SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 517
Guarded Remittance System Employing WANET for Catastrophe Region
Mr.Bala Sundara Ganapathy.N1, Yokeshwaran.T2, Venugopal.S3, Nishanth.M4, Manoj.S5
1 Assistant Professor,2345 Students ,B-Tech, Department of Information Technology, Panimalar Engineering College,
Poonamallee, Chennai,, Tamil Nadu, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – In this paper, we propose an offline mobile
payment system for catastrophe region utilizing WANET
(Wireless Adhoc Network). The current payment system
requires a fixed infrastructure networksuch ascellulartowers,
or wired networks to enable transactions. In Disaster areas,
these infrastructures may not be available and impossible to
get cash from banks or ATM. To overcome this issue, we
provide an infrastructure less wireless network for
communication which permits customers to purchase in
disaster areas. Therefore we introduce a mobile payment
application which enables us to make payment offline. We use
multilevel endorsement mechanism to ensure guarantee
payment for merchant. To reduce communication overheads
we use lightweight scheme based on Bloom filter and Merkle
tree. In order to make transaction easier and secured, QR
codes are used consisting of digital signatures which restricts
an attacker from double spending the QR. In addition with
payment system, regional situation update is provided to
upload their current situation such as roadblocks, floods etc.
Key Words: WANET, Multilevel Endorser, Digital Signature,
Double Spending, Merkle tree.
1. INTRODUCTION:
Now a day’s usage of smart phone has increased
tremendously and due to the availability of internet facility
the world goes digitalized. So payments are done using
online banking and other technique especially using mobile
application. Since everybody carry mobile phone it makes
payment easier without cash transaction. Current mobile
payment adopts various technique and makes the payment
system easier, secured and guaranteed. But all the available
payment system’s technique works only when the user has
cellular connectivity or internet facility. But when there is a
calamity these communication network will be destroyedor
will not function properly. Even though real cash is
considered to be the easiest means for carrying out a
transaction it is impossible to get cash because access to the
ATMs or Banks are restricted physically. Current payment
system works only in the availability of the network. To
overcome this situation we introduce a new way to establish
communication utilizing WANET, make payment possible
and shop in disaster area. We provide an androidapplication
which communicates through WANETandmaketransaction.
We adopt various technique and strategies to make secured,
easier and guaranteed payment for customer and merchant.
This application does not require any fixedinfrastructurefor
communication and the usersmaynotknowanyinformation
about the area during calamity. Moreover we provide an
interface page which allowsthe user to view theinformation
and upload their area situation
2. PROPOSED SYSTEM:
We proposed a payment system that will provide the
infrastructure less network between User and Bank in
disaster area utilizing WANET network.WeuseTransceivers
as an intermediate for the communicationsbetweenMobiles
and Banksin order to cover a wider rangeofcommunication.
The Customer gets the merchant information by scanning
merchant’s QR code, fills payment details and passes the
payment request message across the mobiles using
transceivers. The QR code makes easy to fill the merchant’s
information and identify. For security reasons we use DES
algorithm for encryption and decryption.
To transfer message in wireless medium, Base64algorithm
is used which converts the encrypted binary data into a text
line format such as ASCII value. After reaching the bank the
data is decrypted and it is verified. In order to provide
payment guarantees we use multilevel endorsement (MLE)
mechanism for a customer-to-merchant transaction. Then
QR code is generated which is digitally signed that helps for
authentication and moreover it restricts an attacker from
double spending the QR. Bank response messagereachesthe
customer using same strategy. Then merchant scans the
received QR-code from the customer and sendsinformation
back to the Bank. Finally the QR is validated and the amount
is credited to merchant. We introduced a Disaster
Information center where the users can broadcast any
calamity information such as Roadblocks, Bridge Collapse
and flood affected areas.
3. MODULE DESCRIPTION:
3.1 Account Creation:
In this first module customer and merchant will create a
bank account and sign up in the application. Then customer
will deposit the amount in his account. They should give
their endorser name (surety) which will be added to the
account information and this will help the customer to
withdraw amount from your endorser account if customer
account is under minimum balance. Finally amount will be
converter to bit coins (Digital currency).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 518
3.2 Customer Payment Request:
Second module shows how the purchase is made by the
customer. First the User will login with credential
information like username, password and if it is valid then it
opens the User profile screen. If Customer wantstopurchase
any item then he should scan the Merchant Shop QR code
and then customer has to enter the Item name and cost of
item. Then the information will be encoded with the DES
Algorithm and then the encoded data will be converted into
stream of bits using Base 64 Algorithm. It will be
broadcasted from the customer phone and by using mobile
to mobile communication the data reaches the Bank. The
data is verified by the bank and if data is valid Bank
generates a QR code and send it back to the customer who
made the request.
3.3 Merchant Process:
In this module the received QR code will be scanned by
the Merchant from the customer. The QR code contains the
account information and transaction amount with digital
signature. If the merchant scans the customer QR code the
data is proceed to Bank through mobile communication
using WANET .Bank system will check the QR code
information and validates using parameters such as Date,
Signature, and Time. After the successful verification, the
amount will be transferred from customer to merchant
account and this completed transaction will be informed to
the merchant. When the transaction is completed the used
QR code will become invalid to avoid Double Spending.
3.4 Regional Situation Update:
In this final module we will be providing a page where
the user can upload their surrounding situation. Now all the
user will be connected in WANET network. So any update
made by any user will be passed to all other users. The
update is made based on their location situation like Heavy
rain, Road block. So this location update will be very helpful
to all the people who travels or rescuers by checking the
update. User can also broadcast emergency messageandcall
for rescue which will be useful for the victims in disaster
area. The Situation update can be given in three fields such
as subject, place and status. Once the user update their
Information, other user can view regional information in
their application.
4. ARCHITECTURE DIAGRAM:
Figure 1.1 Architecture Diagram
5. ALGORITHM:
5.1 DES:
DES algorithm is a block cipher used to prevent the
attack from hackersduring transmissionofuserinformation.
DES (Data Encryption Standard) is a symmetric key block
cipher published by the National Institute of Standards and
Technology (NIST).DES is an implementation of a Feistel
Cipheer. It uses 16 round Fesitel structure. The block size is
64-bit. Though, key length is 64-bit, DES hasan effective key
length of 56bits.
General Structure of DES is depicted in the following
illustration. Since DES is based on the Feistel Cipher, all that
is required to specify DES is
 Initial and final permutation
 Round Function
 Key Expansion
The important significant of DES is the algorithmmakes
the transaction secure by using 56-bit key and 64-bit plain
text. So there are 2^56 possibilitiesof keyswhichwouldtake
a decade to find the correct key using brute-force attack. It
uses same algorithm for encryption and decryption.
5.2 Base64
Base64 also be referred as Privacy-enhanced Electronic
Mail (PEM) is used to convert binary data into a text-like
format that allows it to be transported in environments that
can handle only text safely. Base64 encoding takes the
original binary data and divides it into tokens of three bytes
(24 bits) and converted into printable characters from the
ASCII standard. The first step is to take the three bytes
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 519
(24bit) of binary data and split it into four numbers of six
bits. Because the ASCII standard defines the use of seven
bits, Base64 only uses 6 bits (corresponding to 2^6 = 64
characters) to ensure the encoded data isprintableandnone
of the special characters available in ASCII are used. The
ASCII characters used for Base64 are the numbers 0-9, the
alphabets 26 lowercase and 26 uppercase characters plus
two extra characters '+' and '/‘(26+26+10+2=64).
5.3. QR Code:
QR code means Quick Response Code is the trademark
for a type of Matrix Barcode (or two-dimensional barcode).
A QR code uses four standardized encodingmodes(numeric,
alphanumeric, byte/binary, and kanji) to efficiently store
data; extensions may also be used. The QR code consists of
black squares arranged in a square grid on a white
background which can be read by an imaging device and
processed using Reed-Solomon error correction. Each of
these squares is called a module. In every QR code, there are
certain modules that must not be covered or edited, else the
code won’t scan. We specifically use IQR code.
6. HARDWARE AND SOFTWARE REQUIREMENT:
6.1 Hardware Requirement:
Windows:
Hard disk : 250 GB and above.
Processor : i3 and above.
RAM : 2GB and above.
Smart Phone:
Memory : 4GB and above.
Processor : Dual core and above.
RAM : 1GB and above.
6.2 Software Requirement:
Windows:
Operating System : Windows 7 and above
Java Version : JDK 1.7
Web Server : Tomcat 7.0.11
Database : MYSQL
Smart Phone:
Operating System : Gingerbread and above.
No. of Devices : 2(at least).
7. CONCLUSIONS
We designed an online mobile payment system using
WANET to purchase product in disaster areas. The current
payment system needs an online medium to enable the
transaction which usesfixed infrastructure network suchas
cellular towers, base station etc. By using WANET can
provide infrastructure less network which helps the mobile
payment application to work in offline mode. So the
developed application allows the user to shop even in
disaster areas which reduces the fear of people from
purchasing essential goods.
ACKNOWLEDGEMENT
A project of this magnitude and nature requires kind
co-operation and support from many, for successful
completion . We wish to express our sincere thanks to all
those who were involved in the completion of this project.
REFERENCES
[1] B. Ojetunde, N. Shibata, J. Gao, and M. Ito, “An
endorsement-based mobile payment system for a disaster
area,” in Proc. 29th IEEE Int.Conf. Adv. Inf. Netw. Appl.
(AINA), Gwangju, South Korea, Mar. 2015, pp. 482–489.
[2] A. Mishra and K. M. Nadkarni, “Security in wirelessadhoc
networks,” in The Handbook of Ad Hoc Wireless Networks.
Boca Raton, FL, USA: CRC Press, 2003, ch. 30, pp. 499–549.
[3] W. Li, Q. Wen, Q. Su, and Z. Jin, “An efficient and secure
mobile payment protocol for restricted connectivity
scenarios in vehicular ad hoc network,” Comput. Commun.,
vol. 35, no. 2, pp. 188–195, Jan. 2012.
[4] X. Dai, O. Ayoade, and J. Grundy, “Off-line micro-payment
protocol for multiple vendorsin mobile commerce,” in Proc.
7th Int. Conf. Parallel Distrib. Comput. Appl. Technol.
(PDCAT), Taipei, Taiwan, 2006, pp. 197–202
[5] V. Patil and R. K. Shyamasundar, “An efficient, secure and
delegable micro-payment system,” in Proc. IEEE Int. Conf. e-
Technol. e-Commerce e-Service (EEE), Taipei, Taiwan, Mar.
2004, pp. 394–404.

Contenu connexe

Tendances

IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET Journal
 
Paper id 71201959
Paper id 71201959Paper id 71201959
Paper id 71201959IJRAT
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET Journal
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSJournal For Research
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card PaymentEditor IJCATR
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
IRJET- Smart Trolley for Billing System
IRJET-   	  Smart Trolley for Billing SystemIRJET-   	  Smart Trolley for Billing System
IRJET- Smart Trolley for Billing SystemIRJET Journal
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 WebinarIvona M
 
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET Journal
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsTELKOMNIKA JOURNAL
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris ScannerIRJET Journal
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAFirst Atlantic Commerce
 

Tendances (20)

IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 
Gresham Publication
Gresham PublicationGresham Publication
Gresham Publication
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
 
Paper id 71201959
Paper id 71201959Paper id 71201959
Paper id 71201959
 
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...IRJET -  	  Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
 
D0351022026
D0351022026D0351022026
D0351022026
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card Payment
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
article
articlearticle
article
 
IRJET- Smart Trolley for Billing System
IRJET-   	  Smart Trolley for Billing SystemIRJET-   	  Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
 
Bq33413420
Bq33413420Bq33413420
Bq33413420
 
N044057478
N044057478N044057478
N044057478
 
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block ChainIRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block Chain
 
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documentsQR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
 

Similaire à IRJET- Guarded Remittance System Employing WANET for Catastrophe Region

E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPIRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET Journal
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET Journal
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSSECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET Journal
 
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...AnthonyOtuonye
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office AdministrationIRJET Journal
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
E wallet nfc service payment
E wallet nfc service paymentE wallet nfc service payment
E wallet nfc service paymentigede tirtanata
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 

Similaire à IRJET- Guarded Remittance System Employing WANET for Catastrophe Region (20)

E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTPE AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFCIRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFC
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A ReviewIRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSSECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
 
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
E wallet nfc service payment
E wallet nfc service paymentE wallet nfc service payment
E wallet nfc service payment
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Dernier (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

IRJET- Guarded Remittance System Employing WANET for Catastrophe Region

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 517 Guarded Remittance System Employing WANET for Catastrophe Region Mr.Bala Sundara Ganapathy.N1, Yokeshwaran.T2, Venugopal.S3, Nishanth.M4, Manoj.S5 1 Assistant Professor,2345 Students ,B-Tech, Department of Information Technology, Panimalar Engineering College, Poonamallee, Chennai,, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In this paper, we propose an offline mobile payment system for catastrophe region utilizing WANET (Wireless Adhoc Network). The current payment system requires a fixed infrastructure networksuch ascellulartowers, or wired networks to enable transactions. In Disaster areas, these infrastructures may not be available and impossible to get cash from banks or ATM. To overcome this issue, we provide an infrastructure less wireless network for communication which permits customers to purchase in disaster areas. Therefore we introduce a mobile payment application which enables us to make payment offline. We use multilevel endorsement mechanism to ensure guarantee payment for merchant. To reduce communication overheads we use lightweight scheme based on Bloom filter and Merkle tree. In order to make transaction easier and secured, QR codes are used consisting of digital signatures which restricts an attacker from double spending the QR. In addition with payment system, regional situation update is provided to upload their current situation such as roadblocks, floods etc. Key Words: WANET, Multilevel Endorser, Digital Signature, Double Spending, Merkle tree. 1. INTRODUCTION: Now a day’s usage of smart phone has increased tremendously and due to the availability of internet facility the world goes digitalized. So payments are done using online banking and other technique especially using mobile application. Since everybody carry mobile phone it makes payment easier without cash transaction. Current mobile payment adopts various technique and makes the payment system easier, secured and guaranteed. But all the available payment system’s technique works only when the user has cellular connectivity or internet facility. But when there is a calamity these communication network will be destroyedor will not function properly. Even though real cash is considered to be the easiest means for carrying out a transaction it is impossible to get cash because access to the ATMs or Banks are restricted physically. Current payment system works only in the availability of the network. To overcome this situation we introduce a new way to establish communication utilizing WANET, make payment possible and shop in disaster area. We provide an androidapplication which communicates through WANETandmaketransaction. We adopt various technique and strategies to make secured, easier and guaranteed payment for customer and merchant. This application does not require any fixedinfrastructurefor communication and the usersmaynotknowanyinformation about the area during calamity. Moreover we provide an interface page which allowsthe user to view theinformation and upload their area situation 2. PROPOSED SYSTEM: We proposed a payment system that will provide the infrastructure less network between User and Bank in disaster area utilizing WANET network.WeuseTransceivers as an intermediate for the communicationsbetweenMobiles and Banksin order to cover a wider rangeofcommunication. The Customer gets the merchant information by scanning merchant’s QR code, fills payment details and passes the payment request message across the mobiles using transceivers. The QR code makes easy to fill the merchant’s information and identify. For security reasons we use DES algorithm for encryption and decryption. To transfer message in wireless medium, Base64algorithm is used which converts the encrypted binary data into a text line format such as ASCII value. After reaching the bank the data is decrypted and it is verified. In order to provide payment guarantees we use multilevel endorsement (MLE) mechanism for a customer-to-merchant transaction. Then QR code is generated which is digitally signed that helps for authentication and moreover it restricts an attacker from double spending the QR. Bank response messagereachesthe customer using same strategy. Then merchant scans the received QR-code from the customer and sendsinformation back to the Bank. Finally the QR is validated and the amount is credited to merchant. We introduced a Disaster Information center where the users can broadcast any calamity information such as Roadblocks, Bridge Collapse and flood affected areas. 3. MODULE DESCRIPTION: 3.1 Account Creation: In this first module customer and merchant will create a bank account and sign up in the application. Then customer will deposit the amount in his account. They should give their endorser name (surety) which will be added to the account information and this will help the customer to withdraw amount from your endorser account if customer account is under minimum balance. Finally amount will be converter to bit coins (Digital currency).
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 518 3.2 Customer Payment Request: Second module shows how the purchase is made by the customer. First the User will login with credential information like username, password and if it is valid then it opens the User profile screen. If Customer wantstopurchase any item then he should scan the Merchant Shop QR code and then customer has to enter the Item name and cost of item. Then the information will be encoded with the DES Algorithm and then the encoded data will be converted into stream of bits using Base 64 Algorithm. It will be broadcasted from the customer phone and by using mobile to mobile communication the data reaches the Bank. The data is verified by the bank and if data is valid Bank generates a QR code and send it back to the customer who made the request. 