Soumettre la recherche
Mettre en ligne
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
•
0 j'aime
•
10 vues
IRJET Journal
Suivre
https://www.irjet.net/archives/V5/i4/IRJET-V5I4114.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 3
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
IRJET Journal
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET Journal
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET Journal
Bv4201481484
Bv4201481484
IJERA Editor
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET Journal
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
IJERD Editor
Recommandé
IRJET - Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
Multi Bank Atm Family Card: Integration of Multi Bank Multiple User in Single...
IRJET Journal
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET Journal
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET Journal
Bv4201481484
Bv4201481484
IJERA Editor
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET Journal
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
IJERD Editor
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET Journal
Gresham Publication
Gresham Publication
Gresham Jnr Muradzikwa
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
dbpublications
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET Journal
Paper id 71201959
Paper id 71201959
IJRAT
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET Journal
D0351022026
D0351022026
inventionjournals
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
Journal For Research
Novel Approach for Card Payment
Novel Approach for Card Payment
Editor IJCATR
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
article
article
chaudharyharis3
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET Journal
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
Ivona M
Bq33413420
Bq33413420
IJERA Editor
N044057478
N044057478
IJERA Editor
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block Chain
IRJET Journal
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
TELKOMNIKA JOURNAL
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
IRJET - Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
IRJET Journal
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
First Atlantic Commerce
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
Contenu connexe
Tendances
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET Journal
Gresham Publication
Gresham Publication
Gresham Jnr Muradzikwa
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
dbpublications
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET Journal
Paper id 71201959
Paper id 71201959
IJRAT
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET Journal
D0351022026
D0351022026
inventionjournals
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
Journal For Research
Novel Approach for Card Payment
Novel Approach for Card Payment
Editor IJCATR
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
article
article
chaudharyharis3
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
IRJET Journal
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
Ivona M
Bq33413420
Bq33413420
IJERA Editor
N044057478
N044057478
IJERA Editor
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block Chain
IRJET Journal
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
TELKOMNIKA JOURNAL
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET Journal
IRJET - Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
IRJET Journal
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
First Atlantic Commerce
Tendances
(20)
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
Gresham Publication
Gresham Publication
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
Paper id 71201959
Paper id 71201959
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
IRJET - Image Thresholding based Secured Electronic Smart Voting Machine ...
D0351022026
D0351022026
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
Novel Approach for Card Payment
Novel Approach for Card Payment
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
article
article
IRJET- Smart Trolley for Billing System
IRJET- Smart Trolley for Billing System
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
Bq33413420
Bq33413420
N044057478
N044057478
IRJET- Whistle Blower Protection using Block Chain
IRJET- Whistle Blower Protection using Block Chain
QR code based two-factor authentication to verify paper-based documents
QR code based two-factor authentication to verify paper-based documents
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET - Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
Similaire à IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
IRJET Journal
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFC
IRJET Journal
IRJET - A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
IRJET Journal
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET Journal
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
IRJET Journal
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
IRJET Journal
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET Journal
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
AnthonyOtuonye
Basic Office Administration
Basic Office Administration
IRJET Journal
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
E wallet nfc service payment
E wallet nfc service payment
igede tirtanata
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
IRJET Journal
Similaire à IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
(20)
E AUTHENICATION SYSTEM USING QR CODE AND OTP
E AUTHENICATION SYSTEM USING QR CODE AND OTP
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET- Smart Shopping Application using NFC
IRJET- Smart Shopping Application using NFC
IRJET - A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
IRJET- QR Code Techniques for Smart Shopping: A Review
IRJET- QR Code Techniques for Smart Shopping: A Review
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
IRJET - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
IRJET- Securing the Transfer of Confidential Data in Fiscal Devices using Blo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Development of Electronic Bank Deposi and Withdrawal System Using Quick Respo...
Basic Office Administration
Basic Office Administration
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
E wallet nfc service payment
E wallet nfc service payment
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET- Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
simmis5
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
result management system report for college project
result management system report for college project
Tonystark477637
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Dernier
(20)
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
result management system report for college project
result management system report for college project
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 517 Guarded Remittance System Employing WANET for Catastrophe Region Mr.Bala Sundara Ganapathy.N1, Yokeshwaran.T2, Venugopal.S3, Nishanth.M4, Manoj.S5 1 Assistant Professor,2345 Students ,B-Tech, Department of Information Technology, Panimalar Engineering College, Poonamallee, Chennai,, Tamil Nadu, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – In this paper, we propose an offline mobile payment system for catastrophe region utilizing WANET (Wireless Adhoc Network). The current payment system requires a fixed infrastructure networksuch ascellulartowers, or wired networks to enable transactions. In Disaster areas, these infrastructures may not be available and impossible to get cash from banks or ATM. To overcome this issue, we provide an infrastructure less wireless network for communication which permits customers to purchase in disaster areas. Therefore we introduce a mobile payment application which enables us to make payment offline. We use multilevel endorsement mechanism to ensure guarantee payment for merchant. To reduce communication overheads we use lightweight scheme based on Bloom filter and Merkle tree. In order to make transaction easier and secured, QR codes are used consisting of digital signatures which restricts an attacker from double spending the QR. In addition with payment system, regional situation update is provided to upload their current situation such as roadblocks, floods etc. Key Words: WANET, Multilevel Endorser, Digital Signature, Double Spending, Merkle tree. 1. INTRODUCTION: Now a day’s usage of smart phone has increased tremendously and due to the availability of internet facility the world goes digitalized. So payments are done using online banking and other technique especially using mobile application. Since everybody carry mobile phone it makes payment easier without cash transaction. Current mobile payment adopts various technique and makes the payment system easier, secured and guaranteed. But all the available payment system’s technique works only when the user has cellular connectivity or internet facility. But when there is a calamity these communication network will be destroyedor will not function properly. Even though real cash is considered to be the easiest means for carrying out a transaction it is impossible to get cash because access to the ATMs or Banks are restricted physically. Current payment system works only in the availability of the network. To overcome this situation we introduce a new way to establish communication utilizing WANET, make payment possible and shop in disaster area. We provide an androidapplication which communicates through WANETandmaketransaction. We adopt various technique and strategies to make secured, easier and guaranteed payment for customer and merchant. This application does not require any fixedinfrastructurefor communication and the usersmaynotknowanyinformation about the area during calamity. Moreover we provide an interface page which allowsthe user to view theinformation and upload their area situation 2. PROPOSED SYSTEM: We proposed a payment system that will provide the infrastructure less network between User and Bank in disaster area utilizing WANET network.WeuseTransceivers as an intermediate for the communicationsbetweenMobiles and Banksin order to cover a wider rangeofcommunication. The Customer gets the merchant information by scanning merchant’s QR code, fills payment details and passes the payment request message across the mobiles using transceivers. The QR code makes easy to fill the merchant’s information and identify. For security reasons we use DES algorithm for encryption and decryption. To transfer message in wireless medium, Base64algorithm is used which converts the encrypted binary data into a text line format such as ASCII value. After reaching the bank the data is decrypted and it is verified. In order to provide payment guarantees we use multilevel endorsement (MLE) mechanism for a customer-to-merchant transaction. Then QR code is generated which is digitally signed that helps for authentication and moreover it restricts an attacker from double spending the QR. Bank response messagereachesthe customer using same strategy. Then merchant scans the received QR-code from the customer and sendsinformation back to the Bank. Finally the QR is validated and the amount is credited to merchant. We introduced a Disaster Information center where the users can broadcast any calamity information such as Roadblocks, Bridge Collapse and flood affected areas. 3. MODULE DESCRIPTION: 3.1 Account Creation: In this first module customer and merchant will create a bank account and sign up in the application. Then customer will deposit the amount in his account. They should give their endorser name (surety) which will be added to the account information and this will help the customer to withdraw amount from your endorser account if customer account is under minimum balance. Finally amount will be converter to bit coins (Digital currency).
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 518 3.2 Customer Payment Request: Second module shows how the purchase is made by the customer. First the User will login with credential information like username, password and if it is valid then it opens the User profile screen. If Customer wantstopurchase any item then he should scan the Merchant Shop QR code and then customer has to enter the Item name and cost of item. Then the information will be encoded with the DES Algorithm and then the encoded data will be converted into stream of bits using Base 64 Algorithm. It will be broadcasted from the customer phone and by using mobile to mobile communication the data reaches the Bank. The data is verified by the bank and if data is valid Bank generates a QR code and send it back to the customer who made the request. 3.3 Merchant Process: In this module the received QR code will be scanned by the Merchant from the customer. The QR code contains the account information and transaction amount with digital signature. If the merchant scans the customer QR code the data is proceed to Bank through mobile communication using WANET .Bank system will check the QR code information and validates using parameters such as Date, Signature, and Time. After the successful verification, the amount will be transferred from customer to merchant account and this completed transaction will be informed to the merchant. When the transaction is completed the used QR code will become invalid to avoid Double Spending. 3.4 Regional Situation Update: In this final module we will be providing a page where the user can upload their surrounding situation. Now all the user will be connected in WANET network. So any update made by any user will be passed to all other users. The update is made based on their location situation like Heavy rain, Road block. So this location update will be very helpful to all the people who travels or rescuers by checking the update. User can also broadcast emergency messageandcall for rescue which will be useful for the victims in disaster area. The Situation update can be given in three fields such as subject, place and status. Once the user update their Information, other user can view regional information in their application. 4. ARCHITECTURE DIAGRAM: Figure 1.1 Architecture Diagram 5. ALGORITHM: 5.1 DES: DES algorithm is a block cipher used to prevent the attack from hackersduring transmissionofuserinformation. DES (Data Encryption Standard) is a symmetric key block cipher published by the National Institute of Standards and Technology (NIST).DES is an implementation of a Feistel Cipheer. It uses 16 round Fesitel structure. The block size is 64-bit. Though, key length is 64-bit, DES hasan effective key length of 56bits. General Structure of DES is depicted in the following illustration. Since DES is based on the Feistel Cipher, all that is required to specify DES is Initial and final permutation Round Function Key Expansion The important significant of DES is the algorithmmakes the transaction secure by using 56-bit key and 64-bit plain text. So there are 2^56 possibilitiesof keyswhichwouldtake a decade to find the correct key using brute-force attack. It uses same algorithm for encryption and decryption. 5.2 Base64 Base64 also be referred as Privacy-enhanced Electronic Mail (PEM) is used to convert binary data into a text-like format that allows it to be transported in environments that can handle only text safely. Base64 encoding takes the original binary data and divides it into tokens of three bytes (24 bits) and converted into printable characters from the ASCII standard. The first step is to take the three bytes
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 519 (24bit) of binary data and split it into four numbers of six bits. Because the ASCII standard defines the use of seven bits, Base64 only uses 6 bits (corresponding to 2^6 = 64 characters) to ensure the encoded data isprintableandnone of the special characters available in ASCII are used. The ASCII characters used for Base64 are the numbers 0-9, the alphabets 26 lowercase and 26 uppercase characters plus two extra characters '+' and '/‘(26+26+10+2=64). 5.3. QR Code: QR code means Quick Response Code is the trademark for a type of Matrix Barcode (or two-dimensional barcode). A QR code uses four standardized encodingmodes(numeric, alphanumeric, byte/binary, and kanji) to efficiently store data; extensions may also be used. The QR code consists of black squares arranged in a square grid on a white background which can be read by an imaging device and processed using Reed-Solomon error correction. Each of these squares is called a module. In every QR code, there are certain modules that must not be covered or edited, else the code won’t scan. We specifically use IQR code. 6. HARDWARE AND SOFTWARE REQUIREMENT: 6.1 Hardware Requirement: Windows: Hard disk : 250 GB and above. Processor : i3 and above. RAM : 2GB and above. Smart Phone: Memory : 4GB and above. Processor : Dual core and above. RAM : 1GB and above. 6.2 Software Requirement: Windows: Operating System : Windows 7 and above Java Version : JDK 1.7 Web Server : Tomcat 7.0.11 Database : MYSQL Smart Phone: Operating System : Gingerbread and above. No. of Devices : 2(at least). 7. CONCLUSIONS We designed an online mobile payment system using WANET to purchase product in disaster areas. The current payment system needs an online medium to enable the transaction which usesfixed infrastructure network suchas cellular towers, base station etc. By using WANET can provide infrastructure less network which helps the mobile payment application to work in offline mode. So the developed application allows the user to shop even in disaster areas which reduces the fear of people from purchasing essential goods. ACKNOWLEDGEMENT A project of this magnitude and nature requires kind co-operation and support from many, for successful completion . We wish to express our sincere thanks to all those who were involved in the completion of this project. REFERENCES [1] B. Ojetunde, N. Shibata, J. Gao, and M. Ito, “An endorsement-based mobile payment system for a disaster area,” in Proc. 29th IEEE Int.Conf. Adv. Inf. Netw. Appl. (AINA), Gwangju, South Korea, Mar. 2015, pp. 482–489. [2] A. Mishra and K. M. Nadkarni, “Security in wirelessadhoc networks,” in The Handbook of Ad Hoc Wireless Networks. Boca Raton, FL, USA: CRC Press, 2003, ch. 30, pp. 499–549. [3] W. Li, Q. Wen, Q. Su, and Z. Jin, “An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network,” Comput. Commun., vol. 35, no. 2, pp. 188–195, Jan. 2012. [4] X. Dai, O. Ayoade, and J. Grundy, “Off-line micro-payment protocol for multiple vendorsin mobile commerce,” in Proc. 7th Int. Conf. Parallel Distrib. Comput. Appl. Technol. (PDCAT), Taipei, Taiwan, 2006, pp. 197–202 [5] V. Patil and R. K. Shyamasundar, “An efficient, secure and delegable micro-payment system,” in Proc. IEEE Int. Conf. e- Technol. e-Commerce e-Service (EEE), Taipei, Taiwan, Mar. 2004, pp. 394–404.
Télécharger maintenant