Enhancing Security of ATM Transactions via Debit Cards

Authors

  • Nath A Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India
  • Saha S Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India
  • Gupta S Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India
  • Das N Department of Computer Science, St. Xavier’s College (Autonomous), Kolkata, India

DOI:

https://doi.org/10.26438/ijcse/v7i9.152157

Keywords:

ATM, skimming, debit card, theft, PIN, bank server, transaction, OTP

Abstract

Nowadays, there has been a sudden surge in thefts from ATMs. Though ATM cum debit cards provides us with a faster access to our money, there lies a big security issue with such cards. The cards are skimmed by using skimming devices and the information from these cards are often stolen when one tries to perform transactions at an ATM. This information is then misused by the people performing such thefts. This paper will shed light upon the above matter. In this paper, we will be discussing the very basics of an ATM cum debit card and an ATM. Then we will talk about the method in which such thefts take place which we can refer to as skimming. In addition to that, we will elaborate on a technique that could possibly be used to prevent such thefts from taking place. The paper will elaborate on the measures to be taken to implement such a mechanism and the scope of this mechanism.

References

[1] Khalifa, Salem S.M, and Kamarudin Saadan, “The Formal Design Model of an Automatic Teller Machine (ATM).” Lecture Notes on Information Theory, vol. 1, no. 1, Mar. 2013.

[2] Mrunal A. Mahajan, “An approach for securing Swiping Machine transactions”, Journal Paper (IJSRCSE), Volume 06 , Special Issue.01 , pp.68-72, Jan-2018.

[3] Omari, Richard Kwaku Bamfo, “An assessment of the use of Automated Teller Machine (A.T.M) of Barclays Bank Ghana Limited Akim Oda Branch”, Institute Of Distance Learning, Kwame Nkrumah University of Science and Technology, September 2012.

[4] Mukesh Sharma and Shailendra Jha, “Digital Data Stealing from ATM using Data Skimmers: Challenge to the Forensic Examiner”, Journal of Forensic Sciences and Criminal Investigation, Volume 1, Issue 4, January 2017.

[5] Dhanush J.Nair and Sunny Nahar.

“ATM Transaction : A New Time Based Approach Research paper”, International Journal of Science, Engineering and Technology Research (IJSETR), Volume 4, Issue 6, June 2015.

[6] Yekini N.A., Itegboje A.O., Oyeyinka I.K. and Akinwole A.K., “Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 3, No.6, 2012.

[7] Kavita Hooda, “ATM Security”, International Journal of Scientific and Research Publications, Volume 6, Issue 4, April 2016.

Downloads

Published

2019-09-30
CITATION
DOI: 10.26438/ijcse/v7i9.152157
Published: 2019-09-30

How to Cite

[1]
A. Nath, S. Saha, S. Gupta, and N. Das, “Enhancing Security of ATM Transactions via Debit Cards”, Int. J. Comp. Sci. Eng., vol. 7, no. 9, pp. 152–157, Sep. 2019.

Issue

Section

Research Article