Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
43 views7 pages

A Design of Atm Monitoring and Security System Based

The document presents a design for an ATM monitoring and security system utilizing IoT and various sensors, including vibration and image sensors, to enhance ATM security. The system employs an ARM controller to process real-time data, detect unauthorized access, and alert users while also implementing measures to deter theft. The proposed solution aims to improve the reliability and security of ATMs, making them more resilient against cybercriminals and enhancing user convenience.

Uploaded by

hod.mec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views7 pages

A Design of Atm Monitoring and Security System Based

The document presents a design for an ATM monitoring and security system utilizing IoT and various sensors, including vibration and image sensors, to enhance ATM security. The system employs an ARM controller to process real-time data, detect unauthorized access, and alert users while also implementing measures to deter theft. The proposed solution aims to improve the reliability and security of ATMs, making them more resilient against cybercriminals and enhancing user convenience.

Uploaded by

hod.mec
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Journal of Nonlinear Analysis and Optimization

Vol. 10, No. 1 : 2019


ISSN : 1906-9685

A DESIGN OF ATM MONITORING AND SECURITY SYSTEM BASED


ON SENSORS USING IOT
E. GNANESWARI, ASSISTANT PROFESSOR, [email protected]

C. MURALI MOHAN, ASSISTANT PROFESSOR, [email protected]

R. VASIM AKRAM, ASSISTANT PROFESSOR, [email protected]

Department of ECE, Sri Venkateswara Institute of Technology, N.H 44, Hampapuram, Rapthadu,
Anantapuramu, Andhra Pradesh 515722

ABSTRACT: The ubiquitous Automated Teller Machines allowing the detection and remote control of devices
(ATMs) provide a wide range of monetary transactions,
both for individuals and businesses. In this project, sensors
via preexisting network infrastructure. This, in turn,
connected to the Internet of Things (IoT) were used to leads to
maintain ATMs. In this study, vibration and image sensors
are used. To handle the data acquired in real-time from
various sensors, this system employs an embedded system heightened effectiveness, precision, and financial
based on the ARM controller. This system uses image gain. To begin with, "things," or ATMs, were
recognition to match the collected photographs with the
unveiled in 1939. These days, almost three million
user database stored in the cloud in the event that an
unauthorised individual gains access to the user account, devices are installed all over the globe. Hackers,
whether intentionally or unintentionally. The user receives fraudsters, robbers, and security breaches are
the picture along with a message. In the event of a burglary,
the buzzer will emit a beep as soon as it detects vibration. becoming more common as the number of ATM units
DC The door of the ATM is closed using a motor. The grows. Traditional automated teller machines'
burglar is put into unconsciousness by releasing gas from primary function was to disburse banknotes and debit
within the ATM using a stepper motor. This allows the user
to keep tabs on the ATM's status (temperature, smoke, etc.) associated checking accounts [1].
and operate its loads (air conditioning, lights, doors, etc.)
from afar. Compared to all the other systems that are already
in use, this one is much simpler, more dependable, and has
better security.
However, due to their multipurpose nature and
KEY WORDS: Automated Teller Machine increasing complexity, ATMs have become a prime
(ATM), IOT, sensors, monitoring system, security. target for cybercriminals. Modern automated teller
machines are protected by stringent security
I. INTRODUCTION
protocols. In order to complete transactions, they
The "things" that make up the Internet of Things operate under complex systems and networks.
(IoT) are the physical items that have been Although ATMs utilise encryption to protect
equipped with electronics, software, sensors, and customer data, hackers may still access their accounts
network properties. This allows these devices to and steal money using covert devices. Another option
collect and share data. The Internet of Things is that inexperienced thieves would use violence to
(IoT) opens up new possibilities for direct intimidate bank customers into giving up their money
integration between the real and virtual worlds by or account information [3].

http://doi.org/10.36893/JNAO.2019.V10N01.045-051
46 JNAO Vol. 10, No. 1: 2019
deadline due to a lack of accountability, as well as
Among the many sensors used by this system are inadequate resources. Consequently, our research
an accelerometer, a pressure-sensitive resistor, suggests that when GSM technology is integrated
and a passive infrared sensor. This system started with other components mentioned before and
with the well-known ATMEGA328 implemented in ATMs, an enhanced security system
microcontroller. It continuously detects and may be built up. our system can execute a speedy
displays changes in the temperature, pressure, and response in real-time, even if a theft occurs [6].
orientation of the ATM device. The concept
involves use buzzers to notify the location of a The purpose of ATMs, or automated teller machines,
bank and a police station. A camera captures is to make it simpler for people to withdraw money
images via from their accounts. Nowadays, a large percentage of
the videos that play indefinitely. In this case, a DC bank transactions take place via ATM terminals,
motor closes the ATM door, while a stepper which greatly strengthens the infrastructure's
motor emits gas to put the thief to sleep. resilience. Several obstacles, such as an increase in
server load and security concerns, prevented the study
into providing a variety of non-financial services via
II. LITERATURE SURVEY
ATMs from ever seeing the light of day [7]. Articles,
With the beginning of operation of the shared CD journals, books, and antecedent works from the
network, which is regulated by the Korea aforementioned subjects make up the bulk of the
Financial Telecommunications & Clearings literatures. As before, these literatures are compiled
Institute, civilians were able to use the ATMs of for the purpose of providing guidance on how to carry
different banks following the 1975 installation of out this project. Today, with the ever-increasing
the first ATM by the Korea Exchange Bank and prevalence of automation and computerization, free
the 1982 installation by Shinhan Bank. With a systems are wildly popular. The proliferation of
sharp uptick in the first half of the 2000s and a automated teller machines (ATMs) has made online
more moderate uptick thereafter, the number of banking and related activities more accessible, but at
ATMs installed has been steadily rising over the the same time, criminality targeting online financial
last several years. The use of external ATMs in institutions has increased during the last twelve years.
particular has been steadily on the rise. It has been determined via analysis that the crimes are
related. This task addresses the prevention of ATM
In most cases, you may find the outside ATM theft and misuse by conducting a real-time audit of the
machine at the kiosk booth's door or on a nearby ATM equipment.
wall. The external ATM security system
safeguards the first stage using the machined's The method that has been developed to provide clients
built-in signal light, while open and impact with instantaneous cash is known as an automated
detecting sensors cover the others [4]. The ATM teller machine. Current automated teller machines
is safeguarded by the impact detecting sensor, usually include instructions for interactive operations
which promptly transmits a signal to the security printed out on the screen. Once the user has read the
centre. In the event of an emergency signal and instructions, they may use the keypad to operate the
subsequent dispatch, the control centre has a ATM. To use an ATM, customers must insert the card
policy stating that the agent must be at the scene that their bank has issued them. The presence of a
of the crime within twenty-five minutes. Personal Identification Number (PIN) alongside each
However, in practice, agents often fail to meet this ATM card number enables an authentication method.
http://doi.org/10.36893/JNAO.2019.V10N01.045-051
47 JNAO Vol. 10, No. 1: 2019

After the customer's verification is finished, they include a microcontroller with a high-speed flash
are given the option to choose between two types memory ranging from 32 kb to 512 kb, and then
of transactions: quick cash withdrawal and follow the instructions. The most extreme clock rate
balance inquiry. These financial dealings now for 32-bit code execution is made possible by a unique
take place on the servers of the bank's private fastening agent construction architecture and a 128-
network. Users would be able to access a plethora bit wide memory interface. With the 16-bit Thumb
of additional financial services via the expansion mode, programmes that need to discriminate code size
of ATM terminals, allowing for instantaneous may reduce code by over
cash withdrawals. Because of this, the
accessibility and efficiency of the world's thirty percent with a very low penalty for death. The
Automated Teller Machines are both enhanced. LPC2148 is an excellent choice for access control and
All of a sudden, the system's performance is rock purpose of offer applications because to its small size
solid. A security concern lies at the heart of the and low power consumption, which are critical
matter. requirements for scaling down.These devices are
perfect for low-end imaging, voice distinguish, and
communication gateways and convention converters
III. PROPOSED SYSTEM thanks to their on-chip SRAM ranging from 8
Functional Block diagram of the proposed kilobytes to 40 kilobytes, as well as their serial
system is shown in figure (1) in which the interchanges interfaces, which run from a USB 2.0
ARM7 (LPC2129) is interfaced with image full-speed device, various UARTS, SPI, SSP to I2c-
sensor, vibration sensor and smoke sensor transport, and extensive cradle size. These
along with GSM Modem, DC Motor, microcontrollers are well-suited for use in mechanical
Stepper Motor and buzzer. control and restoration frameworks because to their
Power Supply 32-bit clocks, 10-bit analog-to-digital converters
(ADCs), PWM channels, 45 fast GPIO lines, and nine
Vibration
Sensor Stepper edge-or level-sensitive external invasive pins.
Motor

