SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2014
A Paper on Enhanced PIN Security for SBI ATM through
Aadhaar Linked OTP or Biometric
Bodagoddu Sharath Chandra Kumar1, Jally Venkatesh2
1,2MCA student, Dept. of computer science and Engineering, Jawaharlal Nehru Technological University,
Telangana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In this 21st century there is a vast increase in the
usage of the internet globally. With the advent of new
technologies it has become very easy to cheat the secured
information. Card skimming attacks, video recording with
hidden and pre-setup cameras while users execute the PIN-
based transaction at ATMs is one of the common problems for
real and regular users. Many solutions came up to make it
more secure, but every time that it becomessecurethehackers
come up with new tricks again to reveal the PIN information.
In this paper, we have to discuss newly implemented SBI OTP
based cash withdrawal system. Thistechnology isquitesimple,
easy and understandable by the user and can be secured from
the threats or cheats happening in this world. The user who is
using this technology needsasmartphoneforenteringthe OTP
obtain a secure PINtemplate forpoint-of-serviceconfirmation.
It is simple to understand and also provides secure
connectivity. This PIN confirmation protocol serves to protect
against varied attacks. When ATM owner mobile lost or
damaged he does not able give OTP and does not take money
while he is in need. At such time customers can use their
Aadhaar, Biometric to access the account to make the
transactions.
Key Words: Aadhaar, ATM, CIDR, fingerprint, OTP, SBI.
1. INTRODUCTION
The advancement of financial transactions in the modern
world has gone passed from cash to cheques, and then to
payment cards such as credit cards and debitcards.Barclays
bank introduced the first ever ATM in 1967, in its Hendson
branch in London, which could dispense fixed amount of
cash when a user insert a special coded card. Since then,
ATM has become smaller, faster and easier [1]. ATM is a
computerized machine designed to dispense cash to bank
customers without needofhumaninteraction;itcantransfer
money between bank accounts and provide other basic
financial services such as balance enquiries, mini statement,
withdrawal and fast cash among others [2]. With the
increase in number of banks, banking services andATMsthe
number of fraudulent attacks has also increased. Many
systems has been proposed to avoid such kind of attacks.
The introduction of Biometrics authentication technique is
safer and newer technologies for preventing ATM theftsand
attacks. Biometric character of a person will be different
from person to person. Therefore, biometrics can be
incorporated into ATM machines. The main benefit of the
ATM is it provides an 24hours servicedailytocustomersand
users in our everyday life [3]. In this paper we proposed an
ATM that includes fingerprint verification in which
fingerprints of the users are incorporated into the CIDR
database of the UIDAI authority which has given access to
both public and private banks. This paper is arranged as
follows, section II provided the background of ATMsecurity,
section III tells about the existing system, section IV tells
about the newly proposed system, section V is about the
algorithm used in this system, section VI is about the
Experimental results, section VII gives the conclusion and
section VIII deals with the references.
2. LITERATURE SURVEY
Crimes at ATM has become an national issue, with these
crimes not only customers but also financial institutions has
facing a lot of issues. Criminals are tampering the ATM
terminal and steal customers’ card details illegally. Once
users’ ATM card is lost and the password is stolen, the users’
account is vulnerable to attack [4]. Despite warning, many
people normally choose easily guessed PIN's andpasswords
like birthday date, phone numbers and social security
numbers, etc. Biometric authentication and OTP techniques
can solve the issue of password stealing since a person’s
biometric is nontransferable anduniqueforeveryindividual.
The system can compare the scanned biometric to records
stored in a central or local database, OTP is numeric string
which randomly generated and sends to a registered
number.
State Bank Of India (SBI) has introduced new OTP system
since 01st Jan, 2020. In order to protect from unauthorized
transactions at ATMs, we are introducing an OTP basedcash
withdrawal system. OTP based authentication has been
carried out for cash withdrawal above Rs.10000. This new
safeguard system will be applicable from 1st Jan, 2020
across all SBI ATMs from 8 PM to 8 AM [5].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2015
Fig -1: figure represents the OTP-based authentication
announced by the SBI [5]
A Literature survey based on the secure user PIN
confirmation by the ATM has been implemented and in this
section some of the attacks has been mentioned below:
1. This OTP authenticationhasbeenimplementedonly
for SBI terminals, when we withdraw cash in other
bank ATMs not needed to enter OTP.
2. When user mobile lost or damaged not able to
withdraw cash.
3. There is also a rapid increase in the card cloning
devices now a days. Whenever the authenticated
user swipe his/her credit/ debit card, it is fed to
such card cloning devices. This results in stolen of
user credentials.
There are also card skimming devices whichfitperfectlywell
in the ATM card slot. When the user enters his credit or debit
card, he unintentionally enters them in the card skimming
device and thus results in stolen credentials.[6]
Fig -2: Card skimmer steals the card details after inserting
card.[7]
Fig -3: Keyboard records the user entered PIN while
making transaction [8]
3. EXISTING SYSTEM
In our modern world, all the people used to do truncation in
banking like deposit money and withdrawing money. For
that, the customers will be standing in queue to withdraw
money from bank. All the customers felt like waiting for
withdraw cash. Therefore, that bank introduces ATM
(Automated teller machine) to help the customer to
withdraw money quick. In that ATM system, they introduce
CARDS (Credit, Debit, master, Visa) to the customer to
withdraw cash by using them. Main advantage is quick cash
providing by the ATM system. The customer feelshappyand
they will not waste time to withdraw cash by standing. but it
has the disadvantage like, smart cardsandphysical keys,can
be stolen, lost, replicated, or left behind; passwords can be
shared, forgotten, hacked or accidentallyobserved bya third
party. The banks required a better system to maintain
security for the customer to do the transaction in their
banks. To overcome these problems, the developed this
fingerprint-based ATM system [9].
4. PROPOSED SYSTEM
4.1 GOAL
The key goal of the proposed system is a multi-password
safe authentication scheme which combines the several
Authentication techniques which results into a larger
password integration which is more secure. The main
intention is to give user the freedom to select whether the
Biometric or Mobile + Aadhaar Generated OTP. [10]
4.2 OBJECTIVE
 This new scheme needsBiometricorOTPgenerated
by using mobile + Aadhaar of the user.
 The new authentication technique must be built in
such a way that by providing the user freedom of
choice to select the type of techniques to be
involved in making transactions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2016
 This new scheme provide security that are easy to
recall or memorize and atthe sametimethehackers
cannot recover this passwords protection.
This new scheme offers more secure authentication
technique when compared to existing authentication
technique.
4.3 BIOMETRIC ATM
Biometric: The term biometrics is derived from the Greek
word bio means life and metric means to measure.
Biometrics is the measurement and statistical analysis of
people’s unique physical and behavioral characteristics.The
technology is used for identification and access control or to
identify individuals who are under surveillance [11].
WHAT IS BIOMETRIC ATM?
Security Experts says that Automatic Teller Machine (ATM)
should have biometric authentication techniques to verify
identities of customer during transaction. Banks should
move a step forward to use biometric. Bank has been moved
to use OTP and now is the time to implement biometric
authentication technology in ATM systems.Nowadays,there
are devices to perform biometric identification and data
about an individual biometric has been stored in Central
Identities Data Repository (CIDR) it’s a data server of
Aadhaar. Aadhaar card an mandatory identity for Indian
citizen and CIDR has been linked to both private and public
sector banks, so we do not need to take biometric data from
customer if we implement this technique.
The pros for using this technique no two individuals have
same biometric. Thus, biometric is an ultimate to prove that
who you are.
Fig -4: Flow chart of Finger Print Recognition
ADVANTAGES OF BIOMETRIC ATM
 ATM card access is more secure using biometric.
 Only authorized person can access the Account.
 Unauthorized person not able to access account.
 Biometric is unique for every individual.
DISADVANTAGES OF BIOMETRIC ATM
 user should present at time of accessing account
 If user is not able to present at ATM due to health or
other issues other cannot access account.
4.4 MAJOR ISSUES WITH BIOMETRIC ATM
In the present situation major issue of ATM is security.Ifany
person use your ATM card if he know your password easily
access Account. Now days a new issue came into existence
i.e., duplicate ATM card with the help of duplicate ATM card
people do the transaction an unauthorized user can also
access the Account. If we enhanced the security technique
then unauthorized person cannot access the ATM. To
overcome this problem wecanusebiometricorAadharcard.
If biometric mandatory at the time of transaction of ATM
then some fraud people cannot use the ATM card in the
absence of user. But in some case user can not be present in
front of ATM machine then the user family member cannot
also access the ATM like.
1. If a person health not well or metwithaccidentthen
biometric not Possible.
4.5 TO OVERCOME THIS PROBLEM WITH THE HELP OF
AADHAR CARD AND OTP PASSWORD
Aadhaar: Aadhaar number is a proof of identity which has
12-digit unique id issued by the UIDAI authority to the
individual Indian citizen. As it is unique and robust enough
to eliminate duplicate and fake identity [12].
In above we have discuss a major point of biometric. To
overcome from the above problem at the time of using ATM
user can use Aadhaar and mobile for OTP send on customer
mobile. If user not enter OTP transaction wascancelled.First
user should enter last 4-digit of register mobile number and
last 4-digit of Aadhaar number. Both are matches then OTP
sends to mobile. If all information provided by user matches
with the existing database then transaction can be possible,
otherwise not.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2017
5. ALGORITHM
Fig -5: flow chart of ATM cash withdrawal.
START
STEP 1 : Insert The Card Into Machine
STEP 2 : Select The Cash Withdrawal Option.
STEP 3 : Select Option Put The Finger To Scan(i.e.,
Biometric) Or Enter Last 4 Digit Of
Registered Mobile Number And Aadhaar
Number
STEP 4: If Match The Scan Go to Step 9, Else Go to Step 5
STEP 5 : If Biometric Does Not Match Reject Transaction
STEP 6 : If Registered Mobile Number = Enter Last 4 Digit
Registered Mobile Number Go to Step 7
STEP 7 : OTP Sent To Registered Mobile
STEP 8 : OTP Matches Go to STEP 9
STEP 9 : Enter The Amount To Dispense Cash
STEP 10 : If Amount Entered > Maximum Limit
STEP 11 : Please Enter The Cash Below Limit
STEP 12 : checks for amount balance in user account
If amount >= STEP 9 go to Step 13 else Reject
Transaction
STEP 13 : Withdrawn Cash
STEP 14 : Take The Inserted Card From Atm
STOP
6. EXPERIMENTAL RESULTS
Results for Finger Print or biometric: When a fingerprint
was placed on the fingerprint module, it captured the image
and compared with the templates in the database. The
existed data matched with the scanned fingerprint, the
further process would be continued.
Results of OTP using Aadhaar: After mobile and Aadhaar
based authentication was successful. The account holder
receives a message numeric string "OTP" on the user’s
registered mobile number. Now user has to enter the OTP,
After the valid code was entered the transaction process
starts (i.e.., withdraw money, checking balance, etc..,). But
the transaction has beencancelledwhenthewrongcodewas
entered.
ACKNOWLEDGEMENT
As the authors of this page we would like to thank
researchers, journal publishers for providing the papers as
well as the books and websites for providingtheinformation
mentioned in this paper.
7. CONCLUSION
The growth in electronic transactions has greater demand
for fast, secure and accurate user identification and
authentication. Method of identification based on PIN
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2018
number or a password are not all reliable. Passwords can be
forgotten, but ones’ biometric is undeniably connected toits
owner. It cannot be borrowed, stolen or easily forgotten.
ATM With Biometric or AadhaarCardwithOTPCodeismore
secure in comparison with simple OTP send to register
mobile after 8PM to 8Amby SBI ATM. Here the above
proposed conceptual model, is highly secure as it provides
authentication with the information of body part i.e.,
biometric recognition [6] and Aadhar cards With OTP
Password is a stronger method of authentication and
verification as it is unique to individuals. This approach is
easy to maintain and operate with low cost.
In this paper, a technique is introduced for secure ATM
transaction using Aadhar card With OTP or biometric to do
the transaction. These Technique are more secure at the
time of transaction if OTP password not match then
customer not access the account. In this case biometricdone
by the user provided to adhaar card. Now days adhaar card
is must for the human being.
REFERENCES
[1] Michael Asante, Kofi Nti, and Frimpong Twum.
“Improving Security Levels In Automatic Teller Machines
(ATM) Using Multifactor Authentication,” International
Journal of Science and Engineering Applications, ISSN:
2319-7560, pp.126-134, 2016.
[2] Wikipedia the free encyclopedia, “Biometrics”,
Downloaded March 20, 2012 from
http://en.wikipedia.org/wiki/Biometrics.
[3] Akhila Alexander, Akshaya Mohan, Ayana Mohanan,and
Surjith S, “Face Recognition and Finger Print Based
Enhanced Security System for ATM Transaction,”
International Journal of Innovative Research in
Electrical, Electronics, Instrumentation and Control
Engineering, ISSN: 2321- 5526, Vol. 1, Special Issue 2,
2018.
[4] P.K. Amurthy and M.S. Redddy, “ImplementationofATM
Security by Using Fingerprint recognition and GSM”,
International Journal of ElectronicsCommunicationand
Computer Engineering vol.3, no. 1, pp. 83-86, 2012.
[5] https://twitter.com/TheOfficialSBI/status/1211568846
366281728
[6] Y. He, C. H. Chang, and J. Gu, “An area efficient 64-bit
square root carry-select adder for low power
applications,” in Proc. IEEE Int. Symp. CircuitsSyst.,2005,
vol. 4, pp. 4082–4085.
[7] https://www.itstactical.com/wp-
content/uploads/2018/02/ATM_Skimmer_02.jpg
[8] https://i.ibb.co/GCMxh8y/keyboard.jpg
[9] http://ictactjournals.in/paper/IJME_Vol_4_Iss_2_Paper_
4_570_575.pdf
[10] Dr. Dharmendra Chahar Nayana S, Dr.Niranjana murthy
M, “Study on Three Dimensional (3D) Password
Authentication system” International Journal of
Advanced Research in Computer and Communication
Engineering, ISSN: 2278-1021, pp119-125, 2016.
[11]
https://searchsecurity.techtarget.com/definition/biometrics
[12] https://uidai.gov.in/what-is-aadhaar.html
[13] http://www.ijsrp.org/research-paper-0416/ijsrp-
p5225.pdf
[14] https://sbi.co.in/web/personal-banking/information-
services/kyc-guidelines/atm-services
BIOGRAPHIES
Master of Computer Applications,
Dept. of computer science and
Engineering,
Jawaharlal Nehru Technological
University, Telangana, India.
Master of Computer Applications,
Dept. of computer science and
Engineering,
Jawaharlal Nehru Technological
University, Telangana, India.

More Related Content

PDF
D0351022026
PDF
IRJET- Artificial Intelligence based Smart ATM
PDF
N044057478
PDF
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
PDF
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
PDF
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
PDF
project_report
PDF
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
D0351022026
IRJET- Artificial Intelligence based Smart ATM
N044057478
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
project_report
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...

What's hot (20)

PDF
Enhancing security features
PDF
QR BASED CARD-LESS ATM TRANSACTIONS
PDF
E010313141
PDF
A Survey: Fusion of Fingerprint and Iris for ATM services
PDF
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
PDF
3 layered advanced atm security
PDF
IRJET- Secured Merchant Payment using Biometric Transaction
PDF
Fingereye: improvising security and optimizing ATM transaction time based on ...
PDF
A secure communication in smart phones using two factor authentications
PPTX
Technolog11 ies in banking complete edited
PDF
IRJET- Biometric based Bank Locker System
PDF
PDF
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
PDF
H029044050
PDF
ATMeye.iQ
PDF
Credit Card Duplication and Crime Prevention Using Biometrics
PDF
IRJET- A Mobile Payment System Based on Face Recognition
PPTX
An ATM With Third Eye The Future’s Technological Innovation
PPTX
an atm with an eye
PPT
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
Enhancing security features
QR BASED CARD-LESS ATM TRANSACTIONS
E010313141
A Survey: Fusion of Fingerprint and Iris for ATM services
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
3 layered advanced atm security
IRJET- Secured Merchant Payment using Biometric Transaction
Fingereye: improvising security and optimizing ATM transaction time based on ...
A secure communication in smart phones using two factor authentications
Technolog11 ies in banking complete edited
IRJET- Biometric based Bank Locker System
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
H029044050
ATMeye.iQ
Credit Card Duplication and Crime Prevention Using Biometrics
IRJET- A Mobile Payment System Based on Face Recognition
An ATM With Third Eye The Future’s Technological Innovation
an atm with an eye
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
Ad

Similar to IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked OTP or Biometric (20)

PDF
IRJET- Two Level Authentication for Banking System
PDF
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
DOCX
Biometric ATM2.docx
PDF
Transactions Using Bio-Metric Authentication
PDF
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
PPTX
Research paper report of mba digree Aktu
PDF
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
PDF
IRJET- Security for Building & ATM Machine
PPTX
ATM BANKING SYSTEM
PPTX
Atm using finger print
PDF
IRJET- Advanced Two Factor Authentication using Image Processing
PDF
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
PDF
Atm security using_fingerprint_biometric_identifer
PPTX
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
PDF
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
PDF
Low cost 3d authentication service for atm and pos
PPTX
Fingerprint Authentication for ATM
PDF
Enhancing the Cash Point using Multimode Biometric System
PPTX
Finger print ATM
IRJET- Two Level Authentication for Banking System
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
Biometric ATM2.docx
Transactions Using Bio-Metric Authentication
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
Research paper report of mba digree Aktu
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
IRJET- Security for Building & ATM Machine
ATM BANKING SYSTEM
Atm using finger print
IRJET- Advanced Two Factor Authentication using Image Processing
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
Atm security using_fingerprint_biometric_identifer
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
Low cost 3d authentication service for atm and pos
Fingerprint Authentication for ATM
Enhancing the Cash Point using Multimode Biometric System
Finger print ATM
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
Information Storage and Retrieval Techniques Unit III
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPTX
Nature of X-rays, X- Ray Equipment, Fluoroscopy
PDF
Design Guidelines and solutions for Plastics parts
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
Visual Aids for Exploratory Data Analysis.pdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
Soil Improvement Techniques Note - Rabbi
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
August 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Module 8- Technological and Communication Skills.pptx
Information Storage and Retrieval Techniques Unit III
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
III.4.1.2_The_Space_Environment.p pdffdf
Categorization of Factors Affecting Classification Algorithms Selection
Nature of X-rays, X- Ray Equipment, Fluoroscopy
Design Guidelines and solutions for Plastics parts
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Visual Aids for Exploratory Data Analysis.pdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Soil Improvement Techniques Note - Rabbi
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Safety Seminar civil to be ensured for safe working.
August 2025 - Top 10 Read Articles in Network Security & Its Applications
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Module 8- Technological and Communication Skills.pptx

IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked OTP or Biometric

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2014 A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked OTP or Biometric Bodagoddu Sharath Chandra Kumar1, Jally Venkatesh2 1,2MCA student, Dept. of computer science and Engineering, Jawaharlal Nehru Technological University, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this 21st century there is a vast increase in the usage of the internet globally. With the advent of new technologies it has become very easy to cheat the secured information. Card skimming attacks, video recording with hidden and pre-setup cameras while users execute the PIN- based transaction at ATMs is one of the common problems for real and regular users. Many solutions came up to make it more secure, but every time that it becomessecurethehackers come up with new tricks again to reveal the PIN information. In this paper, we have to discuss newly implemented SBI OTP based cash withdrawal system. Thistechnology isquitesimple, easy and understandable by the user and can be secured from the threats or cheats happening in this world. The user who is using this technology needsasmartphoneforenteringthe OTP obtain a secure PINtemplate forpoint-of-serviceconfirmation. It is simple to understand and also provides secure connectivity. This PIN confirmation protocol serves to protect against varied attacks. When ATM owner mobile lost or damaged he does not able give OTP and does not take money while he is in need. At such time customers can use their Aadhaar, Biometric to access the account to make the transactions. Key Words: Aadhaar, ATM, CIDR, fingerprint, OTP, SBI. 1. INTRODUCTION The advancement of financial transactions in the modern world has gone passed from cash to cheques, and then to payment cards such as credit cards and debitcards.Barclays bank introduced the first ever ATM in 1967, in its Hendson branch in London, which could dispense fixed amount of cash when a user insert a special coded card. Since then, ATM has become smaller, faster and easier [1]. ATM is a computerized machine designed to dispense cash to bank customers without needofhumaninteraction;itcantransfer money between bank accounts and provide other basic financial services such as balance enquiries, mini statement, withdrawal and fast cash among others [2]. With the increase in number of banks, banking services andATMsthe number of fraudulent attacks has also increased. Many systems has been proposed to avoid such kind of attacks. The introduction of Biometrics authentication technique is safer and newer technologies for preventing ATM theftsand attacks. Biometric character of a person will be different from person to person. Therefore, biometrics can be incorporated into ATM machines. The main benefit of the ATM is it provides an 24hours servicedailytocustomersand users in our everyday life [3]. In this paper we proposed an ATM that includes fingerprint verification in which fingerprints of the users are incorporated into the CIDR database of the UIDAI authority which has given access to both public and private banks. This paper is arranged as follows, section II provided the background of ATMsecurity, section III tells about the existing system, section IV tells about the newly proposed system, section V is about the algorithm used in this system, section VI is about the Experimental results, section VII gives the conclusion and section VIII deals with the references. 2. LITERATURE SURVEY Crimes at ATM has become an national issue, with these crimes not only customers but also financial institutions has facing a lot of issues. Criminals are tampering the ATM terminal and steal customers’ card details illegally. Once users’ ATM card is lost and the password is stolen, the users’ account is vulnerable to attack [4]. Despite warning, many people normally choose easily guessed PIN's andpasswords like birthday date, phone numbers and social security numbers, etc. Biometric authentication and OTP techniques can solve the issue of password stealing since a person’s biometric is nontransferable anduniqueforeveryindividual. The system can compare the scanned biometric to records stored in a central or local database, OTP is numeric string which randomly generated and sends to a registered number. State Bank Of India (SBI) has introduced new OTP system since 01st Jan, 2020. In order to protect from unauthorized transactions at ATMs, we are introducing an OTP basedcash withdrawal system. OTP based authentication has been carried out for cash withdrawal above Rs.10000. This new safeguard system will be applicable from 1st Jan, 2020 across all SBI ATMs from 8 PM to 8 AM [5].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2015 Fig -1: figure represents the OTP-based authentication announced by the SBI [5] A Literature survey based on the secure user PIN confirmation by the ATM has been implemented and in this section some of the attacks has been mentioned below: 1. This OTP authenticationhasbeenimplementedonly for SBI terminals, when we withdraw cash in other bank ATMs not needed to enter OTP. 2. When user mobile lost or damaged not able to withdraw cash. 3. There is also a rapid increase in the card cloning devices now a days. Whenever the authenticated user swipe his/her credit/ debit card, it is fed to such card cloning devices. This results in stolen of user credentials. There are also card skimming devices whichfitperfectlywell in the ATM card slot. When the user enters his credit or debit card, he unintentionally enters them in the card skimming device and thus results in stolen credentials.[6] Fig -2: Card skimmer steals the card details after inserting card.[7] Fig -3: Keyboard records the user entered PIN while making transaction [8] 3. EXISTING SYSTEM In our modern world, all the people used to do truncation in banking like deposit money and withdrawing money. For that, the customers will be standing in queue to withdraw money from bank. All the customers felt like waiting for withdraw cash. Therefore, that bank introduces ATM (Automated teller machine) to help the customer to withdraw money quick. In that ATM system, they introduce CARDS (Credit, Debit, master, Visa) to the customer to withdraw cash by using them. Main advantage is quick cash providing by the ATM system. The customer feelshappyand they will not waste time to withdraw cash by standing. but it has the disadvantage like, smart cardsandphysical keys,can be stolen, lost, replicated, or left behind; passwords can be shared, forgotten, hacked or accidentallyobserved bya third party. The banks required a better system to maintain security for the customer to do the transaction in their banks. To overcome these problems, the developed this fingerprint-based ATM system [9]. 4. PROPOSED SYSTEM 4.1 GOAL The key goal of the proposed system is a multi-password safe authentication scheme which combines the several Authentication techniques which results into a larger password integration which is more secure. The main intention is to give user the freedom to select whether the Biometric or Mobile + Aadhaar Generated OTP. [10] 4.2 OBJECTIVE  This new scheme needsBiometricorOTPgenerated by using mobile + Aadhaar of the user.  The new authentication technique must be built in such a way that by providing the user freedom of choice to select the type of techniques to be involved in making transactions.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2016  This new scheme provide security that are easy to recall or memorize and atthe sametimethehackers cannot recover this passwords protection. This new scheme offers more secure authentication technique when compared to existing authentication technique. 4.3 BIOMETRIC ATM Biometric: The term biometrics is derived from the Greek word bio means life and metric means to measure. Biometrics is the measurement and statistical analysis of people’s unique physical and behavioral characteristics.The technology is used for identification and access control or to identify individuals who are under surveillance [11]. WHAT IS BIOMETRIC ATM? Security Experts says that Automatic Teller Machine (ATM) should have biometric authentication techniques to verify identities of customer during transaction. Banks should move a step forward to use biometric. Bank has been moved to use OTP and now is the time to implement biometric authentication technology in ATM systems.Nowadays,there are devices to perform biometric identification and data about an individual biometric has been stored in Central Identities Data Repository (CIDR) it’s a data server of Aadhaar. Aadhaar card an mandatory identity for Indian citizen and CIDR has been linked to both private and public sector banks, so we do not need to take biometric data from customer if we implement this technique. The pros for using this technique no two individuals have same biometric. Thus, biometric is an ultimate to prove that who you are. Fig -4: Flow chart of Finger Print Recognition ADVANTAGES OF BIOMETRIC ATM  ATM card access is more secure using biometric.  Only authorized person can access the Account.  Unauthorized person not able to access account.  Biometric is unique for every individual. DISADVANTAGES OF BIOMETRIC ATM  user should present at time of accessing account  If user is not able to present at ATM due to health or other issues other cannot access account. 4.4 MAJOR ISSUES WITH BIOMETRIC ATM In the present situation major issue of ATM is security.Ifany person use your ATM card if he know your password easily access Account. Now days a new issue came into existence i.e., duplicate ATM card with the help of duplicate ATM card people do the transaction an unauthorized user can also access the Account. If we enhanced the security technique then unauthorized person cannot access the ATM. To overcome this problem wecanusebiometricorAadharcard. If biometric mandatory at the time of transaction of ATM then some fraud people cannot use the ATM card in the absence of user. But in some case user can not be present in front of ATM machine then the user family member cannot also access the ATM like. 1. If a person health not well or metwithaccidentthen biometric not Possible. 4.5 TO OVERCOME THIS PROBLEM WITH THE HELP OF AADHAR CARD AND OTP PASSWORD Aadhaar: Aadhaar number is a proof of identity which has 12-digit unique id issued by the UIDAI authority to the individual Indian citizen. As it is unique and robust enough to eliminate duplicate and fake identity [12]. In above we have discuss a major point of biometric. To overcome from the above problem at the time of using ATM user can use Aadhaar and mobile for OTP send on customer mobile. If user not enter OTP transaction wascancelled.First user should enter last 4-digit of register mobile number and last 4-digit of Aadhaar number. Both are matches then OTP sends to mobile. If all information provided by user matches with the existing database then transaction can be possible, otherwise not.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2017 5. ALGORITHM Fig -5: flow chart of ATM cash withdrawal. START STEP 1 : Insert The Card Into Machine STEP 2 : Select The Cash Withdrawal Option. STEP 3 : Select Option Put The Finger To Scan(i.e., Biometric) Or Enter Last 4 Digit Of Registered Mobile Number And Aadhaar Number STEP 4: If Match The Scan Go to Step 9, Else Go to Step 5 STEP 5 : If Biometric Does Not Match Reject Transaction STEP 6 : If Registered Mobile Number = Enter Last 4 Digit Registered Mobile Number Go to Step 7 STEP 7 : OTP Sent To Registered Mobile STEP 8 : OTP Matches Go to STEP 9 STEP 9 : Enter The Amount To Dispense Cash STEP 10 : If Amount Entered > Maximum Limit STEP 11 : Please Enter The Cash Below Limit STEP 12 : checks for amount balance in user account If amount >= STEP 9 go to Step 13 else Reject Transaction STEP 13 : Withdrawn Cash STEP 14 : Take The Inserted Card From Atm STOP 6. EXPERIMENTAL RESULTS Results for Finger Print or biometric: When a fingerprint was placed on the fingerprint module, it captured the image and compared with the templates in the database. The existed data matched with the scanned fingerprint, the further process would be continued. Results of OTP using Aadhaar: After mobile and Aadhaar based authentication was successful. The account holder receives a message numeric string "OTP" on the user’s registered mobile number. Now user has to enter the OTP, After the valid code was entered the transaction process starts (i.e.., withdraw money, checking balance, etc..,). But the transaction has beencancelledwhenthewrongcodewas entered. ACKNOWLEDGEMENT As the authors of this page we would like to thank researchers, journal publishers for providing the papers as well as the books and websites for providingtheinformation mentioned in this paper. 7. CONCLUSION The growth in electronic transactions has greater demand for fast, secure and accurate user identification and authentication. Method of identification based on PIN
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2018 number or a password are not all reliable. Passwords can be forgotten, but ones’ biometric is undeniably connected toits owner. It cannot be borrowed, stolen or easily forgotten. ATM With Biometric or AadhaarCardwithOTPCodeismore secure in comparison with simple OTP send to register mobile after 8PM to 8Amby SBI ATM. Here the above proposed conceptual model, is highly secure as it provides authentication with the information of body part i.e., biometric recognition [6] and Aadhar cards With OTP Password is a stronger method of authentication and verification as it is unique to individuals. This approach is easy to maintain and operate with low cost. In this paper, a technique is introduced for secure ATM transaction using Aadhar card With OTP or biometric to do the transaction. These Technique are more secure at the time of transaction if OTP password not match then customer not access the account. In this case biometricdone by the user provided to adhaar card. Now days adhaar card is must for the human being. REFERENCES [1] Michael Asante, Kofi Nti, and Frimpong Twum. “Improving Security Levels In Automatic Teller Machines (ATM) Using Multifactor Authentication,” International Journal of Science and Engineering Applications, ISSN: 2319-7560, pp.126-134, 2016. [2] Wikipedia the free encyclopedia, “Biometrics”, Downloaded March 20, 2012 from http://en.wikipedia.org/wiki/Biometrics. [3] Akhila Alexander, Akshaya Mohan, Ayana Mohanan,and Surjith S, “Face Recognition and Finger Print Based Enhanced Security System for ATM Transaction,” International Journal of Innovative Research in Electrical, Electronics, Instrumentation and Control Engineering, ISSN: 2321- 5526, Vol. 1, Special Issue 2, 2018. [4] P.K. Amurthy and M.S. Redddy, “ImplementationofATM Security by Using Fingerprint recognition and GSM”, International Journal of ElectronicsCommunicationand Computer Engineering vol.3, no. 1, pp. 83-86, 2012. [5] https://twitter.com/TheOfficialSBI/status/1211568846 366281728 [6] Y. He, C. H. Chang, and J. Gu, “An area efficient 64-bit square root carry-select adder for low power applications,” in Proc. IEEE Int. Symp. CircuitsSyst.,2005, vol. 4, pp. 4082–4085. [7] https://www.itstactical.com/wp- content/uploads/2018/02/ATM_Skimmer_02.jpg [8] https://i.ibb.co/GCMxh8y/keyboard.jpg [9] http://ictactjournals.in/paper/IJME_Vol_4_Iss_2_Paper_ 4_570_575.pdf [10] Dr. Dharmendra Chahar Nayana S, Dr.Niranjana murthy M, “Study on Three Dimensional (3D) Password Authentication system” International Journal of Advanced Research in Computer and Communication Engineering, ISSN: 2278-1021, pp119-125, 2016. [11] https://searchsecurity.techtarget.com/definition/biometrics [12] https://uidai.gov.in/what-is-aadhaar.html [13] http://www.ijsrp.org/research-paper-0416/ijsrp- p5225.pdf [14] https://sbi.co.in/web/personal-banking/information- services/kyc-guidelines/atm-services BIOGRAPHIES Master of Computer Applications, Dept. of computer science and Engineering, Jawaharlal Nehru Technological University, Telangana, India. Master of Computer Applications, Dept. of computer science and Engineering, Jawaharlal Nehru Technological University, Telangana, India.