05.05.2014 Views

ADVANCED SECURITY SYSTEM FOR ATM WITH TRACKING AND SMS INDICATION

The inspiration for our project is got from newspapers and issues which are happening in our routine life. Nowadays stealing of ATM is too much increased so due to that we are just trying to find out solution for it. At some ATM centers there is no availability of security man, due to it some circumferences get chance at there. Police investigation exposed that nevertheless the bank had employed guards for round-the-clock duty, the night time guards in no way turned up. Besides, the police say, rather than setting up or fixing the ATM device to the ground, the financial institution had kept it on a desk like a TV arranged, creating it much easier for that robbers. At present thieves are not just stealing the rupees from ATM but they take away the whole cash box so because of it the security of ATMs failed to stop them, so we want to find out how we can make that cash box safe as much as possible and also will apply some security systems if we will get that something going wrong there. Nowadays money is the important thing for all the human being so that protection of it is also very important. Concentrating just on these we have choose this project. When the thief has been rush-in ATM cabin He tries to break password firstly, if he fail in it he try to beak down or hole in money chamber. As the part of the security vibration sensor is there. beyond certain vibration limit, the vibration is detected and message will be send by controller to authority GSM base station & the buzzer or light indication is appear around the ATM cabin, this is end of first security system. In the second step of the security system the pressure sensor or call as limit switch is use. if thief is try to pull-up the ATM the pressure on limit switch is decrease & switch is pull-up the detection is detected by controller & send message again to authority, as soon as signal is detected the locking system lock the door of the ATM cabin. If the thief is protecting it self in above two step of security & break the ATM cabinet glass door. & take-out whole ATM on heavy vehicle, then controller circuitry in ATM will send the tracking position to GSM on terms of altitude & longitude. & tracking ATM around the world. The use controller IC is 89VS1RD2.AT-commands used in GSM system for tracking purpose & for strikes to the authority.

The inspiration for our project is got from newspapers and issues which are happening in our routine life. Nowadays stealing of ATM is too much increased so due to that we are just trying to find out solution for it. At some ATM centers there is no availability of security man, due to it some circumferences get chance at there.
Police investigation exposed that nevertheless the bank had employed guards for round-the-clock duty, the night time guards in no way turned up. Besides, the police say, rather than setting up or fixing the ATM device to the ground, the financial institution had kept it on a desk like a TV arranged, creating it much easier for that robbers.
At present thieves are not just stealing the rupees from ATM but they take away the whole cash box so because of it the security of ATMs failed to stop them, so we want to find out how we can make that cash box safe as much as possible and also will apply some security systems if we will get that something going wrong there. Nowadays money is the important thing for all the human being so that protection of it is also very important. Concentrating just on these we have choose this project.

When the thief has been rush-in ATM cabin He tries to break password firstly, if he fail in it he try to beak down or hole in money chamber. As the part of the security vibration sensor is there. beyond certain vibration limit, the vibration is detected and message will be send by controller to authority GSM base station & the buzzer or light indication is appear around the ATM cabin, this is end of first security system.
In the second step of the security system the pressure sensor or call as limit switch is use. if thief is try to pull-up the ATM the pressure on limit switch is decrease & switch is pull-up the detection is detected by controller & send message again to authority, as soon as signal is detected the locking system lock the door of the ATM cabin.
If the thief is protecting it self in above two step of security & break the ATM cabinet glass door. & take-out whole ATM on heavy vehicle, then controller circuitry in ATM will send the tracking position to GSM on terms of altitude & longitude. & tracking ATM around the world. The use controller IC is 89VS1RD2.AT-commands used in GSM system for tracking purpose & for strikes to the authority.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

“Advanced Security System for <strong>ATM</strong> with Tracking &<br />

<strong>SMS</strong> Indication”<br />

Submitted by<br />

1) VASAVA DHRUVKUMAR BHARATBHAI. (110143111006)<br />

2) JADAV AKSHAYKUMAR RAMESHCH<strong>AND</strong>RA. (110143111016)<br />

3) GAURAV P<strong>AND</strong>EY KAMLESH. (110143111023)<br />

4) N<strong>AND</strong>VANA MANOJ BHIMJIBHAI. (100140111094)<br />

In fulfillment for the award of the degree<br />

Of<br />

BECHOLER OF ENGINEERING<br />

ELECTRONICS <strong>AND</strong> COMMUNICATION ENGINEERING<br />

Department of Electronics & Communication Engineering<br />

Government Engineering College<br />

Bharuch.<br />

Gujarat Technological University<br />

Ahmedabad<br />

May 2014<br />

1


GOVERNMENT ENGINEERING COLLEGE<br />

BHARUCH<br />

May-2014<br />

DEPARTMENT OF<br />

ELECTRONIC <strong>AND</strong> COMMUNICATION ENGINEERING<br />

CERTIFICATE<br />

This is to certify that the dissertation entitled “Advanced Security System for<br />

<strong>ATM</strong> with Tracking & <strong>SMS</strong> Indication” has been carried out by<br />

Mr.Jadav Akshaykumar Rameshchandra. (Exam No.016 /<br />

Enrollment No.110143111016) under my guidance in fulfillment of the degree of<br />

Bachelor of Engineering in Electronics and Communication 8 th semester of<br />

Gujarat Technological University, Ahmedabad during academic year 2014.<br />

Guided By: Mrs.Khushbu J Tailor<br />

Subject Coordinator<br />

(Prof. S. J. Dawda)<br />

Date of Submission: ________<br />

Head of EC Department<br />

(Prof. K. G. Bhuva)<br />

2


GOVERNMENT ENGINEERING COLLEGE<br />

BHARUCH<br />

May-2014<br />

DEPARTMENT OF<br />

ELECTRONIC <strong>AND</strong> COMMUNICATION ENGINEERING<br />

CERTIFICATE<br />

This is to certify that the dissertation entitled “Advanced Security System for<br />

<strong>ATM</strong> with Tracking & <strong>SMS</strong> Indication” has been carried out by<br />

Mr.Vasava Dhruvkumar Bharatbhai. (Exam No.006 /<br />

Enrollment No.110143111006) under my guidance in fulfillment of the degree of<br />

Bachelor of Engineering in Electronics and Communication 8 th semester of<br />

Gujarat Technological University, Ahmedabad during academic year 2014.<br />

Guided By: Mrs.Khushbu J Tailor<br />

Date of Submission: ________<br />

Subject Coordinator<br />

(Prof. S. J. Dawda)<br />

Head of EC Department<br />

(Prof. K. G. Bhuva)<br />

3


GOVERNMENT ENGINEERING COLLEGE<br />

BHARUCH<br />

May-2014<br />

DEPARTMENT OF<br />

ELECTRONIC <strong>AND</strong> COMMUNICATION ENGINEERING<br />

CERTIFICATE<br />

This is to certify that the dissertation entitled “Advanced Security System for<br />

<strong>ATM</strong> with Tracking & <strong>SMS</strong> Indication” has been carried out by<br />

Mr.Pandey Gaurav Kamlesh. (Exam No.023/<br />

Enrollment No.110143111023) under my guidance in fulfillment of the degree of<br />

Bachelor of Engineering in Electronics and Communication 8 th semester of<br />

Gujarat Technological University, Ahmedabad during academic year 2014.<br />

Guided By: Mrs.Khushbu J Tailor<br />

Date of Submission: ________<br />

Subject Coordinator<br />

(Prof. S. J. Dawda)<br />

Head of EC Department<br />

(Prof. K. G. Bhuva)<br />

4


GOVERNMENT ENGINEERING COLLEGE<br />

BHARUCH<br />

May-2014<br />

DEPARTMENT OF<br />

ELECTRONIC <strong>AND</strong> COMMUNICATION ENGINEERING<br />

CERTIFICATE<br />

This is to certify that the dissertation entitled “Advanced Security System for<br />

<strong>ATM</strong> with Tracking & <strong>SMS</strong> Indication” has been carried out by<br />

Mr.Nandavana Manoj Bhimjibhai. (Exam No.094 /<br />

Enrollment No.100140111094) under my guidance in fulfillment of the degree of<br />

Bachelor of Engineering in Electronics and Communication 8 th semester of<br />

Gujarat Technological University, Ahmedabad during academic year 2014.<br />

Guided By: Mrs.Khushbu J Tailor<br />

Date of Submission: ________<br />

Subject Coordinator<br />

(Prof. S. J. Dawda)<br />

Head of EC Department<br />

(Prof. K. G. Bhuva)<br />

5


ACKNOWLEDGEMENT<br />

It is honor and pleasure to express my heart felt gratitude to those who helped me and<br />

also contributed towards the preparation o this seminar. I am indebted to my guide Mrs.Khushbu<br />

J. Tailor. & Prof Sandip J Dawda. whose invaluable guidance and timely suggestion and<br />

constructive encouragement inspired me to complete the project in the present form. I express<br />

my thanks to the Library of Government Engineering College Bharuch which is a source of such<br />

invaluable information and of course the Internate Facility of the same. I would like to thank to<br />

the entire team of B.E. Staff whose direct and indirect suggestion helped me creating this project.<br />

