Browse > Article
http://dx.doi.org/10.9717/kmms.2011.14.8.1029

Design of an Authentication System Based on Personal Identity Verification Card  

Park, Young-Ho (부경대학교 IT융합응용공학과)
Kong, Byung-Un (부경대학교 대학원 정보시스템협동과정)
Rhee, Kyung-Hyune (부경대학교 IT융합응용공학과)
Publication Information
Abstract
Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.
Keywords
e-ID; Personal Identification; Authentication; Access Control;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 변진욱, "개인식별 시스템에 적용되는 보안 알고리즘 요구사항 분석," 정보통신산업진흥원 주간기술동향 1450호, 2010.
2 "A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)," NIST Special Publication 800-116, 2008.
3 이형호, 박희만, 조상래, 진승헌, "프라이버시 보호기능을 제공하는 온-오프라인 환경의 새로운 국민식별번호체계 제안," 한국정보보호학회지, 제20권, 제1호, pp.74-87, 2010.
4 O Kömmerling and M. G. Kuhn, "Design Principles for Tamper-Resistant Smartcard Processors," Proceedings of the USENIX Workshop on Smartcard Technology, pp.9-20, 1999.
5 V. Pasupathinathan, J. Pieprzyk, and H. Wang, "An On-Line Secure E-Passport Protocol," Proceedings of The Information Security Practice and Experience, LNCS 4991, pp.14-28, 2008.
6 P. A. Karger, "Privacy and security threat analysis of the federal employee personal identity verification (PIV) program," Proceedings of the 2nd Symposium on Usable Privacy and Security, pp.114-121, 2006.
7 김은, 이윤석, 정민수, "스마트카드를 이용한 위조방지 인증 시스템 설계 및 구현," 한국멀티미디어학회논문지, Vol.14, No.2, pp.249-257, 2011.
8 D. De Cock, K. Wouters, and B. Prenel, "Introduction to the Belgian EID Card BELPIC," Proceedings of the 1st European PKI Workshop, LNCS 3093, pp.1-13, 2004.
9 "Personal Identify Verification of Federal Employees and Contractors," NIST FIPS PUB 201-1, 2006.
10 이동진, 곽진, "미국의 개인신원검증 기준 FIPS 201-1에 관한 분석," 한국정보보호학회지, 제19권, 제3호, pp.35-45, 2009.
11 "Interfaces for Personal Identity Verification," NIST Special Publication 800-73-3, 2010.
12 "Biometric Data Specification for Personal Identity Verification," NIST Special Publication 800-76, 2007.
13 "Cryptographic Algorithms and Key Sizes for Personal Identity Verification," NIST Special Publication 800-78-2, 2010.
14 "Security Requirements for Cryptographic Modules," NIST FIPS PUB 140-2, 2001.