Browse > Article

The Mutual Authentication and Operation Methodology for an Enhanced Security and Operation of the IDL  

Jeon, Sang-Hoon (숭실대학교 일반대학원 컴퓨터학과 컴퓨터통신 연구실)
Jun, Moon-Suk (숭실대학교 컴퓨터학과)
Abstract
In the modern world, where the number of people moving from country to country is sharply increasing, domestic and international driver's licenses are easily fabricated or forged, and distinguishing if a driver's license is legitimate or not is often a difficult task. Furthermore, this would require different countries to mutually share and administer the driving records of individuals, making it a much more complex task (Added to it is the complicated matter of countries having to mutually share and administer the driving records of individuals.) However, the authenticity and security of a driver's license has become the first priority since driver's licenses are also used as identification cards in most countries, thus requiring measures to prevent inappropriate uses arising from theft and embezzlement. In this paper, we propose the mutual authentication mechanism which, can provide enhanced security and efficient operation that is administration of personal information contained within ISO Compliant Driving licence(IDL).
Keywords
IDL(OSO Compliant Driving Licence); IC card; Mutual Authentication; Biometric; Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P.Kocher, J. Jaffe and B.Jun, 'Differential Power Analysis,' CRYPT'99, LNCS 1666, pp.388-397, Springer-Verlag, 1999   DOI
2 H.Yoo, herbst, S. mangard, E. Oswald, and S. Moon, 'investigations of Power Analysis Attacks and Countermeasures for ARIA,' WISA'06, LNCS 4298, pp.160-172, Springer-Verlag, 2007   DOI
3 ISO 18013-2, Information technology-Personal identification-ISO-compliant driving licence-Part 2: Machine-readable technologies, ISO, 2007
4 ISO 18013-3: Information technology-Personal identification-ISO-compliant driving licence-Part 3:Access control, authentication and integrity validation, ISO, 2006
5 ISO 19785-1, Information technology-Common Biometric Exchange Formats Framework-Part 1: Data element specification, ISO, 2006
6 ChangKyun Kim, IIHwan Park, 'Investigation of side channel analysis attacks on financial IC cards', KIISC, 18-1 pp.31-35, KIISC, 2008   과학기술학회마을   ScienceOn
7 ISO 7816-4: Identification cards-Integrated circuit(s) cards with contacts-Part 4: Interindustry commands for interchange, ISO, 2005
8 T. Freeman, R. Housley, A. 'Serverbased Certificate Validation Protocol (SCVP)', RFC 5055, 2007
9 P.Kocher, 'Timing Attacks on Implementation of Diffie-Hellman, RSA, DSS, and Other Systems,' CRYPT'96, LNCS 1109, pp.104-113, Springer-Verlag, 1996
10 Richard Fernandez. enterprise Dynamic Access Control(EDAC) Compliance with the Role-Based Access Control(RBAC) Standard ANSI/INCITS 359-2004, 2005
11 ISO 10202-4: Financial transaction cards-Security architecture of financial transaction systems using integrated circuit cards-Part 4: Secure application modules, ISO, 1996
12 R. Housley, W. Polk, W. Ford, D. Solo, 'Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile', RFC 3280, 2002
13 ISO 18013-1, Information technology-Personal identification-ISO-compliant driving licence-Part 1: Physical characteristics and basic data set, ISO, 2005
14 ISO 9796-2, Information technology-Security techniques-Digital signature schemes giving message recovery-Part 2: Integer factorization based mechanisms, ISO, 2002
15 ISO FDIS 19794-3, Information Technology- Biometric Data Interchange Formats-Part 3: Finger Pattern Spectral Data, ISO, 2006
16 ISO 19794-2, Information Technology-Biometric Data Interchange Formats Part 2: Finger Minutiae Data, ISO, 2005
17 ISO 7816-8: Identification cards-Integrated circuit(s) cards with contacts-Part 8: Security related interindustry commands, ISO, 2004
18 ISO 8825-1:2002: Information technology-ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER), ISO, 2000