Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
339 views

Advanced ATM Security System by Using Smart Card and IOT Technology

This document describes a project that aims to develop an advanced ATM security system using smartcard and IoT technology. It is a project report submitted by 5 students for their Bachelor of Technology degree. The report includes an introduction, literature review, proposed system description, hardware implementation details, software components, results and analysis, and conclusion sections. The proposed system uses a smart card reader interfaced with an ARM-7 microcontroller to authenticate users with valid smart cards and allow access to secure areas or devices.

Uploaded by

kota naik
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
339 views

Advanced ATM Security System by Using Smart Card and IOT Technology

This document describes a project that aims to develop an advanced ATM security system using smartcard and IoT technology. It is a project report submitted by 5 students for their Bachelor of Technology degree. The report includes an introduction, literature review, proposed system description, hardware implementation details, software components, results and analysis, and conclusion sections. The proposed system uses a smart card reader interfaced with an ARM-7 microcontroller to authenticate users with valid smart cards and allow access to secure areas or devices.

Uploaded by

kota naik
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 69

ADVANCED ATM SECURITY SYSTEM BY USING

SMARTCARD AND IoT TECHNOLOGY


A project report submitted in partial fulfillment of the requirements for the award of
the degree of

BACHELOR OF TECHNOLOGY
in
COMPUTER SCIENCE AND ENGINEERING
By

K. LAKSHMI PRIYA (16A31A0574)


S.SRI RAMYA (16A31A0590)
N.PRATHYUSHA (16A31A0583)
A.V.SANDEEP (16A31A0596)
M.M.RAJIV PRAKASH (16A31A05B1)

Under the Esteemed Guidance of


Internal Guide Head of the Department
Mr. A. Janarthan Rao Dr. M. Radhika Mani
Asst. Professor Professor & HOD

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

PRAGATI ENGINEERING COLLEGE


(AUTONOMOUS)
(Approved by AICTE & Permanently Affiliated to JNTUK, Kakinada & Accredited by NAAC)
1-378, ADB Road, Surampalem, E.G.Dist., A.P, Pin-533437.

2019-2020

i
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

PRAGATI ENGINEERING COLLEGE


(AUTONOMOUS)
(Approved by AICTE & Permanently Affiliated to JNTUK & Accredited by NAAC)
1-378, ADB Road, Surampalem, E.G.Dist., A.P, Pin-533437.

CERTIFICATE
This is to certify that the report entitled “Advanced ATM Security System

By Using Smart card and IoT Technology”, that is being submitted by K.


LAKSHMI PRIYA (16A31A0574), S. SRI RAMYA (16A31A0590),
N. PRATHYUSHA (16A31A0583), A.V. SANDEEP (16A31A0596),
M.M. RAJIV PRAKASH (16A31A05B1), in partial fulfillment for the
award of the Degree of Bachelor of Technology in Computer Science and
Engineering, Pragati Engineering College is a record of bonafide work carried out
by them.

Internal Guide Head of the Department


Mr. A. Janarthan Rao, M.Tech Dr. M. Radhika Mani ,PhD
Asst. Professor, Dept. of CSE Head of the Department, CSE

External Examiner

ii
ACKNOWLEDGMENT
Entrusting into Project work of “Advanced ATM Security System By Using Smart
card and IoT Technology” enabled us to express our special thanks to Dr. P.
Krishna Rao, Chairman of Pragati Engineering College, (Autonomous)
Surampalem.

We extremely thankful to our honorable Principal Dr. S. Sambhu Prasad, who has
shown keen interest in us and encouraged us by providing all the facilities to
complete our project successfully.

We owe our gratitude to our beloved Head of the Department of CSE, Dr.
M.Radhika Mani, for assisting us in completing our project work.

We express our sincere thanks to our guide Mr. A. Janarthan Rao who has been a
source of inspiration for us throughout our project and for his valuable advices in
making our project a success.

We wish to express my sincere thanks to all teaching and non-teaching staff of


Computer Science and Engineering Department.

K. LAKSHMI PRIYA (16A31A0574)


S.SRI RAMYA (16A31A0590)
N.PRATHYUSHA (16A31A0583)
A.V.SANDEEP (16A31A0596)
M.M. RAJIV PRAKASH (16A31A05B1)

iii
ABSTRACT

This project is designed to gain access to an area or control a device by using a valid

smart card only. The security of any organization is the top most priority for the

concerned authorities. For this reason only, the authorized person with a valid smart

card is allowed to operate the device/ to access a secure area. Earlier, human

supervision was required to monitor all these parameters, but with this proposed

system no supervision is required as only authorized persons are provided with valid

smart cards to operate devices.

A smart card reader is provided to read data from the card assigned to the

authorized personnel. The smart card reader is interfaced to an ARM-7. Whenever the

data read by the smart card matches with the data on the microcontroller then LCD

would display that the card is authorized and a relay is used simultaneously to switch

ON a lamp (indicating a device or access to secure area). If an invalid card is inserted

in the smart card reader, it displays that the card is not authorized and the load (i.e.

lamp) remains OFF indicating that the user is not authorized to access the particular

area/device.

This project can be enhanced further by integrating GSM modem such that

any attempt of unauthorized access is made, then an alert SMS is sent to the

concerned department. Further it can be upgraded to Thumb / IRIS identification

system for higher degree of security system.

iv
TABLE OF CONTENTS
ACKNOWLEDGMENT iii

ABSTRACT iv

LIST OF FIGURES viii

LIST OF TABLES ix

LIST OF ABBREIVATIONS x

Chapter 1 INTRODUCTION 1

1.1 Introduction 1

1.2 Embedded System 2

1.3 Characteristics 3

1.4 Definition of IoT 3

1.5 Characteristics of IoT 4

1.6 Architecture of Internet of Things 5

1.6.1 Application Layer 5

1.6.2 Gateway and Network Layer 5

1.6.3 Management Layer 5

1.6.4 Sensor Layer 5

1.7 Applications 6

1.8 Micro Processor (MPU) 7

1.9 Micro Controller (MCU) 7

1.10 Comparison between Micro Processor and

Micro Controller 8

v
Chapter 2 OVERVIEW OF THE PROJECT 9

2.1 IoT Based Wireless sensor network 9

2.2 Existing System 10

2.3 Proposed System 11

2.3.1 Block Diagram 12

2.3.2 Hardware Components 12

2.3.3 Techniques used in this project 12

2.4 Flow Chart 13

2.5 Description 14

Chapter 3 HARDWARE IMPLEMENTATION 15

3.1 Power Supply 15

3.1.1 Step down the voltage level 16

3.1.2 Convert AC to DC 16

3.2 LCD(Liquid Crystal Display) 17

3.3 VOLTAGE CONVERTER (MAX232) 18

3.3.1 RS232 & TTL 18

3.3.2 MAX232 19

3.4 GSM (Global System for Mobile

communication) 19

3.4.1 The Future of GSM 20

3.4.2 GSM At Commands 21

3.5 RFID Module( Radio Frequency

Identification) 21

3.5.1 RFID Tags 21

3.5.2 Readers 23

vi
3.5.3 Antennas and Radio 24

3.5.4 The Computer Network 25

3.6 Smart Cards 26

3.7 ARM (Advanced RISC Machine) 26

3.7.1 ARM-7 Based LPC2148

Micro Controller 26

3.7.2 PIN Configuration 27

3.7.3 PIN Description 28

3.8 Motor 35

Chapter 4 SOFTWARE COMPONENTS 36

4.1 KEIL u-Vision Software 36

4.1.1 Procedural Steps For Compilation,

Simulation And Dumping 36

4.2 Proteus 44

4.2.1 Introduction 44

4.2.2 Introduction to Proteus 45

Chapter 5 RESULT AND ANALYSIS 47

Chapter 6 CONCLUSION 49

BIBLIOGRAPHY 50

APPENDIX 51

vii
LIST OF FIGURES

Figure No. Name of the Figure Page. No.

Figure 1.1 IoT Technology 4


Figure 1.2 Application areas Block Diagram 6
Figure 1.3 Block diagram of micro processor 7
Figure 1.4 Microcontroller 8
Figure 2.1 Smart Cards 11
Figure 2.2 Block Diagram of The Proposed System 12
Figure 2.3 Flow Chart 13
Figure 3.1 Power Supply 15
Figure 3.2 Step down the voltage level 16
Figure 3.3 Convert Ac To Dc 17
Figure 3.4 Liquid Crystal Display 18
Figure 3.5 Voltage Converter (MAX232) 18
Figure 3.6 Basic internal block diagram of Max232 19
Figure 3.7 Structure of GSM Network 20
Figure 3.8 RFID Tags 22
Figure 3.9 RFID Tag Format 22
Figure 3.10 ARM7/Based Microcontroller (LPC2148) Pin Configuration 27
Figure 3.11 Brushless Dc Motor 35
Figure 4.1 The Main Difference Between The Dotted PCB And Layout PCB 44
Figure 5.1 Schematic Diagram 47
Figure 5.2 Project Kit Photo 48

viii
LIST OF TABLES

Table No. Name of the Table Page. No.