I would like to pay a special thanks to my parents for the sparing their invaluable time and<br />

inspiring me. Although there remain some names but none are remain un-thanked.<br />

VASAVA DHRUV B. (110143111006)<br />

JADAV AKSHAY R. (110143111016)<br />

GAURAV P<strong>AND</strong>EY K. (110143111023)<br />

N<strong>AND</strong>VANA MANOJ B. (100140111094)<br />

B.E. Semester VII (E.C.)<br />

GEC Bharuch.<br />

6


ABSTRACT<br />

The inspiration for our project is got from newspapers and issues<br />

which are happening in our routine life. Nowadays stealing of <strong>ATM</strong> is too much<br />

increased so due to that we are just trying to find out solution for it. At some <strong>ATM</strong><br />

centers there is no availability of security man, due to it some circumferences get<br />

chance at there. Police investigation exposed that nevertheless the bank had<br />

employed guards for round-the-clock duty, the night time guards in no way turned<br />

up. Besides, the police say, rather than setting up or fixing the <strong>ATM</strong> device to the<br />

ground, the financial institution had kept it on a desk like a TV arranged, creating<br />

it much easier for that robbers. At present thieves are not just stealing the rupees<br />

from <strong>ATM</strong> but they take away the whole cash box so because of it the security of<br />

<strong>ATM</strong>s failed to stop them, so we want to find out how we can make that cash box<br />

safe as much as possible and also will apply some security systems if we will get<br />

that something going wrong there. Nowadays money is the important thing for all<br />

the human being so that protection of it is also very important. Concentrating just<br />

on these we have choose this project.<br />

7


List of Tables<br />

__________________________________________________________________<br />

Table No. Table Description Page no.<br />

Table 1 Pin description for GSM module 43<br />

Table 2 Basic AT commands 48<br />

Table 3 Protocol used in modem 52<br />

Table 4 NMEA 0183 message format 54<br />

8


List of Figures<br />

__________________________________________________________________<br />

Figure No Figure Description Page No<br />

1.1 <strong>ATM</strong> robberies 13<br />

1.2 <strong>ATM</strong> keypad display 18<br />

1.3 Filling of money in <strong>ATM</strong> 19<br />

2.1 Internal look of <strong>ATM</strong> 21<br />

2.2 Types of <strong>ATM</strong> 22<br />

2.3 Conceptual model of <strong>ATM</strong> 23<br />

2.4 Basic parts of <strong>ATM</strong> 26<br />

2.5 Transaction system 28<br />

3.2 CCTV cameras 32<br />

3.3 Micro <strong>ATM</strong> black box 33<br />

4.1 Block diagram of <strong>ATM</strong> security system 35<br />

4.2 Sensors 36<br />

4.3 89C51 microcontroller 37<br />

4.4 Block diagram of interfacing of GSM with microcontroller 39<br />

4.5 Circuit diagram of interfacing of GSM with microcontroller 40<br />

4.6 GSM module 42<br />

4.7 Internal structure of GSM modem 45<br />

4.8 SIM card interfacing with GSM module 46<br />

4.9 Pin configuration of 89C51 microcontroller 51<br />

4.10 Block diagram of GPS Receiver 52<br />

9


List of Symbols, Abbreviations & Nomenclature<br />

______________________________________________________________________________<br />

Symbol<br />

Name<br />

Abbreviations<br />

<strong>ATM</strong> Automated teller machine<br />

GSM Global system for mobile communications<br />

GPS<br />

Global positioning system<br />

GPRS General Packet radio service<br />

ABB <strong>ATM</strong> black box<br />

CCTV Closed circuit television<br />

RTPA Real-Time Process Algebra<br />

PIN<br />

Personal identification number<br />

CRT<br />

Cathode ray tube<br />

FSM Finite State Machine<br />

ARC Alarm Receiving Centre<br />

ETSI European Telecommunications Standards Institute<br />

SIM<br />

Subscriber identity module<br />

<strong>SMS</strong><br />

Short Messaging Service<br />

EDC<br />

Electronic Data Capturing<br />

10


Table of Contents<br />

__________________________________________________<br />

Acknowledgement<br />

i<br />

Abstract<br />

ii<br />

List of tables<br />

iii<br />

List of figures<br />

iv<br />

List of symbols, abbreviations and nomenclature vi<br />

Table of contents<br />

vii<br />

Chapter: 1 Introduction<br />

1.1. Problem formulation 13<br />

1.2. Subject definition 14<br />

1.3. Brief history of project 15<br />

1.4. Survey for project 17<br />

Chapter: 2 What is an <strong>ATM</strong>?<br />

2.1 <strong>ATM</strong> (Automatic teller machine) 20<br />

2.2 Basic types of <strong>ATM</strong> 22<br />

2.3 Conceptual model of <strong>ATM</strong> 23<br />

2.4 Mechanisms found inside the vault 25<br />

2.5 Parts of <strong>ATM</strong> 26<br />

2.6 Transaction system 28<br />

Chapter: 3 Securities<br />

3.1 How theft attack the machines 29<br />

3.2 Preventions 30<br />

3.3 Security devices 31<br />

3.3.1 Bull horn 31<br />

3.3.2 Security sensors 32<br />

3.3.3 CCTV cameras 32<br />

3.4 Recently launch security system 32<br />

3.5 Failure of recent security system 34<br />

11


Chapter: 4 Implementation of project work<br />

4.1 Block diagram of <strong>ATM</strong> security system 35<br />

4.1.1 Sensors 36<br />

4.1.2 Control and monitoring by alarms 37<br />

4.1.3 Microcontroller 37<br />

4.1.4 GSM message sending 38<br />

4.1.5 Interfacing of GSM with microcontroller 39<br />

4.1.6 Security activation 40<br />

4.1.7 Location finding 41<br />

4.1.8 Final action 41<br />

4.2 GSM module 42<br />

4.2.1 Introduction to GSM 42<br />

4.2.2 GSM unit 42<br />

4.2.3 Pin description 43<br />

4.2.4 GSM frequency bands 45<br />

4.2.5 SIM card interfacing 46<br />

4.2.6 Features 47<br />

4.2.7 Applications 47<br />

4.3 AT commands 48<br />

4.4 <strong>ATM</strong>EL 89C51 51<br />

4.5 GPS receiver 52<br />

4.5.1 Block diagram of GPS Receiver 52<br />

4.5.2 Protocol used in Modem 52<br />

4.5.3 NMEA 0183 message format 53<br />

4.5.4 Application of GPS receiver 53<br />

Chapter: 5 Merits/Demerits and Application<br />

6. Appendices<br />

5.1 Merits/Demerits 54<br />

5.2 Applications 55<br />

5.3 Conclusions 55<br />

6.1 Program 56<br />

7. References 66<br />

12


Chapter -1<br />

Introduction<br />

This project includes GSM based messaging and tracking of <strong>ATM</strong> during theft.<br />

1.1. PROBLEM <strong>FOR</strong>MULATION:<br />

<strong>ATM</strong> theft, it appears, is this recession’s hottest crime. There were more than 100 instances<br />

of teller machine robberies in India alone in 2010. The thieves have snatched or attempted<br />

to make off with <strong>ATM</strong>s 28 times in the past year. That’s up from 2 cases of the crime in the<br />

year before. In Atlanta, which has also seen a spike in <strong>ATM</strong> crime, as many as 35 machines<br />

have disappeared this year. As this is very big problem of safety of government money.<br />

So, we have decided to improve our present security system. In this security system GSM<br />

is used to protect <strong>ATM</strong>.<br />

Figure:1.1<br />

<strong>ATM</strong> robberies<br />

13


1.2. SUBJECT DEFINITION:<br />

It is an electronic banking outlet, which allows customers to complete basic transactions<br />

without the aid of a branch representative or teller.<br />

An Automated Teller Machine (<strong>ATM</strong>) is a safety-critical and real-time system that is highly<br />

complicated design in and implementation. This paper presents the formal design,<br />

specification, and modeling of the <strong>ATM</strong> system using a denotation mathematics known as<br />

Real-Time Process Algebra (RTPA).<br />

Using an <strong>ATM</strong>, customers can access their bank accounts in order to make cash withdrawals,<br />

debit card cash advances, and check their account balances as well as purchase prepaid cell<br />

phone credit.<br />

If the currency being withdrawn from the <strong>ATM</strong> is different from that which the bank account<br />

is denominated in, the money will be converted at an official wholesale exchange rate.<br />

Thus, <strong>ATM</strong>s often provide one of the best possible official exchange rates for foreign<br />

travelers, and are also widely used for this purpose.<br />

On most modern <strong>ATM</strong>s, the customer is identified by inserting a plastic <strong>ATM</strong> card with a<br />

magnetic stripe or a plastic smart card with a chip that contains a unique card number and<br />

some security information such as an expiration date or CVVC (CVV).<br />

Authentication is provided by the customer entering a personal identification number (PIN).<br />

The newest <strong>ATM</strong> at Royal Bank of Scotland operates without a card to withdraw cash up to<br />

£100. The customers should register first their mobile phone number and bank will give a<br />

six-digit code to enter into <strong>ATM</strong> to withdraw the cash.<br />

14


1.3. BRIEF HISTORY OF PROJECT :<br />

Still now many of theft case had been found in all over Gujarat. A minimum of six <strong>ATM</strong>s<br />

have been stolen throughout Gujarat and there were attempts to carry two a lot more in a<br />

daring robbery development noted considering the fact that February this calendar year.<br />

At the same time as the police battle to crack these scenarios, the State Bank of India has<br />

dropped above Rs forty three lakh in back-to-back <strong>ATM</strong> lifting scenarios– the 1st in Bharuch<br />

on 2 nd April, then Ahmedabad on next day– prompting the bank to act urgently and network<br />

together with the police to protected them.<br />

The most significant robbery was reported in Bharuch on 2 nd April, when an SBI <strong>ATM</strong> that<br />

contains Rs 21.eighty three lakh was lifted. The robbers ended up caught on camera.<br />

The 2nd theft was noted in Axis Bank at Koyali, wherever the robbers first disconnected<br />

CCTV cameras and after that lifted the <strong>ATM</strong>.<br />

Perhaps inspired by a fast & furious Hollywood flick, robbers stole a cash-laden Automated<br />

Teller Machine (<strong>ATM</strong>) from an SBI <strong>ATM</strong> booth in Maninagar. The heist has made the<br />

robbers richer by Rs21 lakh, not to forget an <strong>ATM</strong> worth Rs2.80 lakh where they can keep<br />

all this money safely.<br />

Dhanjibhai Rathore, branch manager with SBI, Maninagar, has filed a complaint in this<br />

regard with Maninagar police station that has commenced investigations in the matter.<br />

The entire matter came to light at when locals in the area noticed something amiss at the<br />

<strong>ATM</strong> booth in Kalgi Apartments near Jayhind Char Rasta. Investigations revealed that the<br />

robbery took place between 3am and 3.30am. The <strong>ATM</strong> that was taken away was not fixed to<br />

the ground, which is the norm.<br />

They cut off electricity supply to the machines in the <strong>ATM</strong> booth, which logged them off<br />

their nodal point at Mumbai. A CCTV camera was also disabled but another one remained<br />

on. We are trying to extract footage,<br />

15


The machines in the booth were refilled with Rs30 lakh Cops believe that robbers knew of<br />

this refill and set their targets accordingly. Moreover, there were no security personnel or<br />

mandatory GPS system at the booth, which made work easier for the thieves.<br />

Vadodara noticed back-to-back lifting of three <strong>ATM</strong>s in March by you, other than a fourth<br />

attempt that failed. While in the first incident here, the intruders lifted the <strong>ATM</strong> of Union<br />

Financial institution of India in conjunction with the CCTV cameras at Bajwa. The guard,<br />

who did not report for duty within the night of theft, was later arrested.<br />

On March 18, there was a try to lift the <strong>ATM</strong> of Punjab National Lender in Vadodara. Once<br />

the robbers failed this time, they broke the <strong>ATM</strong> device. They ended up later arrested.<br />

In most cases, it was located the banks involved had not posted guards or set up cameras. In<br />

certain instances, cameras inside of the <strong>ATM</strong>s had been non-functional.<br />

CMS employee Rahul, along with his friend stole money from <strong>ATM</strong> Machine of Punjab<br />

National Bank by hacking its password. The CMS employees know the password of <strong>ATM</strong><br />

machines as they transfer money in the machine. Both stole 9 lakh rupees from Vaghodiya-<br />

Dabhoi Ring Road. But they were caught by Crime Branch.<br />

After stealing the money they broke the <strong>ATM</strong> machine to mislead the police. But during the<br />

investigation Crime Branch learnt that the money is looted by opening the machine with<br />

password. Hence they nabbed the accused.<br />

16


1.4. SURVEY <strong>FOR</strong> PROJECT:<br />

Early <strong>ATM</strong> security focused on making the <strong>ATM</strong>s invulnerable to physical attack; they were<br />

effectively safes with dispenser mechanisms. A number of attacks on <strong>ATM</strong>s resulted, with<br />

thieves attempting to steal entire <strong>ATM</strong>s by ram-raiding.<br />

Since late 1990s, criminal groups operating in Japan improved ram-raiding by stealing and<br />

using a truck loaded with a heavy construction machinery to effectively demolish or uproot<br />

an entire <strong>ATM</strong> and any housing to steal its cash.<br />

Another attack method, Plofkraak, is to seal all openings of the <strong>ATM</strong> with silicone and fill<br />

the vault with a combustible gas or to place an explosive inside, attached, or near the <strong>ATM</strong>.<br />

This gas or explosive is ignited and the vault is opened or distorted by the force of the<br />

resulting explosion and the criminals can break in.<br />

This type of attacks can be prevented by a number of gas explosion prevention devices also<br />

known as gas suppression system.<br />

These systems use explosive gas detection sensor to detect explosive gas and to neutralize it<br />

by releasing a special explosion suppression chemical which changes the composition of the<br />

explosive gas and renders it ineffective.<br />

Several attacks in the UK (at least one of which was successful) have emulated the traditional<br />

WW2 escape from POW camps by digging a concealed tunnel under the <strong>ATM</strong> and cutting<br />

through the reinforced base to remove the money.<br />

Modern <strong>ATM</strong> physical security, per other modern money-handling security, concentrates on<br />

denying the use of the money inside the machine to a thief, by using different types<br />

of Intelligent Banknote Neutralization Systems.<br />

A common method is to simply rob the staff filling the machine with money. To avoid this,<br />

the schedule for filling them is kept secret, varying and random. The money is often kept in<br />

cassettes, which will dye the money if incorrectly opened.<br />

17


Figure: 1.2<br />

<strong>ATM</strong> keypad display<br />

‣ GSM mobile based device monitoring and control system :<br />

The purpose of this project is to monitor and control the electrical devices Using GSM<br />

module. The GSM modem provides communication mechanism between the user and<br />

microcontroller system by means of <strong>SMS</strong> system.<br />

‣ Vehicle tracker :<br />

In this Project it is proposed to design an embedded system which is used for tracking<br />

and positioning of any vehicle by using Global Positioning System (GPS) and Global<br />

system for mobile communication (GSM).<br />

18


Figure: 1.3<br />

Filling of money in <strong>ATM</strong><br />

19


Chapter -2<br />

What is an <strong>ATM</strong>?<br />

2.1 <strong>ATM</strong> (AUTOMATED TELLER MACHINE):<br />

An automated teller machine or automatic teller machine (<strong>ATM</strong>), also known as an<br />

automated banking machine in Canada, and a Cash point, cash machine or sometimes a hole<br />

in the wall in British English, is a computerized telecommunications device that provides the<br />

clients of a financial institution with access to financial transactions in a public space without<br />

the need for a cashier, human clerk or bank teller.<br />

<strong>ATM</strong>s are known by various other names including <strong>ATM</strong> machine, automated banking<br />

machine, and various regional variants derived from trademarks on <strong>ATM</strong> systems held by<br />

particular banks.<br />

On most modern <strong>ATM</strong>s, the customer is identified by inserting a plastic <strong>ATM</strong> card with a<br />

magnetic stripe or a plastic smart card with a chip that contains a unique card number and<br />

some security information such as an expiration date or CVVC (CVV). Authentication is<br />

provided by the customer entering a personal identification number (PIN).<br />

The newest <strong>ATM</strong> at Royal Bank of Scotland operates without a card to withdraw cash up to<br />

£100. The customers should registered first their mobile phone number and bank will give a<br />

six-digit code to enter into <strong>ATM</strong> to withdraw the cash<br />

Using an <strong>ATM</strong>, customers can access their bank accounts in order to make cash withdrawals,<br />

debit card cash advances, and check their account balances as well as purchase prepaid cell<br />

phone credit.<br />

If the currency being withdrawn from the <strong>ATM</strong> is different from that which the bank account<br />

is denominated in, the money will be converted at an official wholesale exchange rate.<br />

Thus, <strong>ATM</strong>s often provide one of the best possible official exchange rates for foreign<br />

travelers, and are also widely used for this purpose.<br />

20


Figure: 2.1<br />

Internal look of <strong>ATM</strong><br />

21


2.2 Basic Types of <strong>ATM</strong>:<br />

Figure: 2.2<br />

Types of <strong>ATM</strong><br />

To access the advanced features of the complex units, you will usually need to be a member<br />

of the bank that operates the machine.<br />

22


2.3 Conceptual model of <strong>ATM</strong>:<br />

An <strong>ATM</strong> system is a real-time front terminal of automatic teller services with the support of a<br />

central bank server and a centralized account database.<br />

This paper models an <strong>ATM</strong> that provides money withdraw and account balance management<br />

services.<br />

The architecture of the <strong>ATM</strong> system, as shown in Fig., encompasses an <strong>ATM</strong> processor, a<br />

system clock, a remote account database, and a set of peripheral devices such as the card<br />

reader, monitor, keypad, bills storage, and bills disburser.<br />

Figure: 2.3<br />

Conceptual model of <strong>ATM</strong><br />

23


An <strong>ATM</strong> is typically made up of the following devices:<br />

‣ CPU : To control the user interface and transaction devices<br />

‣ Magnetic Chip card reader: To identify the customer<br />

‣ PIN Pad: Similar in layout to a Touch tone or Calculator keypad, often manufactured as<br />

part of a secure enclosure.<br />

‣ Display: Used by the customer for performing the transaction<br />

‣ Function key buttons: Usually close to the display<br />

‣ Touch screen: Used to select the various aspects of the transaction<br />

‣ Record Printer: To provide the customer with a record of their transaction<br />

‣ Vault: To store the parts of the machinery requiring restricted access<br />

‣ Housing: For aesthetics and to attach signage to<br />

Due to heavier computing demands and the falling price of Personal Computer-like<br />

architectures, <strong>ATM</strong>s have moved away from custom hardware architectures using<br />

microcontrollers and/or application-specific integrated circuits to adopting the hardware<br />

architecture of a Personal Computer, such as, USB connections for peripherals, Ethernet and<br />

IP communications, and use personal computer operating systems.<br />

Although it is undoubtedly cheaper to use commercial off-the-shelf hardware, it does make<br />

<strong>ATM</strong>s potentially vulnerable to the same sort of problems exhibited by conventional<br />

Personal Computers.<br />

The vault of an <strong>ATM</strong> is within the footprint of the device itself and is where items of value<br />

are kept. Scrip cash dispensers do not incorporate a vault.<br />

24


2.4 MECHANI<strong>SMS</strong> FOUND INSIDE THE VAULT :<br />

‣ Dispensing mechanism: To provide cash or other items of value.<br />

‣ Deposit mechanism including a Check Processing Module and Bulk Note Acceptor :<br />

To allow the customer to make deposits<br />

‣ Security sensors : Magnetic, Thermal, Seismic, gas<br />

‣ Locks: to ensure controlled access to the contents of the vault<br />

‣ Journaling systems(many are electronic): A sealed flash memory device based on inhouse<br />

standards<br />

‣ Solid-state device: An actual printer, which accrues all records of activity including<br />

access timestamps, number of notes dispensed, etc. This is considered sensitive data and<br />

is secured in similar fashion to the cash as it is a similar liable.<br />

25


2.5 PARTS OF <strong>ATM</strong>:<br />

Figure: 2.4<br />

Basic parts of <strong>ATM</strong><br />

26


An <strong>ATM</strong> has two input devices:<br />

1. Card reader: The card reader captures the account information stored on the magnetic<br />

stripe on the back of an <strong>ATM</strong>/debit or credit card. The host processor uses this<br />

information to route the transaction to the cardholder's bank.<br />

2. Keypad: The keypad lets the cardholder tell the bank what kind of transaction is required<br />

(cash withdrawal, balance inquiry, etc.) and for what amount. Also, the bank requires the<br />

cardholder's personal identification number (PIN) for verification. Federal law requires<br />

that the PIN block be sent to the host processor in encrypted form.<br />

An <strong>ATM</strong> has four output devices:<br />

1. Speaker: The speaker provides the cardholder with auditory feedback when a key is<br />

pressed.<br />

2. Display screen: The display screen prompts the cardholder through each step of the<br />

transaction process. Leased-line machines commonly use a monochrome or color CRT<br />

(cathode ray tube) display. Dial-up machines commonly use a monochrome or color<br />

LCD.<br />

3. Receipt printer: The receipt printer provides the cardholder with a paper receipt of the<br />

transaction.<br />

4. Cash dispenser: The heart of an <strong>ATM</strong> is the safe and cash-dispensing mechanism. The<br />

entire bottom portion of most small <strong>ATM</strong>s is a safe that contains the cash.<br />

27


2.6 TRANSACTION <strong>SYSTEM</strong><br />

The conceptual model of an <strong>ATM</strong> system is used to be described by a Finite State Machine<br />

(FSM), which adopts a set of states and a set of state transition functions modeled by a<br />

transition diagram or a transition table to describe the basic behaviors of the <strong>ATM</strong> system.<br />

The top level behaviors of <strong>ATM</strong> can be modeled in a transition diagram as shown in Fig.<br />

Given below.<br />

Figure: 2.5<br />

Transaction system<br />

28


Chapter -3<br />

Securities<br />

Security, as it relates to <strong>ATM</strong>s, has several dimensions. <strong>ATM</strong>s also provide a practical<br />

demonstration of a number of security systems and concepts operating together and how various<br />

security concerns are dealt with. Early <strong>ATM</strong> security focused on making the <strong>ATM</strong>s invulnerable<br />

to physical attack; they were effectively safes with dispenser mechanisms. A number of attacks<br />

on <strong>ATM</strong>s resulted, with thieves attempting to steal entire <strong>ATM</strong>s by ram-raiding.<br />

3.1 HOW THEFT ATTACK ON THE MACHINE:<br />

1. Ram-raiding is a variation on burglary in which a van, SUV, car, or other heavy vehicle<br />

is driven through the windows or doors of a closed shop, usually a department store or<br />

jewelers shop, to allow the perpetrators to loot it. Since late 1990s, criminal groups<br />

operating in Japan improved ram-raiding by stealing and using a truck loaded with a<br />

heavy construction machinery to effectively demolish or uproot an entire <strong>ATM</strong> and any<br />

housing to steal its cash.<br />

2. <strong>ATM</strong> burglary: An <strong>ATM</strong> burglary is when an <strong>ATM</strong> is broken into to steal its cash. The<br />

attack takes place on site and may be a traditional “safe breaking” method or perhaps as<br />

violent as explosive attack using gas or accelerants.<br />

3. <strong>ATM</strong> Replenishment Attack Where directly employed staff, merchant or CIT courier are<br />

attacked by criminals in the process of replenishing or dealing with cassettes within the<br />

machine. Attacks usually take place when the <strong>ATM</strong> safe is open to receive / remove<br />

cassettes, or when staff are transporting moneys through unsecured areas. These attacks<br />

usually place personnel under considerable duress or physical thread.Plofkraak is used to<br />

seal all openings of the <strong>ATM</strong> with silicone and fill the vault with a combustible gas or to<br />

place an explosive inside, attached, or near the <strong>ATM</strong>. This gas or explosive is ignited and<br />

the vault is opened or distorted by the force of the resulting explosion and the criminals<br />

can break in.<br />

4. A common method is to simply rob the staff filling the machine with money.<br />

29


3.2 PREVENTIONS:<br />

1. This type of attacks can be prevented by a number of gas explosion prevention devices<br />

also known as gas suppression system. These systems use explosive gas detection sensor<br />

to detect explosive gas and to neutralize it by releasing a special explosion suppression<br />

chemical which changes the composition of the explosive gas and renders it ineffective.<br />

2. Modern <strong>ATM</strong> physical security, per other modern money-handling security, concentrates<br />

on denying the use of the money inside the machine to a thief, by using different types of<br />

Intelligent Banknote Neutralization Systems.<br />

3. To avoid rob the staff filling the machine, the schedule for filling them is kept secret,<br />

varying and random. The money is often kept in cassettes, which will dye the money if<br />

incorrectly opened.<br />

4. <strong>ATM</strong> Should be Properly attached with Ground.<br />

5. The Alert alarm should be improved such that it makes an alert to local police and local<br />

authority within time of tampered.<br />

6. A high resolution digital camera should be such placed that it is activated on tampering of<br />

<strong>ATM</strong> and take a picture automatically after each seconds.<br />

7. Theft try to open the <strong>ATM</strong> so after that a Battery attached Sock jerk can be develop with<br />

the Body of <strong>ATM</strong>.<br />

8. Cash box should be such design that it will auto lock to each other from internally<br />

9. Activation of Security alerts to be sent to all Station as per area.<br />

30


3.3 <strong>SECURITY</strong> DEVICES:<br />

3.3.1 <strong>SECURITY</strong> SENSORS:<br />

‣ Seismic sensor:<br />

The Seismic, Heat and Light detector is suitable for the detection of most known<br />

attacks on metal & concrete objects. It is used as safe and <strong>ATM</strong> sensor, also as vault<br />

and safe protection device.<br />

‣ Gas sensor:<br />

The Gas sensor is the ultimate solution against gas attacks. As soon as the specially<br />

constructed sensors detect an explosive gas, the intelligent controller releases a special<br />

explosion suppression chemical which changes the make-up of the explosive gas that<br />

renders it ineffective. Thus it prevents structural damage to the <strong>ATM</strong> and to your<br />

premises.<br />

‣ Temperature sensors:<br />

These sensors translate the temperature into a reference voltage, resistance or current,<br />

which is then measured and processed and a numerical temperature value is computed.<br />

‣ Pressure sensors:<br />

These sensors translate the increase or decrease pressure into reference voltage.<br />

‣ Vibration sensors:<br />

The robbers have the Brake or hole hardly into the <strong>ATM</strong> devices, for a certain limit of<br />

vibration is not sensing, but beyond the certain limit it sensing.<br />

31


3.3.2CCTV CAMERAES:<br />

Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a<br />

specific place, on a limited set of monitor. CCTV equipment may be used to observe<br />

parts of a process from a central control room.<br />

Figure: 3.2<br />

CCTV cameras<br />

3.4 RECENTLY LAUNCHED <strong>SECURITY</strong> <strong>SYSTEM</strong>:<br />

A GSM based system Micro ABB (<strong>ATM</strong> black box) monitors and protects the <strong>ATM</strong> centre<br />

from instances of theft and robbery. With the rising numbers of <strong>ATM</strong> attacks and <strong>ATM</strong><br />

based fraud in the country, securing the popular banking channel is fast becoming a priority<br />

for banks.<br />

Some of the most common techniques used by <strong>ATM</strong> thieves and robbers include ram raids,<br />

explosive attacks, and cutting using rotary saw and blow torch. Robberies sometimes also<br />

occur when <strong>ATM</strong>s are being replenished or serviced.<br />

32


Micro Technologies (India) Ltd. launched an innovative product for the banking sector-<br />

Micro ABB on 6th January 2012 during the ‘Cop-Community Connect’ seminar. Micro<br />

Technologies launched Micro ABB at the event.<br />

According to industry estimates, over 2.3 million <strong>ATM</strong>s around the world of which 72,000<br />

are reported to be in India. However, thefts at the <strong>ATM</strong> centers are one of the serious issues.<br />

<strong>ATM</strong>s are an important part of commerce throughout India and provide a valuable service to<br />

customers. With the growth of the use of <strong>ATM</strong>s there has also been a dramatic increase in<br />

<strong>ATM</strong> attacks and fraud.<br />

Figure: 3.3<br />

Micro <strong>ATM</strong> black box<br />

<strong>ATM</strong> physical attacks are carried out with the intention of gaining access to the cash within<br />

the <strong>ATM</strong> safe or the <strong>ATM</strong> security enclosure. Some of the most common methods include<br />

ram raids, explosive attacks (gas and non-gas) and cutting (e.g. rotary saw, blow torch,<br />

thermal lance, diamond drill).<br />

33


Robbery can also occur when <strong>ATM</strong>s are being replenished or serviced. Staffs are either held<br />

up as they are carrying money to or from an <strong>ATM</strong>, or when the <strong>ATM</strong> safe is open and cash<br />

cassettes replaced. It is a unique, state-of-art and advanced security systems developed for<br />

the Banking Sector, securing <strong>ATM</strong> machines and providing Energy Efficient Technology<br />

for <strong>ATM</strong> Centers.<br />

Micro ABB a GSM based real time security system that monitors and controls <strong>ATM</strong> centre<br />

and problems stated above. It sends alert <strong>SMS</strong> to the registered user in case of intrusion<br />

occurred due to fire, vibration, door open and motion.<br />

Micro ABB comes with life support feature like Wireless Panic Switch, which can be used<br />

by the guard in case of emergency. It is also integrated with the biometric based attendance<br />

system wherein the guard’s attendance will be recorded to minimize the time theft.<br />

Micro Technologies has received test certification for maintaining international standard for<br />

its innovative product Micro ABB. Besides, Micro ABB has been successfully installed in<br />

<strong>ATM</strong>s of many international banks that are showing satisfactory results<br />

3.5 FAILURE OF RECENT <strong>SECURITY</strong> <strong>SYSTEM</strong>S:<br />

‣ Need of guards: all the <strong>ATM</strong> centers required security guards for prevention of stealing.<br />

But in many cases those guards go for outing or get sleep, which make easy way for the<br />

thieves for their robbery. And there is no possibility to provide guards in every center and<br />

also banks have to pay for them.<br />

‣ High cost: security system in present is much costly and can’t implement in all branches.<br />

And the payment for the guard again increases it.<br />

‣ No tracking system: In present security system the security is only limited to the<br />

cashbox. No security when that cash box move away from its place. There is also no<br />

tracking system if the whole cash box is carried out.<br />

34


Chapter: 4<br />

Implementation of Project Work<br />

4.1 BLOCK DIAGRAM OF <strong>ATM</strong> <strong>SECURITY</strong> <strong>SYSTEM</strong>:<br />

Figure: 4.1<br />

Block Diagram of <strong>ATM</strong> security system<br />

35


4.1.1 Sensors:<br />

Seismic sensors are used to senses movement in the machine, and others are used to on off<br />

the camera.<br />

The Seismic, Heat and Light detector is suitable for the Detection of most known attacks<br />

on metal & concrete objects used as safe and <strong>ATM</strong> Sensor, also as vault and safe protection<br />

device Combined Seismic sensor for high Security sites.<br />

Three Detection technologies: Seismic (Bimorph sensor), light and heat. It Provide full<br />

protection to Teller Machines, Cash Dispensers, Safe Protection & Banks Safes Deposit.<br />

The seismic detectors are designed to detect attempts to break into vaults, safes, night<br />

deposit boxes, automatic teller machines (<strong>ATM</strong>s) and other reinforced physical areas such<br />

as data storage's and filing cabinets.<br />

Figure: 4.2<br />

Sensor<br />

36


The sensor is a next generation development based on proven high technology electronic<br />

processing with excellent secure detection without false alarms.<br />

Not only with a new look but also designed for the highest security with full-scale tamper<br />

protection and two possibilities of testing.<br />

4.1.2 Control and Monitoring By Alarms:<br />

Alarm Receiving Centre (ARC): The alarm system should be monitored from an ARC 24<br />

hours daily. The ARC, which should conform to ISO and local police standards, should<br />

automatically generate an alarm signal if the telephone line fails or is cut. In the event that<br />

an alarm signal is received, the ARC should respond according to its standard operating<br />

procedures.<br />

Response: In the event of an alarm the ARC should be able to request a response from a<br />

third party to visit the <strong>ATM</strong> within an agreed (ideally contractually binding) time period.<br />

System/Line Failure: In the event that the alarm detection system fails to operate for any<br />

reason, or there is a fault in the telephone line, the <strong>ATM</strong> should be cleared of all cash until<br />

such a time as the system is operation and has been tested<br />

4.1.3 Microcontroller:<br />

It is a chip having inbuilt computer processor to minimize need of external circuits.<br />

Figure: 4.3<br />

89C51 Microcontroller<br />

37


A microcontroller is a small computer on a single integrated circuit containing a processor<br />

core, memory, and programmable input/output peripherals.<br />

Program memory in the form of NOR flash or OTP ROM is also often included on chip, as<br />

well as a typically small amount of RAM.<br />

Microcontrollers are designed for embedded applications, in contrast to the<br />

microprocessors used in personal computers or other general purpose applications.<br />

4.1.4 GSM message sending:<br />

A GSM modem is a wireless modem that works with a GSM wireless network. A wireless<br />

modem behaves like a dial-up modem.<br />

The main difference between them is that a dial-up modem sends and receives data through<br />

a fixed telephone line while a wireless modem sends and receives data through radio<br />

waves.<br />

AT commands are used in GSM to send the message.<br />

Besides sending text messages, <strong>SMS</strong> can also be used to send small data messages. A<br />

single <strong>SMS</strong> message can contain up to 140 bytes of user data. These messages can be used<br />

for custom applications, telemetry and over the air programming of the phone or SIM card.<br />

Messages such as ringtones, operator logos and WAP Push messages are also encoded as<br />

data messages.<br />

38


4.1.5 Interfacing of GSM with microcontroller:<br />

Instead of sending commands from the HyperTerminal, AT commands are sent to the GSM<br />

module by the microcontroller itself. In this case, the receive (Rx) and transmit (Tx) pin of<br />

the GSM module’s RS232 port are connected to the transmit (Tx) and receive (Rx) pin<br />

of AT89C51’s serial port, respectively. This eliminated the role of computer and just the<br />

controller’s circuit provides a complete user interface for the module.<br />

Figure: 4.4<br />

Block diagram of interfacing of GSM with microcontroller<br />

The controller is programmed to send a fixed command ‘AT’ to the module.<br />

The command AT is used to check the communication with module. It returns a result code<br />

OK if the module and the controller are connected properly.<br />

If either of the module or SIM is not working, it returns a result code ERROR.<br />

39


Circuit diagram:<br />

Figure: 4.5<br />

Circuit diagram of interfacing of GSM with microcontroller<br />

4.1.6 Security Activation:<br />

After receiving message, security system which includes alarm, automatic door locking,<br />

cameras get activated. For <strong>ATM</strong> machines it is best to use two kinds of cameras.<br />

The first camera should be an obvious camera that is set up on top or very close to the<br />

