0% found this document useful (0 votes)
26 views

Finally Projectt

The document discusses strategies and technologies for preventing crimes and detecting theft at ATMs. It describes various forms of ATM crimes like card skimming, cash trapping, and hacking. Advanced security measures are needed to counter increasingly sophisticated criminals and protect users. These include physical security, card authentication, fraud monitoring systems, and preventing data access. The goal is to maintain integrity of banking systems and ensure safety of users' financial assets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views

Finally Projectt

The document discusses strategies and technologies for preventing crimes and detecting theft at ATMs. It describes various forms of ATM crimes like card skimming, cash trapping, and hacking. Advanced security measures are needed to counter increasingly sophisticated criminals and protect users. These include physical security, card authentication, fraud monitoring systems, and preventing data access. The goal is to maintain integrity of banking systems and ensure safety of users' financial assets.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 50

ATM CRIME PREVENTION AND THEFT DETECTION

CHAPTER 1

INTRODUCTION

Money is the basic need of every individual for day-to-day activities. At the same time
protection and security associated with money is equally important, we deposit money in
banks thinking that it is safe, sometimes due to security breach when we withdraw money at
the ATM’s there are some chances of theft. Due to lack of security at the ATM counters the
person might get cheated for his money. It might be due to various reasons like password
sniffing or due to misuse of the ATM cards. This project is designed to overcome the issues
related to the security for better transaction and also to provide security at the ATM counter
with the help of embedded technology. Along with this the project also concentrates on
providing the security for women in case of harassments inside the ATM’s, robbery and
terrorist attacks. Using the concept of wireless sensor technology ATM doors will be locked
and unconscious spray is sprayed so that the thief can be caught immediately and the
information regarding the same will be sent to the control room for further action . One
person is allowed inside the ATM at a time in order to avoid theft inside the ATM, doors will
be locked until the entry of the next individual. ATM security systems encompass a wide
range of measures designed to protect users, their financial transactions, and the integrity of
the machines themselves. These systems incorporate advanced technologies, security
protocols, and physical safeguards to combat various forms of threats, including fraud,
unauthorized access, and theft. This introduction will explore the key components and
features of ATM security systems, highlighting their importance in maintaining the trust and
confidence of customers while ensuring the integrity and confidentiality of their financial
transactions. We will delve into the various layers of protection employed by ATM security
systems, including physical security, encryption and authentication techniques, real-time
monitoring, and incident response mechanisms. In the era of rapid technological
advancements and a cashless economy, Automated Teller Machines (ATMs) have become an
integral part of our daily lives. ATMs provide us with convenient access to our financial
resources and enable us to carry out various transactions swiftly. However, the increasing
reliance on ATMs has also led to a rise in criminal activities targeting these machines. ATM
crime, including thefts and frauds, poses a significant threat to individuals, businesses, and
financial institutions. To counter these challenges, advanced measures for crime prevention
and theft detection in ATMs have become a necessity. This paper aims to explore the various
strategies and technologies employed in ATM crime prevention and theft detection. ATM
crimes can take various forms, including physical attacks, card skimming, cash trapping, and
sophisticated hacking techniques. Criminals target ATMs to obtain personal identification
numbers (PINs), financial data, and cash. The consequences of these crimes extend beyond
financial losses and can lead to severe disruptions in the banking system, erosion of public
trust, and compromised customer confidence. Therefore, it is imperative to establish effective
measures to prevent and detect ATM-related crimes.

The system customer transactions, satisfies the requirements

DEPARTMENT OF ECE, AIT Page no. 1


ATM CRIME PREVENTION AND THEFT DETECTION

of the existing system in full-fledged manner. Through this


system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily.
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily
The system customer transactions, satisfies the requirements
of the existing system in full-fledged manner. Through this
system, customer can make fast transactions and view the
last transactions easily

Sophisticated fraud monitoring systems utilize advanced analytics to detect unusual patterns
and anomalies in ATM transactions. These systems can identify suspicious activities, such as
multiple transactions within a short period or transactions that deviate from the user's typical
behavior. Once anomalies are detected, appropriate actions, such as temporarily blocking the

DEPARTMENT OF ECE, AIT Page No:2


ATM CRIME PREVENTION AND THEFT DETECTION

card or alerting the customer, can be taken. ATM crime prevention and theft detection are
essential for maintaining the integrity of banking systems and ensuring the safety of
individuals' financial assets. By implementing a comprehensive approach that combines
physical security measures, card skimming prevention techniques, cash trapping detection
mechanisms, and digital security measures, financial institutions can significantly reduce the
risk of ATM-related crimes. Continuous research, innovation, and collaboration among
stakeholders are crucial to stay one step ahead of increasingly sophisticated criminals and
protect the interests of ATM users worldwide.

DEPARTMENT OF ECE, AIT Page No:3


ATM CRIME PREVENTION AND THEFT DETECTION

CHAPTER 2

LITERATURE SURVEY

The UK’s Open University (OU) has been using the Internet on a regular basis for
transporting student assignments (homework) between student, tutor and the university. Tutor
marked assignments are a major part of the OU’s assessment system, but all courses also
have an examinable component that often takes the form of a three-hour closed-book
examination taken under supervised conditions. Aim was to investigate to the extent at which
they could use the Internet to automate the examination process. In this paper we discuss the
results of two experiments that we have carried out so far, and discuss how examinations
might be carried out electronically in a distance education setting. The first experiment was
performed in 1997 when students sat a formal supervised examination in which the
examination paper and the students’ answers were transmitted between the OU and the
remote examination sites using electronic means. The second experiment, conducted early in
1999, enabled students to take a ‘mock exam’ accessed via a web page as part of their
revision. [1]

Biometrics-based authentication offers several advantages over other authentication.


Fingerprint technology in Particular, can provide a much more accurate and reliable user
authentication method. Biometrics is a rapidly Advancing field that is concerned with
identifying a person based on his or physiological or behavioral Characteristics. As the
Automated Teller Machines (ATM) technology is advancing, fraudsters are devising different
Skills to beat the security of ATM operations. Various forms of fraud are perpetuated,
ranging from: ATM card theft, Skimming, pin theft, card reader techniques, pin pad
techniques, force withdrawals and lot more. Managing the risk Associated with ATM fraud
as well as diminishing its impact is an important issue that faces financial institutions as
Fraud techniques have become more advanced with increased occurrences. Considering the
numerous security Challenges encountered by Automated Teller Machines (ATM) and users
and given that the existing security in the ATM system has not been able to address these
challenges, there is the need to enhance the ATM security system to Overcome these
challenges. This study focuses on how to enhance security of transactions in ATM system
using Fingerprint. The aim of this study therefore is to develop ATM simulator-based

DEPARTMENT OF ECE, AIT Page No:4


ATM CRIME PREVENTION AND THEFT DETECTION

fingerprint verification operations in Order to reduce frauds associated with the use of ATM.
[2]

The word pies come from the Greek word piezoelectric, meaning to press or squeeze.
Piezoelectricity refers to the generation of electricity or of electric polarity in dielectric when
subjected to mechanical stress and conversely, the generation of stress in such crystals in
Response to an applied voltage. In 1880, the Curie brothers found that quartz changed its
Dimensions when subjected to an electrical field and generated electrical charge when
pressure was applied. Since that time, researchers have found piezoelectric properties in
hundreds of Ceramic and plastic materials. Many piezoelectric materials also show electrical
effects due to temperature changes and radiation. This report is limited to piezoelectricity.
More detailed information on particular sensors can be found by contacting the manufacturer.
[3]

Effective visual design of e-commerce websites enhances website aesthetics and emotional
appeal for the user. To gain insight into how Internet users perceive human images as one
element of website design, a controlled experiment was conducted using a questionnaire,
interviews, and eye-tracking methodology. Three conditions of human images were created
including human images with facial features, human images without facial features, and a
control condition with no human images. It was expected that human images with facial
features would induce a user to perceive the website as more appealing, having warmth or
social presence, and as more trustworthy. In turn, higher levels of image appeal and perceived
social presence were predicted to result in trust. All expected relationships in the model were
supported except no direct relationship was found between the human image conditions and
trust. Additional analyses revealed subtle differences in the perception of human images
across cultures (Canada, Germany, and Japan). While the general impact of human images
seems universal across country groups, based on interview data four concepts emerged—
aesthetics, symbolism, affective property, and functional property—with participants from
each culture focusing on different concepts as applied to website design. Implications for
research and practice are discussed.[4]

In this project, when any physical attack against the ATM takes place, then information about
the attack is sent using IOT and also alerts the surrounding area using a buzzer, at the same
time the entire data from the sensors is sent to the developed mobile application and puts alert
message to the bank officials. The officials who have control over the mobile application can

DEPARTMENT OF ECE, AIT Page No:5


ATM CRIME PREVENTION AND THEFT DETECTION

control the Door through their mobile to lock from their location remotely. To prevent the
escape of the thief chloroform connected to the controller through relay can also be sprayed
inside the ATM by the officials remotely from their place using the mobile app. The Camera
(ESP32) is used for live video coverage and to monitor the activity inside the ATM. The
Camera will not only record the activity but also, transmit will live video taken inside the
ATM and the ATM location as latitude and longitude are tracked using GPS. [5]

Security and safety are a necessity for automated teller machines (ATM)Bhupad S, +2
authors. The ATM security system is implemented using the Internet of things (IOT) and
GPS (global positioning system). The main idea of this project is to develop an ATM
surveillance and security system. In this project, when any physical attack against the ATM
takes place, then information about the attack is sent using IOT and also alerts the
surrounding area using a buzzer, at the same time the entire data from the sensors is sent to
the developed mobile application and puts alert message to the bank officials. The officials
who have control over the mobile application can control the Door through their mobile to
lock from their location remotely. To prevent the escape of the thief chloroform connected to
the controller through relay can also be sprayed inside the ATM by the officials remotely
from their place using the mobile app. The Camera (ESP32) is used for live video coverage
and to monitor the activity inside the ATM. The Camera will not only record the activity but
also, transmit will live video taken inside the ATM and the ATM location as latitude and
longitude are tracked using GPS. [6]

Smart ATM surveillance system S. Shriram, Swastik B. Shetty, +2 authors V. Dharmambal


Published 18 March 2020 Computer Science 2019 International Conference on Circuit,
Power and Computing Technologies (ICCPCT)This paper presents an Automated Teller
Machine (ATM) surveillance system which is a smart system based on embedded technology
and incorporates various sensors to continuously monitor its surroundings for suspicious
activities like physical attack, fraud and theft that might jeopardize the ATM and people
nearby. Also discussed is the security and safety measures that can be implemented to
prevent such raids by proper surveillance. This paper analyses the different forms of physical
attacks on ATM's and discusses the methods that are used to detect the foray, commence
proactive measures and tip-off officials through GSM network. We also discuss about the
implementation of the proposed system, the sensors and the other supporting hardware that

DEPARTMENT OF ECE, AIT Page No:6


ATM CRIME PREVENTION AND THEFT DETECTION

are being used to deploy this system. The proposed system thus heightens the security of
ATMs against imminent attacks effectively. [8]

There are many researches had been done related to the security of the Banks and it
applications such ATM service, online banking etc. It can be understood that nowadays,
most of the security systems provide two or more factor authentication to increase the
security. From an earlier study it was identified that reduces the PIN’s insufficient security
problem can be replaced by the computer-generated number with biometric security
(Bhosale, 2019). It was reported that biometric authentication is a process or ability of
individual to prove his or her own identity using biometric input or authenticate ourselves in
case of ATM transactions (Jebaline & Gomat 2021). And also, it mentioned that include the
biometric authentication with PIN will increase the security of ATM and reduce the chances
of PIN forgery (Jebaline & Gomathi, 2021).[9]

Banks in India have started introducing biometric automatic teller machines (ATMs) as it
seems to be an effective way of preventing card usage and is also a channel to expand a
bank’s reach to the rural and illiterate masses. Union Bank of India installed a first such
"Kisan ATM" at Siyagangai branch Tamil Nadu. Dena Bank has launched the Bio-metric
ATMs in Gujarat. Andhra Bank has launched mobile biometric – access ATMs, one each for
the Twin Cities of Hyderabad and Sceunderabad. Corporation Bank has also introduced
"talking" biometric ATMs". These ATMs talks to the farmer in their local languages. Present
study deals with new innovative model for biometric ATMs which replaces card system by
biometric technology for operating ATMs. Proposed model provides high security in
authentication which also protects service user from unauthorized access. In this proposed
model user required to authenticate himself with biometric identification (Thumb/
Fingerprint/Iris etc.), Personal Identity Number (PIN) and selection of bank branch from
displayed list if necessary. This proposed model is designed for the rural farmers, semi-
literate peoples. This model reduces complexity with authentication as "authentication is
always with you" with high security. It also saves time, cost, and efforts compared with card-
based ATMs and also saves environmental pollution problem of excess number of plastic
cards.[10]

The idea of ATM theft detection project is born with the observation in our real-life incidents
happening around us. This analysis deals with the implementation of security system in
ATMs through totally different strategies to reinforce their safety. This project deals with

DEPARTMENT OF ECE, AIT Page No:7


ATM CRIME PREVENTION AND THEFT DETECTION

prevention of the atm theft from robbery. So, to overcome the drawback found in existing
technology in our society. Here LCD board using showing the output of the message
continuously. This will prevent the robbery and the person involving in robbery can be easily
caught. This proposed system provides biometric registration for entering into atm room just
to store the biometric details of the person. If in case of robbery these biometric details are
useful. Spray mechanism is used to bring the person into unconscious stage and send the
message to the nearby control room through IOT. Stepper motor is used to open the door as
well as to close through RFID card which is of white in color, where we can add the
fingerprints. this card is not restricted to only one person fingerprint it has the capacity of
minimum 2 and max 4 fingerprints you can add others fingerprints also which you will
believe them. Here, Keil tool are used to implement the idea and results are obtained the
buzzer is also used which gives a precautionary sound.[11]

DEPARTMENT OF ECE, AIT Page No:8


ATM CRIME PREVENTION AND THEFT DETECTION

CHAPTER 3

Objectives of the Project

The main objectives of this project are

 To Attain high speed informative System

 To detect the uneven motion for a longer duration of time behind the machine.

 To detect the increase in sound level in case of screaming or shouting in ATM booth

 The objective of designing ATM theft detection /identification

 To make the place more secure for money transaction

DEPARTMENT OF ECE, AIT Page No:9


ATM CRIME PREVENTION AND THEFT DETECTION

CHAPTER 4

Proposed Prototype

LCD

RELAY
GPS

MOTOR
DRIVER
GSM

STEPPER
SPRAY ARDUINO MOTOR
MICROCONTROLLER
VIBRATION
KEYPAD SENSOR

POWER
SUPPLY

DEPARTMENT OF ECE, AIT Page No:10


ATM CRIME PREVENTION AND THEFT DETECTION

The proposed prototype which is present inside the ATM will send messages to the control
station in case of any theft detected, where it will be in touch with the control station which
will respond immediately and the control station checks for theft and locks the door
immediately with the help of stepper motor and alert message is sent to the nearest police
station through SMS. SMS is sent through the GSM service provider, once the message is
received by the control station, ATM door will be locked so that the person who is suspected
can be caught. The Sensor at the entry door of the ATM will restrict the entry to a single
person in order to avoid problems. As soon as the card holder enters into the room, no sooner
other person can enter for that session. More than one entry into the ATM room will be
blocked automatically. The power supply is given to the Arduino micro controller. The GPS
detects the location and feeds to the micro controller. The Arduino microcontroller transmits
the data to relay and to the motor driver. Once relay is activated the buzzer starts working and
the motor driver receives the data form Arduino microcontroller the motor driver transmits
the data to stepper motor and the stepper motor starts rotating and the output data is displayed
on the LCD (liquid crystal display).The block diagram of an Arduino microcontroller
showcases the integration of various components and subsystems, enabling the user to
program, interface with external devices, and create interactive electronic projects. The
simplicity and modularity of the Arduino platform have made it popular among students for a
wide range of applications. The Arduino board may include additional components like
resisters, LCD, GSM, GPS, keypad, that are essential for specific functions or user
interaction. These components enhance the overall functionality and versatility of the
Arduino board. The power supply block provides the necessary voltage and current to operate
the Arduino board. It can be powered through various sources, including USB, external
power adapters, or batteries. The power supply block typically includes voltage regulators to
ensure stable and regulated power for the different components on the board.

LCD: The use of Liquid Crystal Displays (LCDs) in Automated Teller Machines (ATMs) has
revolutionized the banking industry by providing users with a clear and interactive interface
for their transactions. However, these displays serve a more significant purpose beyond user
convenience and information dissemination. LCD technology has become an integral
component in ATM crime prevention, contributing to enhanced security measures and user
protection. This paper aims to explore the various ways LCDs are utilized in ATM crime
prevention and how they contribute to deterring criminal activities.

Displaying security information: One of the primary functions of LCDs in ATMs is to


display security information to users. These displays are utilized to provide essential
instructions and guidelines to customers, promoting safe and secure usage of the machine.
The following security information can be effectively communicated through LCDs.

DEPARTMENT OF ECE, AIT Page No:11


ATM CRIME PREVENTION AND THEFT DETECTION

PIN Shielding: To prevent shoulder surfing and unauthorized access to PINs, LCDs are
equipped with features that shield the entered digits. Special overlays or filters are integrated
into the display, ensuring that the PIN numbers are only visible to the user standing directly
in front of the ATM.

The integration of LCD technology in ATMs goes beyond providing an interactive interface
for users. It plays a significant role in enhancing ATM crime prevention measures and
ensuring user protection. Through the display of security information, dynamic authentication
and encryption techniques, and enhanced user verification processes, LCDs contribute to
deterring criminal activities and safeguarding customer accounts. As technology continues to
advance, LCDs will likely evolve further, incorporating additional security features to stay
ahead of ever-evolving threats. The continued investment in LCD technology for ATM crime
prevention reinforces the commitment of financial institutions to prioritize security and
deliver a safe and secure banking experience to their customers.

GPS: The use of Global Positioning System (GPS) technology has revolutionized various
industries, including security and law enforcement. In the realm of Automated Teller
Machines (ATMs), GPS plays a crucial role in crime prevention and deterring criminals. By
integrating GPS technology into ATMs, financial institutions and law enforcement agencies
can track ATM units, enhance security measures, and enable rapid response to criminal
activities. This paper explores the multifaceted application of GPS in ATM crime prevention
and highlights its effectiveness in ensuring the safety of both the machines and ATM users.
PS technology enables precise tracking and real-time monitoring of ATM units. By equipping
ATMs with GPS devices, financial institutions can: GPS tracking allows financial institutions
to accurately locate and monitor the whereabouts of each ATM unit. This information is
invaluable in optimizing the placement of ATMs in high-traffic, secure areas, reducing the
risk of criminal activities.

Tracking and Recovery: ATMs equipped with GPS technology can be tracked in real-time,
allowing authorities to monitor their location. In the event of theft or unauthorized
movement, the GPS system can provide accurate location information, enabling law
enforcement agencies to swiftly respond and recover the stolen ATM.

Alarm Triggers: GPS-enabled ATMs can be integrated with alarm systems that activate
when an ATM is tampered with or moved without authorization. These alarms can send an
instant alert to the security personnel or law enforcement, including the precise GPS
coordinates of the ATM's current location. This helps in reducing response time and
apprehending criminals.

It's important to note that while GPS technology can aid in preventing ATM crimes and
recovering stolen machines, it should be complemented with other security measures, such as
surveillance cameras, secure enclosures, and access control systems, to create a
comprehensive security framework.

DEPARTMENT OF ECE, AIT Page No:12


ATM CRIME PREVENTION AND THEFT DETECTION

GSM: (Global System for Mobile Communications) technology plays a crucial role in ATM
crime prevention and theft detection. Here's how GSM is utilized in this context.

Real-Time Communication: GSM enables ATMs to establish a constant connection with


the cellular network, allowing them to communicate with the bank's central system or a
dedicated security monitoring center. This real-time communication ensures that any
suspicious activities or unauthorized access to the ATM can be immediately reported and
acted upon.

Alarm Notifications: In the event of an ATM crime, such as tampering, forced entry, or
unauthorized access, GSM technology can trigger alarms within the ATM system. These
alarms can send immediate notifications via SMS or voice calls to designated security
personnel, allowing them to respond promptly to the incident.

Location Tracking: GSM technology, coupled with GPS, can provide precise location
tracking for ATMs. In case of ATM theft, the GPS-GSM combination enables the tracking of
the stolen ATM's movement, allowing law enforcement authorities to locate and recover it
quickly.

SIM Card Security: GSM technology includes security features that protect the SIM card
used in the ATM's communication module. This helps prevent unauthorized SIM card
replacement, which could be attempted by criminals to disable the ATM's communication
capabilities and avoid detection.

Remote Control and Lockdown: GSM enables remote control functionalities for ATMs. In
the case of a security threat or suspicion of tampering, the GSM connection allows authorized
personnel to remotely lock down or shut down the ATM, preventing any further access or
transactions until the issue is resolved.

SPRAY PUMP: Spray pump systems can be employed in ATM crime prevention as a
deterrent against theft and as a means to incapacitate criminals. Here's how spray pump
technology can be utilized:

Pepper Spray or Tear Gas: Some advanced spray pump systems can also be designed to
release pepper spray or tear gas. These substances cause irritation, temporary blindness, and
difficulty breathing, effectively incapacitating the criminal and providing an opportunity for
bystanders or security personnel to intervene. The goal is to deter the criminal and prevent the
successful execution of the crime.

DEPARTMENT OF ECE, AIT Page No:13


ATM CRIME PREVENTION AND THEFT DETECTION

Remote Activation: Spray pump systems can be remotely controlled by security personnel
or a monitoring center. In the event of suspicious activity or a confirmed security threat,
authorized personnel can remotely trigger the spray pump system. This capability allows for a
controlled response and ensures that the spray is only deployed when necessary

It's important to note that the deployment of spray pump systems should comply with legal
regulations and safety considerations to minimize any potential harm to innocent individuals
and ensure the effective and responsible use of such technology. The primary purpose of
these systems is to deter criminals and aid in their identification, while also protecting the
assets and integrity of the ATM.

KEYPAD: Keypads play a significant role in ATM crime prevention and theft detection.
Here are some ways in which keypad technology is utilized:

PIN Security: The keypad is used by ATM users to input their Personal Identification
Number (PIN). PIN security is crucial in preventing unauthorized access and fraudulent
transactions. Keypads are designed with tamper-resistant features to protect against PIN theft
through techniques like shoulder surfing, skimming devices, or camera-based attacks.
Advanced keypads may include additional security measures like anti-skimming technology
or tactile feedback to enhance user confidence.

Encryption: Keypads are typically equipped with encryption capabilities to ensure the
confidentiality of the entered PIN. The PIN data is encrypted within the keypad itself before
transmission to the ATM's processing system. This encryption prevents interception and
eavesdropping on the PIN data, safeguarding the user's sensitive information.

Secure PIN Entry: Keypads can incorporate features to protect against common PIN theft
techniques. This includes randomizing the arrangement of the numbers on the keypad to
confuse potential observers and preventing the recording of keystrokes through techniques
like heat or motion detection. These measures make it more challenging for criminals to
determine the user's PIN.

Remote Keypad Shutdown: In the case of a security threat or suspected compromise of the
keypad, authorized personnel can remotely shut down the keypad, rendering it temporarily
inoperable. This prevents any further access to the ATM until the issue is resolved, reducing
the risk of unauthorized transactions or PIN theft.

By incorporating secure and advanced keypad technology, ATMs can strengthen PIN
security, deter PIN theft, detect tampering attempts, and enable monitoring for fraudulent
activity. These measures contribute to the overall crime prevention and protection of ATM
users' financial information.

RELAY: Relays can be utilized in ATM crime prevention and theft detection systems to
enhance security and prevent unauthorized access. Here are some ways relays are used:

DEPARTMENT OF ECE, AIT Page No:14


ATM CRIME PREVENTION AND THEFT DETECTION

Access Control: Relays can be employed in conjunction with electronic locks to control
access to critical components of the ATM, such as the cash cassette or secure compartments.
The relay acts as a switch that is activated based on user authentication, allowing authorized
personnel or processes to operate the lock and gain access. This helps prevent unauthorized
individuals from tampering with or stealing cash from the ATM.

Alarm Systems: Relays are used in ATM alarm systems to trigger various security
responses. When an alarm condition is detected, such as forced entry, tampering, or
unauthorized access, the relay can activate an alarm siren, strobe lights, or send signals to a
monitoring center. The relay serves as a control mechanism to initiate the appropriate
response and notify security personnel or law enforcement agencies.

Sensor Integration: Relays facilitate the integration of various sensors in an ATM security
system. Sensors such as motion detectors, proximity sensors, or vibration sensors can be
connected to relays. When the sensors detect suspicious activity, they send a signal to the
relay, which can then activate alarms, lock down the ATM, or trigger other security
measures.

Tamper Detection: Relays can be used to detect tampering attempts on critical ATM
components. For example, relays can monitor the integrity of the ATM enclosure or access
panels. If the relay detects any unauthorized opening or tampering, it can trigger an alarm or
initiate a security response, such as disabling the ATM or notifying security personnel.

Relays play a crucial role in coordinating security measures and responses in ATM crime
prevention and theft detection systems. By acting as control switches, relays enable secure
access, activate alarms, integrate sensors, detect tampering, and synchronize security
measures, enhancing the overall security of ATMs.

MOTOR DRIVER: Motor drivers are not directly used in ATM crime prevention and theft
detection systems. However, motor drivers are commonly employed within ATMs for
controlling the movements of various components. These components can indirectly
contribute to crime prevention and theft detection. Here are a few examples:

Cash Dispensing Mechanism: Motor drivers are used to control the motors that dispense
cash from an ATM. These motors are responsible for accurately counting and dispensing the
desired amount of cash to the user. By ensuring precise control over cash dispensing, motor
drivers help prevent instances of cash miscounts or unauthorized cash withdrawals.

Cash Dispensing Mechanism: Motor drivers are used to control the motors that dispense
cash from an ATM. These motors are responsible for accurately counting and dispensing the
desired amount of cash to the user. By ensuring precise control over cash dispensing, motor
drivers help prevent instances of cash miscounts or unauthorized cash withdrawals.

Card Reader Mechanism: Motor drivers are used to control the card reader mechanism that
accepts and ejects ATM cards. These drivers enable smooth and reliable card insertion and

DEPARTMENT OF ECE, AIT Page No:15


ATM CRIME PREVENTION AND THEFT DETECTION

removal, ensuring that the card reader operates accurately and consistently. This helps
prevent card-related security breaches, such as card skimming or card trapping, by
maintaining proper functionality and user experience.

While motor drivers themselves do not directly contribute to crime prevention or theft
detection, their reliable operation and precise control of essential components in an ATM
system indirectly enhance security measures. By ensuring accurate cash dispensing,
activating security features, and maintaining proper card reader functionality, motor drivers
support the overall integrity and security of ATMs.

STEPPER MOTOR: Stepper motors can be utilized in ATMs for controlling door opening
and closing mechanisms, especially in the context of theft detection. Here's how stepper
motors can be used:

Secure Door Operation: Stepper motors can be employed to control the opening and closing
of secure doors within the ATM. These doors typically provide access to the cash
compartment or other sensitive areas. By using stepper motors, precise control over the door
movement can be achieved, ensuring smooth and secure operation. The stepper motor can be
programmed to move the door to specific positions, such as fully closed or fully open,
providing controlled access to authorized personnel only.

Theft Detection and Response: Stepper motors can be integrated with theft detection
systems to trigger appropriate responses when unauthorized access or tampering is detected.
For example, if a sensor detects forced entry or unusual activity, the stepper motor can be
activated to immediately close and lock the door, preventing further access to the ATM's
internal components. This rapid response helps deter theft and secures the contents of the
ATM.

By employing stepper motors for door opening and closing mechanisms, ATMs can enhance
security measures and theft detection capabilities. The precise control offered by stepper
motors ensures secure access control, facilitates rapid response to theft attempts, supports
tamper resistance, and enables integration with alarm systems for comprehensive security
solutions.

VIBRATION SENSOR: Vibration sensors play a vital role in ATM security by detecting
and alerting against various tampering and attack attempts. Here are some key uses of
vibration sensors in ATMs:

Tamper Detection: Vibration sensors are used to detect any unauthorized tampering with the
ATM's outer casing or components. These sensors are strategically placed to monitor
vibrations and movements that occur when someone tries to forcefully open the ATM, drill
into it, or manipulate its parts. If the vibration sensor detects such activity, it triggers an
alarm, notifying security personnel or activating other security measures.

DEPARTMENT OF ECE, AIT Page No:16


ATM CRIME PREVENTION AND THEFT DETECTION

Skimming Prevention: Vibration sensors can be employed to detect the presence of


skimming devices or unauthorized attachments on the ATM's card reader or keypad.
Skimming devices are often installed to capture card data or PINs, compromising the security
of ATM users. The vibration sensor can identify abnormal vibrations caused by these
devices, triggering alarm or alerting security personnel to investigate and remove the
skimming equipment promptly.

Explosive Attacks: Vibration sensors are crucial in preventing explosive attacks on ATMs.
These sensors are designed to detect the vibrations and shockwaves produced during
explosive attempts, such as the use of explosives or gas attacks. When the vibration sensor
registers the characteristic signatures of such attacks, it can trigger an immediate alarm, lock
down the ATM, and send alerts to security personnel and law enforcement agencies.

POWER SUPPLY: Power supply systems play a critical role in the operation and security of
ATMs. Here are some important uses of power supply in ATMs:

Reliable Operation: ATMs require a stable and uninterrupted power supply to ensure their
continuous operation. Power supply systems provide the necessary electrical energy to power
all components of the ATM, including the display, cash dispenser, card reader, keypad, and
communication modules. A reliable power supply ensures that the ATM remains functional
and available for use by customers at all times.

Backup Power: Power supply systems in ATMs often incorporate backup power sources,
such as batteries or uninterruptible power supply (UPS) units. These backup systems are
crucial during power outages or unexpected disruptions in the main power source. They
ensure that the ATM remains operational, allowing customers to complete transactions and
preventing potential loss of data or interruptions in financial services.

Security Features: Power supply systems are closely integrated with security features in
ATMs. For example, power supply systems can control the operation of security cameras,
enabling continuous surveillance and recording of ATM surroundings. Additionally, power
supply systems may power security alarms, sensors, and access control mechanisms, ensuring
their proper functioning to deter and detect unauthorized access or tampering attempts.

Remote Monitoring and Management: Power supply systems in ATMs often feature
remote monitoring and management capabilities. This allows banks or ATM operators to
remotely monitor power consumption, voltage levels, and other parameters related to the
power supply. Remote management capabilities enable proactive monitoring,
troubleshooting, and maintenance, reducing downtime and optimizing ATM performance.

Overall, power supply systems are integral to the reliable operation, security, and efficiency
of ATMs. They ensure continuous power availability, enable backup power during outages,
support security features, facilitate remote monitoring and management, provide power
conditioning and protection, and promote energy efficiency in ATM operations.

DEPARTMENT OF ECE, AIT Page No:17


ATM CRIME PREVENTION AND THEFT DETECTION

Flow chart

DEPARTMENT OF ECE, AIT Page No:18


ATM CRIME PREVENTION AND THEFT DETECTION

Work of flow chart

DEPARTMENT OF ECE, AIT Page No:19


ATM CRIME PREVENTION AND THEFT DETECTION

Hardware and software requirements

Hardware specification

 Microcontroller-ARM7 LPC2148,3.3V,60Mhz

 Relay-12v

 LCD-16*2,5v

 Buzzer- LPF3916-GA-12-3.2-R

 Stepper Motor - ULN2003.

 GSM SIM900- 12V, 900 MHz

 D7E-2 Vibration sensor

 Spray pump

 Power supply-12V

 RDM6300 RFID Card

Software Specifications

 Embedded C

DEPARTMENT OF ECE, AIT Page No:20


ATM CRIME PREVENTION AND THEFT DETECTION

 Keil uv5

 Flash magic

CHAPTER 5

REQUIREMENTS(HARDWARE\SOFTWARE)

MICROCONTROLLER:

Micro controller will send signal to the GSM module. Once GSM receives a signal from
micro controller it informs the control room as “ATM theft detected’’ through an SMS. After
receiving an alert message from the microcontroller GSM module will lock the door. Once
the GSM receives a secret code from the control station it sends the signal to the micro
controller. It consists of 5volts power supply and all the connections of components are fed to
the Arduino microcontroller.

Figure 5.1 Microcontroller

DEPARTMENT OF ECE, AIT Page No:21


ATM CRIME PREVENTION AND THEFT DETECTION

It controls all the interfaced components according to the program written. Its receives the
ATM card data from reader, check with its memory, display with LCD, and send SMS
through GSM module. We can also check balance as well as withdraw amount using 2
switches interfaced with microcontroller. If any abnormal sounds happen around ATM MIC
sensor activates and gives signal to Arduino. MEMS sensor attached to ATM system. If
anyone trying to move ATM from one place to another place then MEMS sensor activates. If
anyone sensor activates then SMS will send to police station (here registered mobile number).
Micro controller will send a signal to the GSM module. As GSM receives a signal from
micro controller informs to control room as ATM theft detected through an SMS when the
controller receives the above message he will send a message to the GSM module to lock the
door. As the GSM receives a secret code from the owner it Send a signal to the micro
controller and micro controller will lock the door.

GSM:

Global System for Mobile Communication is the technology that underpins most of the
World’s mobile phone networks. The GSM platform is a hugely successful wireless
technology and an unprecedented story of global achievement and cooperation. GSM has
become the world’s fastest growing communication technology of all time and the leading
global Mobil standard, spanning 218 countries. GSM is an open digital cellular technology
used for transmitting mobile voice and data services GSM operates in the 900Mhz and
1.8Ghz bands GSM supports data transfer speeds of up to 9.6 kbps, allowing the transmission
of basic data services such as SMS.

DEPARTMENT OF ECE, AIT Page No:22


ATM CRIME PREVENTION AND THEFT DETECTION

Figure 5.2 GSM

2G networks developed as a replacement for first generation (1G) analog cellular networks.
The GSM standard originally described a digital, circuit-switched network optimized for full
duplex voice telephony. This expanded over time to include data communications, first
by circuit-switched transport, then by packet data transport via General Packet Radio
Service (GPRS), and Enhanced Data Rates for GSM Evolution (EDGE). GSM is an open and
digital cellular technology used for mobile communication. It uses 4 different frequency
bands of 850 MHz, 900 MHz, 1800 MHz and 1900 Mhz. It uses the combination of FDMA
and TDMA. This article includes all the concepts of GSM architecture and how it works.  

Network structure:

The network is structured into several discrete sections:

 Base station subsystem – the base stations and their controllers


 Network and Switching Subsystem – the part of the network most similar to a fixed
network, sometimes just called the "core network"
 GPRS Core Network – the optional part which allows packet-based Internet
connections Operations (OSS) – network maintenance.

GSM Security:

GSM was intended to be a secure wireless system. It has considered the user
authentication using a pre-shared key and challenge-response, and over-the-air encryption.
However, GSM is vulnerable to different types of attack, each of them aimed at a different
part of the network. The development of UMTS introduced an optional Universal Subscriber
Identity Module (USIM), that uses a longer authentication key to give greater security, as
well as mutually authenticating the network and the user, whereas GSM only authenticates
the user to the network (and not vice versa). The security model therefore offers
confidentiality and authentication, but limited authorization capabilities, and no non-
repudiation.

STEPPER MOTOR:

DEPARTMENT OF ECE, AIT Page No:23


ATM CRIME PREVENTION AND THEFT DETECTION

Stepper motor also known as step motor or stepping motor, is a brushless DC electric motor
that divides a full Rotation in to a number of equal steps The motor’s position can then be
Commanded to move and hold at one of these steps without any position sensor for feedback
(an open-loop controller), as long as the motor is carefully Sized to the application in respect
to torque and speed. Switched reluctance motors are very large stepping motors with a
reduced pole count, and generally are closed-loop Commutated

Figure 5.3 stepper motor

A step motor can be viewed as a synchronous AC motor with the number of poles (on both
rotor and stator) increased, taking care that they have no common denominator. Additionally,
soft magnetic material with many teeth on the rotor and stator cheaply multiplies the number
of poles (reluctance motor). Modern steppers are of hybrid design, having both permanent
magnets and soft iron cores.

Operation of motor:

Brushed DC motors rotate continuously when CD Voltage is applied to their terminals. The
stepper motor is known by its property of Converting a train of input pulses,(typically square
wave pulses) in to a precisely defined increment in the shaft prostitution defined increment in
the shaft position. Each pulse moves the shaft through a fixed angle.

DEPARTMENT OF ECE, AIT Page No:24


ATM CRIME PREVENTION AND THEFT DETECTION

Figure 5.3.1 stepper motor

Stepper motor effectively have multiple “toothed’’ electromagnets arranged around a central
gear shaped piece of iron. The electromagnets or a micro controller, to make the motor shaft
turn first one electromagnet is given power which magnetically attracts the gear’s teeth when
the gear’s teeth are aligned to the first electromagnet, they are slightly offset from the next
electromagnet is turned on and the first is turned off, the gear. Rotates slightly to align with
the next one from there the process is repeated each of those integer number of steps Making
a full rotation, in that way the motor can be turned by a precise angle. motor has two groups
in total, then the grouping pattern would be Electromagnets within the same group are all
energized together, Because of this, stepper motors with more phases typically have more
wires (or leads) to Control the Motor.

RELAY:

Relays offer a level of safety and protection in controlling high-power devices. They provide
a separation between the low-voltage control circuit and the high-power circuit, reducing the
risk of electrical shock or damage to the microcontroller and other sensitive component.

DEPARTMENT OF ECE, AIT Page No:25


ATM CRIME PREVENTION AND THEFT DETECTION

Figure 5.4 RELAY

Relays are used where it is necessary to control a circuit by an independent low-power signal,
or where several circuits must be controlled by one signal. Relays were first used in long-
distance telegraph circuits as signal repeaters: they refresh the signal coming in from one
circuit by transmitting it on another circuit. Relays were used extensively in telephone
exchanges and early computers to perform logical operations.

The traditional form of a relay uses an electromagnet to close or open the contacts, but other
operating principles have been invented, such as in solid-state relays which
use semiconductor properties for control without relying on moving parts. Relays with
calibrated operating characteristics and sometimes multiple operating coils are used to protect
electrical circuits from overload or faults; in modern electric power systems these functions
are performed by digital instruments still called protective relays.

Latching relays require only a single pulse of control power to operate the switch persistently.
Another pulse applied to a second set of control terminals, or a pulse with opposite polarity,
resets the switch.

Basic Design and Operation Relay:

A simple Electromagnetic relay consists of a coil of wire wrapped around a soft iron
core (a solenoid), an iron yoke which provides a low reluctance path for magnetic flux, a
movable iron armature, and one or more sets of contacts (there are two contacts in the relay
pictured). The armature is hinged to the yoke and mechanically linked to one or more sets of
moving contacts. The armature is held in place by a spring so that when the relay is de-
energized there is an air gap in the magnetic circuit. In this condition, one of the two sets of
contacts in the relay pictured is closed, and the other set is open. Other relays may have more
or fewer sets of contacts depending on their function. The relay in the picture also has a wire
connecting the armature to the yoke. This ensures continuity of the circuit between the
moving contacts on the armature, and the circuit track on the printed circuit board (PCB) via
the yoke, which is soldered to the PCB.

DEPARTMENT OF ECE, AIT Page No:26


ATM CRIME PREVENTION AND THEFT DETECTION

Figure 5.4.1(A) Basic Design of Relay Figure 5.4.1(B) Basic Design of Relay

Pole and Throw:

Since relays are switches, the terminology applied to switches is also applied to relays; a
relay switches one or more poles, each of whose contacts can be thrown by energizing the
coil. Normally open (NO) contacts connect the circuit when the relay is activated; the circuit
is disconnected when the relay is inactive. Normally closed (NC) contacts disconnect the
circuit when the relay is activated; the circuit is connected when the relay is inactive. All of
the contact forms involve combinations of NO and NC connections.

 SPST-NO (Single-Pole Single-Throw, Normally-Open) relays have a single Form


A contact or make contact. These have two terminals which can be connected or
disconnected. Including two for the coil, such a relay has four terminals in total.
 SPDT (Single-Pole Double-Throw) relays have a single set of Form C, break before
make or transfer contacts. That is, a common terminal connects to either of two
others, never connecting to both at the same time. Including two for the coil, such a
relay has a total of five terminals.
 DPDT – Double-Pole Double-Throw relays have two sets of Form C contacts. These
are equivalent to two SPDT switches or relays actuated by a single coil. Such a relay
has eight terminals, including the coil
 Form D – make before break
 Form E – combination of D and B

DEPARTMENT OF ECE, AIT Page No:27


ATM CRIME PREVENTION AND THEFT DETECTION

EN 50005 are among applicable standards for relay terminal numbering; a typical EN 50005-
compliant SPDT relay's terminals would be numbered 11, 12, 14, A1 and A2 for the C, NC,
NO, and coil connections, respectively.

DIN 72552 defines contact numbers in relays for automotive use.

LCD DISPLAY:

It consists of 5volts power supply. It consists of 13 pins liquid crystal. Only 9 pins are used in
supply and these pins are connect to Arduino microcontroller board. This model and it
consists of pot the three pins are connected to power supply (5volts). The ground is connected
to ground of power supply and The VCC is connected to 5volts of power supply and the
RW(READ\WRITE) of LCD is connected to ground of reset of the power

Figure 1.4(LCD display)

Figure 5.5 LCD Display

LCD Display LCD (Liquid Crystal Display) screen is an electronic display module and finds
a wide range of applications. A 16x2 LCD display is a very basic module that has 2
controllers with 16 Pins which is very commonly used in various devices and circuits. These
modules are preferred over seven segments and other multi-segment LEDs as they are
economical; easily programmable; have no limitation of displaying special & even custom
characters (unlike in seven segments), animations. The status of the system is displayed using
LCD.

DEPARTMENT OF ECE, AIT Page No:28


ATM CRIME PREVENTION AND THEFT DETECTION

A liquid-crystal display (LCD) is a flat-panel display or other electronically modulated


optical device that uses the light modulating properties of liquid crystals. Liquid crystals do
not emit light directly, instead using a backlight or reflector to produce images in color or
monochrome.[1] LCDs are available to display arbitrary images (as in a general-purpose
computer display) or fixed images with low information content, which can be displayed or
hidden, such as preset words, digits, and seven-segment displays, as in a digital clock. They
use the same basic technology, except that arbitrary images are made up of a large number of
small pixels, while other displays have larger elements.

LCDs can either be normally on (positive) or off (negative), depending on the polarizer
arrangement. For example, a character positive LCD with a backlight will have black
lettering on a background that is the color of the backlight, and a character negative LCD will
have a black background with the letters being of the same color as the backlight. Optical
filters are added to white on blue LCDs to give them their characteristic appearance. A 16x2
LCD means it can display 16 characters per line and there are 2 such lines. In this LCD each
character is displayed in 5x7 pixel matrix. This LCD has two registers, namely, Command
and Data. The command register stores the command instructions given to the LCD. A
command is an instruction given to LCD to do a predefined task like initializing it, clearing
its screen, setting the cursor position, controlling display etc. The data register stores the data
to be displayed on the LCD. The data is the ASCII value of the character to be displayed on
the LCD. Click to learn more about internal structure of an LCD

SPRAY PUMP:

spray pump is connected to 5volts of relay and it helps the person inside the atm by spraying
the organic chloroform gas to make the theft unconscious.

Figure 5.6 Spray Pump

DEPARTMENT OF ECE, AIT Page No:29


ATM CRIME PREVENTION AND THEFT DETECTION

Sprayer pump are mechanical devices designed to generate a pressure Differential to drive
spray fluid from a storage tank. Through system plumbing, and to the spray nozzle.

 Spray pump are mechanical devices design to generate pressure differential to drive
spry fluid from a storage tank through pumping
 Most garden sprayers use a pump assembly to create the internal pressure and you
move the pump handle up and down to increase pressure.

However, your sprayer may demonstrate poor pressure just by observing the water flow,
sputtering out of the nozzle which no force at all.

To operate the PUMP, you pull the trigger back, pushing the piston the cylinder the upstroke,
the spring pushing the piston back out, expands the cylinder area, sucking fluid into the
pump. In a Spray bottle, you need to suck cleaning fluid in from the reservoir below and
force it out through the barrel above pump. The pump is the main working part of
a spray bottle. The pump consists of the trigger mechanism, a piston, a cylinder and a one-
way valve. When the user presses the trigger, it forces the piston into the cylinder, which
forces the liquid through the nozzle as a concentrated stream of liquid.

The pump is the main working part of a spray bottle. The pump consists of the trigger
mechanism, a piston, a cylinder and a one-way valve. When the user presses the trigger, it
forces the piston into the cylinder, which forces the liquid through the nozzle as a
concentrated stream of liquid. When the trigger is released, the piston moves back, pulling
liquid back into the cylinder. This liquid is forced out of the nozzle the next time the trigger is
pressed. A one-way valve at the bottom of the pump only allows liquid to flow up the tube
into the pump, not back into the bottle.

POWER SUPPLY:
The power supply plays a vital role in an Arduino microcontroller system by
providing the necessary voltage and current to operate the board and its
components. Here are the key functions of the power supply in an Arduino

microcontroller

DEPARTMENT OF ECE, AIT Page No:30


ATM CRIME PREVENTION AND THEFT DETECTION

Figure 5.7 Power Supply

It is an electrical device that supplies electric power to an electrical load. The primary


function of a power supply is to convert electric current from a source to the
correct voltage, current, and frequency to power the load. As a result, power supplies are
sometimes referred to as electric power converters. Some power supplies are separate
standalone pieces of equipment, while others are built into the load appliances that they
power. Examples of the latter include power supplies found in desktop
computers and consumer electronics devices. Other functions that power supplies may
perform include limiting the current drawn by the load to safe levels and storing energy so it
can continue to power the load in the event of a temporary interruption in the source power.
Power Conditioning and Protection: Power supply systems incorporate features to condition
and protect the electrical power provided to ATMs. These systems help regulate voltage
levels, filter out electrical noise, and protect against power surges or voltage fluctuations that
can potentially damage sensitive components. By ensuring clean and stable power, power
supply systems enhance the reliability and longevity of ATM equipment.

AC Power Connection: ATMs are typically connected to the AC (alternating current) power
supply provided by the local utility grid. The power supply system in the ATM is designed to
convert the incoming AC power into the appropriate voltage and current required for the
ATM's operation.

Power Distribution: The power supply system in ATMs distributes the electrical power to
different components within the ATM. This includes powering the display screen, cash
dispenser, card reader, keypad, thermal printer, communication modules, security features,
and other internal systems.

Backup Power: To maintain ATM operation during power outages or disruptions, many
ATMs are equipped with backup power sources. These can include batteries or
uninterruptible power supply (UPS) units. Backup power systems provide temporary
electrical energy to keep the ATM running until power is restored or until the ATM can be
shut down safely.

Remote Monitoring and Management: Power supply systems in ATMs may include remote
monitoring and management capabilities. This allows banks or ATM operators to remotely
monitor power status, energy consumption, and voltage levels. Remote management features
facilitate proactive monitoring, troubleshooting, and maintenance, ensuring optimal ATM
performance and minimizing downtime.

Power Efficiency: Power supply systems in ATMs often incorporate energy-efficient features
to optimize power usage. These can include power management algorithms, sleep modes, or
power-saving mechanisms that reduce energy consumption during periods of inactivity.
Energy-efficient power supply systems contribute to cost savings and environmental
sustainability.

DEPARTMENT OF ECE, AIT Page No:31


ATM CRIME PREVENTION AND THEFT DETECTION

The power supply in ATMs is a critical component that ensures reliable operation and
continuous availability of financial services. By providing stable power, incorporating backup
power sources, enabling remote monitoring, and promoting energy efficiency, power supply
systems play a crucial role in the functioning and performance of ATMs.

Voltage Regulation: The power supply system ensures stable and regulated voltage levels to
prevent damage to sensitive electronic components within the ATM. Voltage regulators are
employed to maintain a consistent voltage output despite fluctuations or variations in the
incoming AC power supply.

Energy Efficiency: Power supply systems in ATMs are designed with energy efficiency in
mind. The systems may incorporate features like power management, sleep mode, or power-
saving settings to optimize energy consumption when the ATM is idle or not in use. Energy-
efficient power supply systems help reduce operational costs and contribute to environmental
sustainability.

RFID CARD READER:

The RFID (Radio Frequency Identification) card reader is a device that reads data from RFID
cards or tags using radio frequency signals. The main function of an RFID card reader is to
retrieve information stored on the RFID card and transmit it to a connected system or
application. Here are the key functions of an RFID card reader:

Figure 5.8 RFID Card Reader

DEPARTMENT OF ECE, AIT Page No:32


ATM CRIME PREVENTION AND THEFT DETECTION

Radio Frequency Identification (RFID)is the wireless non-contact use of radio frequency
waves to transfer data. Tagging items with RFID tags allows users to automatic all a uniquely
identify. To track auto-ID technology to the next level by allowing tags to be read without
line of sight of and depending on the type of RFID having a read range between a few
centimeters to 20+ meters

Readers:

RFID systems can be classified by the type of tag and reader. A Passive Reader Active
Tag (PRAT): system has a passive reader which only receives radio signals from active tags
(battery operated, transmit only). The reception range of a PRAT system reader can be
adjusted from 1–2,000 feet (0–600 m) allowing flexibility in applications such as asset
protection and supervision. An Active Reader Passive Tag (ARPT): system has an active
reader, which transmits interrogator signals and also receives authentication replies from
passive tags. An Active Reader Active Tag (ARAT): system uses active tags awoken with
an interrogator signal from the active reader. A variation of this system could also use a
Battery-Assisted Passive (BAP) tag which acts like a passive tag but the RFID tag can be
affixed to an object and used to track and manage inventory, assets, people, etc. For example,
it can be affixed to cars, computer equipment, books, mobile phones, etc. FID offers
advantages over manual systems or use of bar codes. The tag can be read if passed near a
reader, even if it is covered by the object or not visible. The tag can be read inside a case,
carton, box or other container, and unlike barcodes, RFID tags can be read hundreds at a
time. Bar codes can only be read one at a time using current devices.

DEPARTMENT OF ECE, AIT Page No:33


ATM CRIME PREVENTION AND THEFT DETECTION

Figure 5.8.1 RFID Cards

RFID (Radio Frequency Identification) cards have several applications in ATM crime
prevention and theft detection. Here are some common uses of RFID cards in this context:

Card Authentication: RFID cards can be used to authenticate users at ATMs. Each RFID card
contains a unique identifier that is associated with the cardholder's account. When the card is
inserted into the ATM, the RFID reader verifies the card's authenticity by checking the
embedded information. This helps prevent the use of counterfeit or stolen cards.

Two-Factor Authentication: RFID cards can be used as part of a two-factor authentication


system at ATMs. In addition to the card itself, the user may also need to provide a PIN
(Personal Identification Number) to complete the transaction. This adds an extra layer of
security and makes it more difficult for unauthorized individuals to gain access to an account.

Contactless Transactions: RFID cards can enable contactless transactions at ATMs. Instead of
inserting the card into a slot, users can simply tap or wave their RFID-enabled card near the
ATM's reader. This reduces the risk of card skimming devices being installed on the ATM, as
there is no physical interaction required with the card reader.

Transaction Monitoring: RFID technology can be used to monitor and track ATM
transactions. Each time an RFID card is used, the transaction details, such as the date, time,
location, and amount, can be recorded. This data can be used to detect patterns and anomalies
that may indicate fraudulent activity, such as multiple transactions in different locations
within a short time frame.

It's worth noting that while RFID technology offers certain security benefits, it is not
foolproof. Criminals are constantly evolving their methods, so it's essential to have
comprehensive security measures in place, including regular software updates, surveillance
systems, and user education, to combat ATM crime and theft effectively.

DEPARTMENT OF ECE, AIT Page No:34


ATM CRIME PREVENTION AND THEFT DETECTION

CHAPTER 6

SOFTWARE DISCRIPTION:

Embedded systems play a crucial role in ATM crime prevention and theft detection. Here are
some key ways in which embedded systems are used for these purposes:

Surveillance and Security: ATMs are equipped with embedded systems that include
surveillance cameras and sensors. These systems monitor the ATM and its surroundings to
detect any suspicious activities or tampering attempts. The embedded systems can capture
video footage, take images, and trigger alarms in response to unauthorized access, vandalism,
or skimming devices.

Alarm Systems: Embedded systems in ATMs are designed to detect and respond to security
breaches by activating alarm systems. These alarms can include loud sirens, flashing lights,
or silent alerts that notify security personnel or law enforcement agencies. The embedded
systems can detect unauthorized opening of the ATM, unusual vibrations, or tampering with
the card reader or keypad, triggering the appropriate alarm response.

DEPARTMENT OF ECE, AIT Page No:35


ATM CRIME PREVENTION AND THEFT DETECTION

Tamper Detection: Embedded systems in ATMs are equipped with tamper detection
mechanisms. These mechanisms can detect physical tampering attempts, such as drilling into
the ATM casing or manipulating the card slot. When tampering is detected, the embedded
system can lock down the ATM, disable functionalities, and send alerts to the appropriate
authorities.

Encryption and Secure Communication: Embedded systems in ATMs handle the encryption
and secure communication of data during transactions. They ensure that sensitive
information, such as PINs and account details, are encrypted and protected against
unauthorized access. The embedded systems enable secure communication between the ATM
and the bank's network, preventing interception or tampering with data during transmission.

Transaction Monitoring and Analysis: Embedded systems collect and analyze transaction
data in real-time. They can detect suspicious patterns, such as multiple transactions in a short
time period or unusually high withdrawal amounts. By continuously monitoring transactions,
embedded systems can raise alerts or temporarily suspend suspicious activities, helping
prevent theft and fraud.

Remote Management and Software Updates: Embedded systems enable remote management
of ATMs by banks or service providers. This allows them to remotely monitor the health and
security of the ATM network, apply software updates, and install security patches. Timely
software updates help address vulnerabilities and ensure that the ATM systems remain
protected against evolving threats.

By leveraging the capabilities of embedded systems, ATMs can implement robust security
measures, enhance crime prevention, and improve theft detection. However, it's important to

DEPARTMENT OF ECE, AIT Page No:36


ATM CRIME PREVENTION AND THEFT DETECTION

note that criminals are constantly developing new techniques, and a comprehensive security
approach is required, including physical security measures, user education, and ongoing
monitoring and analysis of ATM activity.

Embedded systems talk with the outside world via peripherals, such as:

 Serial Communication Interfaces (SCI): RS-232, RS-422, RS-485, etc.


 Synchronous Serial Communication Interface: I2C, SPI, SSC and ESSI (Enhanced
Synchronous Serial Interface)
 Universal Serial Bus (USB)
 Multi Media Cards (SD cards, Compact Flash, etc.)
 Networks: Ethernet, Lon Works, etc.
 Fieldbuses: CAN-Bus, LIN-Bus, PROFIBUS, etc.
 Timers: PLL(s), Capture/Compare and Time Processing Units
 Discrete IO: aka General Purpose Input/Output (GPIO)
 Analog to Digital/Digital to Analog (ADC/DAC)
 Debugging: JTAG, ISP, BDM Port, BITP, and DB9 ports.

DEPARTMENT OF ECE, AIT Page No:37


ATM CRIME PREVENTION AND THEFT DETECTION

Software diagramming

Any drawing program can be used to create flowchart diagrams, but these will have
no underlying data model to share data with databases or other programs such as project
management systems or spreadsheet. Many software packages exist that can create flowcharts
automatically.

There are several applications and visual programming languages that use flowcharts


to represent and execute programs. Generally, these are used as teaching tools for beginner
students. Examples include Flowgorithm, Raptor. LARP, Visual
Logic, Fischertechnik ROBO Pro, and VisiRule.

Application :

 Embedded systems are commonly found in consumer, industrial,  automotive, home


appliances, medical, commercial and military applications.
 Telecommunications systems employ numerous embedded systems from telephone
switches for the network to cell phones at the end user. Computer networking uses
dedicated routers and network bridges to route data.
 Transportation systems from flight to automobiles increasingly use embedded
systems. New airplanes contain advanced avionics such as inertial guidance
systems and GPS receivers that also have considerable safety requirements. Various
electric motors — brushless DC motors, induction motors and DC motors — use
electronic motor controllers. Automobiles, electric vehicles,
 Medical equipment uses embedded systems for vital signs monitoring, electronic
stethoscopes  for amplifying sounds, and various  medical
imaging (PET, SPECT, CT, and MRI) for non-invasive internal inspections.
Embedded systems within medical equipment are often powered by industrial
computers.

DEPARTMENT OF ECE, AIT Page No:38


ATM CRIME PREVENTION AND THEFT DETECTION

Keil uv5:

The Keil 8051 Development Tools are designed to solve the complex problems facing
embedded software developers. When starting a new project, simply select the
microcontroller you use from the Device Database and the µVision IDE sets all compiler,
assembler, linker, and memory options for you.

Keil uVision5 (UV5) is an integrated development environment (IDE) specifically designed


for developing software for microcontrollers. While Keil UV5 itself does not directly
contribute to ATM crime prevention and theft detection, it can be used as a development tool
to implement various security measures in ATM systems. Here's how Keil UV5 can be
utilized:

Firmware Development: Keil UV5 allows developers to write and compile firmware for
microcontrollers used in ATMs. This firmware can include security features, such as
encryption algorithms, secure communication protocols, and authentication mechanisms, to
prevent unauthorized access and protect sensitive data.

Tamper Detection and Response: Keil UV5 can be used to implement software-based tamper
detection mechanisms in the ATM firmware. These mechanisms can monitor physical
tampering attempts, such as opening the ATM casing or manipulating card readers, and
trigger appropriate responses, such as disabling the ATM or generating alerts.

DEPARTMENT OF ECE, AIT Page No:39


ATM CRIME PREVENTION AND THEFT DETECTION

Transaction Monitoring: Using Keil UV5, developers can create firmware that monitors
ATM transactions in real-time. The firmware can analyze transaction data, detect suspicious
patterns or anomalies, and raise alerts for potential fraudulent activity. This helps in theft
detection and prevention.

Integration with Hardware Components: Keil UV5 allows developers to integrate firmware
with various hardware components used in ATMs, such as card readers, keypads, and
sensors. By programming the firmware to interact with these components, security features
can be implemented, such as encryption of card data, secure PIN entry, and detection of
skimming devices.

Software Updates and Patches: Keil UV5 facilitates the development and deployment of
software updates and security patches for ATM systems. It enables developers to make
enhancements to the firmware, address vulnerabilities, and roll out updates to the deployed
ATMs to strengthen security measures and stay ahead of emerging threats.

It's important to note that the successful implementation of security measures using Keil UV5
depends on the expertise of the developers and the overall system architecture of the ATM.
Collaboration with security experts and adherence to industry best practices are crucial to
ensure that the firmware developed using Keil UV5 effectively contributes to ATM crime
prevention and theft detection.

Flash Magic:

It is a PC burner tool for programming flash memory-based microcontroller using serial or


Ethernet protocol built by NXP. This tool helps the developer to easily burn the hex file
generated by the embedded software like Keil µvision for 8051 and ARM microcontrollers or

DEPARTMENT OF ECE, AIT Page No:40


ATM CRIME PREVENTION AND THEFT DETECTION

MATLAB

Figure: Flash magic

Steps to burn Hex file in flash memory of microcontroller:

1. Before burning hex file, one has to install USB-to-Serial driver, if the developer is working
through USB port connected to developer kit. One can download PL2303 USB-to-
Serial driver for Windows provided by Prolific Technologies. It is not available for Windows
8 or Mac OS.
2. It is not only the driver that you must install. One can find the compatible driver to
successfully run Flash Magic tool in his or her PC. After installing driver, one can connect
USB to PC in order to find the hardware is found or not.

Flash Magic is a popular software tool used for programming and updating firmware in
microcontrollers. While Flash Magic itself does not directly contribute to ATM crime
prevention and theft detection, it can be utilized as a tool to update and manage the firmware
in microcontrollers used in ATMs. Here's how Flash Magic can be used in this context:

Firmware Updates: Flash Magic enables the secure and efficient updating of firmware in
microcontrollers within ATMs. By using Flash Magic, the ATM's firmware can be updated
with the latest security patches, bug fixes, and enhancements to strengthen the security
measures of the ATM system.

Encryption and Authentication: Flash Magic can be employed to program the microcontroller
firmware to incorporate encryption algorithms and authentication mechanisms. These

DEPARTMENT OF ECE, AIT Page No:41


ATM CRIME PREVENTION AND THEFT DETECTION

security features help protect sensitive data, such as PINs and transaction information, from
unauthorized access or interception.

Data Logging and Auditing: The firmware programmed using Flash Magic can include
functionality for logging and auditing various ATM activities. This enables the recording of
important events, such as cash withdrawals, failed login attempts, or suspicious transactions.
The logged data can be analyzed later for forensic purposes or to identify patterns of
fraudulent activities.

It's important to note that Flash Magic is a programming tool, and its usage for ATM crime
prevention and theft detection relies on the expertise of developers and security professionals.
The implementation of security measures using Flash Magic should align with best practices
and security guidelines to ensure the effectiveness of the firmware updates and the overall
security of the ATM system.

CHAPTER 7

RESULT AND IMPLEMENTATION

DEPARTMENT OF ECE, AIT Page No:42


ATM CRIME PREVENTION AND THEFT DETECTION

The implementation of comprehensive ATM crime prevention and theft detection measures
has demonstrated positive results in reducing ATM-related crimes. Financial institutions that
have adopted these strategies have reported a decrease in theft incidents and improved
customer confidence in using ATMs. Swift detection and response to theft attempts have led
to the apprehension of criminals, preventing further losses. Continued investment in security
technologies, regular audits, and training programs for ATM users and staff will contribute to
maintaining a secure and trusted ATM network. Overall, by employing a multi-layered
approach to ATM crime prevention and leveraging advanced technologies, financial
institutions can minimize the risk of thefts, protect customer assets, and maintain a safe and
secure banking experience for all. The implementation of ATM crime prevention measures
and theft detection technologies has yielded significant results in reducing ATM-related
crimes and enhancing security. The following outcomes have been observed financial
institutions that have implemented comprehensive security measures, including physical
security, video surveillance, and tamper detection, have reported a notable decrease in theft
incidents at ATMs. Criminals are deterred by visible security measures and the risk of being
captured on surveillance cameras. The integration of advanced technologies, such as
skimming detection and fraud analytics, has facilitated the timely identification of suspicious
activities and fraudulent transactions. This enables prompt response by security personnel or
law enforcement agencies, leading to the apprehension of criminals and prevention of further
losses. By implementing a comprehensive approach to ATM crime prevention and theft
detection, financial institutions can minimize risks, protect customers, and maintain the
integrity of their ATM networks. Continued collaboration, technological advancements, and
customer education are key to staying ahead of criminals and ensuring a secure banking
environment. The use of RFID cards and embedded systems in ATM crime prevention and
theft detection has yielded positive results in enhancing security and reducing fraudulent
activities. These technologies have contributed to:

Reduced Card Skimming: RFID cards and embedded systems have helped mitigate card
skimming attacks by introducing contactless transaction capabilities. This eliminates the need
for physically inserting cards into ATM card readers, reducing the risk of skimming devices
capturing card data.

Increased Authentication Security: RFID cards, coupled with PIN-based authentication,


provide two-factor authentication, making it more difficult for unauthorized individuals to
gain access to an account. This added layer of security has helped prevent unauthorized ATM
transactions and account theft.

Enhanced Transaction Monitoring: RFID technology and embedded systems enable real-time
monitoring and analysis of ATM transactions. This allows for the detection of suspicious
patterns and anomalies, such as multiple transactions within a short time frame or unusual
withdrawal amounts. Timely detection and alerts help prevent theft and fraudulent activities.

Improved Tamper Detection: Embedded systems equipped with sensors and tamper detection
mechanisms have contributed to the detection of physical tampering attempts on ATMs.

DEPARTMENT OF ECE, AIT Page No:43


ATM CRIME PREVENTION AND THEFT DETECTION

Alerts and alarms triggered by these systems have helped deter criminals and facilitate quick
response from security personnel.

Swift Response and Investigation: The integration of surveillance cameras within embedded
systems has aided in capturing evidence of criminal activities, helping law enforcement
agencies in identifying and apprehending perpetrators. The availability of video footage has
improved the success rate of investigations and increased the likelihood of prosecution.

Remote Management and Updates: The ability to remotely manage ATMs through embedded
systems has enabled prompt software updates and security patches. This ensures that ATMs
remain protected against evolving threats and vulnerabilities, minimizing the risk of
exploitation by criminals. While these technologies have shown positive results, it's important
to note that criminals continue to adapt and find new ways to commit fraud. Continuous
innovation and comprehensive security measures, including user awareness and education,
are crucial for staying ahead of criminal tactics and maintaining the integrity of ATM
systems.

Robust Physical Security:

 Install surveillance cameras strategically to monitor ATM areas, ensuring clear


visibility of the machine and its surroundings.
 Use tamper-resistant ATM designs and strong enclosures to deter physical attacks.
 Implement secure cash handling mechanisms, such as smart safes or cassette systems,
to minimize the risk of theft during cash replenishment.

Remember that effective ATM crime prevention and theft detection require a multi-layered
approach that combines technology, operational practices, and user awareness. Regular
evaluation of security measures and continuous adaptation to emerging threats are essential to
stay ahead of criminals and maintain the security of ATM systems.

DEPARTMENT OF ECE, AIT Page No:44


ATM CRIME PREVENTION AND THEFT DETECTION

Project Model

DEPARTMENT OF ECE, AIT Page No:45


ATM CRIME PREVENTION AND THEFT DETECTION

DEPARTMENT OF ECE, AIT Page No:46


ATM CRIME PREVENTION AND THEFT DETECTION

Advantages:

 Provides Complete ATM theft Security,

 geological location will always be traced of an ATM machine.

 Maintain the entry of only necessary person

 Offer 24*7 security

 Reduce banks workload

 Less cost

 High range of security

 Our project supports smart city project.

Future Scope:

 We Can Use This High-Level Security Transfer System for Banking, Military and
Online Shopping.

 We Can Use the Power Full Antennas for Longest Communication.

 It Can Help to Easily Catch the Person Who Trying to Theft ATM Machine.

 This Is the Embedded Pals DIP Based So We Can Make Our Own Algorithm in
Micro Controller For More Security Concern.

DEPARTMENT OF ECE, AIT Page No:47


ATM CRIME PREVENTION AND THEFT DETECTION

CONCLUSION

The project avoids harassments on women inside ATMs as the thief can be caught if they try
to rob. Any terrorist attacks can be prevented as they can be caught in case of any unusual
Activities. Overall, it provides a high range of security to the public against increasing
crimes. The ATM door will be locked and unconscious spray will be applied immediately
and the information regarding the same will be sent to the control room for further action.
This provides safety for the woman and the old age people who can walk into the ATM
without any fear. At a time only one person is allowed inside the ATM and until he comes
back no entry will be given for another person. This project is mainly used for ATM safety
and users safety and minimizes the use of security guards. ATM crime prevention and theft
detection are crucial for maintaining the security and trust of ATM users. Implementing a
combination of physical security measures, advanced technologies, and user awareness
campaigns can significantly reduce the risk of ATM crimes. The integration of alarm
systems, video surveillance, skimming detection, fraud analytics, and tamper detection can
enhance the security of ATMs and aid in the prompt detection of thefts. Additionally,
collaboration between financial institutions, law enforcement agencies, and ATM
manufacturers is vital to stay ahead of evolving criminal tactics. The prevention of ATM
crimes and the detection of theft are vital aspects in maintaining the security and integrity of
automated teller machines. This report has highlighted several key strategies and technologies
that can be implemented to mitigate ATM crimes and enhance theft detection. Firstly,
implementing robust physical security measures such as surveillance cameras, access control
systems, and tamper-proof ATM designs can act as deterrents to potential criminals. These
measures can also aid in the identification and apprehension of offenders through the
collection of visual evidence.

Secondly, advanced technology solutions like biometric authentication, card skimming


detection systems, and tamper detection mechanisms can significantly reduce the risks
associated with ATM theft. Biometric authentication, such as fingerprint or iris scanning,
provides an additional layer of security by ensuring that only authorized individuals can
access the ATM and perform transactions. Card skimming detection systems can identify and
alert authorities to the presence of skimming devices that criminals use to steal card
information. Tamper detection mechanisms can raise alarms and disable the ATM if any
unauthorized attempts to tamper with the machine are detected.

Furthermore, real-time monitoring systems and analytics play a crucial role in detecting
suspicious activities and patterns. By leveraging data analysis techniques, financial
institutions can identify anomalous behaviors, such as multiple failed PIN attempts, unusual
transaction patterns, or unauthorized access attempts, triggering immediate alerts to security
personnel or law enforcement agencies.

DEPARTMENT OF ECE, AIT Page No:48


ATM CRIME PREVENTION AND THEFT DETECTION

Collaboration between financial institutions, law enforcement agencies, and ATM


manufacturers is essential in tackling ATM crimes effectively. Sharing information, best
practices, and collaborating on investigations can lead to more efficient prevention and
detection efforts.

Overall, a multi-layered approach combining physical security measures, advanced


technology solutions, real-time monitoring, and collaboration is crucial in preventing ATM
crimes and detecting theft. Implementing these strategies and leveraging emerging
technologies can significantly enhance the security of automated teller machines, safeguard
customer assets, and maintain public trust in the banking system.

DEPARTMENT OF ECE, AIT Page No:49


ATM CRIME PREVENTION AND THEFT DETECTION

REFERENCES

I. Archana et al. International Journal of Advanced Research in Computer Science and


Software Engineering 3(10), October-2021, pp.261-266

II. S.T. Bhopal and Dr. B.S. Sawant ‘’SECURITY IN E-BANKING VIA CARD LESS
BIOMETRIC ATM’’, International Journal of Advanced Technology & Engineering
Research, Volume 2, Issue 4, July 2012

III. Sunil Lohiya ‘’Biometric identification and verification techniques –A future of ATM
Banking System’’, Indian Streams Research Journal, Volume 2, Issue. 7, Aug 2012

IV. Biswas s., Bardhan Roy A., Ghosh k. and Dey N., ‘’A Biometric Authentication
Based Secured ATM Banking System ‘’, International Journal of Advanced Research
in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012

V. Zahid Riaz, Suat Gemili, Michael Beetz and Bernd Radis ‘’A uni _ed Features
Approach to Human Image Analysis and Interpretation’’,85748 Garching,
Germany

VI. Edmund Spinelli SANS GSEC,’’ Biometric Scanning Technologies: Finger, Facial
and Retinal Scanning’’, San Francisco,28 May 2003

VII. Aru, Okereke Eze, Ihekweaba Gosia,’’ Facial Verification Technology for Use in
ATM transactions’’, American journal of Engineering Research (AJER), Volume
-02, Issue-05,pp-188-193 [8] prof. Selina Oko and jane Our, “’ENHANCED ATM
SECURITY SYSTEM USING BIOMETRICSA’’, IJCSI International journal of
Computer Science Issues, Vol. 9, Issue 5, NO 3, September 2012

DEPARTMENT OF ECE, AIT Page No:50

You might also like