|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
 
 
International Journal of Innovation and Scientific Research
ISSN: 2351-8014
 
 
Tuesday 22 May 2018

About IJISR

News

Submission

Downloads

Archives

Custom Search

Contact

Connect with IJISR

  Call for Papers (May 2018)  
 
 
 

CONDITIONAL PRIVACY PRESERVING SECURITY PROTOCOL FOR GSM APPLICATION


Volume 22, Issue 2, April 2016, Pages 408–414

 CONDITIONAL PRIVACY PRESERVING SECURITY PROTOCOL FOR GSM APPLICATION

K. Karthikumar, M. Anto Bennet, B. Ramji, and P. Poonugundran

Original language: English

Received 31 March 2016

Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


The idea of this work is to develop the prevention of theft of the ATM card and to control the usage of the ATM card by unauthorized person. The additional feature of this work is that no transaction can be done without the knowledge of the respective card holder for the cause that GSM transactions are being implemented. The description of the work is as follows; whenever the transaction has to be done, the card is inserted inside the ATM machine and devices are made to interact with some of the legacy systems. A message is received to the mobile phone of the rightful proprietor with a pin number of four digits. This number is entered in the ATM machine. In case of password being correct it moves on to the next level of money transaction, asking for the money withdrawal. Scenario like, the password is found to be defective the transaction will get cancel.

Author Keywords: Spatial smoothing Processing (SSP), Radio Frequency Identification (RFID) technology.


How to Cite this Article


K. Karthikumar, M. Anto Bennet, B. Ramji, and P. Poonugundran, “CONDITIONAL PRIVACY PRESERVING SECURITY PROTOCOL FOR GSM APPLICATION,” International Journal of Innovation and Scientific Research, vol. 22, no. 2, pp. 408–414, April 2016.