Table 1 EPIC RFID Classes 23


Table 2 EPIC RFID Chip Generation 23
Table 3 Band Frequency, Wavelength and Classical Usage 25

ix
LIST OF ABBREVIATIONS

Abbreviation Description
ATM Automated Teller Machine
ALU Arithmetic Logical Unit
SCI Serial Communication Interface
USB Universal Serial Bus
WSN Wireless Sensor Network
GSM Global System for Mobile
MEMS Micro Electrical Mechanical Systems
RPS Regulated Power Supply
LCD Liquid Crystal Display
RFID Radio Frequency Identification
ARM Arithmetic RISC Machine
RISC Reduced Instruction Set Computer
SOA Service Oriented Architecture
TDMA Time Division Multiple Access
FDMA Frequency Division Multiple Access
AC Alternate Current
DC Direct Current
LED Light Emitting Diode
GPIO General Purpose Input Output
MAC Medium Access Control
JTAG Joint Test Action Group
USART Universal Synchronous/Asynchronous
Receiver/Transmitter

x
Advanced ATM Security System By Using Smart card and IOT Technology

CHAPTER 1

INTRODUCTION

1.1 INTRODUCTION:

Microcontroller are widely used in Embedded Systems products. An


Embedded product uses the micrprocessor(or microcontroller) to do one task & one
task only. A printer is an example of Embedded system since the processor inside it
perform one task only namely getting the data and printing it. Although
microcontroller are preferred choice for many Embedded systems, There are times
that a microcontroller is inadequate for the task. For this reason in recent years many
manufactures of general purpose microprocessors such as INTEL, Motorolla, AMD
& Cyrix have targeted their microprocessors for the high end of Embedded
market.One of the most critical needs of the embedded system is to decrease power
consumptions and space. This can be achieved by integrating more functions into the
CPU chips. All the embedded processors have low power consumptions in additions
to some forms of I/O,ROM all on a single chip. In higher performance Embedded
system the trend is to integrate more & more function on the CPU chip & let the
designer decide which feature he/she wants to use.

1.2 EMBEDDED SYSTEM:

Physically, embedded systems range from portable devices such as digital


watches and MP3 players, to large stationary installations like traffic lights, factory
controllers, or the systems controlling nuclear power plants. Complexity varies from
low, with a single microcontroller chip, to very high with multiple units, peripherals
and networks mounted inside a large chassis or enclosure

In general, "embedded system" is not an exactly defined term, as many


systems have some element of programmability. For example, Handheld computers
share some elements with embedded systems such as the operating systems and
microprocessors which power them but are not truly embedded systems, because they
allow different applications to be loaded and peripherals to be connected. Embedded
systems span all aspects of modern life and there are many examples of their use.

Pragati Engineering College Page 1


Advanced ATM Security System By Using Smart card and IOT Technology

Telecommunications systems employ numerous embedded systems from telephone


switches for the network to mobile phones at the end-user. Computer networking uses
dedicated routers and network bridges to route data.

Examples of Embedded System:

 Automated tiller machines (ATMS).


 Integrated system in aircraft and missile.
 Cellular telephones and telephonic switches.
 Computer network equipment, including routers timeservers and firewalls
 Computer printers, Copiers.
 Disk drives (floppy disk drive and hard disk drive)
 Engine controllers and antilock brake controllers for automobiles.
 Home automation products like thermostat, air conditioners sprinkles and
security monitoring system.
 House hold appliances including microwave ovens, washing machines, TV
sets DVD layers/recorders.

1.3 CHARACTERISTICS:

Embedded systems are designed to do some specific task, rather than be a


general-purpose computer for multiple tasks. Some also have real-time performance
constraints that must be met, for reasons such as safety and usability; others may have
low or no performance requirements, allowing the system hardware to be simplified
to reduce costs.

Embedded systems are not always standalone devices. Many embedded


systems consist of small, computerized parts within a larger device that serves a more
general purpose. For example, the Gibson Robot Guitar features an embedded system
for tuning the strings, but the overall purpose of the Robot Guitar is, of course, to play
music. Similarly, an embedded system in an automobile provides a specific function
as a subsystem of the car itself.

The software written for embedded systems is often called firmware, and
is usually stored in read-only memory or Flash memory chips rather than a disk drive.

Pragati Engineering College Page 2


Advanced ATM Security System By Using Smart card and IOT Technology

It often runs with limited computer hardware resources: small or no keyboard, screen,
and little memory.

1.4 DEFINATION OF INTERNET OF THINGS:


The term "Internet of Things" has come to describe a number of technologies and
research disciplines that enable the Internet to reach out into the real world of physical
objects. The Internet of Things, also called The Internet of Objects, refers to a
wireless network between objects. From any time, any place connectivity for anyone,
we will now have connectivity for anything!

Fig 1.1 IOT Technology

1.5 CHARACTERISTICS OF INTERNET OF THINGS


 Event driven
 Ambient intelligence
 Flexible structure
 Semantic sharing
 Complex access technology

Anyone who says that the Internet has fundamentally changed society may be
right, but at the same time, the greatest transformation actually still lies ahead of us.
Several new technologies are now converging in a way that means the Internet is on

Pragati Engineering College Page 3


Advanced ATM Security System By Using Smart card and IOT Technology

the brink of a substantial expansion as objects large and small get connected and
assume their own web identity.

Following on from the Internet of computers, when our servers and personal
computers were connected to a global network, and the Internet of mobile telephones,
when it was the turn of telephones and other mobile units, the next phase of
development is the Internet of things, when more or less anything will be connected
and managed in the virtual world. This revolution will be the Net’s largest
enlargement ever and will have sweeping effects on every industry — and all of our
everyday lives.

Smart connectivity with existing networks and context-aware computation


using network resources is an indispensable part of IoT. With the growing presence of
Wi-Fi and 4G-LTE wireless Internet access, the evolution towards ubiquitous
information and communication networks is already evident. However, for the
Internet of Things vision to successfully emerge, the computing paradigm will need to
go beyond traditional mobile computing scenarios that use smart phones and
portables, and evolve into connecting everyday existing objects and embedding
intelligence into our environment. For technology to disappear from the
consciousness of the user, the Internet of Things demands: a shared understanding of
the situation of its users and their appliances, software architectures and pervasive
communication networks to process and convey the contextual information to where
it is relevant, and the analytics tools in the Internet of Things that aim for
autonomous and smart behavior. With these three fundamental grounds in place,
smart connectivity and context-aware computation can be accomplished.

1.6 ARCHITECTURE OF INTERNET OF THINGS

Architecture of internet Of Things contains basically 4 layers:

1. Application Layer
2. Gateway and the network layer
3. Management Service layer
4. Sensor layer

Pragati Engineering College Page 4


Advanced ATM Security System By Using Smart card and IOT Technology

1.6.1 Application Layer:

 Lowest Abstraction Layer

 With sensors we are creating digital nervous system.

 Incorporated to measure physical quantities

 Interconnects the physical and digital world

 Collects and process the real time information

1.6.2 Gateway And The Network Layer:

 Robust and High performance network infrastructure

 Supports the communication requirements for latency, bandwidth or security

 Allows multiple organizations to share and use the same network


independently

1.2.3 Management Layer:

 Capturing of periodic sensory data

 Data Analytics (Extracts relevant information from massive amount of raw


data)

 Streaming Analytics (Process real time data)

 Ensures security and privacy of data.

1.6.4 Sensor Layer:

 Provides a user interface for using IoT.

 Different applications for various sectors like Transportation, Healthcare,


Agriculture, Supply chains, Government, Retail etc.

Pragati Engineering College Page 5


Advanced ATM Security System By Using Smart card and IOT Technology

1.7 APPLICATIONS:

There are several application domains which will be impacted by the emerging
Internet of Things. The applications can be classified based on the type of network
availability, coverage, scale, heterogeneity, repeatability, user involvement and
impact.

We categorize the applications into four application domains:

(1) Personal and Home

(2) Enterprise

(3) Utilities

(4) Mobile.

There is a huge crossover in applications and the use of data between


domains. For instance, the Personal and Home IoT produces electricity usage data in
the house and makes it available to the electricity (utility) company which can in turn
optimize the supply and demand in the Utility IoT. The internet enables sharing of
data between different service providers in a seamless manner creating multiple
business opportunities.

Fig1.2 Application Areas Block Diagram

Pragati Engineering College Page 6


Advanced ATM Security System By Using Smart card and IOT Technology

1.8 MICROPROCESSOR (MPU)

A microprocessor is a general-purpose digital computer central


processing unit(CPU). Although popularly known as a “computer on a chip” is in
no sense a complete digital computer. The block diagram of a microprocessor CPU is
shown, which contains an arithmetic and logical unit (ALU), a program counter
(PC), a stack pointer (SP),some working registers, a clock timing circuit, and interrupt
circuits.

CPU Serial
RAM ROM COM
General I/O Port Timer Port
MICROCONT
ROLLERS
(MCU)-
Purpose

Fig 1.3 Block diagram of micro processor

1.9 Microcontroller (MCU):


Figure shows the block diagram of a typical microcontroller. The design
incorporates all of the features found in micro-processor CPU: ALU, PC, SP, and
registers. It also added the other features needed to make a complete computer:
ROM, RAM, parallel I/O, serial I/O, counters, and clock circuit.

Pragati Engineering College Page 7


Advanced ATM Security System By Using Smart card and IOT Technology

Fig 1.4 Microcontroller

1.10 Comparision Between Microprocessor And Microcontroller

The microprocessor must have many additional parts to be operational as a


computer whereas microcontroller requires no additional external digital parts.

1. The prime use of microprocessor is to read data, perform extensive


calculations on that data and store them in the mass storage device or display it. The
prime functions of microcontroller is to read data, perform limited calculations on it,
control its environment based on these data. Thus the microprocessor is said to be
general-purpose digital computers whereas the microcontroller are intend to be special
purpose digital controller.

2. Microprocessor need many opcodes for moving data from the external
memory to the CPU, microcontroller may require just one or two, also microprocessor
may have one or two types of bit handling instructions whereas microcontrollers have
many.

