alexa Deployment of NFC for Security Purposes and Efficient
ISSN ONLINE(2278-8875) PRINT (2320-3765)

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Deployment of NFC for Security Purposes and Efficient Transaction in Real World

Thivya.G1, Amutha.C2
Department of Electrical and Electronics Engineering, Rajalakshmi Engineering College, Thandalam, Chennai, India1,2
Related article at Pubmed, Scholar Google


ATMs are predominantly used all over the world. However, the safety of any money transaction is always a concern, no matter how many technologies are developed to protect the transaction. The idea of this project is to develop the prevention of theft of the ATM card and to control the usage of the ATM card by unauthorized person. Conditional security is provided with protocol data unit. The additional feature of this project is that no transaction can be done without the knowledge of the respective card holder for the cause that NFC transactions are being implemented. Whenever the transaction has to be done, the RFID card is inserted inside the ATM machine and NFC devices are made to interact with some of the legacy systems. Granting that both RFID and NFC device is found to be accurate, a message is received to the mobile phone of the rightful proprietor with a pin number of four digits. In case of password being correct it moves on to the next level of money transaction, asking for the money withdrawal. Scenario like, the password is found to be defective, next in order of time, the image of the person is captured and the passage out will be locked.


Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version