Securing ATM with OTP and Biometric

Main Article Content

Mohammed Hamid Khan

Abstract

In today’s world, money can be required at anytime or anywhere such as shopping, travelling or health emergencies etc. The need of money can only be satisfied when you are carrying money with you. That also increases the risk of getting robed. Bank is a safest place to keep money. Bank provides Automated teller machine (ATM) which can provide money any where you want. ATM is an easy way to get money, you just need to insert card and password and you just got the money. But what if someone will steal your card and somehow he/she will know your password, it will grant him/her full access to your money. That raise question on present security and demands something new in the system that can provide second level of security. One time password (OTP) is password that validates an authentic user for only one login to the respective system. If user is unauthorized, system will not allow further access. OTP can be generated by using different cryptographic hash functions that provides a fixed string which can be used as second level security at ATM. In generation of OTP there are many factors that can make OTP unique every time it is generated. Factors that can be considered are time at when the user is accessing the machine, account number of the user, mobile number of the user, Location of the user, International Mobile station Equipment Identity (IMEI) number which is unique for every mobile device. By taking into consideration factors like daily life problem (general problems) that is phone got switched off, battery is down; less coverage of network can affect the OTP solution etc. To avoid application based problem this report also suggest a solution i.e. biometric security; by using biometric security the alternative security will be as same as OTP.
DOI: 10.17762/ijritcc2321-8169.160460

Article Details

How to Cite
, M. H. K. (2015). Securing ATM with OTP and Biometric. International Journal on Recent and Innovation Trends in Computing and Communication, 3(4), 2041–2044. https://doi.org/10.17762/ijritcc.v3i4.4176
Section
Articles