• No results found

Wireless ATM Security System Using Arm 7 with GSM and Accelerometer

N/A
N/A
Protected

Academic year: 2022

Share "Wireless ATM Security System Using Arm 7 with GSM and Accelerometer"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

Virendra k sabale, IJRIT-414 International Journal of Research in Information Technology

(IJRIT)

www.ijrit.com ISSN 2001-5569

Wireless ATM Security System Using Arm 7 with GSM and Accelerometer

Virendra k sabale , Firoj khan, Nitin v kasture ,Fahim ansari Guided by-Prof.K.Ramteke

Department of Electronics, Priyadarshini j.l college of enggenearing,846,Nandanvan,Nagpur

Abstract:

Today, ATM has become an irreplaceable communication and service channel between banks and cardholders due to its fast, convenience and human resource saving advantages; you can easily find ATMs in branches, convenience stores, airports, and shopping malls. To build safe ATM use environment, maintain bank’s brand image and protect bank assets, all the involved organizations, institutions, and persons must research, develop and takes measures to meet the challenges faced by ATM crimes. To avoided crime we designed system namely

“Wireless ATM Security with GSM & Accelerometer Using ARM7”.In this project when any one enters pin,after that he should not get money even after his fingure gesture checked by machine if gesture not matched the machine will send the message. In our project for gesture reconization we use accelerometer & it is heart of our project.

Key words-ATM(automatic telering machine),gsm(global system for mobile),accelerometer,arm 7.

1. Introduction

From the first ATM being installed in the world till now, ATM has gradually become a target of crimes due to it providing direct access to safe and cash. While with the constantly evolving of reported ATM crime, ATM industry has begun to pay attention to the safety of ATM, even cardholders. We believe under the joint and sustained effort of ATM suppliers, banks, and related organization, a more safe and convenient transaction platform and channel will be built up eventually.

ATM security is prime concern in our day-to-day life. Everyone wants to be as much as secure as to be possible. An access control systems forms a vital link in a security chain. The micro controller based digital lock presented here is an access control system that allows only authorized persons to access a restricted area. Our

“Wireless ATM Security with GSM & Accelerometer Using ARM7” system is best suitable for ATM security purpose.

1.2 Problem definition

For ATM security, 1st we see how ATM crime done & way of crime & also see what kind of security provided for ATM, accordingly we will design best security system for ATM

(2)

Virendra k sabale, IJRIT-415 Fig: ATM Related Attacks

From above literature we will decided to read different monitoring system for ATM security. Here we will read different monitoring system for security purpose. The research paper [discusses different monitoring system for security purpose. It is noticed that most of the research carried out belongs to the following categories:

a. Internet based Monitoring using Servers, GPRS modems, etc. with different approaches.

b. GSM-SMS protocols using GSM module individually or in combination with Internet Technologies.

c. Monitoring using Wireless Sensor Networks.

d. Wireless Monitoring using Bluetooth, Wi-Fi, Zigbee and RF.

e. Applications have varied widely like Home Automation, Security Systems, Bio-medicala pplications, Agriculture, Environment, Reservoir, Bridge health monitoring, etc.

2. Aim & objectives

2.1 Aim:

To make a best security system which is best for ATM on the basis of GSM, Accelerometer & ARM processor.

2.2 Objectives:

2.2.1 At a Glance:

 To design low cost intelligent security system.

 To provide flexibility.

 To incorporate alternative mechanism for communication when messaging fails.

 To implement a simple embedded system as a proof of concept.

2.2.2 In Depth:

 Primarily looking at the existing status of research in ATM monitoring, major impetus is only for development of system

 With explosive growth of cellular networks in India and sharp rise in cost for security, our system offer unique opportunity for remote control even in rural area.

 The research work presented in this thesis is aimed to remotely monitor the system using GSM & MEMS by designing and implementing embedded system.

 It is aimed to provide facility to use even any to make remote system affordable to all categories of users.

 The major aspect of the research had been to work out strategies to keep operational cost of the system minimum to emphasize its utility to automate simple systems with remote monitoring capabilities.



3. Methodology to be employed

According to specifications of component use we designed the block diagram. To implement the proposed security for ATM, we use the different hardware and software platforms. Fig below shows the major system modules and their interconnections.

. Here we are using GSM modem for security purpose. The Microcontroller processes this information and this processed information is sent to the user/owner using GSM modem.

(3)

Virendra k sabale, IJRIT-416 LPC2148 is heart of project. The project is designed for providing security using MEMS Accelerometer and Temperature sensor. The output of MEMS device is given to ADC circuit to convert the analog values to digital which is inbuilt for LPC2148 microcontroller. Whenever the accelerometer is disturbed it gives signal to controller and it also senses temperature and gives signal to controller and gives buzzer indication. MEMS are miniaturized structures, sensors, actuators, and microelectronics. Micro sensors and micro actuators are appropriately categorized as “transducers”, which are defined as devices that convert energy from one form to another. In the case of micro sensors, the device typically converts a measured mechanical signal into an electrical signal

Fig: Block Diagram of “Wireless Security System For ATM With GSM &Accelerometer Using ATM7”

.This project uses two power supplies, one is regulated 5V for modules and other one is 3.3V for microcontroller. 7805 three terminal voltage regulator is used for voltage regulation. Bridge type full Wave rectifier is used to rectify the ac output of secondary of 230/12V step down transformer.

4 Component use

4.1 LPC 2148 Microcontroller

Fig: 2.1 LPC 2148 Microcontroller.

4.1.1 Feature of LPC 2148(ARM7)

 16-bit/32-bitARM7TDMI-S microcontroller in a tiny LQFP64 package.

.

ADC

LPC2148 CONTRO LLER ACCELEROMET

ER

SWITCH

CRYSTAL

RESET CKT.

16x2 LCD

TRANSIS TOR DRIVER CIRCUIT

CONTRAST CONTROL

MAX232 GSM

CKT.

BREAKE R

DC

(4)

Virendra k sabale, IJRIT-417

 8 KB to 40 KB of on-chip static RAM and 32 KB to 512 KB of on-chip flash memory; 128-bit wide interface/accelerator enables high-speed 60 MHz operation

 In-System Programming/In-Application Programming (ISP/IAP) via on-chip boot loader software, single flash sector or full chip erase in 400 ms and programming of 256 B in 1 ms.

 Embedded ICE RT and Embedded Trace interfaces offer real-time debugging with the on-chip Real Monitor software and high-speed tracing of instruction execution

 USB 2.0 Full-speed compliant device controller with 2 KB of endpoint RAM.

 In addition, the LPC2146/48 provides 8 KB of on-chip RAM accessible to USB by DMA.

 One or two (LPC2141/42 vs. LPC2144/46/48) 10-bit ADCs provide a total of 6/14 analog inputs, with conversion times as low as 2.44 ms per channel Single 10-bit DAC provides variable analog output (LPC2142/44/46/48 only).

 Two 32-bit timers/external event counters (with four capture and four compare

 Channels each), PWM unit (six outputs) and watchdog.

 Low power Real-Time Clock (RTC) with independent power and 32 kHz clock input.

 Multiple serial interfaces including two UARTs (16C550), two Fast I2C-bus (400 Kbit/s), SPI and SSP with buffering and variable data length capabilities.

 Vectored Interrupt Controller (VIC) with configurable priorities and vector addresses.

 Up to 45 of 5 V tolerant fast general purpose I/O pins in a tiny LQFP64 package.

 Up to 21 external interrupt pins available.

 60 MHz maximum CPU clock available from programmable on-chip PLL with settling Time of 100 ms.

 On-chip integrated oscillator operates with an external crystal from 1 MHz to 25 MHz.

 Power saving modes include Idle and Power-down.

 Individual enable/disable of peripheral functions as well as peripheral clock scaling for additional power optimization.

 Processor wake-up from Power-down mode via external interrupt or BOD.

 Single power supply chip with POR and BOD circuits.

4.1.2 Description

The LPC2148 microcontrollers is based on a 32-bit ARM7TDMI-S CPU with real-time emulation and embedded trace support, that combine microcontrollers with embedded high-speed flash memory ranging from 32 KB to 512 KB. A 128-bit wide memory interface and unique accelerator architecture enable 32-bit code execution at the maximum clock rate. For critical code size applications, the alternative 16-bit Thumb mode reduces code by more than 30 % with minimal performance penalty.

Due to their tiny size and low power consumption, LPC2141/42/44/46/48 are ideal for applications where miniaturization is a key requirement, such as access control and point-of-sale. Serial communications interfaces

(5)

Virendra k sabale, IJRIT-418 ranging from a USB 2.0 Full-speed device, multiple UARTs, SPI, SSP to I2C-bus and on-chip SRAM of 8 KB up to 40 KB, make these devices very well suited for communication gateways and protocol converters, soft modems, voice recognition and low end imaging, providing both large buffer size and high processing power. Various 32-bit timers, single or dual 10-bit ADCs, 10-bit DAC, PWM channels and 45 fast GPIO lines with up to nine edge or level sensitive external interrupt pins make these microcontrollers suitable for industrial control and medical systems.

4.2 GSM Module

4.2.1 Global System for Mobile communications (GSM)

Originally from Group Special Mobile is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 82% of the global mobile market uses the standard GSM is used by over 2 billion people across more than 212 countries and territories. Its ubiquity makes international roaming very common between mobile phone operators, enabling subscribers to use their phones in many parts of the world. GSM differs from its predecessors in that both signalling and speech channels are digital call quality, and thus is considered a second generation (2G) mobile phone system. This has also meant that data communication was built into the system using the 3rd Generation Partnership Project (3GPP).

Newer versions of the standard were backward-compatible with the original GSM phones. For example, Release '97 of the standard added packet data capabilities, by means of General Packet Radio Service (GPRS).

Release '99 introduced higher speed data transmission using Enhanced Data Rates for GSM Evolution (EDGE).

GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in Europe and other parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. It operates at either the 900 MHz or 1,800 MHz frequency band.

Mobile Frequency Range Rx : 925-960; TX: 880-915 Multiple Access Method : TDMA/FDM

Duplex Method : FDD

Number of Channels1 : 24 (8 users per channel) Channel Spacing : 200 kHz

Modulation : GMSK (0.3 Gaussian Filter) Channel Bit Rate : 270.833Kb

(6)

4.2.2 GSM at commands Syntax Rules for GSM

 A command string should start with "AT" or "at", except for the commands "A/" and "+++". At or AT are invalid.

 Several commands can be given in one command string.

 The commands can be given in upper or lower case.

 A command string should contain less

 When an error is made during the typing of the command, it can be corrected using the backspace key.

 Commands and command strings must be terminated with an <ENTER>, except +++ and A/

 A telephone number can exist of following charact

ignored (space, underscore). They help formatting the dial string.

 Commands that use a numerical parameter can be used without a numerical value. In this case the command will be issued with the value zero.

 If the command string contains two consecutive commands without parameter, as discussed above, the modem will respond with an error.

 After the command ATZ has been issued, a pause of two seconds should

 Be respected before entering the ne

Virendra k sabale Fig.structure of gsm network

A command string should start with "AT" or "at", except for the commands "A/" and "+++". At or AT are

Several commands can be given in one command string.

The commands can be given in upper or lower case.

A command string should contain less than 40 characters.

When an error is made during the typing of the command, it can be corrected using the backspace key.

Commands and command strings must be terminated with an <ENTER>, except +++ and A/

A telephone number can exist of following characters: 1 2 3 4 5 6 7 8 9 * =, ; # + > . All other characters are ignored (space, underscore). They help formatting the dial string.

Commands that use a numerical parameter can be used without a numerical value. In this case the command he value zero.

If the command string contains two consecutive commands without parameter, as discussed above, the modem

After the command ATZ has been issued, a pause of two seconds should Be respected before entering the next commands.

Virendra k sabale, IJRIT-419 A command string should start with "AT" or "at", except for the commands "A/" and "+++". At or AT are

When an error is made during the typing of the command, it can be corrected using the backspace key.

Commands and command strings must be terminated with an <ENTER>, except +++ and A/

ers: 1 2 3 4 5 6 7 8 9 * =, ; # + > . All other characters are

Commands that use a numerical parameter can be used without a numerical value. In this case the command

If the command string contains two consecutive commands without parameter, as discussed above, the modem

(7)

Virendra k sabale, IJRIT-420

4.3Accelerometer

An accelerometer is an electromechanical device that will measure acceleration forces. These forces may be static, like the constant force of gravity pulling at your feet, or they could be dynamic - caused by moving or vibrating the accelerometer .

.

By measuring the amount of static acceleration due to gravity, you can find out the angle the device is tilted at with respect to the earth. By sensing the amount of dynamic acceleration, you can analyze the way the device is moving.

At first, measuring tilt and acceleration doesn't seem all that exciting. However, engineers have come up with many ways to make really useful products with them.

In the computing world, IBM and Apple have recently started using accelerometers in their laptops to protect hard drives from damage. If you accidentally drop the laptop, the accelerometer detects the sudden freefall, and switches the hard drive off so the heads don't crash on the platters. In a similar fashion, high g accelerometers are the industry standard way of detecting car crashes and deploying airbags at just the right time.

There are many different ways to make an accelerometer! Some accelerometers use the piezoelectric effect - they contain microscopic crystal structures that get stressed by accelerative forces, which causes a voltage to be generated. Another way to do it is by sensing changes in capacitance. If you have two microstructures next to each other, they have a certain capacitance between them. If an accelerative force moves one of the structures, then the capacitance will change. Add some circuitry to convert from capacitance to voltage, and you will get an accelerometer. There are even more methods, including use of the piezoresistive effect, hot air bubbles, and light.

4.3 Software use 4.4.1 Dip trace

DipTrace is EDA software for creating schematic diagrams and printed circuit boards. The first version of DipTrace was released in August, 2004. The latest version as of July 21, 2014 is DipTrace version 2.4.0.2. The interface and tutorials are multi-lingual (currently English, Czech, Russian and Turkish). In January of 2011, Parallax switched from Eagle to DipTrace for developing its printed circuit boards.

4.4.2 C programming language

C is an imperative (procedural) language. It was designed to be compiled using a relatively straightforward compiler, to provide low-level access to memory, to provide language constructs that map efficiently to machine

(8)

Virendra k sabale, IJRIT-421 instructions, and to require minimal run-time support. C was therefore useful for many applications that had formerly been coded in assembly language, such as in system programming.Despite its low-level capabilities, the language was designed to encourage cross-platform programming. A standards-compliant and portably written C program can be compiled for a very wide variety of computer platforms and operating systems with few changes to its source code. The language has become available on a very wide range of platforms, from embedded microcontrollers to supercomputers.

5. Conclusion

As we all know,thes days most of the atm attacked by the robberies.also gradual increses the theft prevention of robberies using accelerometer ,GSM&ARM7 Procceser.By using this project we can enhancing the security of an ATM as well as nation.

6. References

1] Madu, C.N., & Madu, A.A. (2002). Dimensions of e-quality. International Journal of Qualit & Reliability Management, 19(3), 246-58.

2] Obion W 2009. How to fight ATM fraud. Online Nigeria Daily News, June 21, P. 18.

3] D.Shekar Goud, Ishaq Md PJ.Saritha, “A Secured Approach for Authentication System using GSM”, Global Journal of Advanced Engineering Technologies, Vol1, Issue3-2012 ISSN: 2277-6370

4] Vidar Ajaxon Grønland, Havard Hasli, Jon Fredrik Pettersen, “Challenging cellular network” October16, 2005 5] R.Rasu, P.Krishna Kumar, and M.Chandraman, “Security for ATM Terminal Using Various Recognition Systems”, International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 4, October 2012 ISSN: 2277-3754 ISO 9001:2008 Certified

6] Der Chin Chen, “Portable Biometric System of High Sensitivity Absorption Detection”, Biometric Systems, Design and Applications, 2011, ISBN: 978-953-307-542-6

7] Steve Furber, ARM System-on-Chip Architecture, Second Edition, 2000, Addison Wesley, ISBN 0-201-67519-6 8] Andrew Sloss, Dominic Symes, Chris Wright, ARM System Developer's Guide, 2004, Morgan Kaufmann, ISBN:

1-55860-874-5

9] Waldner, Jean-Baptiste (2008). Nanocomputers and Swarm Intelligence. London: ISTEJohn Wiley & Sons.

p. 205. ISBN 1-84821-009-4.

10] T. Polster, M. Hoffmann (2009). "Aluminium nitride based 3D, piezoelectric, tactile sensors". Proc. Chem. 1:

144–7. doi:10.1016/j.proche.2009.07.036

11] "ARM7DI Data Sheet"; Document Number ARM DDI 0027D; Issued: Dec 1994 12] "D-Link DSL-604+ Wireless ADSL Router - Supportforum - eXpansys Sverige"

13] Andrew (bunnie) Huang. "On MicroSD Problems". Bunnie Studios. "This is comparable to the raw die cost of the controller IC, according to my models; and by making the controllers very smart (the Samsung controller is a 32- bit ARM7TDMI with 128k of code), you get to omit this expensive test step while delivering extra value to customers"

References

Related documents

the two emitters have different collision contention region, thus, the P air0 always access the medium correctly (its transmission always succeed). On the other hand, the P

NRT ALC/LCT Service signaling channel Time of day signaling Conditional access RTP/RTCP HE AACv2 AVC CEA 708 AFD UPD IPv4 ATSC-M/H ensembles ATSC-M/H physical layer FIC TPC ATSC

–  Objective: Inferring Internet topology at the router-level •  Example 2!. –  Data:

• Soft sweets (four colours) • Long cord sweets (two colours) • Thin wire or a needle and thread • Cocktail sticks.

International users of Symbian OS will have a heightened sense of interest in the 2010 Winter Games through a combination of excellent receptivity of streaming bandwidth on

Rate-ratio comparison of age-standardized diabetes prevalence rate per 100 females aged 20+ [2007] in Peel region, to the overall Greater Toronto Area (GTA) age-

Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions. Start

We can cover call traders for Public Liability Insurance to the value of £5 Million whilst trading at The BathVA Markets, Green Park Station.. Please note that you are