An Intelligent IoT-Driven ATM Security System with Invisible Keypad and User Detection

Authors

  • Revathy G, Shaalini J, Stenee Maria G, M. Maheswari Department of Electronics and Communication Engineering, Sethu Institute of Technology, Virudhunagar, India Author

DOI:

https://doi.org/10.15662/IJEETR.2026.0802171

Keywords:

ATM Security, Invisible Keypad, RFID Authentication, Ultrasonic Sensor, PIN Protection, Shoulder Surfing Prevention

Abstract

The project titled “An Intelligent IoT-Driven ATM Security System with Invisible Keypad and User Detection” presents a smart and secure ATM system aimed at enhancing user privacy and preventing unauthorized access during PIN entry. It integrates hardware components such as Arduino Uno, ultrasonic and IR sensors, RFID module, and buzzer with ATM software developed using Python and a MySQL database. The system activates only when a valid user is detected, and it dynamically hides the keypad if any suspicious presence is identified. Additionally, the keypad layout is shuffled each time to prevent pattern tracking. 

The system consists of two main modules: the Account Management Module and the ATM Module. The Account Management Module enables administrators to create and manage user accounts with features like CRUD operations, secure storage of account details, and automatic PIN generation. User credentials are stored in the database and shared securely via email, ensuring proper record maintenance and secure communication. 

The ATM Module handles user transactions such as deposit, withdrawal, balance enquiry, mini statement, and PIN change with OTP verification. During PIN entry, sensors continuously monitor for unauthorized presence, making the keypad invisible if any threat is detected. Overall, the system enhances ATM security, ensures user privacy, and provides a reliable solution to prevent fraud and unauthorized observation.

References

1. K. Ashton, “That ‘Internet of Things’ Thing,” RFID Journal, 2009.

2. A. Whitmore, A. Agarwal, and L. Da Xu, “The Internet of Things—A Survey of Topics and Trends,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 1–17, 2014.

3. Arduino, “Arduino Uno Rev3 Datasheet,” 2023.

4. Espressif Systems, “ESP8266EX Datasheet,” 2022.

5. D. Banerjee and P. Chatterjee, “Security Issues in ATM Systems,” International Journal of Computer Applications, vol. 57, no. 15, 2012.

6. M. Conti, N. Dragoni, and V. Lesyk, “A Survey of Man-in-the- Middle Attacks,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, 2016.

7. Python Software Foundation, “Python Documentation – GUI and Database Connectivity,” 2023.

8. C.Nagarajan and M.Madheswaran - ‘Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques’- Taylor &Francis, Electric Power Components and Systems, Vol.39 (8), pp.780-793, May 2011. DOI: 10.1080/15325008.2010.541746

9. C.Nagarajan and M.Madheswaran - ‘Experimental verification and stability state space analysis of CLL-T Series Parallel Resonant Converter’ - Journal of Electrical Engineering, Vol.63 (6), pp.365-372, Dec.2012. DOI: 10.2478/v10187-012-0054-2

10. C.Nagarajan and M.Madheswaran - ‘Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis’- Springer, Electrical Engineering, Vol.93 (3), pp.167-178, September 2011. DOI 10.1007/s00202-011-0203-9

11. S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025

12. S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428

13. S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w

14. C. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.

15. C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.

16. C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.

17. C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007

18. Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721

19. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022

20. Oracle Corporation, “MySQL 8.0 Reference Manual,” 2023.

21. S. Singh and N. Sharma, “Design and Implementation of Secure ATM Systems Using Embedded Systems,” International Journal of Advanced Research in Computer Science, 2018.

22. J. Granjal, E. Monteiro, and J. S. Silva, “Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues,” IEEE Communications Surveys & Tutorials, vol. 17, no. 3, 2015.

23. Sudha, N., Kumar, S. S., Rengarajan, A., & Rao, K. B. (2021). Scrum Based Scaling Using Agile Method to Test Software Projects Using Artificial Neural Networks for Block Chain. Annals of the Romanian Society for Cell Biology, 25(4), 3711-3727.

24. Sugumar, R. (2025). Designing Resilient and Scalable Cloud-Native Frameworks for Generative AI Content Production. International Journal of Research Publications in Engineering, Technology and Management (IJRPETM), 8(6), 13268-13279.

25. Anbazhagan, K. (2025). AI Driven Zero Trust Security Model for Enterprise Data Protection and Intelligent Infrastructure Management. International Journal of Technology, Management and Humanities, 11(03), 101-107.

26. Gowtham, M. S., Ramkumar, M., Jamaesha, S. S., & Vigenesh, M. (2024). Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks. Computers & Security, 142, 103889.

27. Prabha, S. P., & Rengarajan, A. (2025, February). Decentralized Resource Allocation Model Using Multi-agent Reinforcement Learning for Cloud Environment. In International Conference on Universal Threats in Expert Applications and Solutions (pp. 71-82). Singapore: Springer Nature Singapore.

Downloads

Published

2026-03-28

How to Cite

An Intelligent IoT-Driven ATM Security System with Invisible Keypad and User Detection. (2026). International Journal of Engineering & Extended Technologies Research (IJEETR), 8(2), 2018-2024. https://doi.org/10.15662/IJEETR.2026.0802171