Pragati Engineering College Page 8


Advanced ATM Security System By Using Smart card and IOT Technology

CHAPTER 2
OVERVIEW OF THE PROJECT

2.1 IOT BASED WIRELESS SENSOR NETWORK

The future Internet, designed as an “Internet of Things” is foreseen to be “a


world-wide network of interconnected objects uniquely addressable, based on
standard communication protocols”. Identified by a unique address, any object
including computers, sensors, RFID tags or mobile phones will be able to dynamically
join the network, collaborate and cooperate efficiently to achieve different tasks.
Including WSN‘s in such a Scenario will open new perspectives .Covering a wide
application field, WSNs can play an important role by collecting surrounding context
and environment information. However, deploying WSNs configured to access the
Internet raises novel challenges, which need to be tack led before taking advantage of
the many benefits of such integration. The main contributions of this paper can be
summarized as follows: We look at WSNs and the Internet holistically, in line with
the vision where WSNs will be a part of an Internet of Things. Thereby, we identify
representative application scenarios for WSNs from the multidimensional WSN
design space, in order to obtain insights into issues involved with the integration.
These representative application scenarios open up different schemes for integrating
the WSNs into the Internet’. We summarize our discussion, giving pointers for
possible solutions to address the identified challenges while regarding the resource
limitations present in common WSN nodes

The main objective of this project is to operate solar system by using IOT. We
can observe the parameters are temperature, humidity, Environmental conditions &
voltage by providing security of IOT.

 The ability to monitor environmental conditions is crucial to research in fields


ranging from climate variability. Being able to document baseline and
changing environmental parameters over time is increasingly essential
important and researchers are relying more and more on unattended either
stations for this propose.

Pragati Engineering College Page 9


Advanced ATM Security System By Using Smart card and IOT Technology

 An IOT Based Smart Sensing Platform for Monitoring Environmental


Parameters and solar tracking has been designed and developed. The smart
weather station consists of microcontroller based measuring units which
collect the value of the temperature, relative humidity, light sensor and
automatic solar tracking system.

 These units send their data wireless to a central station, which collects the
data, stores and displays them into a database. The facility of adding a few
more sensors and a few more stations has been provided.

 The Internet of Things (IOT) is a scenario in which objects, animals or people


are provided with unique identifiers and the ability to transfer data over a
network without requiring human-to-human or human-to-computer
interaction. IOT has evolved from the convergence of wireless technologies.

2.2 EXISTING SYSTEM:


ATM security system using GSM and MEMS is one of the hot topics in
embedded systems industry. For providing Security at ATMs GSM and MEMS
Modules .Micro Electrical Mechanical Systems (MEMS) is the integration of
mechanical elements, sensors, actuators, and electronics on a common silicon
substrate through micro fabrication technology. The broadest requirement for these
very small devices is ability to sense the environment, to collect necessary data and
to create a signal or action to make desired changes.
In this project ATMEL based AT89S52 Microcontroller monitors MEMS Module,
GSM and motor. MEMS module is placed on the outer panel of the ATM Machine,
if any tilt is identified by this block, MEMS send a signal to AT89S52 and as the
signal is received, it locks the ATM door and Alert message is send to the Security
using GSM Module. When someone tries to breakdown into ATM the MEMS(micro
electro mechanical sensor)gets disturbed forwards an output signal to the ATMEL
processor then a message will be send to authorized person through GSM modem
and door will be locked automatic using the stepper motor.

Pragati Engineering College Page 10


Advanced ATM Security System By Using Smart card and IOT Technology

2.3 PROPOSED SYSTEM:


The existing self-banking system has got very high popularity with 24 hours
service. Use of ATM (Automatic Teller Machine) is helpful for money transaction.
ATM is activated by placing the card, then entering the pin number of the particular
card. But this system is not safe to use because anybody can access the system if they
have the card and pin number like we share our card and pin number to our friends
who may miss use it. This is the main disadvantage of existing system. Traditional
ATM systems authenticate the method has some defects. Using ATM card and
password cannot verify the client's identity exactly .In recent years, the algorithm that
the fingerprint recognition continuously updated, which has offered new verification
means for us, the original password authentication method combined with the
biometric identification technology verify the users identity better and achieve the
purpose that use of ATM machines improve the safety . In the proposed system we
are trying to remove disadvantages of existing system. So security over money
Transaction is our prime concern. In traditional system client has to carry debit or
credit card with him to verify his identity. This identity card may lose, so instead of
traditional identification we are using biometric identification. Fingerprint recognition
has got continuously updated algorithm in recent years which mean perfect biometric
identification. The purpose of generating OTP is to achieve better identification with
high security. Security of ATM center is also important. For that there is a tilt sensor

Fig 2.1 smart cards

Pragati Engineering College Page 11


Advanced ATM Security System By Using Smart card and IOT Technology

2.3.1 BLOCK DIAGRAM

Fig 2.2 Block Diagram of the Proposed System

2.3.2 Hardware components are:

 Power supply.
 ARM-7
 LCD
 Smartcard.
 Voltage Converter (MAX232)
 Buzzer
 GSM
 MOTOR
 KEYPAD
2.3.3 Software Requirements are:
 keil
 Proteous
 Code develops through Embedded C

Pragati Engineering College Page 12


Advanced ATM Security System By Using Smart card and IOT Technology

2.4 FLOW CHART

Fig 2.3 Flow Chart

Step: 1. initialization of system


2. Check the system parameters (sensor,, smart card)
3. Check the vibrating sensor
4. Send message if sensor activated
5. Check the authentication for send the image to mail.

Pragati Engineering College Page 13


Advanced ATM Security System By Using Smart card and IOT Technology

2.5 DESCRIPTION:

This project is implemented for how we utilize the new technologies in our
world are use full for everyone ,so we have to implement the internet based data
monitoring system IOT technology is used for monitoring this parameters from
anywhere.

Here we are implement the IOT based ATM security system using smart card
technology,

Any ATM system requires neigh security, to remember this point we need to
design this project using SMART CARD with IOT technology. Initially we have to
check the conditions (vibrator and reader) if vibrating sensor is activated immediately
alert message send to the particular number and also system continuously check the
reader data, if any authentication is occurred (security alarm breached) particular
person image gets captured and it sends the image to the person’s mail ID and an alert
SMS is sent to the person’s phone number

Pragati Engineering College Page 14


Advanced ATM Security System By Using Smart card and IOT Technology

CHAPTER 3
HARDWARE IMPLEMENTATION
Hardware components are

 Power supply.
 GSM
 RFID
 SMART CARD
 LCD
 ARM-7(lpc2148)
 Voltage Converter (MAX232)
 MOTOR
 KEYPAD

3.1 POWER SUPPLY


Conversion of 230V alternative current into 5v direct current by using these
following steps and diagram. Here we are using components are

1) step down transformer


2) bridge rectifier
3) capacitor
4) voltage regulator

Fig 3.1 Power Supply

Pragati Engineering College Page 15


Advanced ATM Security System By Using Smart card and IOT Technology

3.1.1 Step down the voltage level:-


The step-down converters are used for converting the high voltage into low
voltage .the converter with output voltage less than the input voltage is called as a
step-down converter and the converter with output voltage greater than the input
voltage is called as step-up converter. These are step-up and step-down
transformers which are used to step up or step down the voltage levels. 230v AC
is converted into 12V AC using a step-down transformer.12V output of step down
transformer is an RMS value and its peak value is given by the product of square
root of two with RMS value, which is approximately 17V

Fig 3.2 Step down the voltage level

3.1.2 Convert AC to DC:-

230V AC power is converted into 12V AC (12V RMS value where in the peak
value is around 17V), but the required power is 5V DC; for this purpose, 17V AC
power must be primarily converted into DC power then it can be stepped down to the
5V DC. But first and foremost, We must know how to convert AC to DC? AC power
can be converted into DC using one of the power electronic converters called as
Rectifier. There are different types of rectifiers, such as half-wave rectifier, full-wave
rectifier, full-wave rectifier and Bridge rectifier. Due to the advantages of the bridge

Pragati Engineering College Page 16


Advanced ATM Security System By Using Smart card and IOT Technology

rectifier over the half and full wave rectifier, the bridge rectifier is frequently used for
converting AC to DC

Fig 3.3 Convert AC to DC

Bridge rectifier consists of four diodes which are connected in the form a
bridge .We know that the diode is an uncontrolled rectifier which will conduct only
forward bias and will not conduct during the reverse bias. If the diode anode voltage
is greater than the cathode voltage then the diode is said to be in forward bias. During
positive half cycle, diodes D2 and D4 will conduct and during negative half cycle
diodes D1 and D3 will conduct. Thus, AC is converted into DC ; here the obtained is
not a pure DC as it consist of pulses .Hence ,it is called as pulsating DC power. But
voltage drop across the diodes is (2*0.7V) 1.4V; Therefore, the peak voltage at the
voltage at the output of this rectifier circuit is 15V (17-1.4) approx.

3.2 LCD (LIQUID CRYSTAL DISPLAY):

LCD (liquid crystal display) is the technology used for displays in notebook
and other smaller computers. Like light-emitting diode (LED) and gas-plasma
technologies, LCDs allow displays to be much thinner than cathode ray tube ( CRT)
technology. LCDs consume much less power than LED and gas-display displays
because they work on the principle of blocking light rather than emitting it.

Pragati Engineering College Page 17


Advanced ATM Security System By Using Smart card and IOT Technology

Fig 3.4 Liquid Crystal Display

3.3 VOLTAGE CONVERTER (MAX232):-

Today, most of the latest microcontrollers are integrated with at least one USART
(Universal Synchronous Asynchronous Receiver Transmitter) peripheral. A well set
module is very useful not only to establish a communication medium (receive or
transmit data) between microcontroller and PC but also to program the device via
preloaded boot-loader. Here is how to make proper level converter using MAX232.
Before that, it is better to have a simple idea about RS232 & TTL levels.

Fig 3.5 Voltage Converter (MAX232)


3.3.1 RS232 & TTL:-

In RS232 protocol, +12V indicates the Space state or Zero and -12V indicates
the Mark state or 1. In TTL, +5V indicates the Mark state and 0 indicates Space state.
Most importantly, TTL level is not accepting negative voltage levels. So for the
RS232 to TTL interface translation is not only a task with 12V to 5V level shifting,
and it includes a level inversion too. To do that, MAX232 is more often used in
microcontroller applications.

Pragati Engineering College Page 18


Advanced ATM Security System By Using Smart card and IOT Technology

3.3.2 MAX232 :-

MAX232 is an IC that operates on single 5V supply and it is integrated with


two drivers and two receivers and also that meets all specifications under EIA/TIA
232-F standards. All receivers can be used to convert RS232 levels to TTL/CMOS
levels and all drivers can be used to convert TTL/CMOS level inputs to RS232 levels.
Since it functions with capacitive voltage generator, external charge-pump capacitors
used in module to support internal voltage doubler and inverter. Some ICs in this
series may not ask for external capacitors (MAX225)

Fig 3.6 Basic internal block diagram of MAX232

3.4 GSM (Global System for Mobile Communication):

Global System for Mobile communications (GSM: originally from Group


Special Mobile) is the most popular standard for mobile phones in the world. Its
promoter, the GSM Association, estimates that 82% of the global mobile market uses
the standard GSM is used by over 2 billion people across more than 212 countries and
territories. Its ubiquity makes international roaming very common between mobile
phone operators, enabling subscribers to use their phones in many parts of the world.
GSM differs from its predecessors in that both signaling and speech channels are
digital call quality, and thus is considered a second generation (2G) mobile phone

Pragati Engineering College Page 19


Advanced ATM Security System By Using Smart card and IOT Technology

system. This has also meant that data communication was built into the system using
the 3rd Generation Partnership Project

Mobile Frequency Range Rx : 925-960; Tx: 880-915

Multiple Access Method : TDMA/FDM

Duplex Method : FDD

Number of Channels1 : 24 (8 users per channel)

Channel Spacing : 200 kHz

Modulation : GMSK (0.3 Gaussian Filter)

Fig 3.7 Structure of GSM Network

3.4.1 The Future of GSM:

GSM together with other technologies is part of an evolution of wireless


mobile telecommunication that includes High-Speed Circuit-Switched Data
(HSCSD), General Packet Radio System (GPRS), Enhanced Data rate for GSM
Evolution (EDGE), and Universal Mobile Telecommunications Service (UMTS).

Pragati Engineering College Page 20


Advanced ATM Security System By Using Smart card and IOT Technology

3.4.2 GSM At Commands:

Syntax Rules FOR GSM

 A command string should start with "AT" or "at", except for the commands
"A/" and "+++". At or aT are invalid.
 Several commands can be given in one command string.
 The commands can be given in upper or lower case.
 A command string should contain less than 40 characters.
 When an error is made during the typing of the command, it can be corrected
using the backspace key.
 Commands and command strings must be terminated with an <ENTER>,
except +++ and A/
 A telephone number can exist of following characters: 1 2 3 4 5 6 7 8 9 * =, ; #
+ > . All other characters are ignored (space, underscore). They help
formatting the dial string.

3.5 RFID MODULE (RADIO FREQUENCY IDENTIFICATION):

Radio Frequency Identification uses a semiconductor (micro-chip) in a tag or


label to transmit stored data when the tag or label is exposed to radio waves of the
correct frequency.

RFID systems fundamentally consist of four elements:

1. The RFID tags.


2. The RFID readers
3. The antennas and choice of radio characteristics,
4. The computer network (if any) that is used to connect the readers.

3.5.1 RFID Tags

The tag is the basic building block of RFID. Each tag consists of an antenna and a
small silicon chip that contains a radio receiver, a radio modulator for sending a
response back to the reader, control logic, some amount of memory, and a power
system. The power system can be completely powered by the incoming RF signal, in

Pragati Engineering College Page 21


Advanced ATM Security System By Using Smart card and IOT Technology

which case the tag is known as a passive tag. Alternatively, the tag’s power system
can have a battery, in which case the tag is known as an active tag.

Fig 3.8 RFID Tags

The primary advantages of active tags are their reading range and reliability.
With the proper antenna on the reader and the tag, a 915MHz tag can be read from a
distance of 100 feet or more. The tags also tend to be more reliable because they do
not need a continuous radio signal to power their electronics.

Passive tags, on the other hand, can be much smaller and cheaper than active
ones because they don’t have batteries. Another advantage is their longer shelf life:
Whereas an active tag’s batteries may last only a few years, a passive tag could in
principle be read many decades after the chip was manufactured

Between the active and the passive tags are the semi-passive tags. These tags
have a battery, like active tags, but still use the reader’s power to transmit a message
back to the RFID reader using a technique known as backscatter. These tags thus have
the read reliability of an active tag but the read range of a passive tag. They also have
a longer shelf life than a tag that is fully active.

RFID TAG FORMAT:

Fig 3.9 RFID tag Format

Electronic Product Code (EPC) tags are a special kind of tag that follows the EPC
standard developed by the MIT Auto-ID Center and is now managed by the trade
organization EPC global. Sanjay Sharma, cofounder of the Auto-ID Center.

Pragati Engineering College Page 22


Advanced ATM Security System By Using Smart card and IOT Technology

Table 1- EPC RFID Classes

Table 2-EPC RFID Chip Generations

3.5.2 READERS

The RFID reader sends a pulse of radio energy to the tag and listens for the
tag’s response. The tag detects this energy and sends back a response that contains the
tag’s serial number and possibly other information as well.

In simple RFID systems, the reader’s pulse of energy functioned as an on-off


switch; in more sophisticated systems, the reader’s RF signal can contain commands
to the tag, instructions to read or write memory that the tag contains, and even
passwords.

Pragati Engineering College Page 23


Advanced ATM Security System By Using Smart card and IOT Technology

Historically, RFID readers were designed to read only a particular kind of tag,
but so-called multimode readers that can read many different kinds of tags are
becoming increasingly popular.

RFID readers are usually on, continually transmitting radio energy and
awaiting any tags that enter their field of operation. However, for some applications,
this is unnecessary and could be undesirable in battery-powered devices that need to
conserve energy. Thus, it is possible to configure an RFID reader so that it sends the
radio pulse only in response to an external event.

3.5.3 ANTENNAS AND RADIO


The RFID physical layer consists of the actual radios and antennas used
to couple the reader to the tag so that information can be transferred between the two.

Radio energy is measured by two fundamental characteristics: the frequencies


at which it oscillates and the strength or power of those oscillations. Commercial FM
broadcast stations in the U.S.A transmit energy at a frequency between 88MHz and
108MHz, or 1 million isolations per second. The AM spectrum, transmits at 500,000
to 1,500,000 oscillations per second, or between 500KHz and 1500KHz. Microwave
ovens cook with RF energy that vibrates 2.4 billion times each second, which is
2.4GHz.

Most RFID systems use the unlicensed spectrum, which is a specific part of the
spectrum set aside for use without a radio license. Popular bands are the low-
frequency (LF) band at 125–134.2KHz, the high-frequency band at 13.56MHz, the
ultrahigh-frequency (UHF) band at 915MHz, and the industrial, scientific, and
medical (ISM) band at 2.4GHz.

The names of the LF, HF, and UHF bands reflect the history of radio’s
development: Radio systems first transmitted at the lower frequencies and moved to
the higher frequencies only as technology advanced. For this reason, lower frequency
radio gear was traditionally cheaper than equipment that operated at higher
frequencies.

Pragati Engineering College Page 24


Advanced ATM Security System By Using Smart card and IOT Technology

Table 3- Band Frequency, Wavelength and Classical Usage

When analyzing the energy that is radiated from an antenna, electrical engineers
divide the field into two parts: the near field, which is the part of radiation that is
within a small number of wavelengths of the antenna, and the far field, which is the
energy that is radiated beyond the near field. Because the wavelength of LF and HF
devices tends to be much larger than the ranges at which RFID systems typically
operate, these systems operate in the near field, while UFH and ISM systems operate
in the far field.

3.5.4 THE COMPUTER NETWORK

Most RFID tags transmit a number and nothing more. So what does a typical
reader do with a typical 96-bit number like 79,228,162,514,264,337,593,
543,950,335. In most cases, the reader sends it to a computer.

What the computer does with the RFID code depends on the application. With
an access-control system, the computer might look to see if the RFID number is
present on a list of numbers that’s allowed access to a particular door or location. If
the number is present, the computer might energize a solenoid that would unlock the
door. In the case of the Mobil Speed pass system, the tag’s serial number and its
response to the random challenge that was generated by the reader are sent over
Mobil’s payment network. If the challenge response matches the token, Mobil’s
computers approve the user of the customer’s credit-card number to complete the
transaction.

Pragati Engineering College Page 25


Advanced ATM Security System By Using Smart card and IOT Technology

3.6 SMAETCARDS:

A smart card is a physical card that has an embedded integrated chip that acts as
a security token. Smart cards are typically the same size as a driver's license or credit
card and can be made out of metal or plastic. They connect to a reader either by direct
physical contact (also known as chip and dip) or through a short-range wireless
connectivity standard such as radio-frequency identification (RFID) or near-field
communication (NFC).

The chip on a smart card can be either a microcontroller or an embedded memory


chip. Smart cards are designed to be tamper-resistant and use encryption to provide
protection for in-memory information. Those cards with microcontroller chips can
perform on-card processing functions and can manipulate information in the chip's
memory.

Smart cards are used for a variety of applications, though most commonly are used for
credit cards and other payment cards. Distribution of smart cards in recent years has
been driven by the payment card industry's move to support smart cards for the EMV
payment card standard. Smart cards capable of short-range wireless connectivity can
also be used for contactless payment systems; they can also be used as tokens for
multifactor authentication.

3.7 ARM (Advanced RISC Machine):


The full form of an ARM is an advanced reduced instruction set computer (RISC)
machine, and it is 32-bit processor architecture developed by ARM Corporation. It
was previously known as Advanced RISC Machines and prior to that
Acorn RISC Machines. ARM cores are used in mobile phones, handheld organizers
(PDA), portable consumer devices

3.7.1 ARM-7 Based LPC2148 Micro controller:

ARM7 processor is commonly used in embedded system applications. Also, it


is a balance among classic as well as new-Cortex sequence. This processor is
tremendous in finding the resources existing on the internet with excellence

Pragati Engineering College Page 26


Advanced ATM Security System By Using Smart card and IOT Technology

documentation offered by NXP Semiconductors. It suits completely for an apprentice


to obtain in detail hardware & software design implementation.
The LPC2148 microcontroller is designed by Philips (NXP Semiconductor)
with several in-built features & peripherals. Due to these reasons, it will make more
reliable as well as the efficient option for an application developer. LPC2148 is a 16-
bit or 32-bit microcontroller based on ARM7 family.

3.7.2 PIN CONFIGURATION:

ARM7 processor is commonly used in embedded system applications. Also, it is a


balance among classic as well as new-Cortex sequence. This processor is tremendous
in finding the resources existing on the internet with excellence documentation
offered by NXP Semiconductors. It suits completely for an apprentice to obtain in
detail hardware & software design implementation.

Fig 3.10 ARM7 Based Microcontroller (LPC2148) Pin Configuration

Pragati Engineering College Page 27


Advanced ATM Security System By Using Smart card and IOT Technology

3.7.3 PIN DESCRIPTION:

Pin1-(P0.21/ PWM5CAP1.3/ AD1.6)


 P0.21 is a GPIO pin (general purpose I/O pin)
 AD1.6 is obtainable in LPC2144/46/48 microcontrollers only where an AD1.6
denotes ADC-1, i/p-6.
 PWM5 is a pulse width modulator output-5.
 CAP1.3 is a Capture i/p for Timer-1, channel-3

Pin2-(P0.22/ CAP0.0/AD1.7/ MAT0.0 2


 P0.22 is a GPIO digital pin
 AD1.7 pin is available in LPC2144/46/48 only where an AD1.7 denotes ADC-
1, input-7
 CAP0.0 is a capture input pin for Timer-0, channel-0.
 MAT0.0 is a match o/p for Timer-0, channel-0

Pin3-RTXC1 3
 It is an I/p to the RTC-oscillator circuit

Pin4- TRACEPKT3/ P1.19

 TRACEPKT3 is a trace packet, bit-3, standard input/output port by the inner


pull-up.
 P1.19 is a GPIO digital pin.

Pin5-RTXC2
 This is an output pin from the RTC oscillator circuit

Pin6, Pin18, Pin25, Pin42, and Pin50


 These pins are a ground reference

Pin7-VDDA
 This pin is an analog voltage power supply (3.3V), and this voltage is very
useful for the on-chip analog to digital converters and digital to analog
converters.
Pin8- P1.18/TRACEPKT2
 P1.18 is a GPIO digital pin.
 TRACEPKT2 is a trace packet, bit-2, standard input/output port by the inner
pull-up.

Pin9- P0.25/AOUT/AD0.4
 P0.25 is a GPIO digital pin I

Pragati Engineering College Page 28


Advanced ATM Security System By Using Smart card and IOT Technology

 AD0.4 denotes ADC-0, input-4


 Aout- the output of DAC and that is accessible only in LPC2142/ LPC2144/
LPC2146/ LPC2148
Pin10- D+
 This pin is a USB bidirectional D+ line

Pin11- D-
 This pin is a USB bidirectional D- line

Pin12-P1.17/TRACEPKT1
 P1.17 is a GPIO digital pin
 TRACEPKT1 is a trace packet, bit-1, standard input/output port by the inner
pull-up.

Pin13-P0.28/ CAP0.2/ AD0.1/MAT0.2


 P0.28 is a GPIO digital pin
 AD0.1 denotes ADC-0, input-1
 CAP0.2 is a capture i/p for Timer-0, channel-2.
 MAT0.2 is a match o/p for Timer-0, channel-2
Pin14-P0.29/ CAP0.3/ AD0.2/MAT0.3
 P0.29 is a GPIO digital pin
 AD0.2 denotes ADC-0, input-2
 CAP0.3 is a capture i/p for Timer-0, channel-3.
 MAT0.3 is a match o/p for Timer-0, channel-3
Pin15-P0.30/ EINT3/ AD0.3/CAP0.0
 P0.30 is a GPIO digital pin
 AD0.3 denotes ADC-0, input-3
 EINT3 is an external interrupt 3-input.
 CAP0.3 is a capture i/p for Timer-0, channel-0.
Pin16- P1.16/TRACEPKT0
 P1.16 is a GPIO digital pin
 TRACEPKT1 is a trace packet, bit-0, standard input/output port by inner pull-
up
Pin17-P0.31/UP_LED/CONNECT
 P0.31 is a GPIO digital pin
 UP_LED is a USB good link LED indicator. When the device is arranged then
it is low and when the device is not arranged, then it is high.
 CONNECT- This signal is used to control an exterior resistor (1.5 kΩ) under
the control of a software control, and it is used by the feature of Soft Connect
Pin19- P0.0/PWM/TXD0
 P0.0 is a GPIO digital pin
 TXD0 is a transmitter o/p for UART0.

Pragati Engineering College Page 29


Advanced ATM Security System By Using Smart card and IOT Technology

 PWM1 is a pulse width modulator o/p-1.


Pin20- P1.31/TRST
 P1.31 is a GPIO digital pin
 TRST is a test reset for JTAG interface.
Pin21-P0.1/ PWM3/ RXD0/EINT0
 P0.1 is a GPIO digital pin
 RXD0 is a receiver i/p for UART0.
 PWM3 is a pulse width modulator o/p-3.
 EINT0 is an external interrupt 0-input
Pin22- P0.2/ CAP0.0/ SCL0
 P0.2 is a GPIO digital pin
 SCL0 is an I2C0 clock I/O, and open-drain o/p
 CAP0.0 is a capture i/p for Timer-0, channel-0.
Pin 23, 43, and 51- VDD
 These pins are power supply voltage for the I/O ports as well as the core.

Pin24- P1.26/RTCK
 P1.26 is a GPIO digital pin
 RTCK is a returned test CLK o/p, an additional signal added to the JTAG-port.
When the frequency of processor changes then it helps debugger
synchronization.
Pin26- P0.3/ SDA0/ MAT0.0/EINT1
 P0.3 is a GPIO digital pin
 SDA0 is an I2C0 data I/O and open drain o/p for I2C bus observance.
 MAT0.0 is matched o/p for timer-0, channel-0.
 EINT1 is an external interrupt 1-i/p.
Pin27-P0.4/ CAP0.1/ SCK0/AD0.6
 P0.4 is a GPIO digital pin I/O
 SCK0 is a serial CLK for SPI0 and SPI CLK o/p from master/ i/p to slave.
 CAP0.1 is a capture i/p for timer-0, channel-0.
 IAD0.6 denotes ADC-0, input-6
Pin28-P1.25/EXTIN0
 P1.25 is a GPIO digital pin I/O
 EXTIN0 is an external trigger i/p, and standard input/output with inner pull-up
Pin29- P0.5/MAT0.1/MISO0/AD0.7
 P0.5 is a GPIO digital pin I/O
 MISO0 is a master in slave out for SPI0, data i/p to SPI-master/data o/p from
SPI slave.
 MAT0.1 is a match o/p for timer-0, channel-1.
 AD0.7 denotes ADC-0, input-7.

Pragati Engineering College Page 30


Advanced ATM Security System By Using Smart card and IOT Technology

Pin30-P0.6/MOSI0/CAP0.2/AD1.0
 P0.6 is a GPIO digital pin I/O
 MOSI0 is a master out slave in for SPI0, and data o/p from SPI master/ data i/p
to SPI slave.
 CAP0.2 is a capture i/p for Timer-0, channel-2.
Pin31-P0.7/ PWM2/ SSEL0/EINT2
 P0.7 is a GPIO digital pin I/O
 SSEL0 is a slave select for SPI0 and chooses the SPI-interface as a slave.
 PWM2 is a pulse width modulator output-2.
 EINT2 is an external interrupt 2-input.
Pin32-P1.24/TRACECLK
 P1.24 is a GPIO digital pin I/O.
 TRACECLK is a trace CLK and standard input/output port with inner pull-up

Pin33-P0.8/TXD1/PWM4/AD1.1
 P0.8 is a GPIO digital pin I/O
 TXD1 is a transmitter o/p for UART1.
 PWM4 is a pulse width modulator o/p-4.
 AD1.1 denotes ADC-1, input-1, and it is obtainable only in LPC2144/46/48.

Pin34- P0.9/PWM6/RXD1/EINT3
 P0.9 is a GPIO digital pin I/O
 RXD1 is a receiver i/p for UART1.
 PWM6 is a pulse width modulator o/p-6.
 EINT3 is an external interrupt 3-input

Pin35-P0.10/RTS1/CAP1.0/AD1.2

 P0.10 is a GPIO digital pin I/O


 RTS1 is requesting to send o/p for UART1 and LPC2144/46/48.
 CAP1.0 is a capture i/p for timer-1, channel-0.
 AD1.2 denotes ADC-1, input-2, and it is obtainable only in
LPC2144/46/48
Pin36-P1.23/PIPESTAT2
 P1.23 is a GPIO digital pin I/O
 PIPESTAT2 is a pipeline status, bit-2., and standard Input/output port with
inner pull-up
Pin37-P0.11/ CAP1.1/CTS1/ SCL1
 P0.11 is a GPIO digital pin I/O
 CTS1 is clear to send i/p for UART1, and these are accessible only in
LPC2144/46/48
 CAP1.1 is a capture i/p for timer-1, channel-1.

Pragati Engineering College Page 31


Advanced ATM Security System By Using Smart card and IOT Technology

 SCL1 — I2C1 CLK I/O, and open drain o/p for the I2C-bus observance
Pin38-P0.12/ MAT1.0/AD1.3/ DSR1

 P0.12 is a GPIO digital pin I/O


 DSR1 is a data set ready i/p for UART1, and these are accessible only in
LPC2144/46/48.
 MAT1.0 is a match o/p for timer-1, channel-0.
 AD1.3 denotes ADC input-3, and it is accessible only in LPC2144/46/48.
Pin39-P0.13/DTR1/MAT1.1/AD1.4

 P0.13 is a GPIO digital pin I/O


 DTR1 is a data terminal ready o/p for UART1 and LPC2144/46/48 only.
 MAT1.1 is a match o/p for timer-1, channel-1.
 AD1.4 denotes ADC input-4, and these are accessible only in LPC2144/46/48.
Pin40-P1.22/PIPESTAT1

 P1.22 is a GPIO digital pin I/O


 PIPESTAT1 is a pipeline status, bit-1, and standard Input/output port with
inner pull-up
Pin41-P0.14/DCD1/EINT1/SDA1

 P0.14 is a GPIO digital pin I/O


 DCD1 is a data carrier detect i/p for UART1, and also only for
LPC2144/46/48 only.
 EINT1 is an exterior interrupt 1-input.
 SDA1 is an I2C1 data I/O and an open drain o/p for I2C bus observance
Pin44:P1.21/ PIPESTAT0 44

 I/O P1.21 is a GPIO digital pin I/O


 PIPESTAT0 is a Pipeline Status, bit 0, and standard Input/output port by the
inner pull-up.
Pin45: P0.15/ EINT2/ RI1/ AD1.5 45

 I/O P0.15 is a GPIO digital pin I/O


 RI1 is a ring pointer i/p for UART1 and it is accessible only in
LPC2144/46/48.
 EINT2 is an external interrupt 2-input.
 AD1.5 indicates ADC 1, input-5, and also available only in LPC2144/46/48
Pin46: P0.16/ MAT0.2/ EINT0/ CAP0.2

 P0.16 is a GPIO digital pin I/O

Pragati Engineering College Page 32


Advanced ATM Security System By Using Smart card and IOT Technology

 EINT0 is an external interrupt0- input.


 MAT0.2 is a match o/p for Timer-0, channel -2
 CAP0.2 is a capture i/p for Timer-0, channel-2.

Pin47: P0.17/ SCK1/ CAP1.2/ MAT1.2 47

 P0.17 is a GPIO digital pin I/O


 CAP1.2 is a capture i/p for Timer-1, channel-2.
 SCK1 is a serial CLK for SSP and CLK o/p from master to slave.
 MAT1.2 is a match o/p for Timer-1, channel-2.

Pin48: P1.20/ TRACESYNC

 P1.20 is a GPIO digital pin I/O


 TRACESYNC is trace synchronization.

Pin49: VBAT

 RTC power supply: This pin gives the supply to the RTC.

Pin52: P1.30/TMS

 P1.30 is a GPIO digital pin I/O

 TMS is a test mode select for interfacing of JTAG.

Pin53: P0.18/CAP1.3/ MISO1/MAT1.3

 P0.18 is a GPIO digital pin I/O


 CAP1.3 is a capture i/p for Timer 1, channel 3.
 MISO1 is a master In Slave-out for SSP, and data i/p to SPI- master

Pin54: P0.19/ MOSI1/MAT1.2/ CAP1.2

 P0.19 is a GPIO digital pin I/O.


 MAT1.2 denotes match o/p for Timer 1, channel 2.
 MOSI1 is a master out slave for SSP master.
 CAP1.2 is a capture i/p for Timer 1, channel 2.

Pin 55: P0.20/ SSEL1/ MAT1.3/ EINT3

Pragati Engineering College Page 33


Advanced ATM Security System By Using Smart card and IOT Technology

 P0.20 is a GPIO digital pin I/O.


 MAT1.3 is a match o/p for Timer 1, channel 3. I
 SSEL1 is a Slave Select designed for SSP. Here, chooses the interface of SSP
as a slave.
 EINT3 is an external interrupt 3-input.

Pin56: P1.29/TCK

 P1.29 is a GPIO digital pin I/O


 TCK is a test CLK for an interface of JTAG.

Pin57: External Reset Input

 The device can be rearranged by a LOW on this pin, effecting Input/Output


ports as well as peripherals for obtaining on their default conditions, &
processor execution begins at address 0.

Pin58: P0.23/VBUS
 P0.23 is a GPIO digital pin I/O
 VBUS specifies the existence of USB-bus power

Pin59: VSSA
 VSSA is an analog ground, and this must be the similar voltage like VSS,
although it should be separated to reduce error and noise

Pin60: P1.28/TDI 60
 P1.28 is a GPIO digital pin I/O
 TDI pin is a test data is used for interfacing JTAG

Pin61: XTAL2
 XTAL2 is an o/p from the oscillator amplifier

Pin62: XTAL1
 XTAL1 is an i/p to the internal CLK generator as well as oscillator circuits

Pin63: VREF-ADC Reference

 This pin should be nominally equal or less than to the voltage VDD although it
should be separated for reducing error as well as noise.

Pragati Engineering College Page 34


Advanced ATM Security System By Using Smart card and IOT Technology

Pin64: P1.27/TDO 64

 P1.27 is a GPIO digital pin I/O


 TDO is a test data out used for interfacing JTAG.
3.8 MOTOR:

Brushless DC motors are common in industrial applications across the world.


At the most basic level, there are brushed and brushless motors and there are DC and
AC motors. Brushless DC motors, as you may imagine, do not contain brushes and
use a DC current.

It often helps to explain how a brushed DC motor works first, as they were
used for some time before brushless DC motors were available. A brushed DC motor
has permanent magnets on the outside of its structure, with a spinning armature on the
inside. The permanent magnets, which are stationary on the outside, are called the
stator. The armature, which rotates and contains an electromagnet, is called the rotor

In a brushed DC motor, the rotor spins 180-degrees when an electric current is


run to the armature. To go any further, the poles of the electromagnet must flip. The
brushes, as the rotor spins, make contact with the stator, flipping the magnetic field
and allowing the rotor to spin a full 360-degree.

A brushless DC motor is essentially flipped inside out, eliminating the need


for brushes to flip the electromagnetic field. In brushless DC motors, the permanent
magnets are on the rotor, and the electromagnets are on the stator. A computer then
charges the electromagnets in the stator to rotate the rotor a full 360-degrees.

Fig 3.11 Brushless DC Motor

Pragati Engineering College Page 35


Advanced ATM Security System By Using Smart card and IOT Technology

CHAPTER 4
SOFTWARE COMPONENTS

4.1 KEIL U-VISION4 SOFTWARE:


The µVision IDE from Keil combines project management, make facilities,
source code editing, program debugging, and complete simulation in one powerful
environment. The µVision development platform is easy-to-use and helping you
quickly create embedded programs that work. The µVision editor and debugger are
integrated in a single application that provides a seamless embedded project
development environment.

4.1.1 Procedural Steps For Compilation, Simulation And Dumping:


1. Open Keil from the Start menu
2. The Figure below shows the basic names of the windows referred in this document

Pragati Engineering College Page 36


Advanced ATM Security System By Using Smart card and IOT Technology

Starting a new Assembler Project:

1. Select New Project from the Project Menu.


2. Name the project ‘Toggle.a51’
3. Click on the Save Button.

4. The device window will be displayed.


5. Select the part you will be using to test with. For now we will use the NXP
LPC1768.
6. Double Click on the NXP.

7. Scroll down and select the LPC 1768


8. Click OK

Pragati Engineering College Page 37


Advanced ATM Security System By Using Smart card and IOT Technology

Creating Source File:


1. Click File Menu and select New.
2. A new window will open up in the Keil IDE.
3. Copy the example to the Right into the new window. This file will toggle Ports 1
and 2 with a delay.
4. Click on File menu and select Save As…
5. Name the file Toggle.a51
6. Click the Save Button

Adding File to the Project:


1. Expand Target 1 in the Tree Menu
2. Click on Project and select Targets, Groups, Files…
3. Click on Groups/Add Files tab
4. Under Available Groups select Source Group 1
5. Click Add Files to Group… button
6. Change file type to Asm Source file(*.a*; *.src)
7. Click on toggle.a51
8. Click Add button
9. Click Close Button
10. Click OK button when you return to Target, Groups, Files… dialog box
11. Expand the Source Group 1 in the Tree menu to ensure that the file was added to
the project

Pragati Engineering College Page 38


Advanced ATM Security System By Using Smart card and IOT Technology

Creating HEX for the Part :


1. Click on Target 1 in Tree menu
2. Click on Project Menu and select Options for Target 1
3. Select Target Tab
4. Change Xtal (Mhz) from 50.0 to 11.0592
5. Select Output Tab
6. Click on Create Hex File check box
7. Click OK Button
8. Click on Project Menu and select Rebuild all Target Files 9. In the Build Window it
should report ‘0 Errors (s), 0 Warnings’
10. You are now ready to Program your Part

Testing Program in Debugger :


1. Comment out line ACALL DELAY by placing a Semicolon at the beginning. This
will allow you to see the port change immediately.
2. Click on the File Menu and select Save
3. Click on Project Menu and select Rebuild all Target Files

Pragati Engineering College Page 39


Advanced ATM Security System By Using Smart card and IOT Technology

4. In the Build Window it should report ‘0 Errors (s), 0 Warnings’


5. Click on Debug Menu and Select Start/Stop Debug Session

Running the Keil Debugger :


1. The Keil Debugger should be now be Running.
2. Click on Peripherals. Select I/O Ports, Select Port 1
3. A new window should port will pop up. This represent the Port and Pins
4. Step through the code by pressing F11 on the Keyboard. The Parallel Port 1 Box
should change as you completely step through the code.
5. To exit out, Click on Debug Menu and Select Start/Stop Debug Session

Flash Magic:

Flash Magic is a tool which is used to program hex code in EEPROM of micro-
controller. It is a freeware tool. It only supports the micro-controller of Philips and
NXP. It can burn a hex code into that controller which supports ISP (in system
programming) feature. Flash magic supports several chips like ARM Cortex M0,
M3, M4, ARM7 and 8051.

