Вы находитесь на странице: 1из 29

\documentclass[12pt, a4paper]{article}

\usepackage{lscape}

\usepackage[utf8]{inputenc}

\usepackage{hyperref}

\usepackage{amsmath}

\usepackage{color}

\usepackage{amsfonts}

\usepackage{amssymb}

\usepackage{graphicx}

\usepackage{fancyhdr}

\usepackage{pdfpages}

\usepackage{pgf}

\usepackage{pgfpages}

%\usepackage{garamond}

%\usepackage[font=footnotesize,labelfont=bf,format=hang,justification=raggedright]{caption}

\usepackage{enumitem}

\usepackage{dotseqn}

\usepackage{chngcntr}

%\pagestyle{scrplain}\documentclass[12pt,a4paper]{article}

\counterwithin{figure}{section}

\counterwithin{table}{section}

\renewcommand{\baselinestretch}{1.2}
\setlength{\textheight}{9.2in}

\setlength{\textwidth}{6.1in}

\addtolength{\leftmargin}{-.3in}

\topmargin -.2in

\linespread{1.5}

\pgfpagesdeclarelayout{boxed}

\edef\pgfpageoptionborder{0pt}

\pgfpagesphysicalpageoptions

{%

logical pages=1,%

\pgfpageslogicalpageoptions{1}

border code=\pgfsetlinewidth{2pt}\pgfstroke,%

border shrink=\pgfpageoptionborder,%

resized width=.95\pgfphysicalwidth,%

resized height=.95\pgfphysicalheight,%

center=\pgfpoint{.5\pgfphysicalwidth}{.5\pgfphysicalheight}%

}%
}

\pgfpagesuselayout{boxed}

\begin{document}

\begin{titlepage}

\pagestyle{fancy}

\fancypage{%

\setlength{\fboxsep}{0pt}%

\setlength{\shadowsize}{0pt}%

\shadowbox}{}

\linespread{1}

\begin{center}

\begin{center} \includegraphics[scale=1.3]{nmietlogo} \end{center}

\begin{center}\textbf{{ SEMINAR REPORT\\ On}}\end{center}

\begin{center}\textbf{{ "Centralized Server Based ATM Security System with Statistical


Vulnerability Prediction Capability "}}\end{center}

\begin{center}\textbf{{ T.E. Computer}}\end{center}

\vspace{.1in}

\begin{center}\text{{ Submitted To Savitribai Phule Pune University}}\end{center}

\begin{center}\text{{In Partial Fulfillment Of The Requirements}}\end{center}

\begin{center}\text{{For The Award OF The Degree}}\end{center}

\begin{center}\text{{In}}\end{center}
\begin{center}\text{{COMPUTER ENGINEERING}}\end{center}

\vspace{.1in}

\begin{center}\text {{ Submitted By}}\end{center}

\begin{center}\textbf {{Ajinkya Mankar }}\end{center}

\begin{center}\textbf{{Seat No: T150554235 }}\end{center}

\vspace{.1in}

\begin{center}\text{{DEPARTMENT OF COMPUTER ENGINEERING}}\end{center}

\begin{center}\text{{ NUTAN MAHARASHTRA INSTITUTE OF ENGINEERING AND


TECHNOLOGY,}}\end{center}

\begin{center}\text{{PUNE-410507}}\end{center}

\begin{center}\text{{YEAR : 2017-2018}}\end{center}

\begin{center}\text{{SEMESTER - 6}}\end{center}

\newpage

%-------------------------Certificate----------------------------------

\begin{center}\textbf{Nutan Maharashtra Institute of Engineering Technology}\end{center}

\begin{center}\textbf{Talegaon Dabhade, Pune - 410507}\end{center}

\begin{center}\textbf{Department of Computer Engineering}\end{center}

\begin{center} \includegraphics[scale=1.3]{nmietlogo} \end{center}

\vspace{.1in}

\begin{center}\textbf{\Large{CERTIFICATE}}\end{center}

\end{center}

\vspace{-0.2cm}

\begin{center}\text{This is to certify that }\end{center}


\begin{center}\textbf{Ajinkya Mankar}\end{center}

\begin{center}\textbf{{Seat No: T150554235 }}\end{center}

\paragraph{is a bona-fide work carried out under the supervision of \textbf{Sulbha Ghadling} and It is
submitted towards the partial fulfillment of the requirement of Savitribai Phule Pune University, For the
award of the degree of Third Year Engineering (Computer Engineering) in academic year 2017-2018.\\ \\}

