See discussions, stats, and author profiles for this publication at: https://www.researchgate.
net/publication/308846756
Design and implementation of anti-theft ATM machine using embedded
systems
Conference Paper · March 2015
DOI: 10.1109/ICCPCT.2015.7159316
CITATIONS READS
27 10,444
2 authors, including:
Anitha Julian
SAVEETHA ENGINEERING COLLEGE
18 PUBLICATIONS 128 CITATIONS
SEE PROFILE
All content following this page was uploaded by Anitha Julian on 11 May 2017.
The user has requested enhancement of the downloaded file.
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
Design and Implementation of Anti-theft ATM
Machine using Embedded Systems
Raj M Anitha Julian
M.E, Embedded System Technologies Assistant Professor
TIFAC-CORE in Pervasive Computing Technologies TIFAC-CORE in Pervasive Computing Technologies
Velammal Engineering College, Surapet Velammal Engineering College, Surapet
Chennai - 600066, India Chennai - 600066, India
[email protected] [email protected]Abstract — Automated Teller Machines (ATMs) security is the Currently, since the security and passive assets in ATM
field of study that aims at solutions that provide multiple points of rooms are managed manually, it ends up in larger physical
protection against physical and electronic theft from ATMs and interaction, that increase the time period and therefore
protecting their installations. From anti-skimming defend systems shrinks the gross margin of ATM operators. These MSPs
to silent indicate systems, integrated ATM video surveillance
are duty-bound and every ATM site is up as costs of
cameras and ATM monitoring options, security specialists are
ready to help the people get more out of the ATM security and downtime are too high. With rising overheads ATM
ATM loss prevention systems. The implementation is achieved operators struggle to pass on the cost and so are looking for
with the use of Machine-to-machine (M2M) communications a reliable remote monitoring solution to revitalize ATM
technology. M2M communications is a topic that has recently maintenance [3].
attracted much attention It provides real-time monitoring and
control without the need for human intervention. The idea of II. MACHINE TO MACHINE COMMUNICATION
M2M platform suggests new system architecture for positioning
and monitoring applications with wider coverage and higher Machine to Machine (M2M) refers to technologies that
communication efficiency. The aim of the proposed work is to allow both wireless and wired systems to communicate with
implement a low cost stand-alone Embedded Web Server (EWS) other devices of the same type [2]. M2M may be a broad term
based on ARM11 processor and Linux operating system using because it does not pinpoint specific wireless or wired
Raspberry Pi. It offers a robust networking solution with wide networking, information and engineering. M2M is considered
range of application areas over internet. The Web server can be
an integral part of the Internet of Things (IoT)and brings many
run on an embedded system having limited resources to serve
embedded web page to a web browser. The setup is proposed for edges to industry and business in general as it has a wide range
ATM security, comprising of the modules namely, authentication of applications like industrial automation, logistics, Smart Grid,
of shutter lock, web enabled control, sensors and camera control. sensible Cities, health, defense etc., largely for observation
however conjointly for management functions.
Index Terms— Raspberry Pi; M2M; Web Server; RF
Communication; Embedded System A. M2M Architecture
M2M can include the case of industrial instrumentation -
comprising a device (such as a sensor or meter) to capture an
I. INTRODUCTION event (such as temperature, inventory level, etc.) that is relayed
The rapid growth in Automatic Teller machines (ATM) through a network (wireless, wired or hybrid) to associate
has made life easy for the day to day man, but it is not so degree application (software program) that interprets the
for operators who manage it. ATMs are not owned by captured event into substantive information (for example,
banks, rather they are outsourced to managed service things ought to be restocked). Such communication was
providers (MSPs) from purchasing to maintaining the originally accomplished by having a foreign network of
machines. Several factors like the maintenance, money
filling, security and therefore the passive assets within the machines to relay information back to a central hub for
ATM rooms are responsible for keeping the ATM active analysis, which might then be rerouted into a system like a
[7]. Typically, an ATM site consists of anywhere between 8 personal computer [2].
to 12 passive assets which include two air conditioners, two The machine to machine communication in ATM has a
light collection boards, Associate in Nursing inverter/UPS, great impact on building a powerful Security Based ATM theft
a security camera and a minimum of eight to twelve light- monitoring system. However, there are many challenges in the
weight bulbs. design of the M2M communications network whereby this
978-1-4799-7075-9/15/$31.00 ©2015 IEEE
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
project deals with prevention of ATM theft from robbery. IV. SHUTTER LOCKING SYSTEM
Sensor based network has been extensively used in monitoring RFID reader is placed on the outside of the shutter and is
and controlling purposes in ATM [3]. separate from the main controller unit. The controller receives
serial data from the Reader and controls the shutter lock or
III. FUNCTION DIAGRAM unlock. When the card is brought near to the RFID module it
reads the data in the card(as shown in Fig 4) and displays on
the LCD. The data in the card is compared with the data in the
program memory and displays authorized or unauthorized
message. The door opens for a licensed person, closes for
associate unauthorized person.
Fig. 4. RFID Reader Technologies[8]
Fig. 1. Function Diagram
RFID tag is a contactless card, stated as a Proximity
computer circuit Card (PICC). Tags could either be actively or
passively high-powered. Active tags contain Associate in
Nursing on-board power supply, like battery, whereas passive
tags should be inductively high-powered via Associate in
Nursing RF signal from the reader. the gap a reader could
interrogate tags from is restricted by the tag’s power.
Consequently, active tags can also scan from a bigger distance
than passive tags.
A. RF Modules
The RFID module transmits a RF signal whenever it reads
the information from the RFID card. The main control unit
Fig. 2. Proposed Module
receives and prepares to require snap and transfer to server RF
Modules square measure used wireless transfer information.
This makes them most fitted for device applications, as in
wherever it is required to regulate some machines or robots
without getting in touch with them(may ensue to numerous
reasons like safety, etc). currently relying upon the sort of
application, the RF module is chosen (as shown in Fig 5). For
short range wireless control applications, an ASK RF
Transmitter-Receiver Module of frequency 315 MHz or 433
MHz is most fitted.
Fig. 3. Sample Login Page
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
enough to be used as fire detectors. Alternative gas sensors are
even ready to warn concerning particulate-free fires (e. g. sure
alcohol fires).
C. M2M Driven ATM Sites
The only solution to the above mentioned security
problems are resorting to M2M technology. Banks can
specialize in the safety of its client as they are of supreme
interest, by implementing remote observance resolution
across their ATM sites to resolve security problems. M2M
Fig. 5. RF Module devices[9] put in ATMs are able to provide handiness, security, cut
back field service visits, minimize system downtimes and
V. RASPBERRY PI WEB SERVER minimize operative prices. Operators are directly alerted
As ARM processor based web servers do not use computer once a haul happens, and is able to resolve the threats in
directly, it helps a lot in cost reduction. The aim of the proposed real time from a distant location.
work is to implement an Embedded Web Server (EWS) based In case of physical attacks, vibration sensors put within
on ARM11 processor and Linux operating system using the machine raises associate degree alarm and intimate the
Raspberry Pi[6]. It gives a strong networking answer with wide operator on breaking, drilling, or cutting of the safe area
range of application areas over internet. The web server runs unit dispensed. Additionally anonymous closure of ATM
on an embedded system having limited resources to serve shutter or any physical attacks on the patron is captured to
embedded web page to a web browser. Different software can boost alarm to the general public, and additionally to the
be used to implement the embedded web server, and these are closest police headquarters.
mentioned below: Apart from the protection, M2M assists the operators
to beat different bottlenecks mounting on them like energy
• Linux–operating system
management, fault management, rising operative prices,
• Apache–web server (http)software
and news. Optimized utilization of infrastructure,
• Mysql – database server continuous network period of time, and reduced operative
• PHP or Perl – programming languages prices maximizes revenues for ATM operators are also
A. RASPBERRY PI CAMERA provided.
Smart ATMs add location intelligence and enhances
The Raspberry Pi camera board contains a five MegaPixel observance visually by desegregation Google map. It
device, and connects via a ribbon cable to the CSI connective allows integrating Google Maps and placing the sites on
on the Raspberry Pi. The video and still image quality is better the maps in step with the geographic distribution. The site
than a USB webcam of similar price. OpenCV is an open status of a site can be viewed during a popup by clicking
source computer vision library that can be used for many on the positioning balloons on the Google Map [7].
vision applications. In order for OpenCV to apply face Furthermore the site location on this popup redirects to
recognition to the captured image python is used. At the site exposure page containing sensing element standing,
command prompt when raspistill -o image.jpg is power supply, power consumption pattern, etc.,
entered, the preview appears on the screen for a few
seconds. The operators/IT directors get a comprehensive
understanding of however distributed the site/device
B. SMOKE DETECTOR AND FLAME DETECTION extremely is[7]. With this graphical read alert notifications
and alarm count of web sites in multiple geographical
In case of gas attachment, heat sensors put within the
locations across the world can be viewed as shown in Fig
machine raises associate in nursing alarm and intimates the
6. Thus, it empowers IT directors to pinpoint problems
operator on breaking, drilling, or cutting of the safe are carried
and resolve the problems in numerous web sites across the
out. A smoke detector is a device that senses smoke, usually as
world with a additional visual bit.
Associate in nursing indicator of fireside[1]. Most smoke
detectors work either by optical detection (photoelectric) or by
physical method (ionization), whereas others use each detection
strategies to extend sensitivity to smoke. Sensitive alarms have
been used for the detection method.
Some smoke alarms use a carbonic acid gas detector or
carbon monoxide gas detector to observe characteristic
merchandise of combustion [4]. However, some gas sensors
react on levels that are dangerous for humans however not
typical for a fireplace; these are not usually sensitive or quick
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
Fig. 6. Google map integrate ATM site Manager [10]
The hosted website on raspberry pi can be accessed by the
Fig. 8. Door Lock System
client[6]. The client has to type the WAN IP address of
website in address bar of any web browser. Client can see the
webpage as displayed as shown in Fig 7. For closing the ATM door, DC motors area unit is used
which are operated by 12VDC power provide. In any motor,
operation is predicated on straightforward electromagnetism. A
current carrying conductor generates a magnetic flux; once and
to the strength of the external magnetic field. A DC Motor is
placed here for authorized closing the ATM door(as shown in
Fig 8) The Device is a monolithic integrated high voltage, high
current four channel driver designed to simply accept
customary DTL or TTL logic levels and drive inductive masses
and change power transistors. To change use as two bridges
every try of channels is provided with associate degree change
input as shown in Fig 9.
Fig. 7. Sample webpage
VI. RESULT AND OUTPUT
Security and passive assets in ATM rooms are managed
manually and it ends up in larger physical interaction, that
increase the time period and therefore shrinks the gross
margin of ATM operators. These MSPs are duty-bound to
create certain that every ATM site is up as costs of
downtime are too high. With rising overheads ATM
operators struggle to pass on the cost and so are looking for
a reliable remote monitoring solution to revitalize ATM
maintenance. The proposed work implements a secure way Fig. 9. Motor Driver Circuit
of accessing an ATM by authorized persons alone in terms
of monitoring the ATM using hardware and the above said This radio frequency (RF) transmission system employs
module is accomplished by using RF Modules, RFID Amplitude Shift Keying (ASK) with transmitter/receiver
Reader, TAG,P89v51RD2 . (Tx/Rx) pair operating at 434 MHz. The transmitter module
takes serial input and transmits these signals through RF as
2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT]
shown in Fig 10. The transmitted signals are received by the [2]. Kim, Jaewoo, Jaiyong Lee, and J. Yun. "M2M service
receiver module placed away from the source of transmission. platforms: survey, issues, and enabling technologies."
(2013): 1-16.
[3]. Dujak, Mico, et al. "Machine-to-machine communication
as key enabler in smart metering systems." Information &
Communication Technology Electronics &
Microelectronics (MIPRO), 2013 36th International
Convention on. IEEE, 2013.
[4]. Kannan, P, and Ms P. Meenakshi Vidya. "Design and
Implementation of Security Based ATM theft Monitoring
system.".
[5]. Ajaykumar M (2013). “Anti-Theft ATM Machine Using
Vibration Detection Sensor” International Journal of
Advanced Research in Computer Science and Software
Engineering, pp: 23-28.
[6]. Liu, Yakun, and Xiaodong Cheng. "Design and
Fig. 10. RF Module Communications implementation of embedded Web server based on arm
and Linux." Industrial Mechatronics and Automation
The M2M-based ATM monitoring system has advantages (ICIMA), 2010 2nd International Conference on. Vol. 2.
in many aspects. Firstly, the integration of M2M platform has IEEE, 2010.
changed the traditional network structure of the monitoring [7]. http://blogs.webnms.com/m2m/2014/08/28/bid-adieu-to-
system. By implementing the whole module in real time guards-welcome-atm- site-manager/
one can make an ATM better safe from intruder and thefts. [8]. http://www.engineersgarage.com/rfid-radio-frequency-
The solution is also cost effective when compared to the identification-and-detection
existing manual solutions. [9]. http://www.engineersgarage.com/electronic-
VII. REFERENCES components/rf-module-transmitter-receiver
[10]. http://blogs.webnms.com/m2m/2013/05/31/webnms-
integrates-google-maps-in-m2m-solutions/
[1]. Kannamma, M. Barathi, B. Chanthini, and D.
Manivannan. "Controlling and monitoring process in
industrial automation using Zigbee." Advances in
Computing, Communications and Informatics (ICACCI),
2013 International Conference on. IEEE, 2013.
View publication stats