Flash Magic is an application developed by Embedded Systems


Academy to allow easily access the features of a microcontroller device. With this
program it can erase individual blocks or the entire Flash memory of the
microcontroller. The kit can be programmed through serial port using ‘Flash Magic’.
‘Flash Magic’ is a freeware windows utility used download the hex file format onto
the kit. The Flash Magic utility is provided in CD along with the KIT. If your PC does
not have a serial port; use a USB to serial converter to download the hex file using the
Flash Magic utility.

Download Hex File into MCU Board:


The method to download Hex File into Flash Memory of MCU in Board is to
use Program Flash Magic that is connected with MCU through Serial Port of
computer PC. Steps to follow to program the kit using Flash Magic utility
1. Interface RS232 Cable between RS232 Serial Port of PC and Board UART-0
(CN3).

Pragati Engineering College Page 40


Advanced ATM Security System By Using Smart card and IOT Technology

2. Supply power into board; in this case, we can see red LED1 is in status ON.
3. Set jumper BR4 (INT1) in ON state.
4. Run Program Flash Magic, it will display result as shown in Figure 1.1
5. Start setting the initial values into program as desired, so we configure values into
program as follows;
4.1 Select COM port corresponding with (in this example, it is
COM1)
4.2 Set the baud rate to 9600
4.3 Set Device to be LPC2148
4.4 Set Interface to be None ISP
4.5 Set Crystal Oscillator with MHz corresponding with the value
internal Board. In this case, it is 12.000MHz, so we must set to
be 12.
4.6 Press ISP LOAD Switch (S1) and RESET Switch (S2) on
Board “ARM7 LPC2148 Development Board” to reset MCU to run
in Boot Loader following the processes;
 Press ISP LOAD Switch (S1) and hold
 Press RESET Switch (S2) while ISP LOAD Switch (S1) is
being held.
 Remove RESET Switch (S2) but ISP LOAD Switch (S1) is
being held.
 Lastly, remove ISP LOAD Switch (S1).
6. Select format of erasing data to be “Erase all Flash + Code Rd Prot”.
7. Set Option to be “Verify after programming”.
8. Click “Browse” to select HEX File for downloading.
9. Click “Start”, Program Flash Magic will start downloading data into MCU
instantly. In this case, we can see the status operation at Status Bar and we must
wait for the operation until it is completed.
10. When the operation of program is complete, press RESET Switch on Board and
MCU will start running follow the downloaded program instantly.
11. Run Program Flash Magic, it will display result as shown in Figure 1.1

Pragati Engineering College Page 41


Advanced ATM Security System By Using Smart card and IOT Technology

Start setting the initial values into program as desired, so we configure values into
program as follow sections.

Step-1 Communication:

a) Select your target device.

b) Select your com port and if you are using USB to serial converter make sure that
you will select proper com port other wise you can not communicate.

c) Now select baud rate ideally it should be 9600 (recommended). Avoid higher than
9600 for proper communication.

d) Now select your interface if you are using DB-9 then it will be None (ISP).

e) Set Crystal Oscillator with MHz corresponding with the value internal Board.
In this case, it is 12.000MHz, so we must set to be 12.

Pragati Engineering College Page 42


Advanced ATM Security System By Using Smart card and IOT Technology

 Press ISP LOAD Switch (S1) and RESET Switch (S2) on Board “ARM7
LPC2148 Development Board” to reset MCU to run in Boot Loader following
the processes;
 Press ISP LOAD Switch (S1) and hold
 Press RESET Switch (S2) while ISP LOAD Switch (S1) is being held.
 Remove RESET Switch (S2) but ISP LOAD Switch (S1) is being held.
 Lastly, remove ISP LOAD Switch (S1).

Step-2 Erase:
Select format of erasing data to be “Erase all Flash + Code Rd Prot”

Now here tick mark the Erase all Flash option. This is the most crucial thing because
wrong selection in this step can be resulting into lost of boot loader in your chip.
Nothing to worry if you lost your boot loader because you can again load it but to
load boot loader you must program you chip through universal programmer or any
other programmer which is not depend upon boot loader for loading hex code. After
loading boot loader you can again able to program your chip using flash magic.

Step-3 Hex file:

Click “Browse” to select HEX File for downloading.

This is very simple and you need to set up a path of your Hex file which is to be
loaded on chip.

Step-4 Options:

Set Option to be “Verify after programming”.

Pragati Engineering College Page 43


Advanced ATM Security System By Using Smart card and IOT Technology

In this always keep Verify after programming option enable by tick mark. You can
use another features as well according to your need.

Step-5 Start:

Click “Start”, Program Flash Magic will start downloading data into MCU instantly.
In this case, we can see the status operation at Status Bar and we must wait for the
operation until it is completed. When the operation of program is complete, press
RESET Switch (S2) on Board and MCU will start running follow the downloaded
program instantly.

4.2 PROTEUS

4.2.1 INTRODUCTION:

Generally we are listening the words PCB’s, PCB layout, PCB designing, etc.
But what is PCB? Why we are using this PCB? We want to know about all these
things as a electronic engineer. PCB means Printed Circuit Board. This is a circuit
board with printed copper layout connections. These PCB’s are two types. One is
dotted PCB and another one is layout PCB. The two examples are shown in below.

Fig 4.1: The Main Difference Between The Dotted PCB And Layout PCB

Pragati Engineering College Page 44


Advanced ATM Security System By Using Smart card and IOT Technology

What is the main difference between the dotted PCB and layout
PCB?
In dotted PCB board only dots are available. According to our requirement we
can place or insert the components in those holes and attach the components with
wires and soldering lid. In this dotted PCB we can make the circuit as out wish but it
is very hard to design. There are so many difficulties are there. Those are connecting
the proper pins, avoiding shot connections and etc. Coming to the layout PCB this is
simple to design. First we select the our circuit and by using different PCB designing
software’s, design the layout of the circuit and by itching process preparing the copper
layout of our circuit and solder the components in the correct places. It is simple to
design, take less time to design, no shortages, looking nice and perfect

Up to now we have discussed about types of PCB’s and difference between


the types. Now we can discuss about PCB designing software. There are so many
PCB designing software’s available. Some are Express PCB, eagle PCB, PCB
Elegance, free PCB, open circuit design, zenith PCB and Proteus etc. Apart from
remaining Proteus is different. Proteus is design suit and PCB layout designing
software. In Proteus we can design any circuit and simulate the circuit and make PCB
layout for that circuit.

4.2.2 INTRODUCTION TO PROTEUS:

Proteus professional is a software combination of ISIS schematic capture program and


ARES PCB layout program. This is a powerful and integrated development
environment. Tools in this suit are very easy to use and these tools are very useful in
education and professional PCB designing. As professional PCB designing software
with integrated space based auto router, it the curser at the component pin end then
draw the connections with that pen symbol. Connect all the components according to
circuit then that designed circuit is show in below image.

Pragati Engineering College Page 45


Advanced ATM Security System By Using Smart card and IOT Technology

If any modifications want to do to the component place the mouse point and click on
right button then option window will open. That is shown in below figure.

After completion of designing save with some mane and debug it. This is virtual
simulation means without making circuit we can see the result in virtually through
this software and we can design the PCB layout to our required circuit with this
software.

Pragati Engineering College Page 46


Advanced ATM Security System By Using Smart card and IOT Technology

CHAPTER 5
RESULT AND ANALYSIS

We designed this projects using IOT technology & Wireless technology,


using the IOT technology we can monitor and transfer the sensors data through
internet. Initially data is transfer to the pc using zigbee technology and then data is
transfer to other PC using IOT concept.

Fig 5.1 schematic diagram

Pragati Engineering College Page 47


Advanced ATM Security System By Using Smart card and IOT Technology

Fig 5.2 Project kit photo

Pragati Engineering College Page 48


Advanced ATM Security System By Using Smart card and IOT Technology

CHAPTER 6
CONCLUSION AND FUTURE SCOPE

CONCLUSION:

The Implementation of ATM security by using SMART CARD recognition and


GSM MODEM took advantages of the stability and reliability of SMART CARD
characteristics. Additional, the system also contains the original verifying methods
which were inputting owner's ID which is send by the controller. The security features
were enhanced largely for the stability and reliability of owner recognition. The whole
system will be built on the technology of embedded system which makes the system
more safe, reliable and easy to use. Additional, system also contains security of ATM
itself which are as follows Temperature sensor, which is used for protecting ATM
center from fire in which if there is fire then sprinkler will be ON. Tilt Sensors, which
use a micro-machined acceleration sensing element with a DC response to measure
inclination relative to gravity.

Future Scope:

In this project we are using finger print as mode of authentication. In the


future project is depending on the biometrics i.e. finger print. In future it will be very
easy to implement because each person has his own finger print s with the permanent
uniqueness. The system will provide many advantages such as, we do not forget our
fingers, Users respect them, fraudsters are afraid of them, Protects privacy. finger
prints do not change over time, finger print stop unauthorized access, and all fingers
are unique, which allows each person to have ten easy uses of identifiers, Base of all
world-wide identification. In future systems using biometric will be preferred as
method to provide security and authentication this will eliminate forgery and fraud in
many organizations.

Pragati Engineering College Page 49


Advanced ATM Security System By Using Smart card and IOT Technology

BIBLIOGRAPHY
REFERENCES

[1] P. Marwedel, Embedded System Design. Kluwer, 2003.


[2] Taherdoost H., Sahibuddin S., and Jalaliyoon N. Smart Card Security; Technology
and Adoption International Journal of Security (IJS), 2011. Volume (5) :Issue(2). [3]
B. Bentley, "Validating the Intel Pentium 4 microprocessor," in Design
Automation Conf, 2001, pp. 244-248.
[4] M. Keating and P. Bricaud, Reuse Methodology Manual: For Systemon-a-Chip
Design. Kluwer, 2002.
[5] S. Schaible, “How thieves clone your credit cards,” Online at http:
//www.wfla.com/story/26074193/credit-cards-cloned, Jul 2014, wFLA News Report.
[6] A.Gera,N.sethi, “A revived survey of various credit card fraud detection
techniques,” International Journal of Computer Science and Mobile Computing, vol.
3, no. 4, pp. 780 – 791, April 2014
[7] Alhassan M.E,Ganiyur S.O,Muhammad-Bello B.L,” An enhanced ATM security
system using second level authentication”,International journal of computer
application(0975-8887),volume 111-no 5,feb 2015.
[8] Jacobs, B. & Poll, E. (2010) Biometrics and Smart Cards in Identity Management.
[9] G. DeMicheli, Synthesis and optimization of digital circuits. McGrawHill, 1994.
[10] R. Drechsler and A. Breiter, "Hardware project management - what we
can learn from the software development process for hardware design,"
in 4th Conference of Informatics and Information Technologies, 2003.
[11] Adeoti, J. (2011). Automated Teller Machine (ATM) frauds in Nigeria: the way
out.
[12] Rodriguez A. B. (2010). Cryptographic Function in a smart card
[13] International Journal of Computer Science and Mobile Computing, Vol.3
Issue.4, April- 2014.
[14] International Journal of Electronics Communication and Computer Engineering
Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X
[15] International Journal of Control, Automation, Communication and Systems
(IJCACS), Vol.1, No.2, April 2016.

Pragati Engineering College Page 50


Advanced ATM Security System By Using Smart card and IOT Technology

APPENDIX
SOURCE CODE :
#include "LPC214x.h"
#include <stdio.h>
#include <string.h>
#include "lcd.c"
#include "uart.h"
#include "uart0.c"
#include"uart1.c"

#define r1 0x00010000
#define r2 0x00020000
#define r3 0x00040000
#define r4 0x00080000
#define c1 0x00100000
#define c2 0x00200000
#define c3 0x00400000
#define mot 0x00010000
#define mot1 0x00020000
#define b 0x00040000
void send_sms(void);
void keypad(void);
void gate();
int pk;
void delay1(void)
{
int i;
for(i=0;i<400000;i++);
}
unsigned int data,key,k=0,i,ch,sms[10],ks=0,kss=0,psw[5],ii;
unsigned char rfid[12],usr,ussr,id,lvl=3;
unsigned int d1=0,d2=0;
void longdelay(unsigned int v)

Pragati Engineering College Page 51


Advanced ATM Security System By Using Smart card and IOT Technology

{
int i,j;
for(i=0;i<=v;i++)
for(j=0;j<=10000;j++);
}
int main()
{
IODIR0 |=0x000F0000;
IODIR0 &=0xFF0FFFFF;
IODIR1 |=0x000F0000;
init_serial0();
init_serial1();
lcd_init();
longdelay(100);
IOSET1=mot;
IOSET1=mot1;
IOSET1=b;
while(1)
{
lcd_write_control(0x01);
lcd_print(" WELCOME");
lcd_write_control(0xc0);
lcd_print("ENTER ANY KEY");
keypad();
lcd_write_control(0x01);
lcd_print(" WELCOME");
lcd_write_control(0xc0);
lcd_print("SHOW YOUR CARD");
longdelay(1000);
sprintf(uart0_buf,"SHOW CARD\r\n");
print_uart0();
if((U1LSR & 0x20))
{
for(ii=0;ii<11;ii++)

Pragati Engineering College Page 52


Advanced ATM Security System By Using Smart card and IOT Technology

{
rfid[ii]=getchar1();
putchar0(rfid[ii]);
}
ii=getchar1();
rfid[ii]='\0';
lcd_write_control(0xce);
lcd_write_ascii(rfid[10]);
longdelay(1000);
}
putchar0(rfid[10]);
if(rfid[10]=='A' || rfid[10]=='9' )
{
sprintf(uart0_buf,"card ok enter otp\r\n");
print_uart0();
lcd_write_control(0x01);
lcd_print("CARD OK..");
longdelay(1000);
lcd_write_control(0x01);
lcd_print("Pls enter OTP");
sprintf(uart1_buf,"AT+CMGF=1\r\n");
print_uart1();
longdelay(400);
longdelay(1000);
sprintf(uart1_buf,"AT+CMGS=");
print_uart1();
longdelay(400);
putchar1('"'); // Transffer data to PC through Serial
sprintf(uart1_buf,"9704056156");
print_uart1();
longdelay(400);
putchar1('"'); // Transffer data to PC through Serial
putchar1(13);
longdelay(200);

Pragati Engineering College Page 53


Advanced ATM Security System By Using Smart card and IOT Technology

sprintf(uart1_buf,"Your OTP:");
d2=d1;
print_uart1();
putchar1(d1/1000+48);
putchar1((d1/100)%10+48);
putchar1((d1/10)%10+48);
putchar1(d1%10+48);
putchar0(d1/1000+48);
putchar0((d1/100)%10+48);
putchar0((d1/10)%10+48);
putchar0(d1%10+48);
longdelay(500);
putchar1(0x1a);
longdelay(300);
longdelay(1000);
for(i=0;i<=3;i++)
{
k=0;
keypad();
lcd_write_ascii(key);
putchar0(key);
psw[i]=key;
IOCLR1=b;
longdelay(20);
IOSET1=b;
}
if(psw[0] == (d2/1000+48) && psw[1] == ((d2/100)%10+48) && psw[2] ==
((d2/10)%10+48) && psw[3] == ((d2/1)%10+48))
{
printf(uart0_buf,"OTP OK\r\n"); // Transffer data to PC through Serial
print_uart0();
lcd_write_control(0x01);
lcd_print("OTP ok");
IOSET1=mot;

Pragati Engineering College Page 54


Advanced ATM Security System By Using Smart card and IOT Technology

IOCLR1=mot1;
longdelay(2000);
IOSET1=mot;
IOSET1=mot1;
}
else
{
putchar0('*');
sprintf(uart0_buf,"WRONG OTP\r\n");
print_uart0();
IOCLR1=b;
lcd_write_control(0x01);
lcd_print("UNAUTHORIZED ACCESS");
longdelay(2000);
IOSET1=b;
}
}
else
{
putchar0('*');
IOCLR1=b;
sprintf(uart0_buf,"WRONG CARD...\r\n");
print_uart0();
lcd_write_control(0x01);
lcd_print("UNAUTHORIZED ACCESS");
longdelay(2000);
IOSET1=b;
}
}
}
void keypad()
{
do
{

Pragati Engineering College Page 55


Advanced ATM Security System By Using Smart card and IOT Technology

d1++;
if(d1>9999)
d1=1000;
IOSET0=0x000F0000;
IOCLR0=0x00010000;
if((IOPIN0 & c1) !=c1)
{
while((IOPIN0 & c1) !=c1);
// lcd_write_control(0xc0);
// lcd_write_ascii('1');
k=1;
key='1';
}
if((IOPIN0 & c2) !=c2)
{
while((IOPIN0 & c2) !=c2);
// lcd_write_control(0xc0);
// lcd_write_ascii('2');
k=1;
key='2';
}
if((IOPIN0 & c3) !=c3)
{
while((IOPIN0 & c3) !=c3);
// lcd_write_control(0xc0);
// lcd_write_ascii('3');
k=1;
key='3';
}
IOSET0=0x00010000;
IOCLR0=0x00020000;
if((IOPIN0 & c1) !=c1)
{
while((IOPIN0 & c1) !=c1);

Pragati Engineering College Page 56


Advanced ATM Security System By Using Smart card and IOT Technology

// lcd_write_control(0xc0);
// lcd_write_ascii('4');
k=1;
key='4';
}

if((IOPIN0 & c2) !=c2)


{
while((IOPIN0 & c2) !=c2);
// lcd_write_control(0xc0);
// lcd_write_ascii('5');
key='5';
k=1;
}

if((IOPIN0 & c3) !=c3)


{
while((IOPIN0 & c3) !=c3);
// lcd_write_control(0xc0);
// lcd_write_ascii('6');
k=1;
key='6';
}
IOSET0=0x00020000;
IOCLR0=0x00040000;

if((IOPIN0 & c1) !=c1)


{
while((IOPIN0 & c1) !=c1);
// lcd_write_control(0xc0);
// lcd_write_ascii('7');
k=1;
key='7';
}

Pragati Engineering College Page 57


Advanced ATM Security System By Using Smart card and IOT Technology

if((IOPIN0 & c2) !=c2)


{
while((IOPIN0 & c2) !=c2);
// lcd_write_control(0xc0);
// lcd_write_ascii('8');
key='8';
k=1;
}

if((IOPIN0 & c3) !=c3)


{
while((IOPIN0 & c3) !=c3);
// lcd_write_control(0xc0);
// lcd_write_ascii('9');
k=1;
key='9';
}
IOSET0=0x00040000;
IOCLR0=0x00080000;

if((IOPIN0 & c1) !=c1)


{
while((IOPIN0 & c1) !=c1);
// lcd_write_control(0xc0);
// lcd_write_ascii('*');
key='*';
k=1;
}

if((IOPIN0 & c2) !=c2)


{
while((IOPIN0 & c2) !=c2);
// lcd_write_control(0xc0);

Pragati Engineering College Page 58


Advanced ATM Security System By Using Smart card and IOT Technology

// lcd_write_ascii('0');
key='0';
k=1;
}

if((IOPIN0 & c3) !=c3)


{
while((IOPIN0 & c3) !=c3);
// lcd_write_control(0xc0);
// lcd_write_ascii('#');
key='#';
k=1;
}
longdelay(100);
}while(k==0);
}

Pragati Engineering College Page 59

You might also like