Enhancing Security of ATM Transactions via Debit Cards
Asoke Nath1 , Sourya Saha2 , Sarthak Gupta3 , Nilarghya Das4
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-9 , Page no. 152-157, Sep-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i9.152157
Online published on Sep 30, 2019
Copyright © Asoke Nath, Sourya Saha, Sarthak Gupta, Nilarghya Das . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Asoke Nath, Sourya Saha, Sarthak Gupta, Nilarghya Das, “Enhancing Security of ATM Transactions via Debit Cards,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.9, pp.152-157, 2019.
MLA Style Citation: Asoke Nath, Sourya Saha, Sarthak Gupta, Nilarghya Das "Enhancing Security of ATM Transactions via Debit Cards." International Journal of Computer Sciences and Engineering 7.9 (2019): 152-157.
APA Style Citation: Asoke Nath, Sourya Saha, Sarthak Gupta, Nilarghya Das, (2019). Enhancing Security of ATM Transactions via Debit Cards. International Journal of Computer Sciences and Engineering, 7(9), 152-157.
BibTex Style Citation:
@article{Nath_2019,
author = {Asoke Nath, Sourya Saha, Sarthak Gupta, Nilarghya Das},
title = {Enhancing Security of ATM Transactions via Debit Cards},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2019},
volume = {7},
Issue = {9},
month = {9},
year = {2019},
issn = {2347-2693},
pages = {152-157},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4866},
doi = {https://doi.org/10.26438/ijcse/v7i9.152157}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i9.152157}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4866
TI - Enhancing Security of ATM Transactions via Debit Cards
T2 - International Journal of Computer Sciences and Engineering
AU - Asoke Nath, Sourya Saha, Sarthak Gupta, Nilarghya Das
PY - 2019
DA - 2019/09/30
PB - IJCSE, Indore, INDIA
SP - 152-157
IS - 9
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
469 | 254 downloads | 181 downloads |
Abstract
Nowadays, there has been a sudden surge in thefts from ATMs. Though ATM cum debit cards provides us with a faster access to our money, there lies a big security issue with such cards. The cards are skimmed by using skimming devices and the information from these cards are often stolen when one tries to perform transactions at an ATM. This information is then misused by the people performing such thefts. This paper will shed light upon the above matter. In this paper, we will be discussing the very basics of an ATM cum debit card and an ATM. Then we will talk about the method in which such thefts take place which we can refer to as skimming. In addition to that, we will elaborate on a technique that could possibly be used to prevent such thefts from taking place. The paper will elaborate on the measures to be taken to implement such a mechanism and the scope of this mechanism.
Key-Words / Index Term
ATM, skimming, debit card, theft, PIN, bank server, transaction, OTP
References
[1] Khalifa, Salem S.M, and Kamarudin Saadan, “The Formal Design Model of an Automatic Teller Machine (ATM).” Lecture Notes on Information Theory, vol. 1, no. 1, Mar. 2013.
[2] Mrunal A. Mahajan, “An approach for securing Swiping Machine transactions”, Journal Paper (IJSRCSE), Volume 06 , Special Issue.01 , pp.68-72, Jan-2018.
[3] Omari, Richard Kwaku Bamfo, “An assessment of the use of Automated Teller Machine (A.T.M) of Barclays Bank Ghana Limited Akim Oda Branch”, Institute Of Distance Learning, Kwame Nkrumah University of Science and Technology, September 2012.
[4] Mukesh Sharma and Shailendra Jha, “Digital Data Stealing from ATM using Data Skimmers: Challenge to the Forensic Examiner”, Journal of Forensic Sciences and Criminal Investigation, Volume 1, Issue 4, January 2017.
[5] Dhanush J.Nair and Sunny Nahar.
“ATM Transaction : A New Time Based Approach Research paper”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015.
[6] Yekini N.A., Itegboje A.O., Oyeyinka I.K. and Akinwole A.K., “Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No.6, 2012.
[7] Kavita Hooda, “ATM Security”, International Journal of Scientific and Research Publications, Volume 6, Issue 4, April 2016.