Skip to main content

Two-Dimensional Hybrid Authentication for ATM Transactions

  • Conference paper
  • First Online:
Advances in Data and Information Sciences

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 94))

  • 1670 Accesses

Abstract

Advancement of information technology leads toward a world with process automation to perform a task more efficiently and avail the services with ease. Banking sectors are not an exception and are moving from traditional manual banking system to an electronic entity. The basic functionality of a bank, out of many, is to deposit money into user accounts and retrieve as per account holder’s necessity. However, as time is precious, eventually account holders may not expect to spend too much time in the queue for depositing or retrieving their money. That is why the need for ATM comes into the picture to make the user’s life easier. However, it comes with some questionable possibilities for false attacks as well. Thus, a proper user authentication mechanism is needed to overcome these fraudulent activities. Our proposed method gives a new dimension to this authentication which is a hybrid version of an existing authentication system for the ATM transaction by using a Graphical pattern password along with current PIN code supplied from the bank. This Graphical password is a version, which has been invented by Google’s Android pattern unlock system. In our proposed mechanism, we combine both Graphical pattern and PIN and incorporated security to enhance reliable transactions. More specifically, the secret encryption key is generated from a PIN using the PRESENT algorithm. Finally, the ciphertext is created using digit stream from the Graphical pattern and secret encryption key. This hybrid process to detect intrusion will significantly enhance security. Our primary focus is to develop a robust and flexible user authentication system to avoid common authentication problems. The proposed approach needs no additional hardware and device dependency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bank Fraud & ATM Security website [Online]. http://resources.infosecinstitute.com/bank-fraud-atm-security/#gref.

  2. Muhammad-Bello, B. L., Alhassan, M. E., & Ganiyu, S. O. (2015). An enhanced ATM security system using second-level authentication. International Journal of Computer Applications, 111(5), 8–14.

    Google Scholar 

  3. Jermyn, I., Mayer, A., Monrose, F., Reiter, M. K., & Rubin, A. D. (1999). The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium, pp 2–12.

    Google Scholar 

  4. von Zezschwitz, E., De Luca, A., & Janssen, P. (2015). Heinrich Hussmann: Easy to draw, but hard to trace? On the observability of grid-based (Un)lock patterns. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2339–2342.

    Google Scholar 

  5. Aviv, A. J., Budzitowski, D., & Kuber, R. (2015). Is Bigger Better? Comparing user-generated passwords on 3 × 3 vs. 4 × 4 grid sizes for android’s pattern unlock. In Proceedings of the 31st Annual Computer Security Applications Conference, pp. 301–310.

    Google Scholar 

  6. An Overview of Cryptography website. [Online]. Available: http://www.garykessler.net/library/crypto.html.

  7. Iyabode, A. M., Nureni, Y. N., Adebayo, A. F., & Olamide, O. A. (2015). Card-less electronic automated teller machine (EATM) with biometric authentication. International Journal of Engineering Trends and Technology, 30(1), 99–105.

    Article  Google Scholar 

  8. Vats, H., Ruhl, R., & Aghili, S. (2015). Fingerprint security for protecting EMV payment cards. In The 10th International Conference for Internet Technology and Secured Transactions, pp. 95–100.

    Google Scholar 

  9. Sui, Y., Zou, X., Du, E. Y., & Li, F. (2014). Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method. IEEE Transactions on Computers, 63, 902–906.

    Article  MathSciNet  Google Scholar 

  10. Dileepsai, Y., & Sudarvizhi, S. (2016). Card less access to POS transactions. International Journal of Applied Engineering Research, 11(7), 5231–5236.

    Google Scholar 

  11. Awotunde, J. B., Jimoh, R. G., & Matiluko, O. (2015). Emmanuel: Secure Automated Teller Machine (ATM) Using Fingerprint Authentication and Short-code Message in a Cashless Soceity. Published in Academia.edu, pp 1–12.

    Google Scholar 

  12. Abdulrahman Alh othaily, Arwa Alraw ais, Xiuzh en Cheng, Rongf ang Bie: A Novel verification method for payment card systems. Personal and Ubiquitous Computing, 19(7), 1145–1156.

    Google Scholar 

  13. Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J. B., Seurin, Y., & Vikkelsoe, C. (2007). PRESENT: An ultra-lightweight block cipher. In CHES: International Workshop on Cryptographic Hardware and Embedded Systems, Vol. 4727, pp. 450–466.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jahir Ibna Rafiq .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mridha, M.F., Rafiq, J.I., Zaman, W.U. (2020). Two-Dimensional Hybrid Authentication for ATM Transactions. In: Kolhe, M., Tiwari, S., Trivedi, M., Mishra, K. (eds) Advances in Data and Information Sciences. Lecture Notes in Networks and Systems, vol 94. Springer, Singapore. https://doi.org/10.1007/978-981-15-0694-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0694-9_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0693-2

  • Online ISBN: 978-981-15-0694-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics