Abstract
Automatic Teller Machines (ATMs) are used by millions of customers every day to make cash withdrawals from their accounts. However, the wide deployment and sometimes-secluded locations of ATMs make them ideal tools for criminals to turn traceable electronic money into clean cash. Existing ATMs do not have much security. There is only one security level provided in existing system that is password. Hackers can easily hack the password, and if intruder has the ATM card then he can easily access the money from ATM system. To prevent this we proposed secured mechanism for the ATM systems in this paper. First level security is the password. When the password is entered successfully next step is to generate four bit secured dynamic key (SDK) (i.e. a dynamic key generated using secured mechanism). The SDK is generated using efficient random selection algorithm and efficient encryption and decryption technique. This generated key is sent through GSM modem kit as an SMS to the customer who is presently using the ATM System to. This 4 bit SDK is authenticated as the access code to provide secured higher level security. The proposed work involves the implementation of the SDK generation mechanism. Further, using this implementation, we conducted experiments to study and compare the response times to send the dynamic key to the customer belonging to two different service providers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dandash, O., Wang, Y., Le, P.D., Srinivasan, B.: A new Dynamic Key Generation Scheme for Fraudulent Internet Payment. In: International Conference on Information Technology, 0-7695-2776-0/07
Kanwal, S., Zafar, N.A.: Modeling of Automated Teller Machine System Using Discrete Structures. In: Proceedings of 8th IPMC (2007)
Li, Chen, Ma: Security in GSM (retrieved October 24th, 2004 from GSM-security)
Huynh, Nguyen: Overview of GSM and GSM security (retrieved October 25th, 2004 from Oregon State University, project)
ETS 300 608. Digital Cellular Telecommunication System (Phase 2), Specification of the Subscriber Identity Module-Mobile Equipment (SIM-ME) Interface. European Telecommunications Standards Institute (May 1998)
Stallings, W.: Practical Cryptography for Data Internetworks. IEEE Computer Society Press (1996)
Rubin, A.D., Wright, R.N.: Off-Line Generation of Limited-Use Credit Card Numbers. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 196–209. Springer, Heidelberg (2002)
Btuchi, M.: The B Bank: A Complete Case Study. In: Second International Conference on Formal Engineering Methods, pp. 190–199. IEEE Press (1998)
Shamir, A.: Web payment system with disposable credit card numbers. In: Proceedings of Financial Cryptography, pp. 232–242 (2001)
Brasche, G., Walke, B.: Concepts, Services and Protocols of the New GSM Phase 2+ General Packet Radio Services. IEEE Communications Magazine 35, 94–104 (1997)
Neumann: Illustrative risks to the public in the use of computer systems and related technology. ACM SIGSOFT Software Engineering Notes, 23–33 (January 1992)
Asokan, N., Janson, P., Steiner, M., Waidner, M.: The State of the Art in Electronic Payment Systems. IEEE Computer (September 1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Challagidad, P.S., Mallapur, J.D. (2013). Secured Mechanism for Dynamic Key Generation in ATM System. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication, and Control. ICAC3 2013. Communications in Computer and Information Science, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36321-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-36321-4_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36320-7
Online ISBN: 978-3-642-36321-4
eBook Packages: Computer ScienceComputer Science (R0)