Skip to main content

Secured Mechanism for Dynamic Key Generation in ATM System

  • Conference paper
Advances in Computing, Communication, and Control (ICAC3 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 361))

  • 2814 Accesses

Abstract

Automatic Teller Machines (ATMs) are used by millions of customers every day to make cash withdrawals from their accounts. However, the wide deployment and sometimes-secluded locations of ATMs make them ideal tools for criminals to turn traceable electronic money into clean cash. Existing ATMs do not have much security. There is only one security level provided in existing system that is password. Hackers can easily hack the password, and if intruder has the ATM card then he can easily access the money from ATM system. To prevent this we proposed secured mechanism for the ATM systems in this paper. First level security is the password. When the password is entered successfully next step is to generate four bit secured dynamic key (SDK) (i.e. a dynamic key generated using secured mechanism). The SDK is generated using efficient random selection algorithm and efficient encryption and decryption technique. This generated key is sent through GSM modem kit as an SMS to the customer who is presently using the ATM System to. This 4 bit SDK is authenticated as the access code to provide secured higher level security. The proposed work involves the implementation of the SDK generation mechanism. Further, using this implementation, we conducted experiments to study and compare the response times to send the dynamic key to the customer belonging to two different service providers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dandash, O., Wang, Y., Le, P.D., Srinivasan, B.: A new Dynamic Key Generation Scheme for Fraudulent Internet Payment. In: International Conference on Information Technology, 0-7695-2776-0/07

    Google Scholar 

  2. Kanwal, S., Zafar, N.A.: Modeling of Automated Teller Machine System Using Discrete Structures. In: Proceedings of 8th IPMC (2007)

    Google Scholar 

  3. Li, Chen, Ma: Security in GSM (retrieved October 24th, 2004 from GSM-security)

    Google Scholar 

  4. Huynh, Nguyen: Overview of GSM and GSM security (retrieved October 25th, 2004 from Oregon State University, project)

    Google Scholar 

  5. ETS 300 608. Digital Cellular Telecommunication System (Phase 2), Specification of the Subscriber Identity Module-Mobile Equipment (SIM-ME) Interface. European Telecommunications Standards Institute (May 1998)

    Google Scholar 

  6. Stallings, W.: Practical Cryptography for Data Internetworks. IEEE Computer Society Press (1996)

    Google Scholar 

  7. Rubin, A.D., Wright, R.N.: Off-Line Generation of Limited-Use Credit Card Numbers. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol. 2339, pp. 196–209. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Btuchi, M.: The B Bank: A Complete Case Study. In: Second International Conference on Formal Engineering Methods, pp. 190–199. IEEE Press (1998)

    Google Scholar 

  9. Shamir, A.: Web payment system with disposable credit card numbers. In: Proceedings of Financial Cryptography, pp. 232–242 (2001)

    Google Scholar 

  10. Brasche, G., Walke, B.: Concepts, Services and Protocols of the New GSM Phase 2+ General Packet Radio Services. IEEE Communications Magazine 35, 94–104 (1997)

    Article  Google Scholar 

  11. Neumann: Illustrative risks to the public in the use of computer systems and related technology. ACM SIGSOFT Software Engineering Notes, 23–33 (January 1992)

    Google Scholar 

  12. Asokan, N., Janson, P., Steiner, M., Waidner, M.: The State of the Art in Electronic Payment Systems. IEEE Computer (September 1997)

    Google Scholar 

  13. http://www.visiontek.co.in/products/modems.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Challagidad, P.S., Mallapur, J.D. (2013). Secured Mechanism for Dynamic Key Generation in ATM System. In: Unnikrishnan, S., Surve, S., Bhoir, D. (eds) Advances in Computing, Communication, and Control. ICAC3 2013. Communications in Computer and Information Science, vol 361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36321-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36321-4_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36320-7

  • Online ISBN: 978-3-642-36321-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics