A Survey Paper on Wireless Authentication in ATMs Using GSM Technology

Kranti N. Gule, Rohit N. Devikar, Sudip K. Hase

Abstract


Due to public location and permanent availability
multiple people depends on the automated teller machine (ATM)
center. Due to that they can easily fall victim to manipulation.
Nowadays automated teller machine is essential part of our daytoday
life and frauds related to that also get increased. So,new methods for
authentication mechanisms are get developed to reduce the ATM
security problems related to personal identification numbers (PIN).
All those mechanisms are usually judged on the basis of speed,
security, and memorability in comparison with traditional PIN entry
mechanism. In PIN based ATM authentication 4 digit number is
given to the system which is unique number. Here doing the survey
of daytoday life ATM use, which provide both a better
understanding of PIN-based ATM authentication, and on how
alternative authentication methods compared and evaluated. From
these findings, draw the several implications for the design of
alternative ATM authentication systems, such as resilience to
distraction and social security.

Full Text:

PDF

References


Ronald Petrlic, Christoph Sorge, “Establishing user trust in automated teller

machine integrity,” Computer Science Department, University of Paderborn,

Paderborn, Germany, Vol. 8, Iss. 2, 2014, pp.132–139.

Bernhard Frauendienst, Alexander De Luca, Sbastian Boring, Heinrich

Hussmann, “My Phone is my Keypad: Privacy-Enhanced PIN-Entry on Public

Terminals,” Media Informatics Group, University of Munich Amalienstr,

Munich, Germany, 2009, pp. 854-858.

Richter, K., Roth, V., Freidinger, R., “A PIN entry method resilient against

shoulder surfing,” In: CCS ’04: Proc. 11th ACM Conf. on Computer and

Communications Security, New York, NY, USA, ACM, 2004, pp. 236-245.

Alexander De Luca, Marc Langheinrich, Heinrich Hussmann, “Towards

Understanding ATM Security: A Field Study of Real World ATM Use,” Faculty

of Informatics, University of Lugano, Via G. Buffi, Lugano, Switzerland,

(2010).

ATM Marketplace, “ATMs reprogrammed to print out ATM, debit details on

receipts,” (2009).

ATM Marketplace, “Reprogrammed ATM helps minn. man get away,”

(2009).

Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van

Doorn,“vTPM: virtualizing the trusted platform module,” In:USENIX-SS’06:

Proc. 15th Conf. on USENIX Security Symp.Berkeley, CA, USA, USENIX

Association, 2006.

Stumpf, F., Benz, M., Hermanowski, M., Eckert, C., “An approach to a trustworthy

system architecture using virtualization,” vol. 4610 of lecture notes in

computer science, Springer Berlin Heidelberg, 2007, pp.191-202.

Berger, S., Cáceres, R., Pendarakis, D., et al, “TVDc: managing security in

the trusted virtual datacenter,” SIGOPS Oper. Syst. Rev., 2008, pp.40-47.

De Luca, A., Langheinrich, M., Hussmann, H., “Towards understanding

ATM security: a field study of real world ATM use,” In: Proc. Sixth Symp. on

Usable Privacy and Security (SOUPS ’10), New York, NY, USA, 2010,

pp.16:1-16:10.

De Angeli, A., Coventry, L., Johnson, G., Renaud, K., “Is a picture really

worth a thousand words? Exploring the feasibility of graphical authentication

systems,” Int. J. Hum.-Comput.Stud., 2009, pp.128-152.

GRGBanking Equipment (HK) Co.,Ltd, “ Best Practice for ATM

Security,” 2011.

Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., Uellenbeck, S.,Wolf, C.,

“Mobile security catching up? Revealing the nuts and bolts of the security of

mobile devices,” In: 2011 IEEE Symp. on Security and Privacy (SP), 2011, pp

.96-111.

Tan, D., Keyani, P., Czerwinski, M., “Spy-resistant keyboard: more secure

password entry on public touch screen displays”, Microsoft Research One

Microsoft Way, Redmond, Washington 98052, USA.

Deyle, T., Roth, V., “Accessible authentication via tactile pin entry”, CG

Topics, Issue 3, March (2006).

Kumar, M., Garfinkel, T., Boneh, D., Winograd, T., “Reducing shouldersurfing

byusing gaze-based password entry”, In Proc SOUPS(2007).

Coventry, L., De Angeli, A., Johnson, G., “Usability and biometric

verification at the ATM interface”, In Proc Chi (2003).

Roth, V., Richter, K., Freidinger, R., “A pin-entry method resilient against

shoulder surfing”, In Proc CCS (2004).

Asamoto, H., Christin, N., Hayashi, E., “Undercover:authentication usable

in front of prying eyes”, In Proc CHI (2008).

Rogers, J., “Please enter your 4-digit PIN”, Financial Services

Technology, U.S, Edition, Issue 4, March (2007).

Andrea Bianchi, “Authentication on Public Terminals with Private

Devices”, Korea Advanced Institute of Science and Technology Daejeon, Korea,

Jan (2011).

Mohsin Karovaliyaa, Saifali Karediab, Sharad Ozac, Dr.D.R.Kalbanded, “

Enhanced security for ATM machine with OTP and Facial recognition features”,

International Conference on Advanced Computing Technologies and

Applications (2015).

Rupinder Saini, Narinder Rana,Rayat, “Comparison of various biometric

methods”, Institute of Engineering and IT, International Journal of Advances in

Science and Technology (IJAST),Vol 2,Issue I, March (2014).


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology