skip to main content
10.1145/3396730.3396735acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceccConference Proceedingsconference-collections
research-article

Enhanced Authentication Mechanism for Automated Teller Machine (ATM) through Implementation of Soft Two-Factor Authentication

Published: 29 May 2020 Publication History

Abstract

The demand of Automated Teller Machine (ATM) is exponentially increase from 2003 to 2018 which makes the ATM as important component in modern banking. The easiness and flexibility to have a transaction at any time without the need to stand in a long queue and dealing with administration make ATM is preferable by a lot of bank customers. However, it is also a big attraction point for criminals and fraudsters. Skimming is one of the threat of ATM service which will allow fraudster to create a clone card through duplication and combination of eavesdropping techniques such as shoulder surfing or installation of miniature video camera, utilization of counterfeit hardware proximity, etc. Therefore, an enhanced method of authentication shall be implemented to maintain the security of ATM service. In this work, we are proposing a new mechanism of ATM authentication which will enhance its security through the use of Soft Two-Factor Authenticator. The analysis of our proposed mechanism is done using NIST SP800-63B to ensure its security against possible techniques for skimming. Henceforth, it provides an additional security against skimming.

References

[1]
Salem S.M.K., and Kamarudin S., "The Formal Design Model of an Automatic Teller Machine (ATM)". Lecture Notes on Information Theory Vol. 1, No. 1, March 2013.
[2]
Yingxu W., Yanan Z., Philip C.Y.S., Xuhui L., Hong G., "The Formal Design Model of an Automatic Teller Machine (ATM)". International Journal of Software Science and Computational Intelligence, 2(1), 102-131, 2010.
[3]
C. Robat, "ATM" Thocp. Online URL: http://www.thocp.net/hardware/atm.htm Accessed on January 14th, 2020.
[4]
International Monetary Fund, "Automated Telelr Machines (ATMs) (per 100,000 adults)" The World Bank. Online URL: https://data.worldbank.org/indicator/FB.ATM.TOTL.P5?end=2018&start=2010&view=chart Accessed on Januay 14, 2020.
[5]
Aijaz A. S. and Syed M.M.S, "Auto Tller Machine (ATM) Fraud - case Study of a Commercial Bank in Pakistan" International Journal of Business and management, Vol. &, No. 22, 2012.
[6]
Krishna V., "ATM Industry Trends" Infosys White Paper. Bangaluru: Infosys, 2019.
[7]
Shweta S. and Shirendra P., "A Safeguard Against ATM Fraud" 2016 IEEE 6th International Conference on Advanced Computing, 2016.
[8]
UK Finance, "The definitive overview of payment industry fraud" Fraud The Facts 2019. Online URL: https://www.ukfinance.org.uk/system/files/Fraud%20The%20Facts%202019%20-%20FINAL%20ONLINE.pdf Accessed on January 14th, 2020.
[9]
Tina O., "ATM Attacks & Fraud Up, Survey Reports" Credit Union Times. Online Url: https://www.cutimes.com/2019/09/09/atm-attacks-fraud-up-survey-reports/?slreturn=20200013221331 Accessed on January 14th, 2020.
[10]
G. R. Jebaline and S. Gomathi, "A Novel method to Enhance the Security of ATM using Biometrics" 2015 International Conference on Circuit, Power and Computing Technologies (ICCPCT), 2015.
[11]
Shubhra J., 'ATM Frauds - Detection & Prevention" Internation Journal of Advances in Electronic and Computer Sciences, 2017.
[12]
ABC13, "Pasadena police find skimming devices at ATMs, fuel pumps". Online URL: https://abc13.com/1408701/ Accessed on January 14th, 2020.
[13]
US Army Cyber Command, "Should Surfing" Cybersecurity Fact Sheet. Online URL: https://www.arcyber.army.mil/Info/Fact-Sheets/Fact-Sheet-View-Page/Article/1440819/cybersecurity-fact-sheet-shoulder-surfing/ Accessed on January 19th, 2020.
[14]
Hayley R., "Stole In The Wall: What should you look out for at an ATM and how can you tell if one has been tampered with" The Sun. Online URL: https://www.thesun.co.uk/money/3875481/atm-scams-money-criminal-tamper-card-machine-steal/ Accessed on January 14th, 2020.
[15]
CAPEC, "Eavesdropping" Common Attack Pattern Enumeration and Classification. Online URL: https://capec.mitre.org/data/definitions/651.html Accessed on January 19th, 2020.
[16]
CAPEC, "Interception" Common Attack Pattern Enumeration and Classification. Online URL: https://capec.mitre.org/data/definitions/117.html Accessed on January 19th, 2020.
[17]
Elaine B. and John K., "Recommendation for Random Number Generation Using Deterministic Random Bit Generators" NIST Special Publication 800-90A. Computer Security Division, Information Technology Laboratory, 2015.
[18]
J. Schiller and S. Crocker, "Randomness Requirements for Security" Request for Comments 4086. Online URL: https://tools.ietf.org/html/rfc4086#section-7.2.1 Accessed on January 19th, 2020.
[19]
Paul A.G., Michael E.G., and James L. F., "Digital Identity Guidelines" NIST Special Publication 800-63-3, 2017.
[20]
Paul A.G. et al.,"Digital Identity Guidelines: Enrollment and Identity Proofing" NIST Special Publication 800-63A, 2017.

Cited By

View all
  • (2024)Development of a matrix-style pressure sensing pin-pad module with tactile feedbackSensors and Actuators A: Physical10.1016/j.sna.2024.115572376(115572)Online publication date: Oct-2024
  • (2023)Two Factor Authentication using Hardware and Biometrics Factors for IoT Devices and Users2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)10.1109/ICDCECE57866.2023.10151368(1-7)Online publication date: 29-Apr-2023
  • (2023)Pressure Tactile Feedback Pin Pad Module Application: Reduce Shoulder Surfing Success RateHCI International 2023 Posters10.1007/978-3-031-35989-7_27(216-223)Online publication date: 9-Jul-2023

Index Terms

  1. Enhanced Authentication Mechanism for Automated Teller Machine (ATM) through Implementation of Soft Two-Factor Authentication

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICECC '20: Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering
    April 2020
    73 pages
    ISBN:9781450374996
    DOI:10.1145/3396730
    Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 May 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ATM
    2. Skimming
    3. authentication
    4. frauds

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICECC 2020

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)18
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Development of a matrix-style pressure sensing pin-pad module with tactile feedbackSensors and Actuators A: Physical10.1016/j.sna.2024.115572376(115572)Online publication date: Oct-2024
    • (2023)Two Factor Authentication using Hardware and Biometrics Factors for IoT Devices and Users2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)10.1109/ICDCECE57866.2023.10151368(1-7)Online publication date: 29-Apr-2023
    • (2023)Pressure Tactile Feedback Pin Pad Module Application: Reduce Shoulder Surfing Success RateHCI International 2023 Posters10.1007/978-3-031-35989-7_27(216-223)Online publication date: 9-Jul-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media