for the electronic
receiver is being done with the help of GSM modem using devices connected. The stepped down output is in the AC
frequencies in the ranges of 900/1800 KHz. Thus the form which is converted to DC using a Bridge wave
unauthorized person i.e. thief is handover to the police. rectifier as discussed below. Conversion of AC to DC is
Thus the system is retained back to its original state by known as Rectification. The connections for the
giving it the necessary repairs after unlatching it. transformer is as shown in the figure 7.
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 900
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
Input from the AC line power source = 230V/50Hz e. Using a 7812 Regulator
Stepping down from 230V to 12V causes only voltage to 7812 regulator is very much necessary for triggering a
change but the frequency remains the same. So the Relay circuit which always works on 12V input. A 7812
frequency remains 50Hz. regulator is a 3 terminal device which is capable of
stabilizing the voltage not to exceed more than 12V. The
Time Period of a wave is the reciprocal of frequency i.e. connections of a 3 terminal include input, ground and then
output. The voltage exceeding 5V is dropped and grounded
T = 1/f and only a stabilized 5V is given as the output. The circuit
for the 7812 along with 7805 connections may be as shown
Given f = 50Hz
in the figure 10 below.
T = 1/50Hz
C = (I x T) / ΔV
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 901
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
The Hardware implementation of the Voltage Microcontroller 89C51 is made up of CMOS which
Regulation Circuit is as shown in the figure 11. contains flash memory (EEPROM) capable of storing the
program information such as codes and instructions. Since
inbuilt memory is used the pin 14th is connected to VCC. If
external memory is used then pin 14th would have been
connected to GND. The pin no 6 is connected to the relay
part used to control various applications of the project.
Transmitter module is connected to 10th pin of the
microcontroller on the transmitter side. Similarly receiver
module is connected to 11th pin of the microcontroller on
the receiver side.
g. Buffer
Fig 11. Voltage Regulation Circuit
Buffer (74LS245) may be used on the transmitting side
f. Microcontroller for the amplification of the voltage that comes as output
from microcontroller or may be used as a 1-bit storage
Microcontroller 89C51 works on 5V DC supply (Upto
device. Resistors used here are pull-up resistors whose
6.6V tolerable). Among the four ports of the
function is to reduce the voltage that goes to the buffer as
microcontroller, port P1 is used for input and port P2 is
well as microcontroller.
used for output purpose as designed in the program.
h. Bistable Circuit
Initially when the circuit is turned “ON”, a high pulse is
given from 10µF capacitor to the 9th pin of microcontroller
and thus microcontroller is reset. This high pulse occurs
due to discharge of the charge stored in the 10µF capacitor
placed beside the reset switch. This is an automatically
occuring mechanism. Thus the microcontroller resets from
any intermediate state to the start of the program for the
execution from the beginning. Since the 10µF capacitor
helps the microcontroller in resetting initially after the
start its also known as “Autoreset Capacitor”. This resetting
of the microcontroller should be done manually whenever
Fig 12. Bistable Circuit
required.
A monostable multivibrator has a single stable state,
The port P3 of the microcontroller is used for the
once in the process it goes to a stable state and will again
special purposes such as counters, timers, interrups,
enter the astable state and thus the shutter door of the ATM
transmission, reception, crystal oscillators,etc. Since the
will open and easily the thief can escape. Astable
port P3 uses full dupleix transfer of data, it is used for
multivibrator doesn’t have any stable state and thus the
transmission and reception of the information regarding
output of this always goes high and low and thus the ATM
the security of the ATM.
door shutter keeps opening and closing and thus the culprit
Crystal oscillator is very much necessary for the can escape. A Bistable multivibrator has 2 stable states i.e.
execution of the programs since it provides machine cycles high and low. This is the very purpose of using in the
which are very necessary for the executions of the project. Thus when once externally triggered the state of
instructions dumped into the microcontroller. The crystal the multivibrator goes high and the door of the ATM gets
oscillator is connected to pin 18 and 19 of the closed until the Bank manager resets the multivibrator i.e.
microcontroller which corresponds to 11.0592MHz. The it comes back to the low state and thus the ATM door opens
crystal oscillator is used externally because it can be used and the culprit can be handovered to the police.
for many applications. If built internally the crystal
The bistable multivibrator circuit is built with 555
oscillator cant be used for the use of many applications.
Timer IC. A trigger switch is connected. This multivibrator
Depending on the application 11,12,14,18 MHz crystal
circuit is placed into the ATM machine and this the ATM is
oscillators can be used. Crystal oscillator creates
placed on the trigger switch. If in case the ATM is lifted, the
oscillations, thus when these oscillations are to be
bistable multivibrator is triggered and this in turn is
generated there are noises developed. Thus to remove
connected to relay and thus the relay gets triggered. All the
these noises a 33µF capacitor is used.
