Enhancing Security of ATM Transactions via Debit Cards
DOI:
https://doi.org/10.26438/ijcse/v7i9.152157Keywords:
ATM, skimming, debit card, theft, PIN, bank server, transaction, OTPAbstract
Nowadays, there has been a sudden surge in thefts from ATMs. Though ATM cum debit cards provides us with a faster access to our money, there lies a big security issue with such cards. The cards are skimmed by using skimming devices and the information from these cards are often stolen when one tries to perform transactions at an ATM. This information is then misused by the people performing such thefts. This paper will shed light upon the above matter. In this paper, we will be discussing the very basics of an ATM cum debit card and an ATM. Then we will talk about the method in which such thefts take place which we can refer to as skimming. In addition to that, we will elaborate on a technique that could possibly be used to prevent such thefts from taking place. The paper will elaborate on the measures to be taken to implement such a mechanism and the scope of this mechanism.
References
[1] Khalifa, Salem S.M, and Kamarudin Saadan, “The Formal Design Model of an Automatic Teller Machine (ATM).” Lecture Notes on Information Theory, vol. 1, no. 1, Mar. 2013.
[2] Mrunal A. Mahajan, “An approach for securing Swiping Machine transactions”, Journal Paper (IJSRCSE), Volume 06 , Special Issue.01 , pp.68-72, Jan-2018.
[3] Omari, Richard Kwaku Bamfo, “An assessment of the use of Automated Teller Machine (A.T.M) of Barclays Bank Ghana Limited Akim Oda Branch”, Institute Of Distance Learning, Kwame Nkrumah University of Science and Technology, September 2012.
[4] Mukesh Sharma and Shailendra Jha, “Digital Data Stealing from ATM using Data Skimmers: Challenge to the Forensic Examiner”, Journal of Forensic Sciences and Criminal Investigation, Volume 1, Issue 4, January 2017.
[5] Dhanush J.Nair and Sunny Nahar.
“ATM Transaction : A New Time Based Approach Research paper”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015.
[6] Yekini N.A., Itegboje A.O., Oyeyinka I.K. and Akinwole A.K., “Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No.6, 2012.
[7] Kavita Hooda, “ATM Security”, International Journal of Scientific and Research Publications, Volume 6, Issue 4, April 2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
