A Survey Paper on Wireless Authentication in ATMs Using GSM Technology
Abstract
multiple people depends on the automated teller machine (ATM)
center. Due to that they can easily fall victim to manipulation.
Nowadays automated teller machine is essential part of our daytoday
life and frauds related to that also get increased. So,new methods for
authentication mechanisms are get developed to reduce the ATM
security problems related to personal identification numbers (PIN).
All those mechanisms are usually judged on the basis of speed,
security, and memorability in comparison with traditional PIN entry
mechanism. In PIN based ATM authentication 4 digit number is
given to the system which is unique number. Here doing the survey
of daytoday life ATM use, which provide both a better
understanding of PIN-based ATM authentication, and on how
alternative authentication methods compared and evaluated. From
these findings, draw the several implications for the design of
alternative ATM authentication systems, such as resilience to
distraction and social security.
Full Text:
PDFReferences
Ronald Petrlic, Christoph Sorge, “Establishing user trust in automated teller
machine integrity,” Computer Science Department, University of Paderborn,
Paderborn, Germany, Vol. 8, Iss. 2, 2014, pp.132–139.
Bernhard Frauendienst, Alexander De Luca, Sbastian Boring, Heinrich
Hussmann, “My Phone is my Keypad: Privacy-Enhanced PIN-Entry on Public
Terminals,” Media Informatics Group, University of Munich Amalienstr,
Munich, Germany, 2009, pp. 854-858.
Richter, K., Roth, V., Freidinger, R., “A PIN entry method resilient against
shoulder surfing,” In: CCS ’04: Proc. 11th ACM Conf. on Computer and
Communications Security, New York, NY, USA, ACM, 2004, pp. 236-245.
Alexander De Luca, Marc Langheinrich, Heinrich Hussmann, “Towards
Understanding ATM Security: A Field Study of Real World ATM Use,” Faculty
of Informatics, University of Lugano, Via G. Buffi, Lugano, Switzerland,
(2010).
ATM Marketplace, “ATMs reprogrammed to print out ATM, debit details on
receipts,” (2009).
ATM Marketplace, “Reprogrammed ATM helps minn. man get away,”
(2009).
Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van
Doorn,“vTPM: virtualizing the trusted platform module,” In:USENIX-SS’06:
Proc. 15th Conf. on USENIX Security Symp.Berkeley, CA, USA, USENIX
Association, 2006.
Stumpf, F., Benz, M., Hermanowski, M., Eckert, C., “An approach to a trustworthy
system architecture using virtualization,” vol. 4610 of lecture notes in
computer science, Springer Berlin Heidelberg, 2007, pp.191-202.
Berger, S., Cáceres, R., Pendarakis, D., et al, “TVDc: managing security in
the trusted virtual datacenter,” SIGOPS Oper. Syst. Rev., 2008, pp.40-47.
De Luca, A., Langheinrich, M., Hussmann, H., “Towards understanding
ATM security: a field study of real world ATM use,” In: Proc. Sixth Symp. on
Usable Privacy and Security (SOUPS ’10), New York, NY, USA, 2010,
pp.16:1-16:10.
De Angeli, A., Coventry, L., Johnson, G., Renaud, K., “Is a picture really
worth a thousand words? Exploring the feasibility of graphical authentication
systems,” Int. J. Hum.-Comput.Stud., 2009, pp.128-152.
GRGBanking Equipment (HK) Co.,Ltd, “ Best Practice for ATM
Security,” 2011.
Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., Uellenbeck, S.,Wolf, C.,
“Mobile security catching up? Revealing the nuts and bolts of the security of
mobile devices,” In: 2011 IEEE Symp. on Security and Privacy (SP), 2011, pp
.96-111.
Tan, D., Keyani, P., Czerwinski, M., “Spy-resistant keyboard: more secure
password entry on public touch screen displays”, Microsoft Research One
Microsoft Way, Redmond, Washington 98052, USA.
Deyle, T., Roth, V., “Accessible authentication via tactile pin entry”, CG
Topics, Issue 3, March (2006).
Kumar, M., Garfinkel, T., Boneh, D., Winograd, T., “Reducing shouldersurfing
byusing gaze-based password entry”, In Proc SOUPS(2007).
Coventry, L., De Angeli, A., Johnson, G., “Usability and biometric
verification at the ATM interface”, In Proc Chi (2003).
Roth, V., Richter, K., Freidinger, R., “A pin-entry method resilient against
shoulder surfing”, In Proc CCS (2004).
Asamoto, H., Christin, N., Hayashi, E., “Undercover:authentication usable
in front of prying eyes”, In Proc CHI (2008).
Rogers, J., “Please enter your 4-digit PIN”, Financial Services
Technology, U.S, Edition, Issue 4, March (2007).
Andrea Bianchi, “Authentication on Public Terminals with Private
Devices”, Korea Advanced Institute of Science and Technology Daejeon, Korea,
Jan (2011).
Mohsin Karovaliyaa, Saifali Karediab, Sharad Ozac, Dr.D.R.Kalbanded, “
Enhanced security for ATM machine with OTP and Facial recognition features”,
International Conference on Advanced Computing Technologies and
Applications (2015).
Rupinder Saini, Narinder Rana,Rayat, “Comparison of various biometric
methods”, Institute of Engineering and IT, International Journal of Advances in
Science and Technology (IJAST),Vol 2,Issue I, March (2014).
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology