DEMONETIZATION AND IMPROVING SECURITY IN MONEY TRANSACTIONS USING SMART CARDS AND GSM TECHNOLOGIES
Journal Title: International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) - Year 2017, Vol 7, Issue 1
Abstract
Due to Demonetization of money in India recently, there is a need for public to use smart cards for transactions. In this paper we review various attacks on smart cards and methods of improving security in transactions. We propose a design of a system which provides very high level security by using smart card and GSM technologies. This system is equipped with a smart card reader and a GSM modem. The user essentially should carry the same mobile number as defined in the smart card with him to get access to the system. This eliminates the misusage of individual smart card technology based security systems. The main purpose of this paper is to design and give effect to a safety system based on RFID and GSM technology which can be put into order in bank, offices etc. In this system only true, right person can with draw his money from safety. We have designed a safety system based on RFID and GSM which can active, make certain, the user and unlock the door in true time for safety get way in. This system is chiefly of microcontroller, RFID reader, GSM modem, keyboard, and LCD, in this system the RFID reader reads the identification number from tag and sends to the microcontroller, if the identification number is accurate then microcontroller sends the SMS request to the person’s mobile number, for the first form let-through secret word to open the safety, if the person send the let through secret word to the microcontroller, which will make certain of the let-through secret words entered by the key board and received from phone. If these 2 let-through secret words are matched the locker will be opened otherwise it will be kept in locked position, This system is more safe than other systems because 2 let-through secret words are needed for verification.
Authors and Affiliations
SAVADAM BALAJI, H. KHAN
Performance Analysis of Ad-Hoc Routing Protocols
An ad hoc mobile network has defined that collection of mobile nodes which are capable of changing on a continual basis that is dynamically and arbitrarily located. In order to enable service between the networks, a rout...
Single Phase Microcontroller-Based Automatic Changeover Switch
Power failure or outage in a country, state or city is highly detrimental to development in public and private industries. The insecurity associated with constant or frequent power failure or outage brings about limitati...
Nyquist Transmission Improved by Multiple Turbo Codes
Working of the turbo code depends on their frame size but, the bit error rate (BER) action of turbo codes can be improved by increasing the frame size. Miserably, the frame size increases produce some defects such as the...
Dynamic Spectrum Access Technique Using Markov Chain
Dynamic Spectrum Access (DSA) is the new paradigm to access the unused spectrum at a given time. When designated user arrived on its licensed spectrum, a user will be hopped to the new vacant spectrum band in the...
A STUDY ON CHARACTERIZATION OF RADIATION INDUCED GRAPHENE OXIDE
Interaction of graphene oxide and its related micro carbons through radiation exhibits various novel properties and phenomena. Irradiation of graphene oxide in solid state or in solution through Co-60, Pm-147, Ti-204 and...