PSG College of Technology: Mohanan.D Monish Challa
PSG College of Technology: Mohanan.D Monish Challa
PSG College of Technology: Mohanan.D Monish Challa
(Autonomous Institution)
COIMBATORE 641 004
MOHANAN.D (13L230)
BACHELOR OF ENGINEERING
of Anna University
September 2015
... ...
[Name of the guide] [Name of the HoD]
Certified that the candidate was examined in the viva-voce examination held
on .
.. ..
(Internal Examiner) (External Examiner)
1
PSG COLLEGE OF TECHNOLOGY
(Autonomous Institution)
COIMBATORE 641 004
MOHANAN.D (13L230)
BACHELOR OF ENGINEERING
of Anna University
September 2015
... ...
[Name of the guide] [Name of the HoD]
Certified that the candidate was examined in the viva-voce examination held
on .
.. ..
(Internal Examiner) (External Examiner)
2
PSG COLLEGE OF TECHNOLOGY
(Autonomous Institution)
COIMBATORE 641 004
BACHELOR OF ENGINEERING
of Anna University
September 2015
... ...
[Name of the guide] [Name of the HoD]
Certified that the candidate was examined in the viva-voce examination held
on .
.. ..
(Internal Examiner) (External Examiner)
3
CONTENTS
4
ACKNOWLEDGEMENT
We are indebted to Dr. S. SUBHA RANI, Professor and Head of the Department of Electronics
and Communication Engineering, for her continued support and motivation.
We would like to express my gratitude to our guide Dr. K. V. ANUSUYA, Assistant Professor,
Dr. L. THULASIMANI Assistant Professor and Dr. A. KANNAMMAL, Assistant
Professor(SR), Department of Electronics and Communication Engineering, for their constant
motivation, direction and guidance throughout the entire course of our technical report.
We are grateful to the support extended by our class advisor Dr.D.SIVARAJ, Assistant
Professor, Department of Electronics and Communication Engineering.
We thank all the staff members of the Department of Electronics and Communication
Engineering for their support.
Last but not the least we thank the Almighty who is a guiding light in all our endeavors.
5
SYNOPSIS
This report presents a novel and efficient algorithm Central Routing (CR) as an
alternative to the existing approaches to avoid full mesh topology in internal border gateway
protocol (iBGP). BGP is a key protocol to exchange routing information within an Autonomous
System (AS) and among various Autonomous Systems. All the routers inside an AS have to
be connected in full mesh topology to run iBGP protocol to make discoveries such as the
selection of root node and the exchange of information. A full mesh topology becomes
cumbersome and hard to manage as a network grows. For large networks alternatives to a
full mesh topology are available such as route reflectors and BGP confederation at the cost of
increased overheads and the possibility of network inconsistencies. The concept of CR is an
alternative solution, where the root node in an AS is responsible for all the control and
management operations such as maintaining routing tables and calculating paths. The
proposed cash based scheme has been implemented through simulations and the results
prove CR to be a successful alternative of route reflectors.
6
LIST OF FIGURES
Figure Number Title Page Number
7
LIST OF TABLES
Table Number Title Page Number
8
CHAPTER 1
INTRODUCTION
1.1 HARDWARE
9
Figure 1.1-A block diagram of a cash machine
Due to heavier computing demands and the falling price of personal computerlike
architectures, cash machines have moved away from custom hardware architectures
using microcontrollers or application-specific integrated circuits and have adopted the
hardware architecture of a personal computer, such as USB connections for
peripherals, Ethernet and IP communications, and use personal computer operating
systems.
Business owners often lease cash machines from service providers. However, based
on the economies of scale, the price of equipment has dropped to the point where
many business owners are simply paying for cash machines using a credit card.
New ADA voice and text-to-speech guidelines imposed in 2010, but required by March
2012 have forced many cash machine owners to either upgrade non-compliant
machines or dispose them if they are not upgradable, and purchase new compliant
equipment. This has created an avenue for hackers and thieves to obtain cash
machine hardware at junkyards from improperly disposed decommissioned machines
at ATMS.
