skip to main content
10.1145/3396730.3396735acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceccConference Proceedingsconference-collections
research-article

Enhanced Authentication Mechanism for Automated Teller Machine (ATM) through Implementation of Soft Two-Factor Authentication

Authors Info & Claims
Published:29 May 2020Publication History

ABSTRACT

The demand of Automated Teller Machine (ATM) is exponentially increase from 2003 to 2018 which makes the ATM as important component in modern banking. The easiness and flexibility to have a transaction at any time without the need to stand in a long queue and dealing with administration make ATM is preferable by a lot of bank customers. However, it is also a big attraction point for criminals and fraudsters. Skimming is one of the threat of ATM service which will allow fraudster to create a clone card through duplication and combination of eavesdropping techniques such as shoulder surfing or installation of miniature video camera, utilization of counterfeit hardware proximity, etc. Therefore, an enhanced method of authentication shall be implemented to maintain the security of ATM service. In this work, we are proposing a new mechanism of ATM authentication which will enhance its security through the use of Soft Two-Factor Authenticator. The analysis of our proposed mechanism is done using NIST SP800-63B to ensure its security against possible techniques for skimming. Henceforth, it provides an additional security against skimming.

References

  1. Salem S.M.K., and Kamarudin S., "The Formal Design Model of an Automatic Teller Machine (ATM)". Lecture Notes on Information Theory Vol. 1, No. 1, March 2013.Google ScholarGoogle Scholar
  2. Yingxu W., Yanan Z., Philip C.Y.S., Xuhui L., Hong G., "The Formal Design Model of an Automatic Teller Machine (ATM)". International Journal of Software Science and Computational Intelligence, 2(1), 102-131, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Robat, "ATM" Thocp. Online URL: http://www.thocp.net/hardware/atm.htm Accessed on January 14th, 2020.Google ScholarGoogle Scholar
  4. International Monetary Fund, "Automated Telelr Machines (ATMs) (per 100,000 adults)" The World Bank. Online URL: https://data.worldbank.org/indicator/FB.ATM.TOTL.P5?end=2018&start=2010&view=chart Accessed on Januay 14, 2020.Google ScholarGoogle Scholar
  5. Aijaz A. S. and Syed M.M.S, "Auto Tller Machine (ATM) Fraud - case Study of a Commercial Bank in Pakistan" International Journal of Business and management, Vol. &, No. 22, 2012.Google ScholarGoogle Scholar
  6. Krishna V., "ATM Industry Trends" Infosys White Paper. Bangaluru: Infosys, 2019.Google ScholarGoogle Scholar
  7. Shweta S. and Shirendra P., "A Safeguard Against ATM Fraud" 2016 IEEE 6th International Conference on Advanced Computing, 2016.Google ScholarGoogle Scholar
  8. UK Finance, "The definitive overview of payment industry fraud" Fraud The Facts 2019. Online URL: https://www.ukfinance.org.uk/system/files/Fraud%20The%20Facts%202019%20-%20FINAL%20ONLINE.pdf Accessed on January 14th, 2020.Google ScholarGoogle Scholar
  9. Tina O., "ATM Attacks & Fraud Up, Survey Reports" Credit Union Times. Online Url: https://www.cutimes.com/2019/09/09/atm-attacks-fraud-up-survey-reports/?slreturn=20200013221331 Accessed on January 14th, 2020.Google ScholarGoogle Scholar
  10. G. R. Jebaline and S. Gomathi, "A Novel method to Enhance the Security of ATM using Biometrics" 2015 International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2015.Google ScholarGoogle Scholar
  11. Shubhra J., 'ATM Frauds - Detection & Prevention" Internation Journal of Advances in Electronic and Computer Sciences, 2017.Google ScholarGoogle Scholar
  12. ABC13, "Pasadena police find skimming devices at ATMs, fuel pumps". Online URL: https://abc13.com/1408701/ Accessed on January 14th, 2020.Google ScholarGoogle Scholar
  13. US Army Cyber Command, "Should Surfing" Cybersecurity Fact Sheet. Online URL: https://www.arcyber.army.mil/Info/Fact-Sheets/Fact-Sheet-View-Page/Article/1440819/cybersecurity-fact-sheet-shoulder-surfing/ Accessed on January 19th, 2020.Google ScholarGoogle Scholar
  14. Hayley R., "Stole In The Wall: What should you look out for at an ATM and how can you tell if one has been tampered with" The Sun. Online URL: https://www.thesun.co.uk/money/3875481/atm-scams-money-criminal-tamper-card-machine-steal/ Accessed on January 14th, 2020.Google ScholarGoogle Scholar
  15. CAPEC, "Eavesdropping" Common Attack Pattern Enumeration and Classification. Online URL: https://capec.mitre.org/data/definitions/651.html Accessed on January 19th, 2020.Google ScholarGoogle Scholar
  16. CAPEC, "Interception" Common Attack Pattern Enumeration and Classification. Online URL: https://capec.mitre.org/data/definitions/117.html Accessed on January 19th, 2020.Google ScholarGoogle Scholar
  17. Elaine B. and John K., "Recommendation for Random Number Generation Using Deterministic Random Bit Generators" NIST Special Publication 800-90A. Computer Security Division, Information Technology Laboratory, 2015.Google ScholarGoogle Scholar
  18. J. Schiller and S. Crocker, "Randomness Requirements for Security" Request for Comments 4086. Online URL: https://tools.ietf.org/html/rfc4086#section-7.2.1 Accessed on January 19th, 2020.Google ScholarGoogle Scholar
  19. Paul A.G., Michael E.G., and James L. F., "Digital Identity Guidelines" NIST Special Publication 800-63-3, 2017.Google ScholarGoogle Scholar
  20. Paul A.G. et al.,"Digital Identity Guidelines: Enrollment and Identity Proofing" NIST Special Publication 800-63A, 2017.Google ScholarGoogle Scholar

Index Terms

  1. Enhanced Authentication Mechanism for Automated Teller Machine (ATM) through Implementation of Soft Two-Factor Authentication

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICECC '20: Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering
      April 2020
      73 pages
      ISBN:9781450374996
      DOI:10.1145/3396730

      Copyright © 2020 ACM

      Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 May 2020

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader