Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents

@article{Najera2009SecurityMA,
  title={Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents},
  author={Pablo Najera and Francisco Moyano and Javier L{\'o}pez},
  journal={J. Univers. Comput. Sci.},
  year={2009},
  volume={15},
  pages={970-991}
}
Traditional paper documents are not likely to disappear in the near future as they are present everywhere in daily life, however, paper-based documentation lacks the link with the digital world for agile and automated processing. At the same time it is prone to cloning, alteration and counterfeiting attacks. E-passport defined by ICAO and implemented in 45 countries is the most relevant case of hybrid documentation (i.e. paper format with electronic capabilities) to date, but, as the advantages… Expand
An analysis of security weaknesses in the evolution of RFID enabled passport
TLDR
The evolution of these passports over the years is presented to develop taxonomy of the weaknesses and to serve as a reference point detailing security vulnerabilities linked to the RFID E-passport features in the first and second E- passport generations. Expand
A Better Time Approximation Scheme for e-Passports
TLDR
This paper proposes a scheme that enables e-passports to update their effective dates based on the effective dates of other, more recently updated e- Passports, in a secure and effective manner, reducing the time window in which an attacker can use an expired certificate. Expand
Secure Architecure for the Integration of RFID and Sensors in Personal Networks
TLDR
This paper provides PN architecture and analysis that addresses aspects such as the management of personal tags as members of the PN, the authentication and secure communication of PN nodes and remote users with the context-aware technologies, and the enforcement of security and privacy policies. Expand
A biometric based secure session key agreement using modified elliptic curve cryptography
TLDR
Security enhanced mechanism based on variation of Diffie&Hellman key agreement protocol using Elliptic Curve Cryptography (ECC) between E&Passport and the Examination Syst em (ES) is suggested and confirms the security goal of the biometric based system. Expand
Towards Mobile Contactless 4-Fingerprint Authentication for Border Control
TLDR
This paper presents on-going work of an advanced mobile device for border control focusing on usability and integrating new technologies to envision next-generation of mobile devices based on the MobilePass device but significantly improved. Expand
User-centric secure integration of personal RFID tags and sensor networks
TLDR
This paper defines a secure architecture for PNs including methods for the secure access to context-aware technologies from both local PN members and the Internet of Things, and analyzes which security solutions available in the literature can be adapted for this architecture. Expand
Real-time location and inpatient care systems based on passive RFID
TLDR
This paper analyzes the case of a medical equipment tracking system for healthcare facilities enabling both real-time location and theft prevention and provides a solution for care and control of patients in a hospital based on passive HF RFID with the result of a fully functional demonstrator. Expand
Contactless finger and face capturing on a secure handheld embedded device
TLDR
A new handheld device that enables border control authorities to check European, visaholding and frequent third country travelers in a comfortable, fast and secure way is presented and tests of the handheld device at a land border indicate great acceptance by travelers and border guards. Expand

References

SHOWING 1-10 OF 21 REFERENCES
E-Passport: The Global Traceability Or How to Feel Like a UPS Package
TLDR
This paper revisits the privacy concerns caused by the Basic Access Control mechanism of MRTDs and considers German e-passports as a use case and proposes a variant of the cost-efficient hardware architecture (COPACOBANA) which has been recently realized. Expand
Security and Privacy Issues in E-passports
  • A. Juels, D. Molnar, David A. Wagner
  • Computer Science
  • First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
  • 2005
TLDR
Privacy and security issues that apply to e-passports are described and analyzed, and these issues are analyzed in the context of the International Civil Aviation Organization (ICAO) standard for e- Passports. Expand
ePassport: Securing International Contacts with Contactless Chips
TLDR
It is proved that Belgian passport, recipient of Interpol "World's most secure passport" award in 2003, provides the worst basic access key entropy one has ever seen, and that two-thirds of Belgian ePassports in circulation do not implement any data protection mechanism. Expand
Formal Security Analysis of Australian E-passport Implementation
TLDR
This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR to confirm existing security issues that were previously informally identified and presents weaknesses that exists in the current e- passport implementation. Expand
Crossing Borders: Security and Privacy Issues of the European e-Passport
TLDR
This work discusses attacks on Basic Access Control due to the low entropy of the data from which the access keys are derived, sketches the European proposals for Extended Access Control and the weaknesses in that scheme, and shows how fundamentally different design decisions can make e-passports more secure. Expand
Security of Electronic Passports
The electronic part of the passport should increase the security of the whole document but at the same time brings in new threats to the privacy of the passport holder. Therefore electronic passportsExpand
Part 1
In compliance with the provisions of the Clean Water Act (CWA), as amended (33 United States Code [U.S.C.] 1251 et seq.), any Operator of a point source discharge of pollutants (i.e., discharge)Expand
"J."
however (for it was the literal soul of the life of the Redeemer, John xv. io), is the peculiar token of fellowship with the Redeemer. That love to God (what is meant here is not God’s love to men)Expand
A Proposal for the Integration of Dublin Core and MPEG-7
TLDR
This document describes a mapping between Dublin Core and MPEG-7 metadata using XML namespaces and shows how this mapping can be modified to handle different types of data stores. Expand
The hybrid tree: an index structure for high dimensional feature spaces
  • K. Chakrabarti, S. Mehrotra
  • Computer Science, Mathematics
  • Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337)
  • 1999
TLDR
The hybrid tree-a multidimensional data structure for indexing high-dimensional feature spaces is introduced and significantly outperforms both purely DP-based and SP-based index mechanisms as well as linear scans at all dimensionalities for large-sized databases. Expand
...
1
2
3
...