3.3 Merchant Process: In this module the received QR code will be scanned by the Merchant from the customer. The QR code contains the account information and transaction amount with digital signature. If the merchant scans the customer QR code the data is proceed to Bank through mobile communication using WANET .Bank system will check the QR code information and validates using parameters such as Date, Signature, and Time. After the successful verification, the amount will be transferred from customer to merchant account and this completed transaction will be informed to the merchant. When the transaction is completed the used QR code will become invalid to avoid Double Spending. 3.4 Regional Situation Update: In this final module we will be providing a page where the user can upload their surrounding situation. Now all the user will be connected in WANET network. So any update made by any user will be passed to all other users. The update is made based on their location situation like Heavy rain, Road block. So this location update will be very helpful to all the people who travels or rescuers by checking the update. User can also broadcast emergency messageandcall for rescue which will be useful for the victims in disaster area. The Situation update can be given in three fields such as subject, place and status. Once the user update their Information, other user can view regional information in their application. 4. ARCHITECTURE DIAGRAM: Figure 1.1 Architecture Diagram 5. ALGORITHM: 5.1 DES: DES algorithm is a block cipher used to prevent the attack from hackersduring transmissionofuserinformation. DES (Data Encryption Standard) is a symmetric key block cipher published by the National Institute of Standards and Technology (NIST).DES is an implementation of a Feistel Cipheer. It uses 16 round Fesitel structure. The block size is 64-bit. Though, key length is 64-bit, DES hasan effective key length of 56bits. General Structure of DES is depicted in the following illustration. Since DES is based on the Feistel Cipher, all that is required to specify DES is  Initial and final permutation  Round Function  Key Expansion The important significant of DES is the algorithmmakes the transaction secure by using 56-bit key and 64-bit plain text. So there are 2^56 possibilitiesof keyswhichwouldtake a decade to find the correct key using brute-force attack. It uses same algorithm for encryption and decryption. 5.2 Base64 Base64 also be referred as Privacy-enhanced Electronic Mail (PEM) is used to convert binary data into a text-like format that allows it to be transported in environments that can handle only text safely. Base64 encoding takes the original binary data and divides it into tokens of three bytes (24 bits) and converted into printable characters from the ASCII standard. The first step is to take the three bytes
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 519 (24bit) of binary data and split it into four numbers of six bits. Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensure the encoded data isprintableandnone of the special characters available in ASCII are used. The ASCII characters used for Base64 are the numbers 0-9, the alphabets 26 lowercase and 26 uppercase characters plus two extra characters '+' and '/‘(26+26+10+2=64). 5.3. QR Code: QR code means Quick Response Code is the trademark for a type of Matrix Barcode (or two-dimensional barcode). A QR code uses four standardized encodingmodes(numeric, alphanumeric, byte/binary, and kanji) to efficiently store data; extensions may also be used. The QR code consists of black squares arranged in a square grid on a white background which can be read by an imaging device and processed using Reed-Solomon error correction. Each of these squares is called a module. In every QR code, there are certain modules that must not be covered or edited, else the code won’t scan. We specifically use IQR code. 6. HARDWARE AND SOFTWARE REQUIREMENT: 6.1 Hardware Requirement: Windows: Hard disk : 250 GB and above. Processor : i3 and above. RAM : 2GB and above. Smart Phone: Memory : 4GB and above. Processor : Dual core and above. RAM : 1GB and above. 6.2 Software Requirement: Windows: Operating System : Windows 7 and above Java Version : JDK 1.7 Web Server : Tomcat 7.0.11 Database : MYSQL Smart Phone: Operating System : Gingerbread and above. No. of Devices : 2(at least). 7. CONCLUSIONS We designed an online mobile payment system using WANET to purchase product in disaster areas. The current payment system needs an online medium to enable the transaction which usesfixed infrastructure network suchas cellular towers, base station etc. By using WANET can provide infrastructure less network which helps the mobile payment application to work in offline mode. So the developed application allows the user to shop even in disaster areas which reduces the fear of people from purchasing essential goods. ACKNOWLEDGEMENT A project of this magnitude and nature requires kind co-operation and support from many, for successful completion . We wish to express our sincere thanks to all those who were involved in the completion of this project. REFERENCES [1] B. Ojetunde, N. Shibata, J. Gao, and M. Ito, “An endorsement-based mobile payment system for a disaster area,” in Proc. 29th IEEE Int.Conf. Adv. Inf. Netw. Appl. (AINA), Gwangju, South Korea, Mar. 2015, pp. 482–489. [2] A. Mishra and K. M. Nadkarni, “Security in wirelessadhoc networks,” in The Handbook of Ad Hoc Wireless Networks. Boca Raton, FL, USA: CRC Press, 2003, ch. 30, pp. 499–549. [3] W. Li, Q. Wen, Q. Su, and Z. Jin, “An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network,” Comput. Commun., vol. 35, no. 2, pp. 188–195, Jan. 2012. [4] X. Dai, O. Ayoade, and J. Grundy, “Off-line micro-payment protocol for multiple vendorsin mobile commerce,” in Proc. 7th Int. Conf. Parallel Distrib. Comput. Appl. Technol. (PDCAT), Taipei, Taiwan, 2006, pp. 197–202 [5] V. Patil and R. K. Shyamasundar, “An efficient, secure and delegable micro-payment system,” in Proc. IEEE Int. Conf. e- Technol. e-Commerce e-Service (EEE), Taipei, Taiwan, Mar. 2004, pp. 394–404.