\\

\textbf{\footnotesize Prof. Sulbha Ghadling} \hspace{1.8in} \textbf{\footnotesize Prof. Gurpreet K. Bhatti}

\newline

{\footnotesize (Seminar Guide)} \hspace{3in} {\footnotesize(Seminar Coordinator)}

\newline

\newline

\textbf{\footnotesize Prof. Shyamsunder Ingle}\hspace{2.1in}

\textbf{\footnotesize Dr. Rajendra Kanphade}

\newline

{\footnotesize (Head of Department)}\hspace{3.0in}

{\footnotesize (Principal)}

\newline

\newline

Place:Pune \hspace{3.0in} Date:

\newline

\newpage

%-----------------------Acknowledgement-------------------------------

\begin{center}
\textbf{\Large{ACKNOWLEDGEMENT}}

\end{center}

\vspace{0.1in}

I remain immensely obliged to Prof. Gurpreet Kaur Bhatti, for providing me with the idea of this topic,
and for her valuable support in garnering resources for me either by way of information or computers
also her guidance and supervision which made this seminar happen. I would like to thank my college
Nutan Maharashtra Institute of Engineering and Technology Talegaon-Dabhade. Our source of
inspiration, Principal Dr. Rajendra Kanphade and the H. O. D. of Computer Engineering Prof.
Shyamsunder Ingle for their valuable support. I would like to say that it has indeed been a fulling
experience for working out this seminar topic. Last but not least I would like to express my heartfelt
thanks to my family members for their help and wishes for the successful completion of this seminar.

\vspace{1.0 in}

%\hspace{9cm}

\begin{flushright}

Ajinkya Mankar

\end{flushright}

\begin{flushright}

\hspace{10.5cm} Roll No.:TEC136

\newline

Batch: 2017-2018

\end{flushright}

\newpage

%--------------------------Abstract----------------------------------

%\paragraph{}
\section*{\begin{center} \textbf{\Large{ABSTRACT}} \end{center}}

%\begin{center} \textbf{\Large{ABSTRACT}} \end{center}

The aim of the proposed work is to develop a security system with a centralized private server for all the
ATMs in a city. Security related information is captured using a wide variety of sensors and switches and
this information is processed and sent to a central server for further analysis and data presentation.
Information from the sensors is sent continuously in real time to build a database. The system performs
statistical vulnerability analysis using the data received from various sensors from different ATMs and
assigns a vulnerability quotient to all the ATMs. Thus, helps to be a central system for identifying security
gaps in a particular ATM. This system seeks to be a proactive measure to prevent risks associated with
ATMs.

\newpage

\thispagestyle{empty}

\include{Title}

\thispagestyle{empty}

\include{certfct}

\thispagestyle{empty}

\pagenumbering{Roman}

\addcontentsline{toc}{section}{ACKNOWLEDGMENT}

\include{acc}

\newpage

\addcontentsline{toc}{section}{ABSTRACT}

\include{Abstract}

\newpage

\thispagestyle{empty}

\tableofcontents
\newpage

\thispagestyle{empty}

\thispagestyle{empty}

\pagestyle{fancy}

\fancyhead[RO]{\footnotesize{}}

\fancyhead[LO]{\footnotesize{Secured Association Rule Mining In Partitioned Database}}

\renewcommand{\footrulewidth}{0.5pt}

\fancyfoot[RO]{\footnotesize{Dept. of Comp. Engg., 2017-18}}

\fancyfoot[LO]{\footnotesize{NMIET, Talegaon Dabhade}}

\pagenumbering{arabic}

\include{intro}

\include{access}

\include{problem}

\include{coding}

\include{testing}

\include{result}

\include{conclusion}

\include{appendix}

\include{appendix2}

\listoffigures

\addcontentsline{toc}{section}{LIST OF FIGURES}

\newpage
\fancyhead[RO]{\footnotesize{Introduction}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 1 \vspace{.20in} \\ INTRODUCTION}

