Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM)
Автор: Moses O. Onyesolu, Amara C. Okpala
Журнал: International Journal of Computer Network and Information Security(IJCNIS) @ijcnis
Статья в выпуске: 10 vol.9, 2017 года.
Бесплатный доступ
The current use of Personal Identification Number (PIN) for verification of the validity of a customer’s identity on Automated Teller Machine (ATM) systems is susceptible to unauthorized access and illegal withdrawal of cash from the ATM, hence, the need for more reliable means of carrying out user authentication. We present a three-tier authentication model with three layers of authentication using password, fingerprint and One-Time-Password (OTP). The identity of an ATM user is validated using password, fingerprint and OTP. Object-Oriented Analysis and Design Methodology (OOADM) was employed in the investigation of the existing system and analysis of the proposed system. Microsoft Visual Basic.NET and Microsoft SQL Server were employed in the implementation of the system. The result is a three-tier authentication model for ATM. Alphabetic keys and some special character keys were introduced to the existing numeric keypad for authentication. The ATM was interfaced with a fingerprint reader for improved security.
Automated Teller Machine, Authentication, Password, Fingerprint, One-Time-Password, Security
Короткий адрес: https://sciup.org/15011938
IDR: 15011938
Список литературы Improving Security Using a Three-Tier Authentication for Automated Teller Machine (ATM)
- B. Komolafe (2017, Jan.). Nigerians withdraw N4.7 trillion through ATM in 2016 [Online]. Available: Http://www. vanguardngr.com/2017/01/nigerians-withdraw-n4-7-trillion-atms-2016.
- N.Y. Asabere, R.O. Baah and A.A. Odefiya, “Measuring standards and service quality of Automated Teller Machines (ATMs) in the banking industry of Ghana,” International Journal of Information and Communication Technology Research, vol 2, issue 3, pp 216– 226, 2012.
- P.S. Rose and S.C. Hudgins, Management and Financial Services, 9th ed. New York: McGraw-Hill, 2013.
- J. Hota. (2012) “Window-based and web-enabled ATM: issues and scopes,” The IUP Journal of Information Technology, vol. 3, issue 4, pp 52-59. Available: http://www.academia.edu/5043734 /windows-based-and-web-enabled-ATMs-issues-and-scopes
- H.A. Hayder (2011) “Implementing additional security measure on ATM through biometric [Online]. Available: http://www.etd.uum.edu.my/2576
- Diebold Incorporated (2012). ATM fraud and security. [Online]. Available: http:// securens.in/pdfs/KnowledgeCenter /5_ATM %20Fraud% 20and%20Security.pdf
- S.A. Adelewo. (2010, August). “Challenges of automated teller machine (ATM) usage and fraud occurrences in Nigeria. A case study of selected banks in Minna metropolis,” Journal of Internet Banking and Commerce, vol. 5, issue 2, pp 10-20. Available: http://www.arraydev.com/ commerce /jibc
- S.T. Bhosale and B.S. Sawant, “Security in e-banking via cardless biometric ATMs,” International Journal of Advanced Technology and Engineering Research (ITATER), vol. 2 issue 4, pp 9-12, July 2012.
- Gemalto (2011, Feb). One-Time-Password Solution for Secure Network Access. [Online]. Available: http://www.gemalto.com/brochures-site/download-site/Documents/ent_otp_secure _access.pdf
- B. Patil, B.S. Chandrekar, M.P. Chavan and B.S. Chaudhri, “RBI 3X – fingerprint based ATM,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, issue 3, pp 577 – 581, March 2016.
- P. Jaynthi and S. Sarala, “Enhanced ATM security using differentiated passwords with GSM technology,” International Journal of Innovative Research in Engineering & Science, vol. 5, issue 4, pp 28 – 35, May 2015.
- G.B. Iwasokun and O.C. Akinyokun. (2013) “A fingerprint-based authentication framework for ATM,” Journal of Computer Engineering and Information Technology, vol. 2, issue 3. Available: http/dx.doi.org/ 10.4172/2324-9307.1000112.
- D. Shimal and D. Jhunu. (2011). “Designing a biometric strategy (fingerprint) measure for enhancing ATM security in Indian e-banking system,” International Journal of Information and Communication Technology Research, vol. 1, issue 5. Available: http://www.esjournals.org
- D. Malviya. (2014, Dec.). “Face recognition technique: Enhanced safety approach for ATM,” International Journal of Scientific and Research Publications, vol 4, issue 12. Available: http://www.ijsrp.org
- E.J. Mwaikali, “Assessment of challenges facing customers in Automated Teller Machine in the banking industry in Tanzania: A case of some selected banks in Tanzania,” International Journal of Research in Business and Technology, vol. 4, issue 3, pp 480-488, 2014.