Proposed OSI Security Architecture for an ATM System
The OSI security architecture ensures that all security aspects
of an ATM system are covered, aligning with the OSI (Open
Systems Interconnection) model. Security mechanisms are
applied at different layers to provide Confidentiality, Integrity,
and Availability (CIA). Below is how security can be integrated
at various OSI layers for an ATM system:
1. Physical Layer Security
Threats: Card skimming, eavesdropping on PIN entry
(shoulder surfing), ATM hardware tampering.
Security Measures:
o Use of tamper-resistant ATMs.
o CCTV cameras and physical security guards.
o Anti-skimming devices and encrypted PIN pads.
2. Data Link Layer Security
Threats: Network sniffing, MAC spoofing.
Security Measures:
o Use of MAC address filtering to allow only authorized
ATM terminals.
o Encryption at link-level (e.g., WPA2 for wireless
connections).
3. Network Layer Security
Threats: Man-in-the-middle (MITM) attacks, IP spoofing.
Security Measures:
o Firewall to prevent unauthorized access.
o IPsec (Internet Protocol Security) for secure
communication.
4. Transport Layer Security
Threats: Session hijacking, unauthorized data interception.
Security Measures:
o TLS (Transport Layer Security) for encrypting
communication between the ATM and bank server.
o Session authentication and timeout mechanisms.
5. Session Layer Security
Threats: Unauthorized session establishment, session
hijacking.
Security Measures:
o Secure login mechanisms with encrypted session
tokens.
o Automatic session termination after inactivity.
6. Presentation Layer Security
Threats: Data interception, format manipulation attacks.
Security Measures:
o Data encryption standards (AES, RSA) for secure data
representation.
o Tokenization of sensitive user information.
7. Application Layer Security
Threats: Malware, phishing attacks, unauthorized access.
Security Measures:
o Multi-factor authentication (MFA) for account
access.
o Real-time fraud detection and transaction
monitoring.
Examples of CIA (Confidentiality, Integrity, and Availability) in
an ATM System
Security
ATM Example
Aspect
Ensuring that the user’s PIN is encrypted and
Confidentiality not exposed during transmission. Card details
should not be stored in plain text.
The ATM system should verify that the user’s
entered PIN matches the bank records without
Integrity unauthorized modifications. If a transaction is
initiated, it must be completed without
tampering.
The ATM should be operational 24/7. Even
during high traffic, system failures should be
Availability
minimized using redundant servers and backup
power.