CFP last date
22 April 2024
Reseach Article

An Enhanced ATM Security System using Second-Level Authentication

by Muhammad-bello B.l, Alhassan M.e, Ganiyu, S.o
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 111 - Number 5
Year of Publication: 2015
Authors: Muhammad-bello B.l, Alhassan M.e, Ganiyu, S.o
10.5120/19533-1181

Muhammad-bello B.l, Alhassan M.e, Ganiyu, S.o . An Enhanced ATM Security System using Second-Level Authentication. International Journal of Computer Applications. 111, 5 ( February 2015), 8-15. DOI=10.5120/19533-1181

@article{ 10.5120/19533-1181,
author = { Muhammad-bello B.l, Alhassan M.e, Ganiyu, S.o },
title = { An Enhanced ATM Security System using Second-Level Authentication },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 111 },
number = { 5 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume111/number5/19533-1181/ },
doi = { 10.5120/19533-1181 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:48:12.453469+05:30
%A Muhammad-bello B.l
%A Alhassan M.e
%A Ganiyu
%A S.o
%T An Enhanced ATM Security System using Second-Level Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 111
%N 5
%P 8-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increase of automated teller machine (ATM) frauds has actuated the development of new authentication mechanisms that can overcome the security problems associated with the personal identification numbers (PIN). The traditional PIN entry system has stood the test of time mainly because of its speed and memorability which are part of the metrics used to access the ATM authentication system. The third metric, which is security has often been compromised thence the need for a more secured authentication system for ATM operations. This paper therefore proposes an enhanced ATM security system using second level authentication process. The method adopted for this research is to develop an enhancement of the existing system by building an additional security mechanism on the existing system's security mechanism. The proposed system was found to be realistic and cost effective when compared to other proposed authentication mechanism for ATM transactions.

References
  1. Jimoh, R. G. and Babatunde, A. N. (2014). Enhanced Automated Teller Machine using Short Message Service authentication verification. World Academy of Science, Engineering and Technology. International Journal of Computer, Information Science and Engineering 2014. Vol:8 No:1 pp. 14-17
  2. Adepoju, A. S & Alhassan, M. E. (2010). Challenges of automated Teller Machine (ATM) usage and fraud occurrences in Nigeria – A case study of selected banks in Minna metropolis. Journal of Internet Banking and Commerce. Vol 15, No. 2. pp. 1-10. [Online]. Available: http://www. arraydev. com/commerce/JIBC/2010-08/Solomon. pdf
  3. Siddique, M. I & Rehman, S. (2011). Impact of Electronic crime in Indian banking sector – An Overview Int. International Journal of Business & Information Technology. Vol-1 No. 2 September 2011 pp. 159-164
  4. Leow, H. B. (1999). New Distribution Channels in banking Services. Banker's Journal Malaysia, No. 110, June 1999, pp. 48-56.
  5. Aliyu, A. A. & Tasmin, R. B. (2012) Information and Communication Technology in Nigerian Banks: Analysis of Services and Consumer Reactions. In proceedings of 3rd International Conference in Business and Economic Research ( 3rd ICBER 2012 ) MARCH 2012. pp. 150-164
  6. Shoewu, O. and Edeko, F. O. (2011). Outgoing call quality evaluation of GSM network services in Epe, Lagos State. American journal of scientific and industrial research. Vol 2 No. 3. pp. 409-417
  7. Rosenblatt, S. (2013). Two-factor authentication: What you need to know. Retrieved from: http://www. cnet. com/news/two-factor-authentication-what-you-need-to-know-faq/ Last updated on April 14, 2014. Accessed on November 23, 2014.
  8. De Luca, A. , Langheinrich, M. & Hussmann, H. (2010). Towards Understanding ATM Security – A Field Study of Real World ATM Use. Retrieved from: https://cups. cs. cmu. edu/soups/2010/proceedings/a16_deluca. pdfAccessed on November 26, 2014.
  9. Kyle, C. (2004). Biometrics: An In Depth Examination. SANS Institute Information Security Reading Room. SANS Institute 2004. Retrieved from: http://www. sans. org/reading-room/whitepapers/authentication/biometrics-in-depth-examination-1329. Accessed on November 26, 2014.
  10. Liu, N. Y. (2013). Bio Privacy: Privacy Regulations and the Challenge of Biometrics. Taylor & Francis 2013.
  11. Oko, S. and Oruh, J. (2012): Enhanced ATM security system using biometrics. IJCSI International Journal of Computer Science Issues, September 2012. Vol. 9, Issue 5, No 3, pp. 352-357.
  12. Ravikumar, S. , Vaidyanathan, S. , Thamotharan, S. & Ramakrishan, S. (2013), A new business model for ATM transaction security using fingerprint recognition. International Journal of Engineering and Technology (IJET). Jun-Jul 2013 Vol 5 No 3 pp. 2041-2047
  13. Padmapriya, V. & Prakasam, S. (2013), Enhancing ATM security using fingerprint and GSM technology. International Journal of Computer Applications October 2013 Vol. 80 No. 16 pp. 43-46.
  14. Das, S. S. & Debbarma, S. J. (2011), Designing a biometric strategy (fingerprint) measure for enhancing ATM security in Indian e-banking system. International Journal of Information and Communication Technology Research. September 2011, Vol 1, no 5 pp. 197-203.
  15. Santhi, B. & Ram Kumar, K. (2012), Novel hybrid technology in ATM security using biometrics. Journal of Theoretical and Applied Information Technology. March 2012. Vol. 37 No. 2 pp. 217-223.
  16. Prithika, M. & Rajalakshmi, P. (2013), Card duplication and crime prevention using biometrics. IOSR Journal of Computer Engineering (IOSR-JCE) Mar. - Apr. 2013, Vol10, No 1 pp. 1-7.
  17. Okereke, E. Ihekweaba, G. & Okpara, F. K. (2013), Facial verification technology for use in ATM transactions. American Journal of Engineering Research (AJER) Vol. 02 No. 5. pp. 188-193.
  18. Ibidapo, O. A. , Omogbadegun, Z. O, & Oyelami, O. M. (2010). Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E-Banking System. International Journal of Electrical & Computer Sciences IJECS-IJENS Vol:10 No:06. pp. 63-68
  19. Selvaraju, N. & Sekar, G. (2010), A method to improve the security level of ATM banking systems using AES algorithm, International Journal of Computer Applications. June 2010 Vol 3 No. 6
  20. Muhammad-Bello, B. L. , Ganiyu S. O, Alhassan M. E. (2014). A New Model for Enhancing ATM Security in Nigeria Using Second Level Authentication. International Journal of Science and Advanced Technology. Vol. 04, No 09, September, 2014. pp. 12-16
Index Terms

Computer Science
Information Sciences

Keywords

Authentication ATM Security Second-Level Authentication ATM.