0% found this document useful (0 votes)
11 views

BiometricBasedSmartATMUsingRFID

The document presents a conference paper on a biometric-based smart ATM system utilizing RFID and fingerprint authorization to enhance security. It outlines the limitations of existing ATM systems and proposes a new design that includes features like real-time alerts for unauthorized access, fire and vibration sensors, and facial recognition capabilities. The proposed system aims to provide a safer ATM experience by ensuring that users receive immediate notifications regarding their account activities and potential security threats.

Uploaded by

suhas060606
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

BiometricBasedSmartATMUsingRFID

The document presents a conference paper on a biometric-based smart ATM system utilizing RFID and fingerprint authorization to enhance security. It outlines the limitations of existing ATM systems and proposes a new design that includes features like real-time alerts for unauthorized access, fire and vibration sensors, and facial recognition capabilities. The proposed system aims to provide a safer ATM experience by ensuring that users receive immediate notifications regarding their account activities and potential security threats.

Uploaded by

suhas060606
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/347173626

Biometric Based Smart ATM Using RFID

Conference Paper · August 2020


DOI: 10.1109/ICSSIT48917.2020.9214287

CITATIONS READS

21 500

6 authors, including:

Rolant Gini John M.E. Harikumar


Amrita Vishwa Vidyapeetham Amrita Vishwa Vidyapeetham
24 PUBLICATIONS 195 CITATIONS 25 PUBLICATIONS 154 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by M.E. Harikumar on 28 April 2023.

The user has requested enhancement of the downloaded file.


Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1

Biometric Based Smart ATM Using RFID


Gokul.S, Kukan.S, Meenakshi.K, Vishnu Priyan S S, Rolant Gini J, M.E.Harikumar
Department of Electronics and Communication Engineering
Amrita School of Engineering, Coimbatore
Amrita Vishwa Vidyapeetham, India
gokulsridharan1999@gmail.co m, s.kukan77@gmail.co m, meeru.krishh@gmail.co m, vishnu32510@gmail.co m,
j_rolantgini@cb.amrita.edu, me_harikumar@cb.amrita.edu

Abstract — In the present world, the usage of ATM to TABLE I. T IMELINE OF AN AT M – A BRIEFING
withdraw cash has increased. At the same time, theft and robbery
cases have also been increased that calls for the need for much- Period Development
secured ATM that provides additional features for security. In 1988 – 1994 (The starting
Cash deposit and cash withdrawal
this work, the aim is at security-based smart ATM which period)
functions based on RFID and fingerprint authorization for its
1995 – 1999 (Initial
access. The RFID number and fingerprint details are obtained developments) Mini statements and balance in quiry
from the user after which the recognized card number,
authorization status, and location of access are passed on for 2002 – 2004 (Extended Chequebook request, Fund transfers,
checking its authenticity with the database details. Once the developments) and T ouch screen facilities
information is validated with the retrieved database details then Railway and Airway ticket booking. Bill
the corresponding account holder gets the message if the 2004 – 2006 (Third-party
payment (like electricity, Broadband..).
services) Recharging for mobile phone
authorization is valid or not. The location, time, and date of the
access are also informed to the account holder. Additionally, this
2007 onwards Customized ATM services
enhances the security by placing vibration and flame sensors
which immediately notify in case of fire and breakage. To achieve
complete security, the face of the person accessing the ATM card As there are many ATM centres across India, each centre
is also recorded – using a camera – in the machine with time and must be ensured with security as the number of ATM theft
date of access that could be used in case of suspicion. cases are increasing day by day. As a result, in addition to
security officers at the ATM, more reliable security methods
Keywords—IoT; RFID; esp8266; microcontroller; fingerprint are necessary. Shockingly, nearly 50 theft cases have been
sensor; embedded system; signal processing. reported just between January 2020 and 16 April 2020 at
various ATM centres across India; a few of which also include
I. INT RODUCT ION
uprooting of the ATM [2]. Therefore, this project mainly aims
An Automated Teller Machine (ATM) is a computerized to build a secure, easily accessible, and safe ATM.
machine that provides customers of the banks the facility of
accessing their accounts for dispensing cash and to carry out II. THE EXIST ING SYST EM OF T HE AT M
other financial and non-financial transactions without the need The current ATM system provides two types of services.
to visit the bank branch. ATM’s were first used in London in The former one provides the customer with the cash requested
1967, and after 50 years, these machines were introduced and sends a message with a report of the amount taken and
nationwide. The growth of ATM development is briefed in account balance. The latter one is more advanced to accept the
Table I [1]. deposit from the user, provides credit card payment facilities ,
ATM points are conveniently located at multiple locations. and sends a message to the user about the transaction and
ATM of any bank can be accessed to withdraw cash in 24x7 account information.
hours, 365 days a year. If one is travelling overseas, then the The existing system of ATM has been briefed in Fig. 1. The
card can be used to draw currency of the country an individual input to the ATM is recognized through the input devices such
is travelling to, from the ATM. The use of an ATM is restricted as card reader and keypad. The card reader is an input device
only to the person who knows the PIN (Personal Identificatio n that is used to read data from the card which identifies the
Number). The single most benefit of the ATM is to save time user’s card number. The card is either swiped or pressed on the
in driving down to the branch and one need not has to waste card reader that captures the account information once a
time waiting in the queue to perform transactions. The ATM connection is established with the magnetic strip on the
facilities provide the option of banking instantly for various backside of the ATM card. This information is passed to the
transactions. Apart from cash withdrawal and checking account host server that uses the data to get details about the
balance, modern ATMs are used to open a fixed deposit with a cardholder. To get details from the user, currently have a
bank, recharge mobile, pay income tax, deposit cash, pay the keypad which contains around 48 keys that are interfaced with
insurance premium, apply for a personal loan, transferring the processor. The card is recognized using a Personal
cash, paying the bill, booking railway ticket, etc., Identification Number (PIN). After the PIN is authorized, the
user can choose any service provided by the ATM through the

978-1-7281-5821-1/20/$31.00 ©2020 IEEE 406

orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1

keypad. To ensure security, every card has a unique PIN and the incidents. It is important to note that the methods for
the PIN is sent to the host processor in the encrypted form. sending messages are cost-efficient in this project. Moreover,
using a camera to capture the face of the user at the ATM helps
reduce unwanted storage space as required by that of CCTV
cameras.

SCREEN III. THE PROPOSED SYST EM OF T HE AT M


BANK The proposed system is a microcontroller-based ATM in
CO MPUTER which normal cards are replaced with RFID cards that contain
ATM the card number of the user. Instead of using the PIN, the
KEYPAD fingerprint of the user is used for authorization. Hence if the
SYSTEM
person is in the vicinity of ATM, his/her card is scanned by the
SO FTWARE RFID scanner and the system waits for the valid fingerprint of
ACCO UNTS the corresponding card. If a valid fingerprint is recognized by
CARD DATABASE the fingerprint sensor of the ATM, a message will be sent to
READER
the phone number, registered to the card, stating that “The
access is granted”. On the other hand, if an invalid fingerprint
is recognized, the user of the corresponding card gets a
message stating that “Access not granted! Someone has tried to
Fig. 1. Block diagram of the existing system. access this card”. Regardless of if the access is granted or not,
the cardholder also gets details about the time, date, and
A. Merits of an existing ATM system location of the access. To minimize the storage of unwanted
 The system provides a message to the cardholder as video feed, the images of the people inside ATM are saved in
soon as the transaction happens. the database through a camera that helps the respective bank
and the cardholder in case of theft at the ATM. In case of fire
 The system provides flexibility that the user needn’t in the ATM, the proposed system automatically sends a
come to the ATM instead anyone who knows the card’s message to the fire station along with the GPS coordinates of
PIN can access the card. the ATM. Moreover, if someone tries to break the ATM, the
system automatically sends a message to the police station
 Every card has a unique PIN.
along with the GPS location of the ATM which is essential [7].
 The PIN is sent to the processor in an encrypted form. Thus, the proposed system combines a lot of required aspects
in the field of ATM’s security to help the bank and ensures
B. Demerits of an existing ATM system security at the ATM. The block diagram in Fig.2 shows the
 Criminals can fit small cameras to ATMs that record working of the proposed system.
account details and personal identification numbers that The proposed system uses hardware components like RFID
increase the risks of fraud and robbery.
scanner and cards, fingerprint sensor [8], GPS module,
 The user doesn’t get any message about the NodeMCU, flame sensor, and vibration sensor. It has used
unauthorized access of the card. software platforms including Arduino for processing the
received input from the sensors , MIT app inventor that creates
 The user doesn’t get information about the location of an application for tracking the changes in the values of the
access to the card in the case of theft. sensor readings, to send messages and firebase for cloud
 The face of the person accessing the ATM is stored as storage.
video in CCTV which needs more storage space. The main reason for which NodeMCU is used is that it has
 Import details like card number, CVV are displayed on a built-in WiFi module in it that helps to send the necessary
the ATM card that supports misusing the card. values to the cloud database, in this case, it is the firebase. The
MFRC522 based RFID reader module used as the user’s card
Throwing light to the various scenarios referred, the and the corresponding card reader uses electromagnetic fields
developments in the existing ATMs are required on using to transfer data over a short distance with a frequency of
alternate methods for authentication instead of a PIN [3], [4], 13.56MHz. An R307 fingerprint module is used for obtaining
sending alert messages [5] on detecting vibration on the the fingerprint as a password for authentication from the user.
machine, having cameras to record people who are accessing The fingerprint processing mainly includes two elements
the ATM [6]. This paper mainly aims at using RFID tag and namely enrolment and matching. In fingerprint enrolling, every
fingerprint as the input to the ATM. Since the cardholder gets a cardholder requires to place the finger twice on the sensor that
message regarding the authentication status, location of the the system checks the finger images to process and generates a
ATM, date, and time of access regardless of if the access is pattern of the finger. The enrolled fingerprint is stored. In
valid or not which helps the cardholder get information about matching, during the ATM access, the user places the finger on
his/her card being misused. In addition to this, the vibration the optical sensor after which the system produces a pattern of
and flame sensors prevent robbery and fire accidents by the finger and compares it with those fingers enrolled in the
alerting the respective departments by giving a message about finger library templates.

978-1-7281-5821-1/20/$31.00 ©2020 IEEE 407

orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1

GPS RFID

FINGERPRINT MICRO CO NTRO LLER DATABASE


SENSO R

VIBRATIO N
SENSO R FLAME SENSO R MIT APP INVENTO R

SURVEILLANCE CAMERA MESSAGE TO USER’S


MO BILE

IMAGE SAVED IN GIVEN LO CATIO N BY CO DE

Image detection

Fig. 2. Block diagram of the proposed system.

vital parameters like card details, authorization status, location


of the ATM, time, and date of access are updated from the
ATM. One of the main purposes of using the database is to get
the details about the recent transaction and send messages to
the corresponding cardholder. A mobile application was
created using MIT App Inventor- a web application
development environment in which the values from the
firebase are retrieved for sending messages to the cardholder
with relevant details. Moreover, for taking actions against
accidents and thefts, flame and vibration sensors are used to
ensure the safety at the ATM. Further, Python has been used
for applying image processing techniques that capture the
images of the faces of the users using the ATM. The stored
images are pushed to the database for future verification. By
recognizing the image and pushing it to the database, the
security of the ATM is enhanced as there is an increase in
ATM card thefts and fingerprint frauds

IV. RESULT S AND DISCUSSIONS


When the circuit is set as shown in Fig.3, the code is fed
into the microcontroller. Assuming that there are RFID cards
with card numbers in them and their respective fingerprints are
stored for future authorization, an app is built to keep track of
the values such as RFID card number, user ID, location of the
access, access status (if the authorization is valid or not), etc.
Fig. 3. Circuit diagram of the proposed system
This application was built by a tool named “MIT app
inventor”. This is the tool that is used to send messages to the
In addition to this, a GPS module is used to get details like user after the access of the card at the ATM.
the location of where the transaction has happened, date, and
time of the access. The main advantage of sending the
longitude and latitude of the ATM to the user is that the
location of the ATM is known exactly and it avoids confusions
in case if there are many ATM centres at the same location.
Firebase is the cloud database used in this project where the Fig. 4. T he developed mobile application’s icon/logo.

978-1-7281-5821-1/20/$31.00 ©2020 IEEE 408

orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1

The start-up icon of the developed mobile application has this case, the ATM displays it as an invalid user. The second
been shown in Fig. 4. The home page and its orientation of the case happens when the user accesses the system using a valid
application can be seen as shown in Fig.5. When a transaction card and give in the corresponding valid fingerprint for the
or an attempt for a transaction is made, the respective values card. In this case, the access is granted and the values of the
get updated in the firebase (the database used) which is RFID card number, location, and time of access are updated in
retrieved through the developed android application Fig.4. the Firebase and they are retrieved through the application. A
Following this, the respective values for RFID card number, message is sent to the registered phone number of t he
user ID, location of the access, access status, flame, and cardholder of the respective card stating that “the access is
vibration sensor status are updated in the application replacing authorized” along with GPS coordinates of the ATM where the
the text of the corresponding labels. Each label stands for one card was accessed and other credentials as shown in Fig.6 and
ATM. Fig. 7.

TABLE II. T EST CASES

Scenarios Case 1 Case 2 Case 3 Case 4

RFID Card Invalid Valid Valid -

Fingerprint - Valid Invalid -

Message Not Sent Sent Sent Sent

The third case happens when the access for the system is
given by a valid card but it is given an invalid fingerprint for
the respective card. The access is not granted in this case as the
system expects the corresponding fingerprint for the card
registered previously. The values for the RFID card number,
location, and time of access are updated in the Firebase and are
retrieved through the application. The response in the Firebase
Fig. 5. Home page of the application. & IDE has been shown in Fig. 8 for the denied case. A
message is sent to the registered phone number of the
Four possible cases can happen in the system developed in cardholder stating that the “access is denied” along with the
real-time working as shown in Table II. The first case happens GPS coordinates of the ATM where the card has been tried for
when a user uses or tries to access through an invalid card. In access and other credentials like time, date, etc. as in the Fig. 9.

Fig. 6. Firebase & IDE display for an authorized case. T he authorization has been indicated with the red colour circles on both platforms.

978-1-7281-5821-1/20/$31.00 ©2020 IEEE 409

orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1

the GPS location of the ATM, as shown in Fig.10, for


immediate actions to prevent it from causing heavy damages .

Fig. 7. Message received by the cardholder in an authorized case

Fig. 10. T ext message received by the police station and fire station.

Fig. 11. Database for users accessing the AT M.

Fig. 8. Firebase data for access denied case indicated by a red circle.

Fig. 9. T ext message received by the cardholder in a denied case. Fig. 12. Capturing the user’s face while accessing the AT M.

The fourth case is to ensure safety at the ATM by placing To keep track of people entering the ATM, a signal
flame and vibration sensors. In case, if someone tries to break processing technique for capturing the face of that person is
or damage the ATM, a message is sent to the police station used. The image of the CCTV placed in the ATM takes more
about the action with the GPS location of the ATM as shown in storage space. To reduce storage space, the python was used
Fig. 10. In case of fire, a message is sent to the fire station with for tracking the images of the faces of various people who use
the ATM. The camera fitted in the ATM tracks the people who

978-1-7281-5821-1/20/$31.00 ©2020 IEEE 410

orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1

are using the ATM. To implement this, the “OpenCV” module increased, to ensure security towards this issue in the proposed
in python is used. Haar feature-based Cascade classifier is used system, extra tiers of safety measure like face detection, iris
in the code which uses object detection algorithm to identify scanner, OTP generation can be added.
objects in an image or a video. When the program is executed,
the camera searches for a face with the help of the facial VI. REFERENCES
features using the classifier. Once the face is recognized, it is [1] Hota, Jyotiranjan. (2013). Growth of AT M Industry in India. CSI
flipped, reshaped and highlighted. A rectangular box is drawn Communications. 36. 23-25.
around the face and is pushed to the database. The capturing of [2] T he T imes of India, “Atm Crimes”. Available:
the face of the user is shown in Fig.11 and the location where https://timesofindia.indiatimes.com/topic/Atm-Crimes [Accessed: May
08,2020].
all the users’ images are saved is shown in Fig.12. Thus, these
specifications pave the way for an ATM system to be effective, [3] Christiawan, B. A. Sahar, A. F. Rahardian and E. Muchtar, "Fingershield
AT M – AT M Security System using Fingerprint Authentication,"
secure, and easily accessible. International Symposium on Electronics and Smart Devices (ISESD),
Bandung, 2018, pp. 1-6.J. Clerk Maxwell, A Treatise on Electricity and
V. CONCLUSION Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68 -73.
Thus this proposed system used the RFID card and the [4] S. Hazra, "Smart ATM Service," 2019 Devices for Integrated Circuit
(DevIC), Kalyani, India, 2019, pp. 226- 230.
user’s fingerprint for authorization. In the case of multiple
[5] S. Sankhwar and D. Pandey, "A Safeguard against AT M Fraud," 2016
accounts, different RFID cards can be used for each bank IEEE 6th International Conference on Advanced Computing (IACC) ,
accounts. The card closest to the proximity of the card reader Bhimavaram, 2016, pp. 701-705, doi: 10.1109/IACC.2016.135.
will be considered for the current operation. It enhances the [6] K. Archana, P. B. Reddy and A. Govardhan, "T o enhance the security
security by sending messages to the cardholders for the card for AT M with the help of sensor and controllers, "2017 International
holder’s register number about the location, date, and time Conference on Energy, Communication, Data Analytics and Soft
Computing (ICECDS), Chennai, 2017, pp. 1012-1015, doi:
through the GPS, regardless of if the transaction is valid or 10.1109/ICECDS.2017.8389590.
not. Also, a camera that is set regularly checks who is trying to [7] V. M. E. Jacintha, S. J. Rani, J. G. Beula and J. J. Johnsly, "An extensive
access the card in the ATM that helps in cases of fraud. It resolution of AT M security systems," 2017 T hird International
prevents accidents and robbery as the sensors that are fit Conference on Science T echnology Engineering & Management
(ICONST EM), Chennai, 2017, pp.934-938, doi:
immediately alert the respective departments. The effective 10.1109/ICONST EM.2017.8261340.
results for the prototype verify the proposed system for smart [8] Rhydo Labz. R30X Series Fingerprint Identification Module User
ATM. Manual. Available: https://www.rhydolabz.com/documents/finger-print-
The proposed system is just a prototype of an ATM system module.pdf. [Accessed: May 08,2020].
in which money transferring facilities can be added to be [9] P. A. Paresh and Dr. Latha Parameswaran, “Vision-based algorithm for
implemented at the ATM. In addition to sending the user the fire detection in smart buildings”, in Lecture Notes in Computational
GPS location of the ATM, the amount of cash withdrawn, the Vision and Biomechanics, vol. 30, Springer Netherlands, 2019, pp.
1029-1038.
image of the face of the user can also be sent. To increase the
[10] V. Ashokan and Murthy, O. V. R., “Comparative evaluation of
security against the theft and accidents at the ATM, more classifiers for abnormal event detection in ATMs”, in 2017 International
accurate sensors for fire detection and damage detection can be Conference on Intelligent Computing, Instrumentation and Control
inserted [9], [10]. Since the fraud in fingerprint recognition has T echnologies, ICICICT 2017, 2018, vol. 2018-January, pp. 1330-1333.

978-1-7281-5821-1/20/$31.00 ©2020 IEEE 411

orized licensed use


View limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy