NFC FEATURED THREE LEVEL ATM SECURITY
Main Article Content
Abstract
An ATM- (Automatic teller machine) has been operational since 1966. Since then this machine has been successfully installed in about 3.5 million cities worldwide. The flexibility of using credits and debits card anywhere has become an advantageous facility has become a common platform for cyber crimes. Another problem with this process is blocking of cards in case of lost or misuse, for which customer has to wait for long time throughout interaction with customer care services. This paper presents a possible solution to reduce the complexities caused in this process as stated. Using three level authentication with NFC (near field communication), and a dash matrix algorithm which generates OTP to overcome the transaction liabilities. The add on feature of this method is blocking of card with least time. By implementing QR code through quick response authentication scheme. NFC technology works with both NFC enabled or non NFC phones via transmitter, receiver and a Bluetooth. This proposed system is user friendly and also ensure security.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Young-Gon Kim and Moon-Seog Jun, “A design of User Authentication system using QR code identifying methodâ€, 6th International Conference on Computer Science and Convergence,Information Technology, IEEE Transactions,pp. 31-35,Nov-Dec 2011. [2] Blake Ross, C. Jakson, N. Miyake, D. Boneh, and J.C. Mitchell, “Stronger password authentication using browser extensions,†in SSYM’05: Proc. 14th Conf. USENIX Security Symp., Berkeley, CA, pp. 2-2, USENIX Association,2005. [3] Zhengming Li, Lijie Xue and Fei Tan, “Face detection in complex background based on skin color features and improved AdaBoost Algorithm†Progress in Informatics and Computing (PIC ), 2010 IEEE International Conference,Vol. 2 , pp. 723-727, Dec. 2010. [4]Dirk Volland,Kay Noyen,Onur Kayikci,Lukas Ackermann and Florian Michahelles," Switching the Role of NFC Tag and Reader for the Implementation of Smart Posters". NFC '12 Proceedings of the 2012 4th IEEE International Workshop on Near Field Communication, pp. 63-68, Mar 2012. [5] Vedat Coskun, Busra Ozdenizci and Kerem Ok, "A Survey on Near Field Communication (NFC) Technology" Wireless..Personal..Communications:..An..International Journal,..Volume..71..Issue..3.,August..2013.pp..2259-2294 [6] M. Roland and .I. Langer, "Digital Signature Records for the NFC Data Exchange Format"..2010.IEEE.Second International Workshop on Near Field Communication, pp 71-76. [7] Anusha Mandalapu, Daffney Deepa, Laxman Deepak Raj, Anish Dev J, "An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies".2015 IEEE International Conference and Workshop on Computing and Communication, pp. 1-6. [8] K. Shankari Devi, V. Vennila and D. Jayakumar "Near Field Communication (NFC) Technology in Smart ETransactions". International Journal of Science Technology & Engineering, Near Field Communication (NFC) Technology in Smart E-Transactions (IJSTE/ Volume 1 / Issue 11 / 040) ISSN (online): 2349-784X pp.1-5