<strong>ATM</strong> machine. The second camera would be a hidden camera installed inside the <strong>ATM</strong><br />

machine itself to allow it to capture the facial features of the customer. Those two cameras<br />

severe different but complementary purpos.<br />

To start with, the obvious camera can greatly assist in deterring away any type of crime or<br />

suspicious activity near the <strong>ATM</strong> machine. On top of that, it would help the viewer to<br />

40


Conceive what is happening around the <strong>ATM</strong> machine and will present the bigger picture<br />

in a better view compared to the small hidden camera.<br />

On the other hand, the hidden camera will do a great job at identifying potential hackers<br />

and thieves who try to break into the machine or try to force others into giving them their<br />

money using the <strong>ATM</strong> machine.<br />

Even though those two cameras do different things, their combined footage tell a more<br />

complete story and tend to make police investigations go a lot smother.<br />

4.1.7 Location finding:<br />

If robbers try to take the whole <strong>ATM</strong> box, the position of <strong>ATM</strong> is unknown so we can find<br />

out the position of machine by using tracking system by improved vehicle tracker.<br />

4.1.8 Final Action:<br />

When security gets activated, message is received by the authorized person and final action<br />

is taken by police and patrolling staff to catch the thieves red handed. The position of <strong>ATM</strong><br />

can find out and can secure our government property.<br />

41


The main hardware parts are listed below:<br />

4.2GSM MODULE:<br />

4.2.1 Introduction to GSM:<br />

GSM (Global System for Mobile Communications) is world's most famous Mobile<br />

platform. Mobile phones with SIM cards use GSM technology to help you communicate<br />

with your family, friends and business associates.<br />

GSM(Global System for Mobile Communications, originally Groupe Special Mobile), is a<br />

standard set developed by the European Telecommunications Standards Institute (ETSI) to<br />

describe protocols for second generation (2G) digital cellular networks used by mobile<br />

phone.<br />

4.2.2 GSM unit:<br />

The GSM Modem supports popular "AT" command set so that users can develop<br />

applications quickly. The product has SIM card holder to which activated SIM card is<br />

inserted for normal use. The power to this unit can be given from UPS to provide<br />

uninterrupted operation. This product provides great feasibility for devices in remote<br />

location to stay connected which otherwise would not have been possible where telephone<br />

line do not exist.<br />

Figure: 4.6<br />

GSM module<br />

42


4.2.3 Pin description:<br />

Feature<br />

Power supply<br />

Power saving<br />

Frequency<br />

bands<br />

GSM class<br />

Transmit<br />

power<br />

GPRS<br />

connectivity<br />

Temperature<br />

range<br />

DATA GPRS<br />

CSD<br />

<strong>SMS</strong><br />

Implementation<br />

Single supply voltage 3.4-4.5V<br />

Typical power consumption in SLEEP mode to 2.5 mA<br />

SIM300 Tri-band: EGSM 900, DCS 1800, PCS 1900. The<br />

band<br />

Can be set by AT COMM<strong>AND</strong>, and default band is<br />

EGSM 900<br />

And DCS 1800.<br />

Compliant to GSM phase 2/2+<br />

Small MS<br />

Class 4(2W) at EGSM900<br />

Class 1(1W) at DCS1800 and PCS1900<br />

GPRS multi-slot class 10<br />

GPRS mobile station class B<br />

Normal operation: -20’C to +55’C<br />

Restricted operation: =25’C to 20’C and +55’C to +70’C<br />

Storage temperature:-40’C to +80C’<br />

GPRS data downlink transfer: max 85.6 kbps<br />

GPRS data uplink transfer: max 42.8 kbps<br />

Coding scheme: CS-1, CS-2, CS-3 and CS-4<br />

SIM300 supports the protocols PAP (Password authentication<br />

Protocol) usually used for PPP connection.<br />

THE SIM300 integrates the TCP/IP protocol.<br />

Support packet Switched Broadcast Control Channel(PBCCH)<br />

CSD transmission rate:2.4, 4.8, 9.6, 14.4 kbps, non-transparent<br />

Unstructured Supplementary power supply<br />

MT,MO,CB Text and PDU mode<br />

<strong>SMS</strong> storage: sim card<br />

Support transmission of sms alternatively over CSD or GPRS<br />

43


FAX<br />

Sim Interface<br />

External<br />

antenna<br />

Audio feature<br />

Two serial<br />

interfaces<br />

Phonebook<br />

management<br />

SIM<br />

Application<br />

toolkit<br />

Real time<br />

clock<br />

Timer<br />

function<br />

Physical<br />

characteristics<br />

Firmware<br />

upgrade<br />

User can choose preferred mode.<br />

Group3 class1<br />

Supported sim card 1.8, 3V<br />

Connected via 50ohm antenna connector or antenna pad<br />

Speech codec modes:<br />

Half rate(ETS 06.20)<br />

Full rate(ETS 06.10)<br />

Enhanced full rate(ETS 06.50/06.60/06.80)<br />

Echo suppression<br />

Serial port 1 seven lines on serial port interface<br />

Serial ort 1 can be used for CSD fax, GPRS service and send<br />

Supported phonebook types: SM, FD, LD, RC, ON, MC.<br />

Supports SAT class 3, GSM 11.14 Release 98<br />

Implemented<br />

Programmable via AT commands<br />

Size: 40±0.15 × 33±0.15 × 3.3±0.3mm (including<br />

application<br />

Connector)<br />

40±0.15 × 33±0.15 × 2.85±0.3mm (excluding application<br />

Connector)<br />

Weight:8g<br />

Firmware upgradeable over serial interface<br />

Table: 1<br />

Pin description for GSM module<br />

44


4.2.4 GSM frequency bands:<br />

GSM networks operate in a number of different carrier frequency ranges (separated into<br />

GSM frequency ranges for 2G and UMTS frequency bands for 3G), with most 2G GSM<br />

networks operating in the 900 MHz or 1800 MHz bands.<br />

Where these bands were already allocated, the 850 MHz and 1900 MHz bands were used<br />

instead (for example in Canada and the United States). In rare cases the 400 and 450 MHz<br />

frequency bands are assigned in some countries because they were previously used for<br />

first-generation systems.<br />

Most 3G networks in Europe operate in the 2100 MHz frequency band.<br />

Regardless of the frequency selected by an operator, it is divided into timeslots for<br />

individual phones to use. This allows eight full-rate or sixteen half-rate speech channels per<br />

radio frequency. These eight radio timeslots (or eight burst periods) are grouped into a<br />

TDMA frame.<br />

Half rate channels use alternate frames in the same timeslot. The channel data rate for all 8<br />

channels is 270.833 Kbit/s, and the frame duration is 4.615 ms.The transmission powers in<br />

the handset is limited to a maximum of 2 watts in GSM 850/900 and 1 watt in GSM<br />

1800/1900.<br />

Figure: 4.7<br />

Internal structure of GSM modem<br />

45


4.2.5 SIM card interfacing:<br />

The SIM interface supports the functionality of the GSM Phase 1 specification and also<br />

supports the functionality of the new GSM Phase 2+ specification for FAST 64 kbps SIM<br />

(intended for use with a SIM application Tool-kit). Both 1.8V and 3.0V SIM Cards are<br />

supported.<br />

Figure: 4.8<br />

SIM card interfacing with GSM module<br />

The SIM interface is powered from an internal regulator in the module having nominal<br />

voltage 2.8V. All pins reset as outputs driving low. SIM card interface with GSM modem<br />

is shown in above figure.<br />

46


4.2.6 Features:<br />

‣ GSM/GPRS Modem using SIMCOM-300Module<br />

‣ RS232 interface DB port<br />

‣ Voice communication port<br />

‣ On board voltage regulator<br />

‣ Power / single led indication<br />

‣ Smaconnector for antenna connection<br />

‣ Mobility<br />

‣ Easy availability<br />

‣ High uptime<br />

‣ We use communication feature of Telephone landlines for internet, e-mail, data<br />

connectivity, remote monitoring, computer to computer communication, security<br />

systems. In the same way we can use GSM technology and benefit from its advantages.<br />

4.2.7 Applications:<br />

1. Access control devices:<br />

Access control devices can communicate with servers and security staff through <strong>SMS</strong><br />

messaging. Complete log of transaction is available at the head-office Server instantly<br />

without any wiring involved and device can instantly alert security personnel on their<br />

mobile phone in case of any problem.<br />

2. Transaction terminals:<br />

EDC (Electronic Data Capturing) machines can use <strong>SMS</strong> messaging to confirm<br />

transactions from central servers. The main benefit is that central server can be<br />

anywhere in the world.<br />

3. Supply Chain Management:<br />

With a central server in your head office with GSM capability, you can receive instant<br />

transaction data from all your branch offices, warehouses and business associates with<br />

nil downtime and low cost.<br />

47


4.3 “AT” commands:<br />

AT commands, also called Hayes AT commands, are based on the Hayes Modem de facto<br />

standard, ATTENTION Commands for modems.<br />

They are used to communicate with your modem. These commands modify your modem's<br />

behavior or instruct the modem to do something specific, such as dialing a telephone number.<br />

The "AT" refers to getting the Attention of your modem.<br />

To send a command to modem, we need to start a terminal program such as Windows Hyper<br />

Terminal .No matter which terminal program you use, it should be configured to communicate<br />

with the COM port that your modem is attached to.<br />

You then type commands in the Terminal window. The modem executes the command and<br />

responds appropriately. One set of AT commands will identify your modem and version<br />

information.<br />

4.3.1 Basic AT Commands:<br />

AT+CSCA="+651234567"<br />

AT+CGMI<br />

AT+GMI<br />

AT+GMM<br />

AT+CGSN<br />

AT+CGMR<br />

AT+CIMI<br />

AT+CNUM<br />

AT+CPAS<br />

AT+CREG<br />

AT+CSQ<br />

AT+CBC<br />

Set Message Center Number<br />

Get the name of manufacturer<br />

Get the ID of manufacturer<br />

Get the Model information<br />

Get IMEI number (International Mobile Equipment Identity)<br />

Get software version<br />

Get IMSI number (International Mobile Subscriber Identity)<br />

MSISDN<br />

Get mobile phone activity status<br />

Get mobile network registration status<br />

Get radio signal strength<br />

Get battery charge level and battery charging status<br />

48


ATD, ATA, etc<br />

ATD, ATA, AT+F*<br />

AT+CMGS, AT+CMSS<br />

AT+CMGR, AT+CMGL<br />

AT+CMGW<br />

AT+CMGD<br />

AT+CNMI<br />

AT+CPBR<br />

AT+CPBW<br />

AT+CPBF<br />

AT+CLCK<br />

AT+CPWD<br />

AT+CMEE=n<br />

AT+COPS=, ,<br />

<br />

Establish a data connection or voice connection to a remote<br />

modem<br />

Send and receive fax<br />

Send <strong>SMS</strong> messages<br />

Read <strong>SMS</strong> messages<br />

Write <strong>SMS</strong> messages<br />

Delete <strong>SMS</strong> messages<br />

Obtain notifications of newly received <strong>SMS</strong> messages<br />

Read phonebook entries<br />

Write phonebook entries<br />

Search phonebook entries<br />

Opening or closing facility locks<br />

Changing passwords<br />

Enable certain error messages<br />

n= 0 disable +CME ERROR: result code and use ERROR<br />

instead.<br />

n= 1 enable +CME ERROR: result code and use numeric<br />

values.<br />

N= 2 enable +CME ERROR: result code and use verbose<br />

values.<br />

Change the GSM network<br />

< mode> is used to select whether the selection is done<br />

automatically by the ME or is forced by this command<br />

tooperator given in the format and may be:<br />

= 0 automatic ( field is ignored).<br />

= 1 manual.<br />

= 2 deregister from network.<br />

= 3 set only .<br />

= 4 manual / automatic (if manual selection fails, automatic mode<br />

is entered).<br />

:<br />

49


= 0 long alphanumeric (default value).<br />

= 1 short format alphanumeric .<br />

= 2 numeric .<br />

< operator> string type given in format ; this field may<br />

be up to 16 character long for long alphanumeric format, up to 8<br />

characters for short alphanumeric format and 5 characters long<br />

for numeric format MCC/MNC codes)<br />

AT+CBST<br />

AT+CRLP<br />

AT+CPMS<br />

AT+CSAS<br />

AT+CRES<br />

AT+CMGF=1<br />

AT+CMGL="ALL"<br />

Change bearer service type<br />

Change/configure radio link protocol parameters<br />

Storage of <strong>SMS</strong> messages<br />

Save configurations of the GSM/GPRS modem<br />

Settings related to <strong>SMS</strong> messaging such as the <strong>SMS</strong> center<br />

address<br />

Instruct the GSM / GPRS modem to operate in <strong>SMS</strong> text mode<br />

List all the messages<br />

Table: 2<br />

Basic AT commands<br />

50


4.4 <strong>ATM</strong>EL 89C51:<br />

1). The Atmel 89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4K<br />

bytes of Flash programmable and erasable read only memory (PEROM)The Atmel 89C51<br />

device is manufactured using Atmel’s high-density nonvolatile memory technology and is<br />

compatible with the industry-standard MCS-51 instruction set and pin out.<br />

2). The on-chip Flash allows the program memory to be reprogrammed in-system or by a<br />

conventional nonvolatile memory programmer.<br />

3). By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C51<br />

is a powerful microcomputer which provides a highly-flexible and cost-effective solution to<br />

many embedded control applications. The Atmel 89C51 provides the following standard<br />

features: 4K Bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, a<br />

five vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator and<br />

clock circuitry.<br />

Figure: 4.9<br />

Pin configuration of 89C51 microcontroller<br />

The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and<br />

interrupt system to continue functioning. The AT89C51 Power-down Mode saves the RAM<br />

51


4.5 GPS Receiver:<br />

4.5.1 Block diagram of GPS Receiver:<br />

Figure: 4.10<br />

Block diagram of GPS Receiver<br />

The GPS Receiver consists of two units, first is active antennas which receives RF<br />

signals and amplify it. The antenna is active in the sense it takes power from the module and<br />

amplifies the signal for high sensitivity. The RF signal is filtered and proceed to generate NMEA<br />

format serial data output.<br />

4.5.2 Protocol used in modem:<br />

NMEA (0183) protocol used in GPS modem<br />

Table: 3<br />

Protocol used in modem<br />

52


4. 5. 3 NMEA 0183 message format:<br />

Table: 4<br />

NMEA 0183 message format<br />

4. 5. 4 Application of GPS Receiver:<br />

Car navigation & marine navigation.<br />

Vehicle tracking.<br />

Mapping devices application emergency locating.<br />

Geographic surveying.<br />

Personal positioning.<br />

AVL & location-based services.<br />

53


Chapter:5<br />

Merits/Demerits & Application<br />

5.1 Merits and Demerits<br />

5.1.1 Merits:<br />

1) Security of <strong>ATM</strong> is enhanced.<br />

2) Cost is lower<br />

3) Sensitivity is high.<br />

4) Installation & Maintenance charge is low.<br />

5) The Power requirement is low.<br />

6) Security of <strong>ATM</strong> & cash box is increase.<br />

7) Ease of design of circuit.<br />

8) Not bulky.<br />

9) Best security from Far.i.e. GSM modem.<br />

10) Tracking of <strong>ATM</strong> is possible.<br />

5.1.2 Demerits:<br />

1).The one and only disadvantage of its signal problem of GSM sim card in village area.<br />

54


5.2 Application:<br />

1). In all the banks (i.e.BOB, SBI, HDFC, Dena bank, etc.)<br />

2). As an electronic-Seal on goods containers.<br />

3). As a GSM-R network in Railway crossing detectors system.<br />

4). As a Vehicle tracking system.<br />

5). As a GPS system in terms of security.<br />

6). In a vehicle intrusion system.<br />

7). In a industries to give a message of machinery or products condition to the authority.<br />

5.3 Conclusions<br />

By working on this project we are trying to make better securities for the <strong>ATM</strong> machines.<br />

Due to many theft cases of <strong>ATM</strong>s over the world, the security is necessary to protect the<br />

money.<br />

In case of <strong>ATM</strong> is Moved then Bull horn with high db sounding would make alert, which can<br />

inform the nearer police or patrolling staff.<br />

After that Location Tracking would be activated and GSM unit Located in the Cash Box will<br />

send message of its GPS location of Longitudes & Latitudes to the Mobile Numbers to each<br />

1 minutes so the Path can be followed.<br />

As a more implementation, a voice Recorder will start recording Voice which will helpful for<br />

further investigation.<br />

This Security System Developed will be Combination of Vehicle Tracking and GSM<br />