10
Figure 1.2 -Two employees refilling a cash machine
The vault of a cash machine is within the footprint of the device itself and is where
items of value are kept. Scrip cash dispensers do not incorporate a vault.
Mechanisms found inside the vault may include:
11
1.2 SOFTWARE
With the migration to commodity Personal Computer hardware, standard commercial
"off-the-shelf" operating systems, and programming environments can be used inside
of cash machines. Typical platforms previously used in cash machine development
include RMX or OS/2.
12
With the move to a more standardised software base, financial institutions have been
increasingly interested in the ability to pick and choose the application programs that
drive their equipment. WOSA/XFS, now known as CEN XFS (or simply XFS), provides
a common API for accessing and manipulating the various devices of a cash
machine. J/XFS is a Java implementation of the CEN XFS API.
While the perceived benefit of XFS is similar to the Java's "Write once, run
anywhere" mantra, often different cash machine hardware vendors have different
interpretations of the XFS standard. The result of these differences in interpretation
means that cash machine applications typically use a middleware to even out the
differences among various platforms.
With the onset of Windows operating systems and XFS on cash machines, the
software applications have the ability to become more intelligent. This has created a
new breed of cash machine applications commonly referred to as programmable
applications. These types of applications allows for an entirely new host of applications
in which the cash machine terminal can do more than only communicate with the cash
machine switch. It is now empowered to connected to other content servers and video
banking systems.
Notable cash machine software that operates on XFS platforms include Triton
PRISM, Diebold Agilis EmPower, NCR APTRA Edge, Absolute Systems Absolute
INTERACT, KALKalignite Software Platform, Phoenix Interactive VISTAatm, Wincor
Nixdorf ProTopas, Euronet EFTS and Intertech inter-ATM.
With the move of cash machines to industry-standard computing environments,
concern has risen about the integrity of the cash machine's software stack.
13
CHAPTER 2
SECURITY
Security, as it relates to cash machines, has several dimensions. Cash machines also
provide a practical demonstration of a number of security systems and concepts
operating together and how various security concerns are addressed.
Early cash machine security focused on making the terminals invulnerable to physical
attack; they were effectively safes with dispenser mechanisms. A number of attacks
resulted, with thieves attempting to steal entire machines by ram-raiding. Since late
1990s, criminal groups operating in Japan improved ram-raiding by stealing and using
a truck loaded with heavy construction machinery to effectively demolish or uproot an
entire cash machine and any housing to steal its cash.
Another attack method, plofkraak, is to seal all openings of the cash machine
with silicone and fill the vault with a combustible gas or to place an explosive inside,
attached, or near the machine. This gas or explosive is ignited and the vault is opened
or distorted by the force of the resulting explosion and the criminals can break in. This
type of theft has occurred in Netherlands, Belgium, France, Denmark, Germany and
Australia. These types of attacks can be prevented by a number of gas explosion
prevention devices also known as gas suppression system. These systems use
explosive gas detection sensor to detect explosive gas and to neutralise it by releasing
a special explosion suppression chemical which changes the composition of the
explosive gas and renders it ineffective.
Several attacks in the UK (at least one of which was successful) have involved digging
a concealed tunnel under the cash machine and cutting through the reinforced base
to remove the money.
Modern cash machine physical security, per other modern money-handling security,
concentrates on denying the use of the money inside the machine to a thief, by using
different types of Intelligent Banknote Neutralisation Systems.
A common method is to simply rob the staff filling the machine with money. To avoid
this, the schedule for filling them is kept secret, varying and random. The money is
often kept in cassettes, which will dye the money if incorrectly opened.
14
2.1 TRANSACTIONAL SECRECY AND INTEGRITY
Figure 2.1-A Triton brand cash machine with a dip style card reader
The security of cash machine transactions relies mostly on the integrity of the secure
cryptoprocessor: the cash machine often uses general commodity components that
sometimes are not considered to be "trusted systems"
Encryption of personal information, required by law in many jurisdictions, is used to
prevent fraud. Sensitive data in cash machine transactions are
usually encrypted with DES, but transaction processors now usually require the use
of Triple DES. Remote Key Loading techniques may be used to ensure the secrecy of
the initialisation of the encryption keys in the cash machine. Message Authentication
Code (MAC) or Partial MAC may also be used to ensure messages have not been
tampered with while in transit between the cash machine and the financial network.
2.2 CUSTOMER IDENTITY INTEGRITY
15
manufacturers have put in place countermeasures to protect the equipment they
manufacture from these threats.
Alternative methods to verify cardholder identities have been tested and deployed in
some countries, such as finger and palm vein patterns, iris, and facial
recognition technologies. Cheaper mass-produced equipment has been developed
and is being installed in machines globally that detect the presence of foreign objects
on the front of ATMs, current tests have shown 99% detection success for all types
of skimming devices.
Openings on the customer side of cash machines are often covered by mechanical
shutters to prevent tampering with the mechanisms when they are not in use. Alarm
sensors are placed inside cash machines and their servicing areas to alert their
operators when doors have been opened by unauthorised personnel.
To protect against hackers, cash machines have a built-in firewall. Once the firewall
has detected malicious attempts to break into the machine remotely, the firewall locks
down the machine.
Rules are usually set by the government or cash machine operating body that dictate
what happens when integrity systems fail. Depending on the jurisdiction, a bank may
or may not be liable when an attempt is made to dispense a customer's money from
a cash machine and the money either gets outside of the cash machine's vault, or
was exposed in a non-secure fashion, or they are unable to determine the state of
the money after a failed transaction.Customers often commented that it is difficult to
recover money lost in this way, but this is often complicated by the policies regarding
suspicious activities typical of the criminal element.
16
2.4 CUSTOMER SECURITY
17
mounted scanner, allowing the bank to identify which card enters the building. Most
cash machines will also display on-screen safety warnings and may also be fitted with
convex mirrors above the display allowing the user to see what is happening behind
them.
As of 2013, the only claim available about the extent of cash machine-connected
homicides is that they range from 500 to 1000 per year in the US, covering only cases
where the victim had an ATM card and the card was used by the killer after the known
time of death.
18
CHAPTER 3
ULTRASONIC SENSOR
19
3.2.3 ULTRASONIC APPLICATION
Ultrasonic Application Technology is the thing which developed in recent decades.
With the ultrasonic advance, and the electronic technology development, especially
as high-power semiconductor device technology matures, the application of ultrasonic
has become increasingly widespread:
20
CHAPTER 4
PINS AND POWER
4.1 MODULE PIN DEFINITIONS
21
CHAPTER 5
MODULE OPERATING PRINCIPLE
Set low the Trig and Echo port when the module initializes , firstly, transmit at least
10us high level pulse to the Trig pin (module automatically sends eight 40K square
wave), and then wait to capture the rising edge output by echo port, at the same time,
open the timer to start timing. Next, once again capture the falling edge output by echo
port, at the same time, read the time of the counter, which is the ultrasonic running
time in the air. According to the formular: test distance = (high level time * ultrasonic
spreading velocity in air) / 2, you can calculate the distance to the obstacle.
22
CHAPTER 6
TIMING DIAGRAM
The Timing diagram is shown below. You only need to supply a short 10uS pulse to
the trigger input to start the ranging, and then the module will send out an 8 cycle burst
of ultrasound at 40 kHz and raise its echo. The Echo is a distance object that is pulse
width and the range in proportion .You can calculate the range through the time interval
between sending trigger signal and receiving echo signal. Formula: uS / 58 =
centimeters or uS / 148 =inch; or: the range = high level time * velocity (340M/S) / 2;
we suggest to use over 60ms measurement cycle, in order to prevent trigger signal to
the echo signal.
23
CHAPTER 7
INFERENCE
CHAPTER 8
CONCLUSION
24
BIBLIOGRAPHY
1. Muhammad Razaa.H, Ankit Kansara, Aliraza Nafarieha and William Robertson, 2014, Central
Routing Algorithm: An Alternative Solution to Avoid Mesh Topology in iBGP, Procedia Computer
Science, Vol. 37, 2014, pp. 85-91.
2. Issariyakul. T , and Hossain. E , "Introduction to Network Simulator NS2," Springer, Oct. 2008.
25