\vspace*{\fill}

\end{center}

\newpage

\begin{center}

\section{INTRODUCTION}

\end{center}

\subsection{Introduction}

\paragraph{}The introduction of automated teller machines (ATM) or automated Banking Machine


(ABM) has proven to be an important technological advancement that has enabled people to withdraw
their money easily, 24x7. Since ATMs are easily accessible reservoirs of liquid cash, they are constantly
targeted by thieves and fraudsters to steal the money stored in ATM. This system is a proactive measure
that ensures the safety of the people and prevents physical attacks by predicting the vulnerability of an
ATM.

\linebreak

There are three types of security concerns pertaining to ATM -

\begin{enumerate}

\item \textbf{Physical attack:} Physical theft of valuable media—the category of crimes that are used to
steal cash or other valuable media from the ATM using methods which physically breach the cash
enclosure

\item \textbf{Identity theft:} Identity Theft refers to the category of crimes that capture the data used by
a consumer to authenticate themselves at a Self-Service Terminal to enable their financial services. The
most frequent attack vectors in this category include Card Skimming, Card Trapping, and Card “Sniffing.”

\item \textbf{Logical theft:} Logical theft of valuable media refers to the category of crimes that are used
to steal cash or other valuable media from the ATM using methods which do not physically breach the
cash enclosure

\end{enumerate}

Existing security system provides only one layer of physical security. However, there are many advanced
techniques to prevent cyber security attacks . CCTV and emergency push buttons which trigger a siren
are the main security measures that are widely present in most ATMs; This is a very limited security
measure and hence requires improvement. There are many other proposals made to improve the
security in using an ATM include, biometric security system; however, this system does not address the
problem of physical attack. Next one is “Unusual event detection using security camera” the system is
only an active measure to detect security issues.

\linebreak

It does not have a central means to monitor all the ATMs. The system proposed to provide ATM physical
security using a client server model using ARM11 cannot monitor more than one ATM at a time. Also,
security related information captured by this system is very limited and does seek to be a proactive
solution to the problem. There are also systems proposed to do facial recognition using security cameras
and produce alert warnings. The response time of these systems is high and do not check the overall
security of an ATM. From the above data it is clear that there is a need to implement a centralized
monitoring system which not only detects security attacks, but also predicts one. This system uses wide
variety of sensors.

\linebreak

\newpage

\fancyhead[RO]{\footnotesize{BACKGROUND}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 2 \vspace{.20in} \\ BACKGROUND}

\vspace*{\fill}

\end{center}
\newpage

\begin{center}

\section{BACKGROUND}

\end{center}

\subsection{Introduction}

\paragraph{}The introduction of automated teller machines (ATM) or automated Banking Machine


(ABM) has proven to be an important technological advancement that has enabled people to withdraw
their money easily, 24x7. Since ATMs are easily accessible reservoirs of liquid cash, they are constantly
targeted by thieves and fraudsters to steal the money stored in ATM. This system is a proactive measure
that ensures the safety of the people and prevents physical attacks by predicting the vulnerability of an
ATM.

\newpage

%---------------------------------------------------------------------

%---------------------------------------------------------------------

\newpage

\fancyhead[RO]{\footnotesize{LITERATURE SURVEY}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 3 \vspace{.20in} \\ LITERATURE SURVEY}

\vspace*{\fill}

\end{center}

\newpage

\begin{center}
\section{LITERATURE SURVEY}

\end{center}

\begin{enumerate}

\item \textbf{G.Renee Jeanine, S. Gomathy,P.G.Scholar,A Novel Method to Enhance the Security of ATM
using Biometrics ,2016.}

\textbf{Description:} Nowadays we are using the pin number for security in ATMs, which replaced
signature based system. The pin based security is the simplest level of security. The pin number is a
unique number which is encrypted and decrypted during transaction. Nowadays the pin number can be
extracted through many ways, for fraudulent activity. So, as a solution the pin number can be replaced
with biometric security. The biometric security may be fingerprint, retina and so on. Nowadays, the
system is used to compare the input image with the image in the database and if they are verified, the
bank staff would disperse the cash. But the proposal model would completely replace the pin number
with biometric system and the machine would disperse the cash when the comparison gets satisfied.
Thus the security of the transaction is improved to a greater extent.