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 902
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
relays are shorted together and thus all the relays trigger at consists of primary coil, 2 contacts, one is normally open
the same time. Thus when the bistable and relays are contact “NO” & the other is normally closed contact “NC”&
triggered the alarm attached at the transmitter side starts pole normally identified a common. When relay is in off
making the alarm indicating that something wrong has state the pole (common) is connected to normally closed
been occurring in the ATM. (NC contact). The load may be a fan or dc motor or heater
coil, when transistor starts conducting current starts
i. Relay Switch flowing through the coil. Which develops its own magnetic
flux when the strength of current is suitable; whenever a
sufficient flux is produced it attracts the pole to make
contact with normally open position ‘NO’. Hence the load
connected to it performs its operation until the contact is
broken. A diode connected in parallel across the primary
coil is to eliminate the effect of back EMF on the transistor.
Relays have great application in industry. Using the
principle of energizing an Electromagnet we can handle
large voltages & current application. Without the risk of
Fig 13. Relay Switch shocks.
The relay works on 9V DC and thus the voltage supplied Here 2 relays are initially shorted such that the NO of
to all the other circuits in the project is 5V DC which is not 1st relay is shorted with NC of the 2nd relay and NO of 2nd
sufficient for the relay circuit to work. Thus a separate step relay is shorted with the NC of 1st relay and is made
down transformer having a rating of 18V (9-0-9), 500mA is looping. One end of the loop is given to the VCC and the
used. The voltage 9V for relay purposes is used directly other end is given to GND and then the loop is then
after stepping down from the transformer but before giving commonly used for the control of opening and closing the
it to the regulator. Since the relay works on DC, the door of the ATM (i.e. connected to servo motor). This
incoming step down voltage should be converted from AC looping becomes necessary since the motor should rotate
to DC and thus full wave rectifier is used. The full wave in the clockwise and anticlockwise direction for the
rectifier output will be then given to voltage regulator 7805 purpose of opening and closing of the door of the ATM
and then 5V is given to the motor. when triggered. When the relay gets ON the door closes and
opens when the relay gets OFF.
The same transformer connected to the microcontroller
part could have been used for relays but since it causes
overloading on the transformer and no other components
5V INPUT
RELAY1C
6V
NO
220ohm
Q1 COMMON
IO1 D1
FROM 1kohm
BC548 LED1
MC PORTS IN4007 NC
VCC
RELAY1C
6V
NO1
220ohm
COMMON1
IO2 1kohm Q2
FROM D2 NC1
MC PORTS BC548
K2 K1
IN4007
LED2
N/C
COM
N/O
RE LAY 1 C RE LAY 1 C
A B
M1
M OTOR_ V IRTUAL
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 903
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
transfer is fast and uses more number of lines. This mode is to 5V TTL/CMOS levels. The drivers (T1 & T2), also called
good for short range data transfer. Serial communication transmitters, convert the TTL/CMOS input level into RS232
on the other hand, uses only one or two data lines to level. The transmitters take input from controllers serial.
transfer data and is generally used for long distance Transmission pins and sends the output to GSM receiver.
communication. In serial communication the data is sent as The receivers, on the other hand, take input from
one bit at a time. This article describes the interfacing of transmission pin of serial port and give serial output to
89C51 microcontroller with a GSM via serial port, RS232. microcontroller’s receiver pin. MAX232 needs four external
capacitors whose value ranges from 1µF to 22µF.
MAX-232 version of serial I/O standard, which is most
widely used in PCs, GSM and several devices. In MAX232, l. Transmitter Module
high and low bits are represented by flowing voltage
ranges. Therefore, while connecting a GSM to
microcontroller system, a voltage converter is required.
This converter converts the microcontroller output level to
the GSM voltage levels, and vice versa. IC MAX232 also
known as line driver is very commonly used for this
purpose. The simplest connection between a GSM and
microcontroller requires a minimum of three pins, RxD
(receiver, pin2), TxD (transmitter, pin3) and ground (pin5) Fig 17. Transmitter module (ST-TX01-ASK)
of the serial port of GSM.
The transmitter module here is placed on the
MAX232 has two sets of line drivers for transferring and ATM cabin side so as whatever damage that is occuring in
receiving data. The line drivers used for transmission are the ATM needs to be intimated to the bank and to the
called T1 and T2, where as the line drivers for receiver are police station.
designated as R1 and R2.
Simultaneously when the relay is triggered, the
transmitter module is activated and thus the information is
encoded and is then transmitted through the transmitter.
Prior to the sending of the information, whatever the
damage has been happened is detected and the location of
the ATM with what name it is loaded in the
microcontroller is encoded with the help of the Encoder.
this encoder can encode 8 different situations occurring in the transmitter ST-TX-01-ASK along with decoder HT-12D.
the same ATM and send the information. Bt here only a The ST- RX01-ASK is an ASK Super heterodyne receiver
single information is loaded “ATM BREAK” in the module with PLL synthesizer and crystal oscillator, which
microcontroller program. This encoder is connected to the is used as a low-cost ASK/OOK receiver module. The RX01-
ASK Transmitter chip (ST-TX01-ASK) which then ASK is a low power RF Receiver module that was
transmits the information to the receiver chip at the bank developed for wireless data communication devices. Its
side. operating frequency 433MHz, with an intermediate
frequency of 10.7KHz. The module ST-RX-01-ASK has eight
The ST-TX01-ASK is an ASK Hybrid transmitter pins. This receiver receives the information and then
module, designed by the Saw Resonator. Its operating demodulates it and then gives it to the decoder for
frequency is 315/ 433 MHz. It uses the digital modulation decoding the information
(ASK) scheme; Here during the transmission of a binary
‘0’, the carrier wave is fully suppressed i.e. completely OFF,
and during the transmission of ‘1’ the carrier wave is ON.
Since it operates in the radio frequency range (above 300
MHz), it is known as RF-Transmitter. O/p Power is 4-12
dB. Operating Voltage is 3-6 V and Data rate is 1K-3K bps.
b. HT12D Decoder
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 906
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 907
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
No risk of the thief and robbery. Retina Scan and Heart Beat Scanning Technology can
Exact time and location is identified. also be included.
No need of security guard. Charging of the battery and storing it after converting
Person is identified and imprisoned. it to DC which is given directly from the supply.
GPS Module can be added to know the exact location of
7.2. Demerits the ATM since there are many ATM centres in a
particular place.
Along with some merits, there are some demerits that Gas Chambers can be implemented in real time
are as mentioned below: wherein to allow excess gas out it can be done using 2
DC motors wherein they work alternatively depending
Failure of sensor result in the failure of whole security upon the timers set.
system. Pressure and vibration sensors can also be added to
An exact amount of toxic gas should be released so as sense the pressures and vibrations.
to only unconscious the thief, else excess amount may
kill the thief. References:
Electricity is always necessary as power failure leads
to failure of whole system. [1] Armenian Luther George Simjian(. 17 April in 1920)
“Automatic Teller Machine The history of computing
8. CONCLUSION Project”. Thocp.net.
At present there are various techniques which are
[2] John Adrian Shepherd-Barron, British inventor(1960),
being successfully used for security of ATM Machine. An
“Development the cash machine Automated Teller
example is using CCTV camera for successfully recording
Machine or ATM ”.
the video footage of all the transactions activity in the ATM
but such simple security methods weren’t enough to
provide much security. Thus GSM technology intervened. [3] B. M. Nelligani, N. V. U. Reddy and N. Awasti, "Smart
ATM security system using FPR, GSM, GPS," 2016
The information related to the attack or the threat International Conference on Inventive Computation
occurring in the ATM is initially sensed and simultaneously Technologies (ICICT), Coimbatore, 2016.
the information is encoded and sent off to the receiver
using radio frequency signals. These radio frequency [4] Roli, B., Priti S. and Punam B. (2011): Minutiae
signals have wide range of transmission and thus can be Extraction from Fingerprint Images. International
placed at any distance. Door is closed and thus the thief Journal of Computer Science Issues, vol.8, Issue 5, No3.
can’t escape. Toxic gas generation unit is activated at the ISSN(online):1694
same time, the thief becomes unconscious thus the internal
activities that again occur in the ATM is prohibited. Power [5] Brunner, A., Decressin, J. and Kudela, B. (2004):
saving mode saves a lot of power. Alarm generation unit Germany’s Three-Pillar Banking System – Cross
alerts the surrounding people about the irregular activity Country Perspectives in Europe, Occasional Paper,
within the ATM. GSM provide a pathway for the delivery of International Monetary Fund, Washington DC.
the messages to 2 different people in case of holidays. The
bistable can finally be only reset by the head of the bank. [6] The Ankit Anil Agarwal, Saurabh Kumar, Sultania,
Thus the security features were enhanced largely for the Gourav Jaiswal, Prateek Jain(2011), “RFID Based ATM
stability and reliability of owner recognition. The method security is developed” .
of protecting the ATM machine can be said as a method
[7] Cynthia B. (2000). The measurement of white-collar
having no disadvantages. The whole system was build on
crime using Uniform Crime Reporting (UCR) Data. S
the technology of embedded system which makes the
department of Justice, Federal Bureau of Investigation,
system more safe, reliable and easy to use.
New York.
9. FUTURE SCOPE [8] Madu, C.N., & Madu, A.A. (2002). Dimensions of e-
quality. International Journal of Quality & Reliability
The future scopes of the implemented applications Management, 19(3), 246-58.
may be extended as follows:
[9] Implementation of ATM security system using GSM
Finger Print Technology can be included for security and MEMS”, Swpnali Gunjal, Nikita Shete, Poonam
and valid authorization.
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 908
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 909