SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 3, Issue 1 (August 2013) PP: 01-07
www.ijeijournal.com Page | 1
Design and Implementation of Security Based ATM theft
Monitoring system
Sivakumar T.1
, Gajjala Askok2
, k. Sai Venuprathap3
1
M. Tech (Embedded systems), Dept. of ECE, Kuppam Engineering College, Kuppam, Chittoor (dst), A.P, India
2
M. Tech (Embedded systems), Dept. of ECE, KEC, Kuppam -AP
3
Dept. of ECE, Asst. Professor, Kuppam Engineering College, Kuppam, Chittoor (dst), A.P, India
Abstract: The Idea of Designing and Implementation of Security Based ATM theft project is born with the
observation in our real life incidents happening around us.
This project deals with prevention of ATM theft from robbary.so overcome the drawback found in
existing technology in our society. When ever robbery occurs, Vibration sensor is used here which senses
vibration produced from ATM machine. This system uses ARM controller based embedded system to process
real time data collected using the vibration sensor. Once the vibration is sensed the beep sound will occur from
the buzzer. DC Motor is used for closing the door of ATM. Stepper motor is used to leak the gas inside the ATM
to bring the thief into unconscious stage. Camera is always in processing and sending video continuous to the
PC and it will be saved in computer. RTC used to capture the robber occur time and send the robbery occur
time with the message to the nearby police station and corresponding bank through the GSM. Hear LCD display
board using showing the output of the message continuously. This will prevent the robbery and the person
involving in robbery can be easily caught. Here, Keil tools are used to implement the idea and results are
obtained. keil tools is used for run the DC motor and stepper motor for automatic door lock and also leak the
gas inside the ATM.
Keyword: ARM controller-LPC2129, Vibration Sensor, GSM Technique, DC Motor, Stepper motor, Buzzer,
LCD Display, Keil Tool …
I. INTRODUCTION
In today’s technically advanced world, autonomous systems are gaining rapid popularity. As the social
computerization and automation has been increased and the ATM and credit card has been installed and spread
out to simplify the activity for financial activity, the banking activity has been simplified, however the crime
related with financial organization has been increased in proportion to the ratio of spread out of automation and
devices. Those crimes for the financial organization have been increased gradually from year 1999 to 2003, little
bit decreased in 2004, and then increased again from year 2005.
In the year of 2007, 212,530 of theft and 4,439 of robber cases are happened, and 269,410 of theft and
4,409 of robber cases are happened in year 2010 and also in the year 2011, 270,109 of theft and 4,509 of robber
cases are happened .so that the cases of theft and robber have been increased gradually during past 12 years.
Among the crime for financial organization, the cases of theft and robber have very high proportion of
over 90% and the crime for the ATM has been increased because the external ATM has been increased and it is
always exposed to the crime.
Therefore, this study is going to suggest the method of rapid reaction and minimization of loss by
detecting the ATM machine at real-time when it has been stolen can be found through GSM technology.
So by using the GSM technology, Vibration sensor, DC Motor, Stepper Motor, unconscious gas theft
of external ATM machine can be predicted. In this project we are using buzzer to give signal for corresponding
bank and police station. Camera is used to take the continuous video clips. Here DC Motor is used to close the
door of the ATM and stepper motor is used for emit gas and bring the theft to unconscious stage.
II. BLOCK DIAGRAM
Functional Block diagram of the proposed system in which how the ARM7 (LPC2129)is interfaced
with vibration sensor, stepper motor, GSM Modem, DC Motor, Stepper Motor, buzzer, RTC and LED display.
(i)ATM SECTION
(ii)Receiver section (In side ATM Center)
iii) Via GSM
Design and Implementation of Security Based ATM theft Monitoring system
www.ijeijournal.com Page | 2
(i) ATM Section:
(ii)Receiver section :( In side ATM Center)
NOTE: Red Antena’s --Transmitters
Green Antena’s--receivers
III. Experimental (or) Practical Work
(i)Complete hardware development of this project for ATM Security system
Design and Implementation of Security Based ATM theft Monitoring system
www.ijeijournal.com Page | 3
(ii)Practical GSM Modem:
IV. RELATED STUDY
1. ATM (Automated Teller Machine):
The first ATM in Korea was installed by Korea exchange Bank in 1975, and after installation of ATM
by Shinhan Bank in 1982, the civilian can use the ATM of various banks with Starting of operation of common
CD network which is controlled by Korea financial telecommunications & clearings institute. The number of
installed ATM machine has shown the trend of increasing continuously with the high increasing ratio in the first
half of year 2000s, and gradual increase after the year. Especially external ATM machine has been increased
continuously.
The external ATM machine is located in the entrance of kiosk booth and sidewall generally. The
security system of those external ATM protects the 1st stage with the signal lamp installed in the machined
itself, and covers the others with the open and impact detecting sensors. The impact detecting sensor generates
and sends the signal to the security center immediately to protect the ATM machine. The control center has a
rule if the emergency signal is sent and order to dispatch to the agent, the agent shall be the location within 25
minutes at the latest, however the late dispatch due to the lack of responsibility of agent and lack of number of
agent and equipment will not be done of proper and rapid reaction for the ATM theft.
Therefore, GSM Technology with addition of some more components already mention above
which is to suggest in this study is installed in the ATM, the advanced security System can be setup with the
rapid reaction implementing in real-time even the theft is happened.
2. GSM (Global System for Mobile Communications):
The GSM which is one of the representative wireless networks which has low-power, low-cost and
convenience to use .Global System for Mobile Communications originally from Groupe Special Mobile is the
most popular standard for mobile telephony systems in the world. The GSM Association, its promoting industry
trade organization of mobile phone carriers and manufacturers, estimates that 80% of the global mobile market
uses the standard. GSM is used by over 1.5 billion people across more than 212 countries and territories.
A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a
subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM
modem looks just like a mobile phone. When a GSM modem is connected to a computer, this allows the
computer to use the GSM modem to communicate over the mobile network. While these GSM modems are
most frequently used to provide mobile internet connectivity, many of them can also be used for sending and
receiving SMS and MMS messages. A GSM modem can be a dedicated modem device with a serial, USB or
Bluetooth connection, or it can be a mobile phone that provides GSM modem capabilities.
2(i) Technical details:
Most GSM networks operate in the 900 MHz or 1800 MHz bands. Some countries in the Americas
(including the United States and Canada) use the 850 MHz and 1900 MHz bands because the 900 and 1800
MHz frequency bands were already allocated. The rarer 400 and 450 MHz frequency bands are assigned in
some countries, notably Scandinavia, where these frequencies were In the 900 MHz band the uplink frequency
band is 890-915 MHz, and the downlink frequency band is 935-960 MHz this 25 MHz bandwidth is subdivided
into 124 carrier frequency channels, each spaced 200 kHz apart.
2(ii) Using GSM Modem in the ATM System:
In the system we will be using a GSM Modem to send and receive SMS. When the robbery occurs, it
will send send the message to corresponding banks and near police station (PS) according to the controller
response.
Design and Implementation of Security Based ATM theft Monitoring system
www.ijeijournal.com Page | 4
3. Vibration Sensor:
This sensor buffers a piezoelectric transducer. As the transducer is displaced from the mechanical
neutral axis, bending creates strain within the piezoelectric element and generates voltages. If the assembly is
supported by its mounting points and left to vibrate “in free space” the device will behave as a form of vibration
sensor. The sensing element should not be treated as a flexible switch, and is not intended to be bent. Sensor
Value 500 roughly corresponds to 0g acceleration. Acceleration will deflect the sensing element up or down,
causing Sensor Value to swing either way. This sensor is not meant to measure precise acceleration and
vibration - use it to detect an acceleration impulse, or the presence of vibration.
In the system we will be using a vibrating sensor (piezoelectric transducer) to find vibration from ATM
machine when ever robbery occurs.
Device Specifications:
i. Current Consumption --400uA
ii.Output Impedance --1K ohm
V. HARDWARE RESOURCES
A. Power supply circuit
The main building block of any electronic system is the power supply to provide required power for
their operation. For the microcontroller keyboard, LCD, RTC, GSM, +5V are required & for driving buzzer
+12V is required. The power supply provides regulated output of +5V & non-regulated output of +12V. The
hardware part consists of the components and the sensors used in the system. This part mainly collects the status
of the sensors and stores it into the micro controller‘s EEPROM.
B.Stepper Motor
A stepper motor is an electromechanical device which converts electrical pulses into discrete
mechanical movements. The shaft or spindle of a stepper motor rotates in discrete step increments when
electrical command pulses are applied to it in the proper sequence. The motors rotation has several direct
relationships to these applied input pulses. The sequence of the applied pulses is directly related to the direction
of motor shafts rotation. The speed of the motor shafts rotation is directly related to the frequency of the input
pulses and the length of Rotation is directly related to the number of input pulses applied.
Here we are placing this stepper motor for leak the gas inside the ATM to bring the thief into
unconscious stage.
B (i) When to Use a Stepper Motor
A stepper motor can be a good choice whenever controlled movement is required. They can be used to
advantage in applications where you need to control rotation angle, speed, position and synchronism. Because of
the inherent advantages listed previously, stepper motors have found their place in many different applications.
Design and Implementation of Security Based ATM theft Monitoring system
www.ijeijournal.com Page | 5
Some of these include printers, plotters, scanners, high end office equipment, hard disk drives, fax machines and
many more.
C. DC Motors
For the Closining the ATM door, we are using DC motors. It is operated by 12VDC power supply. In
any electric motor, operation is based on simple electromagnetism. A current carrying conductor generates a
magnetic field; when and to the strength of the external magnetic field
Here we are placing DC Motor for closing the ATM door while thief’s are trying to broken the ATM machine.
D. Motor Driver ULN2003D
The Device is a monolithic integrated high voltage, high current four channel driver designed to accept
standard DTL or TTL logic levels and drive inductive loads and switching power transistors. To simplify use as
two bridges each pair of channels is equipped with an enable input.
A separate supply input is provided for the logic, allowing operation at a lower voltage and internal clamp
diodes are included. This device is suitable for use in switching applications at frequencies up to 5 kHz. The
L293D is assembled in a 16 lead plastic package which has 4 center pins connected together and used for heat
sinking. The chip is designed to control 2 DC motors. There are 2 Input and 2 output pins for each motor.
FEATURES:
 500mA rated collector current(Single output)
 High-voltage outputs: 50V
 Inputs compatible with various types of logic.
 Relay driver application.
E. BC 547:
The BC547 is a small signal transistor. It is used to control outputs that require a higher voltage and/or
more current than an Arduino pin can provide. However, these kinds of transistors are not good for controlling
outputs that require a large amount of current (like many motors and some higher-current light sources).
Here we are placing this BC 547 to control outputs between the vibrating sensor and controller.
F. RF Communication
Radio frequency (RF) is a rate of oscillation in the range of about 3 kHz to 300 GHz, which
corresponds to the frequency of radio waves, and the alternating currents which carry radio signals. RF usually
refers to electrical rather than mechanical oscillations. The energy in an RF current can radiate off a conductor
into space as electromagnetic waves (radio waves) this is the basis of radio technology
G. JMK AV Receiver with Wireless Camera
It is mini wireless monitoring video camera and wireless receiver set for home and small business
surveillance and is used here for demonstration purpose. Simply install the wireless camera in the room where
we want to monitor and set the wireless receiver in the next room (up to 15 meters away) and hook it up to a TV
or DVR to watch the action or record the footage for the security records.
Here we are placing this wireless camera in the ATM room. Depiction of AV Receiver wireless camera sends
the continuous video footages to PC.
H. TV Capture card
A TV capture card is a computer component that allows television signals to be received by a
computer. It is a kind of television tuner. Most TV tuners also function as video capture cards, allowing them to
record television programs onto a hard disk. Digital TV tuner card is as shown in the Figure
Design and Implementation of Security Based ATM theft Monitoring system
www.ijeijournal.com Page | 6
AV Receiver and Wireless Camera
The card contains a tuner and an analog-to-digital converter along with demodulation and interface logic
VI. SOFTWARE IMPLEMENTATION
For the software implementation, we deploy two software packages. First one is the Keil µVision 3.0.
Second one is the Flash magic simulator. The Keil µVision Debugger accurately simulates on-chip peripherals
(I²C, CAN, UART, SPI, Interrupts, I/O Ports, A/D Converter, D/A Converter, and PWM Modules) of
ARM7device.
Simulation helps to understand hardware configurations and avoids time wasted on setup problems.
With simulation, we can write and test applications before target hardware is available. The system program
written in embedded C using KEIL IDE software will be stored in Microcontroller.
Keil development tools for the Microcontroller Architecture support every level of software developer
from the professional applications engineer to the student for learning about embedded software development.
The industry-standard Keil C Compilers, Macro Assemblers, Debuggers, Real-time Kernels, Single-board
Computers, and Emulators support all ARM7 derivatives.The Keil Development Tools are designed to solve the
complex problems facing embedded software developers.
Flash magic is used to dump the code to microcontroller from PC. Flash Magic is a free, powerful,
feature-rich Windows application that allows easy programming of Philips FLASH Microcontrollers. Build
custom applications for Philips Microcontrollers on the Flash Magic platform! Use it to create custom end-user
firmware programming applications, or generate an in-house production line programming tool.
The Flash Memory In-System Programmer is a tool that runs under Windows 95/98/NT4/2K. It allows
in-circuit programming of FLASH memories via a serial RS232 link. Computer side software called Flash
Magic is executed that accepts the Intel HEX format file generated from compiler Keil to be sent to target
microcontroller. It detects the hardware connected to the serial port.
VII. CONCLUSON
As we all know, these days most of the ATM has been attacked by the robberies. Also gradual
increases the theft of ATM after the year by year.
This paper demonstrates how an automation of “ATM THEFT” prevention from robbery (or) thief can
be implemented using GSM Technology ,vibrating sensor, dc motor, stepper motor, LED display, buzzer with
keil micro vision 3.0 can be implemented in ATM Machines center.
By implementing this project we can catch thief and robberie’s in ATM itself and also we can save our
precious time.
ACKNOWLEDGMENT
This work is supported by Kuppam Engineering College and thanks for valuable references provided
by the authors and my friends. Any opinions, findings, and conclusions or recommendations expressed in this
material are those of the authors and do not necessarily reflect their views
Design and Implementation of Security Based ATM theft Monitoring system
www.ijeijournal.com Page | 7
REFERENCE
[1]. Sakr, Sharif. "ARM co-founder John Biggs". Engadget. Retrieved December 23, 2011. "[...] the ARM7-
TDMI was licensed by Texas Instruments and designed into the Nokia 6110, which was the first ARM-
powered GSM phone."
[2]. electricmotors.machinedesign.com
[3]. Kim, Bo-Ra, “Domestic ATM status and meanings”, Payment and Settlement, and IT, Vol. 44, pp. 76,
2011.
[4]. Karki, James (September 2000). "Signal Conditioning Piezoelectric Sensors" (PDF). Texas Instruments.
Retrieved 2007-12-02.
[5]. "GSM UMTS 3GPP Numbering Cross Reference". ETSI. Retrieved 30 December 2009.
[6]. "Gsmd – Openmoko". Wiki.openmoko.org. 8 February 2010. Retrieved 22 April 2010.
[7]. "The Hacker's Choice Wiki". Retrieved 30 August 2010.
[8]. Liptak, Bela G. (2005). Instrument Engineers' Handbook: Process Control and Optimization. CRC Press.
p. 2464. ISBN 978-0-8493-1081-2.
[9]. Herman, Stephen. Industrial Motor Control. 6th ed. Delmar, Cengage Learning, 2010. Page 251.
[10]. Laughton M.A. and Warne D.F., Editors. Electrical engineer's reference book. 16th ed. Newnes, 2003
[11]. William H. Yeadon, Alan W. Yeadon. Handbook of small electric motors. McGraw-Hill Professional,
2001
[12]. "BC548 − NPN Epitaxial Silicon Transistor". Retrieved 28 June 2013.
[13]. World's Transistor Comparison Tables, Tech/ECA, 1993, ISBN 981-214-444-7
He completed B. E in ECE from “Sri Nandhanam College of Engineering and Technology”,
“ANNA University” from Tirupatur campus in the year 2010. He is persuing M.Tech (EMBEDDED SYSTEM)
from Kuppam Engineering College, “JNTU” from Kuppam campus. His Research interests in real time system,
control system, networks and digital communication.
He completed B. Tech in EEE from “Srikalahasteeswara institute of technology"srikalahasti campus
from JNTU in the year 2011. He is persuing M.Tech in “EMBEDDED SYSTEM” in Kuppam Engineering
College from JNTU.His Research interests in real time operating systems for handling complex operations,
Experts Systems, Artificial neural networks ,graphine based computer chip design and EHVAC,HVDC.
He completed B. Tech in ECE from MITS Madarapalli in the year 2009. He completed M.Tech in
VLSI from SRM Engineering College, Chennai in the year 2011. Currently working as Assistant Professor in
Kuppam Engineering College in the Department of ECE. His area of research is VLSI, low power VLSI, Mixed
mode level VLSI design and Data circuit design.

Weitere ähnliche Inhalte

Was ist angesagt?

Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking systemVISHAL NAGAR
 
RFID based car parking system-final ver
RFID based car parking system-final verRFID based car parking system-final ver
RFID based car parking system-final verDebasis Nayak
 
anti theft alarm for bikes by vinod and venu
anti theft alarm for bikes by vinod and venuanti theft alarm for bikes by vinod and venu
anti theft alarm for bikes by vinod and venuvenu13
 
Smart helmet by pratik panmand
Smart helmet by pratik panmandSmart helmet by pratik panmand
Smart helmet by pratik panmandPRATIKPANMAND
 
Smart helmet for safer driving
Smart helmet for safer drivingSmart helmet for safer driving
Smart helmet for safer drivingChetamoniAnusha
 
Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Diwash Kapil Chettri
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security systempragyajain53
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationranjeet1990
 
ACCIDENT DETECTION USING MOBILE PHONE.pptx
ACCIDENT DETECTION USING MOBILE  PHONE.pptxACCIDENT DETECTION USING MOBILE  PHONE.pptx
ACCIDENT DETECTION USING MOBILE PHONE.pptxAjay575757
 
Smart Helmet Alcohol Detection and Sleep Alert
Smart Helmet Alcohol Detection and Sleep AlertSmart Helmet Alcohol Detection and Sleep Alert
Smart Helmet Alcohol Detection and Sleep Alertijtsrd
 
RFID based car PARKING SYSTEM
RFID based car PARKING SYSTEM  RFID based car PARKING SYSTEM
RFID based car PARKING SYSTEM Kunal Kabra
 
IoT Based Garbage Monitoring System ppt
IoT Based Garbage Monitoring System pptIoT Based Garbage Monitoring System ppt
IoT Based Garbage Monitoring System pptRanjan Gupta
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system96452128
 
Gsm based irrigation control
Gsm based irrigation controlGsm based irrigation control
Gsm based irrigation controlSatyam Tiwari
 
Fnal year project on iot accident detection and tracking system 26-may 21'
 Fnal year project on iot accident detection and tracking system  26-may 21' Fnal year project on iot accident detection and tracking system  26-may 21'
Fnal year project on iot accident detection and tracking system 26-may 21'ankitadeokate
 

Was ist angesagt? (20)

Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
RFID based car parking system-final ver
RFID based car parking system-final verRFID based car parking system-final ver
RFID based car parking system-final ver
 
anti theft alarm for bikes by vinod and venu
anti theft alarm for bikes by vinod and venuanti theft alarm for bikes by vinod and venu
anti theft alarm for bikes by vinod and venu
 
Smart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle TheftSmart IoT Device for Vehicle Theft
Smart IoT Device for Vehicle Theft
 
Iot car parking system
Iot car parking systemIot car parking system
Iot car parking system
 
Smart helmet by pratik panmand
Smart helmet by pratik panmandSmart helmet by pratik panmand
Smart helmet by pratik panmand
 
smart Home security
smart Home securitysmart Home security
smart Home security
 
automatic room light controller
automatic room light controllerautomatic room light controller
automatic room light controller
 
Smart helmet for safer driving
Smart helmet for safer drivingSmart helmet for safer driving
Smart helmet for safer driving
 
Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...Home automation using blynk app with fan direction control and displaying sta...
Home automation using blynk app with fan direction control and displaying sta...
 
Password based wireless door opener security system
Password based wireless door opener security systemPassword based wireless door opener security system
Password based wireless door opener security system
 
Micro controller-based-power-theft-identification
Micro controller-based-power-theft-identificationMicro controller-based-power-theft-identification
Micro controller-based-power-theft-identification
 
ACCIDENT DETECTION USING MOBILE PHONE.pptx
ACCIDENT DETECTION USING MOBILE  PHONE.pptxACCIDENT DETECTION USING MOBILE  PHONE.pptx
ACCIDENT DETECTION USING MOBILE PHONE.pptx
 
Smart Helmet Alcohol Detection and Sleep Alert
Smart Helmet Alcohol Detection and Sleep AlertSmart Helmet Alcohol Detection and Sleep Alert
Smart Helmet Alcohol Detection and Sleep Alert
 
RFID based car PARKING SYSTEM
RFID based car PARKING SYSTEM  RFID based car PARKING SYSTEM
RFID based car PARKING SYSTEM
 
IoT Based Garbage Monitoring System ppt
IoT Based Garbage Monitoring System pptIoT Based Garbage Monitoring System ppt
IoT Based Garbage Monitoring System ppt
 
Smart healmet
Smart healmetSmart healmet
Smart healmet
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system
 
Gsm based irrigation control
Gsm based irrigation controlGsm based irrigation control
Gsm based irrigation control
 
Fnal year project on iot accident detection and tracking system 26-may 21'
 Fnal year project on iot accident detection and tracking system  26-may 21' Fnal year project on iot accident detection and tracking system  26-may 21'
Fnal year project on iot accident detection and tracking system 26-may 21'
 

Andere mochten auch

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMAlpesh Kurhade
 
Gsm technology
Gsm technologyGsm technology
Gsm technologyggrajan46
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Thingsteam-WIBU
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGYJOLLUSUDARSHANREDDY
 

Andere mochten auch (7)

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
000
000000
000
 
Gsm technology
Gsm technologyGsm technology
Gsm technology
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Ähnlich wie Design and Implementation of Security Based ATM theft Monitoring system

ATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorIRJET Journal
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
IRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPSIRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPSIRJET Journal
 
Biometric Vehicle Authentication System
Biometric Vehicle Authentication SystemBiometric Vehicle Authentication System
Biometric Vehicle Authentication SystemShifAnAhMed1
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...IRJET Journal
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
IRJET- IoT based Accident Tracking and Reporting
IRJET- IoT based Accident Tracking and ReportingIRJET- IoT based Accident Tracking and Reporting
IRJET- IoT based Accident Tracking and ReportingIRJET Journal
 
Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...ijsptm
 
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET Journal
 
VEHICLE POSITION AND ACCIDENT PREVENTION USING MULTISENSOR, GSM, GPS
VEHICLE POSITION AND ACCIDENT PREVENTION USING MULTISENSOR, GSM, GPSVEHICLE POSITION AND ACCIDENT PREVENTION USING MULTISENSOR, GSM, GPS
VEHICLE POSITION AND ACCIDENT PREVENTION USING MULTISENSOR, GSM, GPSDeepakK547422
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security SolutionIRJET Journal
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft systemAshu0711
 
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...IRJET Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadNishanth C
 
IRJET- Home Locker Surveillance without using CCTV Camera
IRJET- Home Locker Surveillance without using CCTV CameraIRJET- Home Locker Surveillance without using CCTV Camera
IRJET- Home Locker Surveillance without using CCTV CameraIRJET Journal
 
ATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityIRJET Journal
 

Ähnlich wie Design and Implementation of Security Based ATM theft Monitoring system (20)

ATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensorATM machine security system using GSM and MEMS sensor
ATM machine security system using GSM and MEMS sensor
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
IRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPSIRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPS
 
Biometric Vehicle Authentication System
Biometric Vehicle Authentication SystemBiometric Vehicle Authentication System
Biometric Vehicle Authentication System
 
S0102297102
S0102297102S0102297102
S0102297102
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
IRJET- IoT based Accident Tracking and Reporting
IRJET- IoT based Accident Tracking and ReportingIRJET- IoT based Accident Tracking and Reporting
IRJET- IoT based Accident Tracking and Reporting
 
Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...Security system with face recognition, sms alert and embedded network video m...
Security system with face recognition, sms alert and embedded network video m...
 
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
IRJET- Vehicle Starting using Fingerprint Sensor & Accident Detection using G...
 
B1803050722
B1803050722B1803050722
B1803050722
 
VEHICLE POSITION AND ACCIDENT PREVENTION USING MULTISENSOR, GSM, GPS
VEHICLE POSITION AND ACCIDENT PREVENTION USING MULTISENSOR, GSM, GPSVEHICLE POSITION AND ACCIDENT PREVENTION USING MULTISENSOR, GSM, GPS
VEHICLE POSITION AND ACCIDENT PREVENTION USING MULTISENSOR, GSM, GPS
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security Solution
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
 
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
IRJET-Automatic Vehicle Accident Detection and Messaging System using GSM and...
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
IRJET- Home Locker Surveillance without using CCTV Camera
IRJET- Home Locker Surveillance without using CCTV CameraIRJET- Home Locker Surveillance without using CCTV Camera
IRJET- Home Locker Surveillance without using CCTV Camera
 
ATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance SecurityATM Robbery Prevention Using Advance Security
ATM Robbery Prevention Using Advance Security
 

Mehr von International Journal of Engineering Inventions www.ijeijournal.com

Mehr von International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Design and Implementation of Security Based ATM theft Monitoring system

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 1 (August 2013) PP: 01-07 www.ijeijournal.com Page | 1 Design and Implementation of Security Based ATM theft Monitoring system Sivakumar T.1 , Gajjala Askok2 , k. Sai Venuprathap3 1 M. Tech (Embedded systems), Dept. of ECE, Kuppam Engineering College, Kuppam, Chittoor (dst), A.P, India 2 M. Tech (Embedded systems), Dept. of ECE, KEC, Kuppam -AP 3 Dept. of ECE, Asst. Professor, Kuppam Engineering College, Kuppam, Chittoor (dst), A.P, India Abstract: The Idea of Designing and Implementation of Security Based ATM theft project is born with the observation in our real life incidents happening around us. This project deals with prevention of ATM theft from robbary.so overcome the drawback found in existing technology in our society. When ever robbery occurs, Vibration sensor is used here which senses vibration produced from ATM machine. This system uses ARM controller based embedded system to process real time data collected using the vibration sensor. Once the vibration is sensed the beep sound will occur from the buzzer. DC Motor is used for closing the door of ATM. Stepper motor is used to leak the gas inside the ATM to bring the thief into unconscious stage. Camera is always in processing and sending video continuous to the PC and it will be saved in computer. RTC used to capture the robber occur time and send the robbery occur time with the message to the nearby police station and corresponding bank through the GSM. Hear LCD display board using showing the output of the message continuously. This will prevent the robbery and the person involving in robbery can be easily caught. Here, Keil tools are used to implement the idea and results are obtained. keil tools is used for run the DC motor and stepper motor for automatic door lock and also leak the gas inside the ATM. Keyword: ARM controller-LPC2129, Vibration Sensor, GSM Technique, DC Motor, Stepper motor, Buzzer, LCD Display, Keil Tool … I. INTRODUCTION In today’s technically advanced world, autonomous systems are gaining rapid popularity. As the social computerization and automation has been increased and the ATM and credit card has been installed and spread out to simplify the activity for financial activity, the banking activity has been simplified, however the crime related with financial organization has been increased in proportion to the ratio of spread out of automation and devices. Those crimes for the financial organization have been increased gradually from year 1999 to 2003, little bit decreased in 2004, and then increased again from year 2005. In the year of 2007, 212,530 of theft and 4,439 of robber cases are happened, and 269,410 of theft and 4,409 of robber cases are happened in year 2010 and also in the year 2011, 270,109 of theft and 4,509 of robber cases are happened .so that the cases of theft and robber have been increased gradually during past 12 years. Among the crime for financial organization, the cases of theft and robber have very high proportion of over 90% and the crime for the ATM has been increased because the external ATM has been increased and it is always exposed to the crime. Therefore, this study is going to suggest the method of rapid reaction and minimization of loss by detecting the ATM machine at real-time when it has been stolen can be found through GSM technology. So by using the GSM technology, Vibration sensor, DC Motor, Stepper Motor, unconscious gas theft of external ATM machine can be predicted. In this project we are using buzzer to give signal for corresponding bank and police station. Camera is used to take the continuous video clips. Here DC Motor is used to close the door of the ATM and stepper motor is used for emit gas and bring the theft to unconscious stage. II. BLOCK DIAGRAM Functional Block diagram of the proposed system in which how the ARM7 (LPC2129)is interfaced with vibration sensor, stepper motor, GSM Modem, DC Motor, Stepper Motor, buzzer, RTC and LED display. (i)ATM SECTION (ii)Receiver section (In side ATM Center) iii) Via GSM
  • 2. Design and Implementation of Security Based ATM theft Monitoring system www.ijeijournal.com Page | 2 (i) ATM Section: (ii)Receiver section :( In side ATM Center) NOTE: Red Antena’s --Transmitters Green Antena’s--receivers III. Experimental (or) Practical Work (i)Complete hardware development of this project for ATM Security system
  • 3. Design and Implementation of Security Based ATM theft Monitoring system www.ijeijournal.com Page | 3 (ii)Practical GSM Modem: IV. RELATED STUDY 1. ATM (Automated Teller Machine): The first ATM in Korea was installed by Korea exchange Bank in 1975, and after installation of ATM by Shinhan Bank in 1982, the civilian can use the ATM of various banks with Starting of operation of common CD network which is controlled by Korea financial telecommunications & clearings institute. The number of installed ATM machine has shown the trend of increasing continuously with the high increasing ratio in the first half of year 2000s, and gradual increase after the year. Especially external ATM machine has been increased continuously. The external ATM machine is located in the entrance of kiosk booth and sidewall generally. The security system of those external ATM protects the 1st stage with the signal lamp installed in the machined itself, and covers the others with the open and impact detecting sensors. The impact detecting sensor generates and sends the signal to the security center immediately to protect the ATM machine. The control center has a rule if the emergency signal is sent and order to dispatch to the agent, the agent shall be the location within 25 minutes at the latest, however the late dispatch due to the lack of responsibility of agent and lack of number of agent and equipment will not be done of proper and rapid reaction for the ATM theft. Therefore, GSM Technology with addition of some more components already mention above which is to suggest in this study is installed in the ATM, the advanced security System can be setup with the rapid reaction implementing in real-time even the theft is happened. 2. GSM (Global System for Mobile Communications): The GSM which is one of the representative wireless networks which has low-power, low-cost and convenience to use .Global System for Mobile Communications originally from Groupe Special Mobile is the most popular standard for mobile telephony systems in the world. The GSM Association, its promoting industry trade organization of mobile phone carriers and manufacturers, estimates that 80% of the global mobile market uses the standard. GSM is used by over 1.5 billion people across more than 212 countries and territories. A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. When a GSM modem is connected to a computer, this allows the computer to use the GSM modem to communicate over the mobile network. While these GSM modems are most frequently used to provide mobile internet connectivity, many of them can also be used for sending and receiving SMS and MMS messages. A GSM modem can be a dedicated modem device with a serial, USB or Bluetooth connection, or it can be a mobile phone that provides GSM modem capabilities. 2(i) Technical details: Most GSM networks operate in the 900 MHz or 1800 MHz bands. Some countries in the Americas (including the United States and Canada) use the 850 MHz and 1900 MHz bands because the 900 and 1800 MHz frequency bands were already allocated. The rarer 400 and 450 MHz frequency bands are assigned in some countries, notably Scandinavia, where these frequencies were In the 900 MHz band the uplink frequency band is 890-915 MHz, and the downlink frequency band is 935-960 MHz this 25 MHz bandwidth is subdivided into 124 carrier frequency channels, each spaced 200 kHz apart. 2(ii) Using GSM Modem in the ATM System: In the system we will be using a GSM Modem to send and receive SMS. When the robbery occurs, it will send send the message to corresponding banks and near police station (PS) according to the controller response.
  • 4. Design and Implementation of Security Based ATM theft Monitoring system www.ijeijournal.com Page | 4 3. Vibration Sensor: This sensor buffers a piezoelectric transducer. As the transducer is displaced from the mechanical neutral axis, bending creates strain within the piezoelectric element and generates voltages. If the assembly is supported by its mounting points and left to vibrate “in free space” the device will behave as a form of vibration sensor. The sensing element should not be treated as a flexible switch, and is not intended to be bent. Sensor Value 500 roughly corresponds to 0g acceleration. Acceleration will deflect the sensing element up or down, causing Sensor Value to swing either way. This sensor is not meant to measure precise acceleration and vibration - use it to detect an acceleration impulse, or the presence of vibration. In the system we will be using a vibrating sensor (piezoelectric transducer) to find vibration from ATM machine when ever robbery occurs. Device Specifications: i. Current Consumption --400uA ii.Output Impedance --1K ohm V. HARDWARE RESOURCES A. Power supply circuit The main building block of any electronic system is the power supply to provide required power for their operation. For the microcontroller keyboard, LCD, RTC, GSM, +5V are required & for driving buzzer +12V is required. The power supply provides regulated output of +5V & non-regulated output of +12V. The hardware part consists of the components and the sensors used in the system. This part mainly collects the status of the sensors and stores it into the micro controller‘s EEPROM. B.Stepper Motor A stepper motor is an electromechanical device which converts electrical pulses into discrete mechanical movements. The shaft or spindle of a stepper motor rotates in discrete step increments when electrical command pulses are applied to it in the proper sequence. The motors rotation has several direct relationships to these applied input pulses. The sequence of the applied pulses is directly related to the direction of motor shafts rotation. The speed of the motor shafts rotation is directly related to the frequency of the input pulses and the length of Rotation is directly related to the number of input pulses applied. Here we are placing this stepper motor for leak the gas inside the ATM to bring the thief into unconscious stage. B (i) When to Use a Stepper Motor A stepper motor can be a good choice whenever controlled movement is required. They can be used to advantage in applications where you need to control rotation angle, speed, position and synchronism. Because of the inherent advantages listed previously, stepper motors have found their place in many different applications.
  • 5. Design and Implementation of Security Based ATM theft Monitoring system www.ijeijournal.com Page | 5 Some of these include printers, plotters, scanners, high end office equipment, hard disk drives, fax machines and many more. C. DC Motors For the Closining the ATM door, we are using DC motors. It is operated by 12VDC power supply. In any electric motor, operation is based on simple electromagnetism. A current carrying conductor generates a magnetic field; when and to the strength of the external magnetic field Here we are placing DC Motor for closing the ATM door while thief’s are trying to broken the ATM machine. D. Motor Driver ULN2003D The Device is a monolithic integrated high voltage, high current four channel driver designed to accept standard DTL or TTL logic levels and drive inductive loads and switching power transistors. To simplify use as two bridges each pair of channels is equipped with an enable input. A separate supply input is provided for the logic, allowing operation at a lower voltage and internal clamp diodes are included. This device is suitable for use in switching applications at frequencies up to 5 kHz. The L293D is assembled in a 16 lead plastic package which has 4 center pins connected together and used for heat sinking. The chip is designed to control 2 DC motors. There are 2 Input and 2 output pins for each motor. FEATURES:  500mA rated collector current(Single output)  High-voltage outputs: 50V  Inputs compatible with various types of logic.  Relay driver application. E. BC 547: The BC547 is a small signal transistor. It is used to control outputs that require a higher voltage and/or more current than an Arduino pin can provide. However, these kinds of transistors are not good for controlling outputs that require a large amount of current (like many motors and some higher-current light sources). Here we are placing this BC 547 to control outputs between the vibrating sensor and controller. F. RF Communication Radio frequency (RF) is a rate of oscillation in the range of about 3 kHz to 300 GHz, which corresponds to the frequency of radio waves, and the alternating currents which carry radio signals. RF usually refers to electrical rather than mechanical oscillations. The energy in an RF current can radiate off a conductor into space as electromagnetic waves (radio waves) this is the basis of radio technology G. JMK AV Receiver with Wireless Camera It is mini wireless monitoring video camera and wireless receiver set for home and small business surveillance and is used here for demonstration purpose. Simply install the wireless camera in the room where we want to monitor and set the wireless receiver in the next room (up to 15 meters away) and hook it up to a TV or DVR to watch the action or record the footage for the security records. Here we are placing this wireless camera in the ATM room. Depiction of AV Receiver wireless camera sends the continuous video footages to PC. H. TV Capture card A TV capture card is a computer component that allows television signals to be received by a computer. It is a kind of television tuner. Most TV tuners also function as video capture cards, allowing them to record television programs onto a hard disk. Digital TV tuner card is as shown in the Figure
  • 6. Design and Implementation of Security Based ATM theft Monitoring system www.ijeijournal.com Page | 6 AV Receiver and Wireless Camera The card contains a tuner and an analog-to-digital converter along with demodulation and interface logic VI. SOFTWARE IMPLEMENTATION For the software implementation, we deploy two software packages. First one is the Keil µVision 3.0. Second one is the Flash magic simulator. The Keil µVision Debugger accurately simulates on-chip peripherals (I²C, CAN, UART, SPI, Interrupts, I/O Ports, A/D Converter, D/A Converter, and PWM Modules) of ARM7device. Simulation helps to understand hardware configurations and avoids time wasted on setup problems. With simulation, we can write and test applications before target hardware is available. The system program written in embedded C using KEIL IDE software will be stored in Microcontroller. Keil development tools for the Microcontroller Architecture support every level of software developer from the professional applications engineer to the student for learning about embedded software development. The industry-standard Keil C Compilers, Macro Assemblers, Debuggers, Real-time Kernels, Single-board Computers, and Emulators support all ARM7 derivatives.The Keil Development Tools are designed to solve the complex problems facing embedded software developers. Flash magic is used to dump the code to microcontroller from PC. Flash Magic is a free, powerful, feature-rich Windows application that allows easy programming of Philips FLASH Microcontrollers. Build custom applications for Philips Microcontrollers on the Flash Magic platform! Use it to create custom end-user firmware programming applications, or generate an in-house production line programming tool. The Flash Memory In-System Programmer is a tool that runs under Windows 95/98/NT4/2K. It allows in-circuit programming of FLASH memories via a serial RS232 link. Computer side software called Flash Magic is executed that accepts the Intel HEX format file generated from compiler Keil to be sent to target microcontroller. It detects the hardware connected to the serial port. VII. CONCLUSON As we all know, these days most of the ATM has been attacked by the robberies. Also gradual increases the theft of ATM after the year by year. This paper demonstrates how an automation of “ATM THEFT” prevention from robbery (or) thief can be implemented using GSM Technology ,vibrating sensor, dc motor, stepper motor, LED display, buzzer with keil micro vision 3.0 can be implemented in ATM Machines center. By implementing this project we can catch thief and robberie’s in ATM itself and also we can save our precious time. ACKNOWLEDGMENT This work is supported by Kuppam Engineering College and thanks for valuable references provided by the authors and my friends. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect their views
  • 7. Design and Implementation of Security Based ATM theft Monitoring system www.ijeijournal.com Page | 7 REFERENCE [1]. Sakr, Sharif. "ARM co-founder John Biggs". Engadget. Retrieved December 23, 2011. "[...] the ARM7- TDMI was licensed by Texas Instruments and designed into the Nokia 6110, which was the first ARM- powered GSM phone." [2]. electricmotors.machinedesign.com [3]. Kim, Bo-Ra, “Domestic ATM status and meanings”, Payment and Settlement, and IT, Vol. 44, pp. 76, 2011. [4]. Karki, James (September 2000). "Signal Conditioning Piezoelectric Sensors" (PDF). Texas Instruments. Retrieved 2007-12-02. [5]. "GSM UMTS 3GPP Numbering Cross Reference". ETSI. Retrieved 30 December 2009. [6]. "Gsmd – Openmoko". Wiki.openmoko.org. 8 February 2010. Retrieved 22 April 2010. [7]. "The Hacker's Choice Wiki". Retrieved 30 August 2010. [8]. Liptak, Bela G. (2005). Instrument Engineers' Handbook: Process Control and Optimization. CRC Press. p. 2464. ISBN 978-0-8493-1081-2. [9]. Herman, Stephen. Industrial Motor Control. 6th ed. Delmar, Cengage Learning, 2010. Page 251. [10]. Laughton M.A. and Warne D.F., Editors. Electrical engineer's reference book. 16th ed. Newnes, 2003 [11]. William H. Yeadon, Alan W. Yeadon. Handbook of small electric motors. McGraw-Hill Professional, 2001 [12]. "BC548 − NPN Epitaxial Silicon Transistor". Retrieved 28 June 2013. [13]. World's Transistor Comparison Tables, Tech/ECA, 1993, ISBN 981-214-444-7 He completed B. E in ECE from “Sri Nandhanam College of Engineering and Technology”, “ANNA University” from Tirupatur campus in the year 2010. He is persuing M.Tech (EMBEDDED SYSTEM) from Kuppam Engineering College, “JNTU” from Kuppam campus. His Research interests in real time system, control system, networks and digital communication. He completed B. Tech in EEE from “Srikalahasteeswara institute of technology"srikalahasti campus from JNTU in the year 2011. He is persuing M.Tech in “EMBEDDED SYSTEM” in Kuppam Engineering College from JNTU.His Research interests in real time operating systems for handling complex operations, Experts Systems, Artificial neural networks ,graphine based computer chip design and EHVAC,HVDC. He completed B. Tech in ECE from MITS Madarapalli in the year 2009. He completed M.Tech in VLSI from SRM Engineering College, Chennai in the year 2011. Currently working as Assistant Professor in Kuppam Engineering College in the Department of ECE. His area of research is VLSI, low power VLSI, Mixed mode level VLSI design and Data circuit design.