Smart ATM Pin Recovery and Secured ATM Transactions Based On Fingerprint Identification
Smart ATM Pin Recovery and Secured ATM Transactions Based On Fingerprint Identification
LITERATURE REVIEW
Introduction Since security measures at ATM
centers play a significant role in preventing
attacks on customers money, several
researches have proposed the used of
fingerprint in a like manner of this research,
to shift from PIN to biometric based security.
Fingerprinting has been the most widely used
during the 20th century. The maturity of
Biometric techniques and generally the
dramatic improvement of the captured
devices have led to the research of
fingerprinting in multiple applications but in
the last years, minutiae have been the main
type of algorithm used. The minutiae are
relatively stable and robust to contrast, image
resolution and global distortion as compared
to other fingerprint representation Fatai et al.
(2014). Jeroen et al. (2011) provided a better
understanding of the benefits and limitation
of integration of biometrics in a PIN-base
payment authentication system. Based on
their review they proposed a biometric that
can be integrated in a PIN-based
authentication infrastructure by binding a
fixed binary, renewable string to a noisy
biometric sample. Related studies The South
African Social Security Agency (SASSA) has
introduced a new SASSA Payment Card that
has a fingerprint authenticated features. The
card is a SASSA branded smart payment
MasterCard, which has an embedded chip
containing personal details, fingerprint and
secret PIN, with the card the customers can
easily withdraw and make payment at point-
of-sale (POS) center, purchase airtime, pay
water and electricity bill from the accounts, or
open accounts. (SAAS, 2013).
Justification
One of the major problems people face is the
loss of the password and not remembering it
again, these has caused a lot of damage to
people and organizations. ATM fraud has been
very common in all banks and the problems
has created fear in many costumers heart that
they prefer going to the bank to collect their
money than to use an ATM, also many people
are illiterate that they don’t know how to use
the ATM card. In the field of computer
security, one of the most damaging attacks is
masquerading, in which an attacker assumes
the identity of a legitimate user in a computer
system. Masquerade attacks typically occur
when an intruder obtains a legitimate user’s
password or when a user leaves their
workstation unattended without any sort of
locking mechanism in place. It is difficult to
detect this type of security breach at its
initiation because the attacker appears to be a
normal user with valid authority and
privileges. This difficulty underlines the
importance of equipping computer systems
with the ability to distinguish masquerading
attacker actions from legitimate user
activities. Security especially at our banks has
been compromised. There are cases of
impersonation at the ATM machines and it
would be difficult to authenticate someone
just with the ATM card and PIN numbers. The
current authentication systems are
characterized by an increasing interest in
biometric techniques. Among these
techniques are face, facial thermo gram,
fingerprint, hand geometry, hand vein, iris,
retinal pattern, signature and voiceprint. All
these methods have different degrees of
uniqueness, permanence, measurability,
performance, user’s acceptability and
robustness against circumvention Akwaja
(2010) finger print is the most preferred.
Biometrics-based authentication offers
several advantages over other authentication.
Fingerprint technology in particular, can
provide a much more accurate and reliable
user authentication method. Biometrics is a
rapidly advancing field that is concerned with
identifying a person based on his or
physiological or behavioral characteristics. As
the Automated Teller Machines (ATM)
technology is advancing, fraudsters are
devising different skills to beat the security of
ATM operations. Various forms of fraud are
perpetuated, ranging from: ATM card theft,
skimming, pin theft,
Research Questions
Can the implementation of a multifactor
technology such as use of fingerprint and PIN
be utilized as a useful identifier in improving
security at the ATM machines? Are there
more benefits in using the AES algorithm in a
Bank employing a multifactor security system
that use PIN and fingerprint for their ATMs?
Will the use of biometric system for ATM
authentication be acceptable to the users?
Objectives
Broad Objective
The purpose of this research is to enhance
the security of the existing ATM (Automated
Teller Machine) system by integrating the
existing PIN (Personal Identification Number)
with the fingerprint. Specific objective 1. To
identify different areas that a multifactor
security system that use PIN and fingerprint
has been utilized. 2. To propose the use of
fingerprint and PIN as an authentication
system in the Bank’s ATM. 3. To propose a low
power consuming ATM machine using the AES
algorithm.
6 Scope of research
The first milestone of my research is learning
the
Wang Y. et al (2007) proposed a fingerprint
orientation model based on 2D Fourier
expansions (FOMFE) in the phase plane.
Though FOMFE does not require prior
knowledge of singular points, it is able to
describe the overall ridge topology
seamlessly. Fengling et al (2005) proposed a
smartcard based encryption/authentication
scheme for ATM banking system. The first
layer of the scheme is used to perform
authentication based on available information
on the smartcard. Fingerprint based
authentication via feature and minutiae
matching then followed on the second layer.
Das and Jhunu (2011) focused on
vulnerabilities and the increasing wave of
criminal activities occurring at ATMs and
presented a prototype fingerprint
authentication for enhancing security. The
systems adopt the same measure as the
current work by formulating modules for
fingerprint enrolment, enhancement, feature
extraction and database and matching. Santhi
and Kumar (2012) proposed an ATM security
enhancing method with secured Personal
Identification Image (PII) process. A detailed
research on various existing biometric systems
is also presented stating the strengths and
limitations. Bhosale and Sawant (2012) and
Ibiyemi et al (2012) present groundbreaking
models for biometric ATMs which replaces
card system with biometric technology. The
proposed systems hybridize feature-based
fingerprint, iris and PIN to provide reliable and
fool-proof ATM authentication. Customers
must be convinced that the technologies
provide more benefit than the card-and-PIN
system, which works well, said John Hall,
spokesman for the American Bankers
Association. The cards also serve functions
beyond the ATMs, as debit cards and as
advertising for the banks. "Getting that wallet
space is important," said Bill Spence, a
biometric expert with Campbell, Calif.-based
Recognition Systems Inc. The growers
wouldn't need to carry ATM cards, which can
be a lure for thieves. "Biometrics is certainly
the most secure form of authentication," said
Avivah Litan, an analyst with Gartner Inc., a
Stamford, Conn.-based technology analysis
firm. "It's the hardest to imitate and
duplicate." Jain, A.et. al. (2000) However,
companies that make automated teller
machines have found budding markets for the
fingerprint technology in South America,
where citizens already are accustomed to the
use of fingerprints for general identification,
such as ID cards they carry. Diebold Inc. of
North Canton, Ohio, has supplied fingerprint-
capable ATMs to a bank in Chile that is using
them in a pilot project. Last year Dayton,
Ohio-based NCR Corp. installed 400 of them
in Colombia. BanCafe, Colombia's fifth largest
bank, bought the ATMs at the end of 2002 for
addedsecurity for coffee growers and to get
them to open accounts. Mali et al (2012)
provided a network security framework for
real time ATM application using a combination
of PIN, thumb scanning and face recognition
to foster security. The proposed framework is
expected to register thumb and face features
to be stored at a server side in encrypted
format. Authentication is done by decrypting
patterns from database, and matching with
input pattern before access is granted for ATM
operations. The integrated system uses
Principal Component Analysis (PCA) and Eigen
algorithm for face recognition, LSB algorithm
for stegnogaphy and AES algorithm for
cryptography. Though the framework looks
promising, its practicality is not supported by
detailed implementation and evaluation.
Abayomi et al (2012) proposed an enhanced
e-banking system where customer can access
multiple accounts over different banks
institutions with a single ATM card with
fingerprint authentication. A match-on-card
technique was used that relies on a one-to-
one matching where the data from the ATM
fingerprint sensor is compared only to the
template stored on the user’s ATM card. This
will help in privacy concern of users; the
system will also help the users to have access
to multiple accounts with a single ATM card. It
is secured and help in reducing ATM fraud.