messaging System with Some new added features.<br />

55


6.1 Program:<br />

#include<br />

#define port2 P2<br />

sbit rs = P1^0;<br />

sbit rw = P1^1;<br />

sbit e = P1^2;<br />

sbit sel = P3^2;<br />

sbit accident=P3^3;<br />

sbit vibration=P3^4;<br />

char info[70];<br />

char test[6]={"$GPRMC"};<br />

char comma_position[13];<br />

unsigned int check=0,i;<br />

unsigned char a;<br />

void receive_data();<br />

void send2gsm();<br />

void serial1();<br />

void lcd_time();<br />

void lcd_latitude();<br />

void lcd_longitude();<br />

void lcd_speed();<br />

void lcd_date();<br />

6. Appendices<br />

//DELAY FUNCTION<br />

void delay(unsigned int msec)<br />

{<br />

int i,j ;<br />

for(i=0;i


LCD COMM<strong>AND</strong> SENDING FUNCTION<br />

void lcd_cmd(unsigned char item)<br />

{<br />

port2 = item;<br />

rs= 0;<br />

rw=0;<br />

e=1;<br />

delay(1);<br />

e=0;<br />

return;<br />

}<br />

// LCD DATA SENDING FUNCTION<br />

void lcd_data(unsigned char item)<br />

{<br />

port2 = item;<br />

rs= 1;<br />

rw=0;<br />

e=1;<br />

delay(1);<br />

e=0;<br />

return;<br />

}<br />

// LCD STRING SENDING FUNCTION<br />

void lcd_string(unsigned char *str)<br />

{<br />

int i=0;<br />

while(str[i]!='\0')<br />

{<br />

lcd_data(str[i]);<br />

57


}<br />

i++;<br />

delay(10);<br />

}<br />

return;<br />

// SERIAL PORT SETTING<br />

void serial()<br />

{<br />

TMOD=0x20; //MODE=2<br />

TH1=0xfd; // 4800 BAUD<br />

SCON=0x50 ; // SERIAL MODE 1 ,8- BIT DATA ,1 STOP BIT ,1 START BIT ,<br />

RECEIVING ON<br />

TR1=1; //TIMER START<br />

}<br />

void serial1(unsigned char x)<br />

{<br />

SBUF=x;<br />

while(TI==0);<br />

TI=0;<br />

}<br />

void Send2Gsm(char *aaa)<br />

{<br />

unsigned int i;<br />

for(i=0;aaa[i]!=0;i++)<br />

{<br />

serial1(aaa[i]);<br />

delay(1);<br />

}<br />

}<br />

58


void sendmsg(unsigned char *msg )<br />

{<br />

Send2Gsm("AT\r\n");<br />

delay(5);<br />

Send2Gsm("AT+CMGF=1\r\n");<br />

delay(5);<br />

Send2Gsm("ATE=0\r\n");<br />

delay(5);<br />

Send2Gsm("AT+CMGS=\"9979015801\"\r\n");<br />

delay(5);<br />

//Send2Gsm(msg);<br />

//serial1(0x1a);<br />

delay(5);<br />

}<br />

void find_comma()<br />

{<br />

unsigned int i,count=0;<br />

for(i=0;i


sendmsg("hi\r");<br />

find_comma();<br />

lcd_time();<br />

lcd_date();<br />

lcd_latitude();<br />

lcd_longitude();<br />

// lcd_speed();<br />

sel=1;<br />

check=0;<br />

IE=0x90;<br />

}<br />

void receive_data() interrupt 4<br />

{<br />

info[check++]=SBUF; //Read SBUF<br />

if(check


lcd_string("TIME"); //Showing time<br />

Send2Gsm("TIME\r");<br />

lcd_cmd(0xC0); //Begining of second line<br />

lcd_data(info[c1+1]); //Displaying hours<br />

serial1(info[c1+1]);<br />

lcd_data(info[c1+2]);<br />

serial1(info[c1+2]);<br />

lcd_string(":");<br />

serial1(58);<br />

lcd_data(info[c1+3]);<br />

//Displaying minutes<br />

serial1(info[c1+3]);<br />

lcd_data(info[c1+4]);<br />

serial1(info[c1+4]);<br />

lcd_string(":");<br />

serial1(58);<br />

lcd_data(info[c1+5]); //Displaying seconds<br />

serial1(info[c1+5]);<br />

lcd_data(info[c1+6]);<br />

serial1(info[c1+6]);<br />

lcd_data(info[c1+8]);<br />

lcd_data(info[c1+9]);<br />

lcd_data(info[c1+10]);<br />

//serial1("\r");<br />

delay(250);<br />

//Delay, so one can see time<br />

}<br />

void lcd_shape() //Shape of degree symbol<br />

{<br />

lcd_cmd(64);<br />

lcd_data(10);<br />

lcd_data(17);<br />

lcd_data(17);<br />

lcd_data(10);<br />

61


lcd_data(0);<br />

lcd_data(0);<br />

lcd_data(0);<br />

lcd_data(0);<br />

}<br />

void lcd_latitude()<br />

{<br />

unsigned int c3=comma_position[2];<br />

lcd_shape();<br />

lcd_cmd(0x01); //Clear LCD display<br />

lcd_cmd(0x84); //Move cursor to position 6 of line 1<br />

lcd_string("LATITUDE"); //Showing latitude<br />

Send2Gsm("\rLATITUDE\r");<br />

lcd_cmd(0xC0); //Begining of second line<br />

lcd_data(info[c3+1]);<br />

serial1(info[c3+1]);<br />

lcd_data(info[c3+2]);<br />

serial1(info[c3+2]);<br />

lcd_data(0);<br />

lcd_data(info[c3+3]);<br />

serial1(info[c3+3]);<br />

lcd_data(info[c3+4]);<br />

serial1(info[c3+4]);<br />

lcd_data(info[c3+5]);<br />

serial1(info[c3+5]);<br />

lcd_data(info[c3+6]);<br />

serial1(info[c3+6]);<br />

lcd_data(info[c3+7]);<br />

serial1(info[c3+7]);<br />

lcd_data(info[c3+8]);<br />

serial1(info[c3+8]);<br />

lcd_data(info[c3+9]);<br />

62


serial1(info[c3+9]);<br />

lcd_data(0x27);<br />

serial1(0x27); //ASCII of minute sign(')<br />

lcd_data(info[c3+10]);<br />

serial1(info[c3+10]);<br />

lcd_data(info[c3+11]);<br />

serial1(info[c3+11]);<br />

//serial1(0x1a);<br />

delay(250);<br />

}<br />

void lcd_longitude()<br />

{<br />

unsigned int c5=comma_position[4];<br />

lcd_cmd(0x01); //Clear LCD display<br />

lcd_cmd(0x84); //Move cursor to position 4 of line 1<br />

lcd_string("LONGITUDE"); //Showing longitude<br />

lcd_cmd(0xC0);<br />

//Begining of second line<br />

Send2Gsm("\rLONGITUDE\r");<br />

lcd_data(info[c5+1]);<br />

serial1(info[c5+1]);<br />

lcd_data(info[c5+2]);<br />

serial1(info[c5+2]);<br />

lcd_data(info[c5+3]);<br />

serial1(info[c5+3]);<br />

lcd_data(0);<br />

serial1(0);<br />

lcd_data(info[c5+4]);<br />

serial1(info[c5+4]);<br />

lcd_data(info[c5+5]);<br />

serial1(info[c5+5]);<br />

lcd_data(info[c5+6]);<br />

serial1(info[c5+6]);<br />

63


lcd_data(info[c5+7]);<br />

serial1(info[c5+7]);<br />

lcd_data(info[c5+8]);<br />

serial1(info[c5+8]);<br />

lcd_data(info[c5+9]);<br />

serial1(info[c5+9]);<br />

lcd_data(info[c5+10]);<br />

serial1(info[c5+10]);<br />

lcd_data(0x27); //ASCII of minute sign(')<br />

serial1(0x27);<br />

lcd_data(info[c5+11]);<br />

serial1(info[c5+11]);<br />

lcd_data(info[c5+12]);<br />

serial1(info[c5+12]);<br />

serial1(0x1a);<br />

delay(250);<br />

}<br />

void lcd_date()<br />

{<br />

unsigned int c9=comma_position[8];<br />

lcd_cmd(0x01); //Clear LCD display<br />

lcd_cmd(0x85); //Move cursor to position 5 of line 1<br />

lcd_string("DATE");<br />

lcd_cmd(0xC0);<br />

lcd_data(info[c9+1]);<br />

lcd_data(info[c9+2]);<br />

lcd_data('-');<br />

lcd_data(info[c9+3]);<br />

lcd_data(info[c9+4]);<br />

lcd_data('-');<br />

lcd_data(info[c9+5]);<br />

lcd_data(info[c9+6]);<br />

64


delay(250);<br />

}<br />

void main()<br />

{<br />

unsigned int i;<br />

i=0;<br />

accident=1;<br />

vibration=1;<br />

while(1)<br />

{<br />

sel=1;<br />

serial();<br />

lcd_cmd(0x38); //2 LINE, 5X7 MATRIX<br />

lcd_cmd(0x0e); //DISPLAY ON, CURSOR BLINKING<br />

//lcd_string("SPEED(inKNOTS)");<br />

//delay(20);<br />

IE=0x90;<br />

while(1)<br />

{<br />

if(check==69)<br />

compare();<br />

if(!vibration)<br />

{<br />

sel=0;<br />

sendmsg("<strong>ATM</strong> IS UNSECURED\r");<br />

sel=1;<br />

}<br />

//<br />

}<br />

i++;<br />

}<br />

}<br />

65


7. References<br />

1. AT commands: http://www.simcom-sh.com<br />

2. Alarm security: http://www.bullhornatmalarm.com/Bull_Horn_<strong>ATM</strong>_Alarm.pdf<br />

3. ABB: http://www.Microtechnologies.netpdfnewsMicro_ABB.pdf<br />

4. GSM modem: http://www.nowsms.com/faq/what-is-a-gsm-modem<br />

5. Interfacing of GSM with Microcontroller:<br />

6. http://www.electronicsbasedprojects4u.blogspot.in/2012/03/interfacing-gsm-module-with-<br />

8051.html<br />

66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!