Image 3.2 Vibration Sensor


Sensor DC
Motor
ARM An electromechanical transducer is protected by this
Server
sensor. The transducer produces voltages when it is
Database Buzzer
bent, which causes strain in the piezoelectric element

GSM
and shifts it away from the mechanical neutral axis.
Crystal
Oscillator Assembled and held "in free space" by its mounting
Fig. 1: FUNCTIONAL BLOCK DIAGRAM OF points, the gadget may be used as a vibration sensor.
PROPOSED SYSTEM
Please do not bend the sensing element in any way; it
3.1 ARM
is not meant to be used as a flexible switch. At 0 g
A 16-bit or 32-bit ARM7TDMI-S CPU with
acceleration, the sensor value is 500. When you
constant imitating and inserted logic is at the heart
of the LPC2148 microcontrollers. accelerate, the sensing
http://doi.org/10.36893/JNAO.2019.V10N01.045-051
48 JNAO Vol. 10, No. 1: 2019
order, the shaft or spindle revolves in discrete step
component, resulting in a yawing of the Sensor increments. The order in which the

Value. Use this sensor to detect acceleration


The direction of rotation of the motor shaft is directly
impulses or vibration, not for exact acceleration correlated with the applied pulses. The length of
and vibration measurements. A piezoelectric rotation is proportional to the number of input pulses
supplied, and the speed of rotation is proportional to
transducer, a vibrating sensor, will be used in the
the frequency of the input pulses. In order to put the
system to detect vibrations emanating from burglar to sleep, we will use this stepper motor to
ATMs in the event of a theft. release gas into the ATM.

3.3 Image Sensor 3.6 DC Motors


A sensor that can detect and transmit the data that Using DC motors, we are closing the ATM door. It
makes up an image is called an image sensor or runs on a 12VDC power source. Basic
imaging sensor. To do this, it takes use of the fact electromagnetism is the basis of any electric motor's
that light waves undergo varied attenuation as functioning. Depending on the presence and intensity
they travel through and reflect off of things, and of an external magnetic field, a conductor carrying
then turns that information into signals, which are current may produce its own magnetic field. Here we
really brief bursts of current. Light or other forms have installed a DC motor to close the ATM door in
of electromagnetic energy may manifest as the event that the machine is smashed by thieves.
waves. Digital cameras, camera modules, medical
imaging equipment, night vision devices 3.7 GSM
(including thermal imaging), and other analogue Global System for Mobile Communications
and digital electronic imaging tools all make use (GSM) modems are specialized types of
of image sensors. One kind of digital sensor is the modems that operate over subscription based
flat panel detector. With this setup, the web wireless networks, similar to a mobile phone.
A GSM modem accepts a Subscriber Identity
camera doubles as an image sensor.
Module (SIM) card, and basically acts like a
mobile phone for a computer.Such a modem
3.4 Buzzer can even be a dedicated mobile phone that the
computer uses for GSM network capabilities.
Mechanical, electromechanical, or piezoelectric
buzzers or beepers are all examples of auditory 3.8 Working
signalling devices. Alarm clocks and timers are
common applications for buzzers and beepers. An The system's sensors are constantly being monitored
electromechanical mechanism similar to an
in order to identify any intrusion attempt. Alerting the
electric bell but without the metal foundation was
the basis of early gadgets. controller that the safety measures are due since the
sensors have been activated. The controller then
3.5 Stepper Motor instructs the driver to trigger the alarm system, which
will deter the would-be intruder by sounding a buzzer.
To accomplish discrete mechanical motions, an The burglar is trapped inside the ATM when the
electromechanical device known as a stepper controller triggers the motor to shut the doors. All of
motor is used. When electrical command pulses the data entered is processed by the ARM
are supplied to a stepper motor in the correct
http://doi.org/10.36893/JNAO.2019.V10N01.045-051
49 JNAO Vol. 10, No. 1: 2019
microcontroller.

processes the incoming data and then turns on the


appropriate output devices. With the aid of IoT,
all the values are sent to the homepage.

Also prevented in this publication from being


used by unauthorised individuals without our
knowledge. After detecting a picture, the image
sensor compares it to the original, stored in a
Fig 3: MESSAGE RECEIVED BY THE
database on the server. In order to initiate this ACCOUNT USER
session, the user must recognise the third party as
a known person. The user may skip the steps of IV. CONCLUSION
entering the PIN for withdrawal and go straight to In order for the ATM to handle all of the upcoming
the user choice if he is the one who has arrived to transactions, its infrastructure has to be very strong.
withdraw. If the user in question is an Because an assault may bring down all of the
unauthorised third party, their picture will be
taken using the webcam. The next step is to check transactions, it has to be resilient. The suggested
the picture against the user's database. After that, system verifies the encryption of the transactions. By
the user's account is notified and the picture is sent supplying the session key, which enhances
by email. After the user confirms that the sender
encryption, this boosts security. Several difficulties
is someone they know, a window will popup
allowing them to input their PIN and withdraw the are addressed by the system's robustness, security, and
funds. ease of implementation. The end customers will find

RESULTS it more convenient and easy to utilise. Making the


existing infrastructure more useful and easy for end
The complete hardware development of
proposed ATM monitoring and security users is the goal of the suggested solution.
system is shown in Figure (2). Figure (3)
shows the output of using the trusted third
party application and the message received
by the account user in case of an
unauthorized access.

http://doi.org/10.36893/JNAO.2019.V10N01.045-051
50 JNAO Vol. 10, No. 1: 2019
V. REFERENCES
[1] Şeyma Batı and Didem Gözüpek, “Joint
Optimization of Cash Management and
Routing for New-Generation Automated
Teller Machine Networks”, IEEE
Transactions on Systems, Man, and
Cybernetics: Systems, Volume: 49, Issue:
12, Dec. 2019.
[2] Yanwei Lou, Wenqian Shang, Ligu Zhu,
Di Zhang and Dongyu Feng, "Visualization
Research And Implementation Based on
Fig 2: EXPERIMENTAL KIT OF ATM Alarm Data", IEEE/ACIS 15th
PROPOSEDSYSTEM International Conference on Computer and
Information Science (ICIS), 2016.
[3] M Nelligani Bharathi, N.V Uma Reddy and
Nithin Aswathi, "Smart ATM security system
using GPSFPRGSM", International conference
on inventive Computing technologies, vol. 3, pp.
1-5, 2016.
[4] Sambarta Ray, Sovik Das and Anindya Sen,
"An intelligent vision system for monitoring
security and surveillance of ATM", Annual IEEE
India conference [INDICON], 2015.
[5] K. Malladi and S. Sridharan, "Online
Franchise Capturing using IPv6 through
Automated Teller Machines," in the Proceedings
of International Conference on Recent Trends in
Information Technology (iCRTlT), IEEE,2013,
pp. 562 – 568.
[6] P.K. Amurthy and M.S. Redddy,
“Implementation of ATM Security by Using
Fingerprint recognition and GSM”,International
Journal of Electronics Communication and
Computer Engineering vol.3, no. 1, pp. 83-86,
2012
[7] M. Becher, F.C. Freiling, J. Hoffmann,
T. Holz, S. Uellenbeck and C. Wolf, "Mobile
security catching up Revealing the nuts and bolts
of the security of mobile devices", In: 2011 IEEE
Symp. on Security and Privacy (SP), pp. 96-111,
2011.
[8] K John peter, G. Geemini, Shaya Glory,
S. Arumugam, G. Nagarajan, Sanjana Devi v, et
al., "Improving ATM security via face
recognition", 3rd International conference on
electronics computing technology, 2011.
[9] T. Kohno, A. Stubblefield, A. D. Rubin, and
D. S. Wallach, "Analysis of an electronic voting
system," in Security and Privacy, 2004 IEEE
http://doi.org/10.36893/JNAO.2019.V10N01.045-051
51 JNAO Vol. 10, No. 1: 2019
Symposium
[10] Che-Yen cyst, Shih-Hsuan Chiu, Jiun-
Jian Liaw, ChuawPin Lu, “The safety helmet
detection for ATM’s closed-circuittelevision
via the changed Hough rework,”
International Carnahan Conference Security
Technology, Proceedings IEEE thirty-
seventh Annual 2003, pp. 364 – 369, 2003

http://doi.org/10.36893/JNAO.2019.V10N01.045-051

You might also like