\textbf{Advantage:} Heightens the security of system. This is a better approach as compere to pin
system.

\\

\textbf{Disadvantage:} Provides low level physical security. There is not any centralised monitoring
system to monitor all ATM's under a city.

\item \textbf{Sudhir Goswa,Jyoti Goswa,Nagreh Kumar,Unusual Event Detection in Low Resolution Video
for enhancing ATM security,2015.

}
\textbf{Description:} In real world applications, tracking target in low resolution video is a challenging
task because there is loss of discriminative detail in the visual appearance of moving object. The existing
methods are mostly based on the enhancement of LR (low resolution) video by super resolution
techniques. But these methods require high computational cost. This cost further increases if we are
dealing with events detection. Proposed algorithm is able to detect unusual events without such type of
conversion and well suited for enhancement of security of ATMs where conventional low resolution
cameras are generally used due to their low cost. Proposed algorithm only uses close morphological
operation with disk like structuring element in the preprocessing steps to cope up with low resolution
video. It further uses rolling average background subtraction technique to detect foreground object from
dynamic background in a scene. Our proposed algorithm is able to recognize the occurrence of
uncommon events such as overcrowding or fight in the low resolution video simply by using statistical
property, standard deviation of moving objects. It is fast enough because it process low resolution
frames and could be helpful in surveillance system for enhancing the security of ATMs where
conventional camera of low resolution are still used. It does not use any classifier and avoids the
requirement of training the system initially.\\

\textbf{Advantage:} Unusual events can be captured

Using exiting cameras.\\

\textbf{Disadvantage:} Persons requires for continuous monitoring of each ATM system.

\item \textbf{Bharati M Nelligan,

Dr. N V Uma Reddy,SMART ATM SECURITY SYSTEM USING FPR, GSM, GPS,2014.

\textbf{Description:} The proposed system enhance security of ATM (Automatic Teller Machine) systems.
The objective of the system is to know the Enhanced smart ATM security system which is developed
using the Embedded system and advanced technologies. In our proposed system RFID card is used as
ATM card, IR sensor in order to sense the presence of the card holders and to turn on Fan and Light, if
ATM is tampered then SMS is sent to two main stations via GSM. GPS is used to track the location in case
the cash box is robbed. Finger print is used to identify and verify authorized bank personnel. Hence the
proposed system is the highly secured system for ATMs.

\\

\textbf{Advantage:} Tracking of robbed system is provided.\\

\textbf{Disadvantage:} There is no any centralised system to monitor all ATM systems.


\item \textbf{Sāmbhar Ray,Siunik Das,Ananda Sen,An Intelligent Vision System for monitoring Security
and Surveillance of ATM,2013.

\textbf{Description:} The proposed system increase the security and surveillance of ATM kiosks. Due to
the increase of robbery in ATM kiosks, it is important to employ an automated surveillance system to
protect and secure the ATM machine from threats. Currently, a camera attached with the ATM unit,
records and transmits the video feed to the main server of the bank. Around the clock, this manual
surveillance utilizes a lot of bandwidth for transmission. There is waste of memory and late response to
emergency situation. Using this system it is possible to detect whether a person is wearing a mask or
not. The proposed system is also capable of counting the number of people present inside the ATM kiosk
and generate a warning signal, thereby removes a constant human supervision, reducing the storage of
unnecessary video feed and transmitting only an anomalous situation, a faster response to a threat by
shutting down the ATM machine as soon the system detects the threat.\\

\textbf{Advantage:} system has detected whether the person is wearing a mask or not correctly and no
of persons in ATM room.\\

\textbf{Disadvantage:} system is not able to recognizing whether person is account holder or not.

\item \textbf{D.Narmada,J. V Priyadarsini,DESIGN AND IMPLEMENTATION OF SECURITY BASED ATM


USING ARM,2013.

\textbf{Description:} Automated Teller Machines (ATMs) security is the field of study that aims at
solutions that provide multiple points of protection against physical and electronic theft from ATMs and
protecting their installations. From anti-skimming defend systems to silent indicate systems, integrated
ATM video surveillance cameras and ATM monitoring options, security specialists are ready to help the
people get more out of the ATM security and ATM loss prevention systems. The aim of the proposed
work is to implement a low cost stand-alone Embedded Web Server (EWS) based on ARM11 processor
and Linux operating system using Raspberry Pi. It offers a robust networking solution with wide range of
areas over internet. The setup is proposed for ATM security, comprising of the modules namely,
authentication of shutter lock, web enabled control, sensors and camera control. This project consists of
two sides, one is at the door side with AT89S52 microcontroller and another one is inside ATM with
RasberryPi Smoke and vibration sensors are used for protection purpose. Ethernet is used to upload the
sensor values to the HTML web page. The alert messages will be sent to the authorized person if
vibration or smoke is detected. The person's mobile number is stored in the system at the initial stage.\\

\textbf{Advantage:} Heightens the security using client server model.\\

\textbf{Disadvantage:} There is no any centralized server based monitoring system.

%----------------------------------------------------------------

\newpage

\fancyhead[RO]{\footnotesize{PROBLEM DEFINITION

}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 4 \vspace{.20in} \\PROBLEM DEFINITION

\vspace*{\fill}

\end{center}

\newpage

\begin{center}
\section{PROBLEM DEFINITION

\end{center}

To develop centralized server based system to monitor ATM machines under a city which is going to
collect data continuously,detect security attacks and predict those attacks and heighten the security
level.\\

\newline

\newpage

\newpage

\fancyhead[RO]{\footnotesize{OBJECTIVE AND SCOPE}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 5 \vspace{.20in} \\OBJECTIVE AND SCOPE}

\vspace*{\fill}

\end{center}

\newpage

\begin{center}

\section{OBJECTIVE AND SCOPE}


\end{center}

\newline

\newpage

\fancyhead[RO]{\footnotesize{Design Methods}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 6 \vspace{.20in} \\ Design Methods}

\vspace*{\fill}

\end{center}

\newpage

\begin{center}

\section{Design Methods}

\end{center}

\subsection{System Architecture}

The proposed system is based on the concept of Internet of things; hence, high speed internet
connection at the location of deployment is indispensible. Following are the three key sections in the
system architecture.

\newline

1. Server.
\newline

2. ATM and sensor interface.

\newline

3. Client user interface

\newline

Different types of security related data is collected at regular intervals from the sensors which are placed
at appropriate locations in the ATM kiosk by a microcontroller (Arduino - ATMEGA328). This data is
processed by the microcontroller and is sent to the server with the help of ESP8266 Wi-Fi module, using
the domain name of the server (or Public IP address of the router). All the information received by the
server is stored in a file (one file for each ATM). The tail end (last line) of the file contains the most recent
data.

\newline

\begin{figure}[h]

\caption{Overview of the system}

\centering

\includegraphics[scale=0.5]{Picture1}

\end{figure}

\newline

Once the data reaches the router of the server, using port forwarding technique (Network address
translation) the data is sent to port 80 (Standard port for a HTTP server), the port at which Raspberry-Pi
is connected. Using the same technique, a client computer can access the data from the server. The
client user will be authenticated with the help of a username and password. Once the user is
authenticated, the server generates a web page by executing the PHP script and the web page is
displayed on the monitor of the client system. The PHP page generated contains the most recent data
that was received (By reading only the tail end of the sensor data file). However, vulnerability analysis is
performed by consolidating all the information from all the ATMs. The web page contains all the
information from all the connected ATMs displayed in a 2D row column fashion.
\subsubsection{SETTING UP THE SERVER }

Any computer can be turned into a server by installing appropriate server software. There are many
web-server software in the market which can be freely downloaded and installed into the system which
you desire to operate as server.

