Abstract
Advancement of information technology leads toward a world with process automation to perform a task more efficiently and avail the services with ease. Banking sectors are not an exception and are moving from traditional manual banking system to an electronic entity. The basic functionality of a bank, out of many, is to deposit money into user accounts and retrieve as per account holder’s necessity. However, as time is precious, eventually account holders may not expect to spend too much time in the queue for depositing or retrieving their money. That is why the need for ATM comes into the picture to make the user’s life easier. However, it comes with some questionable possibilities for false attacks as well. Thus, a proper user authentication mechanism is needed to overcome these fraudulent activities. Our proposed method gives a new dimension to this authentication which is a hybrid version of an existing authentication system for the ATM transaction by using a Graphical pattern password along with current PIN code supplied from the bank. This Graphical password is a version, which has been invented by Google’s Android pattern unlock system. In our proposed mechanism, we combine both Graphical pattern and PIN and incorporated security to enhance reliable transactions. More specifically, the secret encryption key is generated from a PIN using the PRESENT algorithm. Finally, the ciphertext is created using digit stream from the Graphical pattern and secret encryption key. This hybrid process to detect intrusion will significantly enhance security. Our primary focus is to develop a robust and flexible user authentication system to avoid common authentication problems. The proposed approach needs no additional hardware and device dependency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bank Fraud & ATM Security website [Online]. http://resources.infosecinstitute.com/bank-fraud-atm-security/#gref.
Muhammad-Bello, B. L., Alhassan, M. E., & Ganiyu, S. O. (2015). An enhanced ATM security system using second-level authentication. International Journal of Computer Applications, 111(5), 8–14.
Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., & Rubin, A. D. (1999). The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium, pp 2–12.
von Zezschwitz, E., De Luca, A., & Janssen, P. (2015). Heinrich Hussmann: Easy to draw, but hard to trace? On the observability of grid-based (Un)lock patterns. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2339–2342.
Aviv, A. J., Budzitowski, D., & Kuber, R. (2015). Is Bigger Better? Comparing user-generated passwords on 3 × 3 vs. 4 × 4 grid sizes for android’s pattern unlock. In Proceedings of the 31st Annual Computer Security Applications Conference, pp. 301–310.
An Overview of Cryptography website. [Online]. Available: http://www.garykessler.net/library/crypto.html.
Iyabode, A. M., Nureni, Y. N., Adebayo, A. F., & Olamide, O. A. (2015). Card-less electronic automated teller machine (EATM) with biometric authentication. International Journal of Engineering Trends and Technology, 30(1), 99–105.
Vats, H., Ruhl, R., & Aghili, S. (2015). Fingerprint security for protecting EMV payment cards. In The 10th International Conference for Internet Technology and Secured Transactions, pp. 95–100.
Sui, Y., Zou, X., Du, E. Y., & Li, F. (2014). Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Transactions on Computers, 63, 902–906.
Dileepsai, Y., & Sudarvizhi, S. (2016). Card less access to POS transactions. International Journal of Applied Engineering Research, 11(7), 5231–5236.
Awotunde, J. B., Jimoh, R. G., & Matiluko, O. (2015). Emmanuel: Secure Automated Teller Machine (ATM) Using Fingerprint Authentication and Short-code Message in a Cashless Soceity. Published in Academia.edu, pp 1–12.
Abdulrahman Alh othaily, Arwa Alraw ais, Xiuzh en Cheng, Rongf ang Bie: A Novel verification method for payment card systems. Personal and Ubiquitous Computing, 19(7), 1145–1156.
Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., Seurin, Y., & Vikkelsoe, C. (2007). PRESENT: An ultra-lightweight block cipher. In CHES: International Workshop on Cryptographic Hardware and Embedded Systems, Vol. 4727, pp. 450–466.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mridha, M.F., Rafiq, J.I., Zaman, W.U. (2020). Two-Dimensional Hybrid Authentication for ATM Transactions. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_19
Download citation
DOI: https://doi.org/10.1007/978-981-15-0694-9_19
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0693-2
Online ISBN: 978-981-15-0694-9
eBook Packages: EngineeringEngineering (R0)