This research presents security in two ways.
This design considers the fingerprint image for
the client side security and also considers the
AES algorithm for the secured communication
in between the client and server. A lot of
researchers are working to improve the speed
of AES as well as the other aspects like area,
latency, power etc. To make the AES faster
and securer some researchers introduced
hardware realizations and s-box
optimizations. Today most of the researchers
involving the execution of theAdvanced
Encryption Standard (AES) algorithm are fallen
into three areas: ultra-high-speed encryption,
very low power consumption, and algorithmic
integrity. Many research works have been
done by different hardware realizations using
ASIC and FPGA technology. Some References
present the fastest FPGA realization of the
AES algorithm. Fingerprint based
authentication is more secure, reliable and
standard than the password based
authentication. Finger-scan biometric is based
on the distinctive characteristics of the human
fingerprint. Our existing ATM system is
password based. The limitation of this system
is that it fails to identify the person rather it
only identify the card and password as well as
the communication link is not secured. ,
which have access to be hacked. The
proposed ATM system is able to overcome
this typeof limitations because proposed ATM
system is fingerprint based.
Identified Gap AT present most of the ATM
systems use triple-data Encryption Standard
(DES) Nawaz et. al.(2013) but the triple-DES
has some drawbacks. It is vulnerable to
differential attacks and also slow in
performance. DES (Data Encryption Standard)
has been used as a de facto standard cipher
for more than 20 years. In 2001, NIST
(National Institute of Standards and
Technology) made Rijndael the new standard
cipher AES Daemen and Rijmen (2001), NIST
(2001). Personal banking information is highly
sensitive and users are vulnerable while using
ATMs Mohammed (2015). Keypads in
particular have been exploited by
criminalsATM first came into use in December
1972 in the UK. IBM 2984 was designed for
request of Lloyds Bank. ATM is typically
connected directly to their hosts or ATM
Controller via either ADSL or dial-up modem
over a telephone line or directly via a leased
line. For transaction security all
communication traffic between ATM and
transaction process is encrypted by
cryptography. Nowadays, most of ATM uses a
Microsoft OS primarily Windows XP
Professional or Windows XP Embedded or
Linux.
Fingerprint
Fingerprint is a characteristic which is unique
for each person. Every fingerprint contain
unique identifiable piece of information. The
uniqueness in each fingerprint is due to the
peculiar genetic code of DNA in each person.
Ridges and valleys are the parts of fingerprint
that provide friction for the skin. The direction
and location of ridges make the identification.
A fingerprint in its narrow sense is an
impression left by the friction ridges of a
human finger. In a wider use of the term,
fingerprints are the traces of an impression
from the friction ridges of any part of a
human. There are three types of fingerprint
patterns
AES Algorithm
shows that AES has four stages which are
required for every round except that the last
round excludes the mix column phase and the
first round has only key addition. The four
stages of Rijndael algorithm (AES algorithm)
are: Substitute bytes: This function uses an
S-box to perform a byte-by-byte substitution
of the block. For encryption and decryption,
this function is indicated by SubBytes () and
InvSubBytes () respectively. Shiftrows: This is
a simple permutation. For encryption and
decryption, this function is indicated by
ShiftRows () and InvShiftRows () respectively.
Mix Columns: This is a substitution that makes
use of arithmetic over GF (28), with the
irreducible polynomial “m(x) = x8 + x4 + x3 + x
+1”. For encryption and decryption, this
function is indicated by MixColumns () and
InvMixColumns () respectively.
Methodology:
The proposed methodology is based on
identification of fingerprint of the ATM user.
The user inserts the ATM card and enters PIN
to perform transactions. If the user enters the
invalid PIN for three times, an alert message
will be sent to registered mobile number and
also a pop-up window will open on the ATM
machine. The pop-up window displays the
message “You have entered wrong PIN; please
give your registered fingerprint to create new
PIN”. User provides the
finger impression for authentication. If
fingerprint matches then the bank server will
provide flexibility for the user to create
his/her new PIN on the ATM machine itself.
After that user will get message that you have
successfully got new PIN. Now user can
continue transactions with this new PIN as
earlier. Figure 1 shows the activity diagram of
proposed system.
Algorithm for Fingerprint Recognition
Input: Image of fingerprint.
Output: Detection of key points.
1. Input image is converted into greyscale
image then it is converted into binary image.
2. Skeleton image is obtained.
3. Using Harris corner detection algorithm,
key points of fingerprint are detected.
4. Using key points, the fingerprints are
matched.
The Matching Algorithm plays a key role in
fingerprint recognition steps. We are using
matching algorithms and they are SURF
(Speeded-Up Robust Features) algorithm and
Harris corner detection algorithm.
RESEARCH METHODOLOGY
Introduction
The methodology proposed by Webster and
Watson (2002) was followed. In the
subsequent pages of this chapter, the steps
taken to identify relevant literature is
presented, along with the results of this
procedure. The purpose of this research is to
present a secured and an energy efficient
ATM banking system that is highly secured. At
present most of the ATM systems use triple-
data Encryption Standard (DES) but the triple-
DES has some drawbacks. It is vulnerable to
differential attacks and also slow in
performance. Nawaz (2013). This research
presents security in two ways, a design that
considers the fingerprint image for the client
side security and also consider the AES
algorithm for the secured communication in
between the client and server. Reducing the
power consumption of AES (Advanced
Encryption Standard) circuits is a critical
problem when the circuits are used in
embedded systems. Many circuit
architectures for AES have been proposed
recently and their performances have been
evaluated by using ASICof security issues
affecting ATM system in banking sector in
Kenya. A survey is administered to a selected
sample from Machakos. The term ‘survey’ is
commonly applied to a research methodology
designed to collect data from a specific
population, or a sample from that population,
and typically utilizes a questionnaire or an
interview as the survey instrument (Robson,
1993)
Research design A descriptive research
methodology is used for this research because
it portrays accurately that most ATM users
have no confidence in the use of PIN as the
only means of identity at the ATM machines,
by conducting a survey and fact finding. We
used some survey methods like comparative
and correlation approach conducting survey
on users and also existing literature. This
research has some aspects of qualitative
methods where the users opinions and
attitude is used to come up with the
conclusions about the use of PIN and
biometric at the ATM. Gravetter and Forzano
(2011) explain that descriptive research
design involves the measurement of a
variable or a set of variables as they naturally
exist. The research is aimed at collecting
information from respondents in determining
e-learning security issues. Chandran (2004)
notes that descriptive research designs are
used in studies that answers the “who”,
“what”, “when”, “where” and “how”
questions. This design describe what is
prevalent in security challenges in ATM
systems. The use of descriptive research
design enabled the description of the
identificationmight not be clear, this was
achieved by conducting a field editing where
clarity is made as the data is being collected.
Centralized editing after the data is collected.
The analysis is done by SPSS and there was
need of assigning numerical values to the
answers given during data collection for the
sake of coding and classification using tables
to tabulate the findings to summarize the
survey.
Research population
The total population of the research is banks
that are in Machakos County. Machakos
County has an estimated population of
1,098,584 people machakos county profile
(2015) which includes five towns; Athi River,
Machakos, Kangundo-Tala, Kathiani and Masii.
The target population is the ATM users which
the researcher is interested in describing and
making statistical inferences about. It refers to
the entire group of individual or objects to
which researchers are interested in
generalizing the conclusion.
Sample and sampling
techniques
For this research, my sampling unit is
geographical where Machakos town is
sampled. The methodology for this research is
a stratified random sample of bank users
across the town. Gay (1987) reports: Random
sampling is the best single way to obtain a
representative sample
Hardware specification
RAM: 4GB
Fingerprint scanner with USB cable
Processor: Intel core-i5, 64-bit
Software specification
OS: Windows 7 & above
Back-end: Python
Front-end: Java
Results
The proposed ATM security system provides a
mechanism for recovery of ATM PIN by using
fingerprint identification. The developed
system is able to authenticate the user based
on fingerprint identification. The system is
able to send an alert message to ATM card
owner for entering the wrong PIN. The alert
message is also sent to the owner of the card
upon successful creation of new PIN.
From the tests carried out we have been able
to prove that, the biometric identification for
ATM transactions can be practically
implemented in a real time environment. The
developed system provides ATM users with
the facility to change the PIN in the ATM
machine itself.
Future Scope
Bank can provide helpline number to block
the ATM card. In case if the ATM card is being
misused, user will get the message of
transaction which is performed through
his/her card. By referring that message, user
can call to helpline
number to block the ATM card through the
registered mobile number.
Conclusion
ATM authentication using PIN-based entry is
highly susceptible to shoulder- surfing or
observation attacks. In this system, we
propose the Secure-PIN- Authentication, OTP-
based authentication service for ATMs using
Mobile devices. The protocol does not require
any additional hardware support for currently
operating ATM machine terminals and
employs offloaded computation from the
mobile device for verifying the transaction
requests.
References
1. Alhassan M.E,Ganiyur S.O,Muhammad-
Bello B.L,” An enhanced ATM security system
using second level
authentication”,International journal of
computer application(0975-8887),vol 111-no
5,feb 2015.
2. A.Gera,N.sethi, “A revived survey of various
credit card fraud detection techniques,”
International Journal of Computer Science
and Mobile Computing, vol. 3, no. 4, pp. 780 –
791, April 2014
3. G. Stanley, “Card-less financial transaction,”
Apr. 21 2014, US Patent App. 14/257,588.
4. Gajjala Askok,Sai Venupradhap, Sivakumar,
“Design and Implementation of security based
ATM theft Monitoring System”, International
Journal of Engineering Inventions , vol 3,2013
[1] (AES)”, FIPS Publication 197,
http://csrc.nist.gov/encryption/
aes/index.html, Nov. 2001. [2] A.P.
Chandrakasan and R.W. Brodersen (eds.), Low
Power Digital CMOS Design, Kluwer Academic
Publishers, 2005. [3] Abayomi-Alli A.,
Omidiora E.O., Olabiyisi E.O., and Ojo J.A.,
Enhanced E-Banking System with Match-On-
Card Fingerprint Authentication and
MultiAccount ATM Card. The Journal of
Computer Science and Its Aplication, An
International Journal of the Computer Society
of Nigeria (NCS), V0l. 19, No.2 December,
2012 [4] Akwaja Chima, Nigeria Connects 99
million Subscribers, Fin. Standard., 2010, 10:
15-512. [5] ATM scam targets hundreds of
credit cards‘, New Europe, issue: 793, 4
August 2008, From
http://www.neurope.eu/articles/89221.php
(last visited on 20 April 2009). [6] B, Schouten
and B. Jacobs, Biometrics and their use in e-
passport, Image and Vision Computing vol. 27,
pp. 305–312. 2009, [7] B. Richard and M.
Alemayehu, Developing Ebanking Capabilities
in a Ghanaian Bank: Preliminary Lessons.
Journal of Internet Banking and Commerce,
vol. 11, no. 2, 2006. Downloaded March 15,
2012 from
http://www.arraydev.com/commerce/jibc/ [8]
Bhosale ST, and Sawant BS, Security in
eBanking via Card-less Biometric ATMS.
International Journal of Advanced Technology
& Engineering Research, 2012, 2: 9-12. [9]
Chris. Christian Science Monitor. ‘Guard your
card: ATM fraud grows more sophisticated’.
July 23, 2003.From http://www.csmonitor.com/2003/0721/p15s01-