Apache and Nginx are the most popular HTTP server software. There are also dedicated server operating
systems like - Red Hat Enterprise Linux, Windows Server, Mac OS X Server, which enable easy server
management. Some of the key feature of a server operating system includes- Ability to access server
both in GUI and command-level interface; advanced hardware, software and network configuration
services; Provides central interface to manage users and most importantly, implement security and other
administrative processes.

\newline

\begin{figure}[h]

\caption{Raspberry-Pi set up as server }

\centering

\includegraphics[scale=1.8]{Picture6}

\end{figure}

\newline

The server in this system is a Raspberry-Pi-3 mini computer, running Rasbian (Debian Linux) operating
system with Apache server software installed in it. PHP-5 is also installed (integrated) with Apache. PHP
(recursive acronym for PHP: Hypertext Preprocessor) is a widely used open source general-purpose
scripting language that is especially suited for web development and can be embedded into HTML. PHP,
unlike a client-side programming language like JavaScript, PHP is a server side programming language,
which means that the PHP code is executed on the server and only the result is sent to the client system.
You can even configure your web server to process all your HTML files with PHP, and then there's really
no way that users can tell what you have up your sleeve. This particular feature makes PHP the best
option to design a secure web system

\newline
\subsubsection{HARDWARE SETUP } The hardware setup at the location of deployment mainly consists
of a microcontroller (Arduino) to which different sensors are interfaced. The number of sensors
interfaced need not be limited to the list mentioned in this paper. More number of diverse sensors can
be incorporated into the system to improve the security. If the number of pins in the microcontroller is
not sufficient for connecting all the sensors, then the technique of multiplexing can be used. Software
has to be updated accordingly to include all the sensors.

\newline

Key components used in the system are discussed below

\begin{itemize}

\item \textbf{Raspberry pi 3 :} Raspberry pi is a mini computer which runs the server software. The
Raspberry Pi is a series of small single-board computers developed in the United Kingdom by the
Raspberry Pi Foundation to promote the teaching of basic computer science in schools and in developing
countries. Raspberry-Pi 3 comes with inbuilt Wi-Fi module. However, if older versions of raspberry pi are
used, then a separate USB Wi-Fi module must be connected to one of the Pi’s USB port.

\newline

Specifications of Raspberry-Pi 3 [6]

\begin{itemize}

\item SoC: Broadcom BCM2837 (roughly 50% faster than the Pi 2)

\item CPU: 1.2 GHZ quad-core ARM Cortex A53 (ARMv8 Instruction Set)

\item GPU: Broadcom VideoCore IV @ 400 MHz

\item Memory: 1 GB LPDDR2-900 SDRAM

\item USB ports: 4

\item Network: 10/100 MBPS Ethernet, 802.11n Wireless LAN, Bluetooth 4.0

\end{itemize}
\newline

\item \textbf{ESP 8266 (Wi-Fi module) :} ESP 8266 is a small low power Wi-Fi module, which can be used
to send data to the internet server. ESP module also comes with a built in microcontroller. It is operated
using ‘AT commands’

\newline

\item \textbf{Reed switch (Door switch) :} Reed switches are placed at the front entrance door of the
ATM kiosk. These switches can be used to detect if the door of an ATM kiosk is open or closed. These
switches are magnetic switches that closes (or opens) when a magnet is brought near it.

\newline

\item \textbf{TMP35 (Temperature sensor) :} TMP35 is an easy to use, low voltage (2.7v – 5v) analog
temperature sensor. TMP35 contains three pins – Vcc, Gnd and analog output. The output analog
voltage of the sensor is directly proportional to the temperature of the surroundings. Output voltage of
the sensor is directly calibrated to degree Celsius [9]. TMP35 can be used to detect fires.

\newline

\item \textbf{Passive infrared sensor (PIR sensor) :}PIR sensor can be used to detect motion, hence
allows us to sense the presence of a person (any living thing) inside an ATM kiosk. However, it is not
possible to find out the number of persons inside the ATM kiosk using this sensor. This sensor works by
producing a trigger pulse when there is a change in infrared radiation in the region covered by it. Every
object in this world radiates infrared radiation, when a living object moves this radiation changes, PIR
sensors detects this change in radiation levels and produces trigger pulses.

\newline

\item \textbf{ADXL335 (Accelerometer) :} ADXL335 is a 3 axes accelerometer module. Accelerometer is a


device used to give information regarding the orientation of an object in space. Accelerometer does not
provide any information regarding the position of the object in space. ADXL335 is MEMS technology
based accelerometer. The orientation information along the 3 axes is transferred to the microcontroller
using the I2C (Inter Integrated Circuit) communication protocol. I2C bus is a 2 wired, open drain,
bidirectional, multi-master, multi-slave, serial communication bus. The two I2C lines are- serial data
(SDA) and serial clock (SCL). [7] This sensor can be placed on the body of the ATM to detect if the ATM is
being tilted and lifted or any other possible events that causes disorientation of the ATM.

\newline

\item \textbf{Resistive Pressure sensor :} This sensor is used to detect the amount of pressure applied.
This sensor is primarily a resistor whose resistance change is proportional to the amount of pressure
applied on its surface (Within the operating limits). This sensor can be interfaced to a microcontroller by
creating a potential divider network and reading the analog voltage at the center.

\end{itemize}

\subsubsection{SOFTWARE DESIGN } In this system most of the software resides in the server. The
microcontroller which is interfaced with the sensors contains code that reads data from all the sensors
when there is a change in state in one or more sensors and sends this data to ESP8266 via the serial port
of the microcontroller (Tx and Rx pins). Server contains all the web pages required to view the
information. Web pages are programmed in PHP. PHP is a scripting language whose code is incorporated
with HTML (Hyper text markup language) script. Flowchart below shows the series of events that occurs
at the time of accessing the server. When a user accesses the server, he is first presented with a login
page to authenticate himself. It can be observed from the flow chart that every event is logged in a log
file (Events.csv). This step is used to detect unauthorized access and other security breaches.

\newline

\newpage

%---------------------------------------------------------------

\newpage

\fancyhead[RO]{\footnotesize{Flowchart}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 7 \vspace{.20in} \\Flowchart}

\vspace*{\fill}

\end{center}
\newpage

\begin{center}

\section{Flowchart}

\end{center}

\newline

\newline

\subsection{ Vulnerability prediction }

Vulnerability of ATM system is predicted based in the following parameters -

\newline

1.Activity level

\newline

2.Unexpected sensor activity

\newline

3.Security guard

\newline

4.Cash

\newline

Based on these four factors the vulnerability quotient is calculated. Vulnerability quotient is a number
ranging from 2 to 10+. Value 2 indicates a safe ATM. 10 and above indicates an unsecured ATM. The
activity level is a number which is assigned based on the information from reed switches. If the state of
this switch (Open/Close) changes often then it indicates that more people visit that particular ATM.
Based on this data a number (From 1 to 3) is assigned to an ATM. 1 indicates less activity and 3 indicates
more activity. Is the ATM guarded by a security guard? This is one of the critical factors that decide the
security at an ATM. This information is sent to the server when the security guard reports to duty; He
enters his name and shift duration in a small console and signs in ATMs that have cash are at more risk
that those that do not have case. This data has to be retrieved from the machine.
\begin{figure}[h]

\caption{Vulnerability quotient calculation}

\centering

\includegraphics[scale=0.5]{picture5}

\end{figure}

\subsection{ Unexpected sensor activity detection }Unexpected sensor activity is detected by calculating
the mean, median, mode and standard deviation of all the data values received from the sensors. Any
drastic change in mean or a large value of standard deviation is an indication that the machine is
tampered. Consistent average (mean), acceptable mode value (maximum value captured) and almost
zero standard deviation value are desirable. Depending on which sensor is showing unexpected activity,
a value ‘X’ is added to the vulnerability quotient. The value of ‘X’ indicates the severity of risk that we will
have to incur due to a particular sensor. Mean = ™sensor data / Total number of data Mode = Maximum
value captured in a particular sensor SD = ( ™ (sensor data – mean) 2 / Total number of data)  Flowchart
below shows how the vulnerability quotient is calculated.

\newline

\newpage

\fancyhead[RO]{\footnotesize{Result}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 8 \vspace{.20in} \\Result}

\vspace*{\fill}
\end{center}

\newpage

\begin{center}

\section{Result}

\end{center}

Values of vulnerability quotient when ‘X’ (unexpected sensor behavior) is set to 0. The cells that are
marked in red indicate a bad score.

\begin{figure}[h]

\caption{All possible values for vulnerability quotient when X=0 }

\centering

\includegraphics[scale=0.5]{Picture4}

\end{figure}

From all the above data it is clear that ATM security is very crucial concern in this constantly advancing
world. In a world of increasing ATM crimes, it is not enough to just detect a breach in security, but the
system has to predict one before the occurrence of one. The proposed system seeks to be a proactive
measure to reduce ATM crimes and make this world a safer place to live.

\newline

%---------------------------------------------------------------------
\newpage

\fancyhead[RO]{\footnotesize{Application}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 9 \vspace{.20in} \\Application}

\vspace*{\fill}

\end{center}

\newpage

\begin{center}

\section{Application}

\end{center}

o reduce ATM crimes and make this world a safer place to live.

\newline

%---------------------------------------------------------------------

\newpage
\fancyhead[RO]{\footnotesize{Conclusion}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 10 \vspace{.20in} \\Conclusion}

\vspace*{\fill}

\end{center}

\newpage

\begin{center}

\section{Conclusion}

\end{center}

\subsection{Conclusion}

From all the above data it is clear that ATM security is very crucial concern in this constantly advancing
world. In a world of increasing ATM crimes, it is not enough to just detect a breach in security, but the
system has to predict one before the occurrence of one. The proposed system seeks to be a proactive
measure to reduce ATM crimes and make this world a safer place to live.

%---------------------------------------------------------------------

\newpage

\fancyhead[RO]{\footnotesize{FUTURE SCOPE}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 11 \vspace{.20in} \\FUTURE SCOPE}

\vspace*{\fill}

\end{center}

\newpage

\begin{center}
\section{FUTURE SCOPE}

\end{center}

\subsection{Future Work}

Future work can to be explore different association rule generation measures, or also analys. In future, a
better algorithms such as FP-Growth or Matrix-Apriori can be used to generate association rules which
gives same result as Apriori but with less time. Also in future focus can be given in improving the security
of transactions as server or agents view the transaction after decryption.

\subsection{Application}

1. Proposed system can be used for business applications.

\newline

2. It can also be used in malls; which solves the problem of how to arrange the items in rack.

%---------------------------------------------------------------------

\newpage

\fancyhead[RO]{\footnotesize{Bibiography}}

\begin{center}

\vspace*{\fill}

\textbf{\LARGE CHAPTER 12 \vspace{.20in}\\ BIBLIOGRAPHY}

\vspace*{\fill}

\end{center}

\newpage

\begin{center}

\section{BIBLIOGRAPHY}

\end{center}

\newline
\begin{thebibliography}{11}

\bibitem{MDID} G. Renee Jebaline, S. Gomathi, \lq\lq A Novel Method to Enhance the Security of ATM
using Biometrics \rq\rq.2015 International Conference on Circuit, Power and Computing Technologies
[ICCPCT] 978-1-47997075-9/15/31.00 ©2015 IEEE.

\bibitem{MDID} Sudhir Goswami, Jyoti Goswami, Nagresh Kumar, \lq\lq Unusual Event Detection in Low
Resolution Video for enhancing ATM \rq\rq 2015 2nd International Conference on Signal Processing and
Integrated Networks (SPIN).

\bibitem{MDID} Bharati M Nelligani, Dr. N V Uma Reddy, Mr.Nithin Awasti, “Smart ATM Security System
Using FPR, GSM, GPS,” Inventive Computation Technologies (ICICT), International Conference on

\bibitem{MDID} Sambarta Ray, Souvik Das, Dr. Anindya Sen, “An Intelligent Vision System for monitoring
Security and Surveillance of ATM ,” IEEE INDICON 2015

\bibitem{MDID} D.Narmada, J. V Priyadarsini, “Design and Implementation of Security Based ATM Using
ARM11,” Inventive Computation Technologies (ICICT).

\end{thebibliography}

\end{document}

Вам также может понравиться