Secure PIN Authentication for ATM Transaction using Mobile Application
Bharathiraja N1, Ravindhar N.V2, Loganathan V3

1Bharathiraja N, Assistant Professors, Department of Computer Science Engineering, Saveetha Engineering College, Anna University Chennai (Tamil Nadu). India.
2Ravindhar N.V, Assistant Professors, Department of Computer Science Engineering, Saveetha Engineering College, Anna University Chennai (Tamil Nadu). India.
3Loganathan V, Assistant Professors, Department of Computer Science Engineering, Saveetha Engineering College, Anna University Chennai (Tamil Nadu). India.

Manuscript received on May 01, 2016. | Revised Manuscript received on May 02, 2016. | Manuscript published on May 05, 2016. | PP: 60-63 | Volume-6 Issue-2, May 2016. | Retrieval Number: B2848056216
Open Access | Ethics and Policies | Cite 
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Automatic Teller Machines (ATMs) transactions are an important role for obtaining money using credit or debit cards; hence they need to be secure and trustworthy. Shoulder-surfing or observation attacks, including card skimming and video recording with hidden cameras while users perform transactions at point-of-service terminals is one of the common threats for common users. In the proposed system, a secure authentication protocol for performing transaction in Automatic Teller Machines (ATMs) using mobile application is developed. This approach protects the user from illegal use of credit/debit cards and partial observation attacks, and is also against to relay, replay, and intermediate transaction attacks in the transaction process. Users use an mobile application installed in their personal mobile device for scanning a Quick Response (QR) code on the screen to initiate the transaction and obtain a secure One-Time-Password (OTP) for authentication. By using this proposed system, the security is enhanced while providing less complexity on the user side.
Keywords: About four key words or phrases in alphabetical order, separated by commas.