Browse > Article
http://dx.doi.org/10.5762/KAIS.2012.13.10.4814

A Design of Advanced Channel Creation in e-Passport  

Lee, Gi-Sung (Department of Computer & Game, Howon University)
Jeon, Sang-Yeob (Department of Computer Science, SoongSil University)
Jun, Moon-Seog (Department of Computer Science, SoongSil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.13, no.10, 2012 , pp. 4814-4821 More about this Journal
Abstract
An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.
Keywords
e-Passport; BAC; RFID; Hash; Digital Signatures; security;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 ICAO. "Biometric Deployment of Machine Readable Travel Documents", Version 2.0 2004.
2 Eili Bjelkasen, Linda Walbeck Olsen, "Security Issues in ePassports", May, 2006.
3 ICAO, "Development of a Logical Data Structure-LDS for Optional Capacity Expansion Technologies", Revision 1.7, 2004
4 ICAO, 'PKI for Machine Readable Travel Documents offering ICC Read-Only Access', Version 1.1, 2004.
5 Gaurav S., Kc and Paul A., Karger., "Security and privacy issues in machine readable travel documents (MRTDs)", IBM Technical Report (RC23575). IBM T. J., Watson Research Labs, April, 2005.
6 NIST, "Recommendation for Key Management. Technical Report Special Publication 800-57 Draft", 2005.
7 S. J. Oh, "An Anomaly Detection Method for the Security of VANETs", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10, No.2, pp. 77-83, Apr., 2010.
8 Y. H. Cho, G. S. Lee, "Prediction on Clusters by using Information Criterion and Multiple Seeds", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10 No.6, pp.145-152, Dec., 2010.
9 H. Y. Hwang, H. J. Suh, "The Multi-path Power-aware Source Routing(MPSR) for the Maximum Network Lifetime in Ad-Hoc Networks", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10No.5, pp. 21-29, Oct., 2010.
10 E. C. Kim, S. I. Seo, J. Y. Kim, "Performance of Tactics Mobile Communication System Based on UWB with Double Binary Turbo Code in Multi-User Interference Environments", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10, No.1, pp. 39-50, Feb., 2010.
11 J. P. Cho, S. I. Cho, K. M. Kang, H. J. Hong, "Analysis on Characteristics for Sharing Co-channel between Communication Systems", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.11, No.4, pp. 251-256, Aug., 2011.
12 H. Y. Hwang, Namyun Kim, "Personal Information Protection System for Web Service", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.11 No.6, pp. 267-273, Dec., 2011.
13 YeWang, Xiao-LeiZhang, WeiweiChen, J. G. Ki, K. T. Lee, "Comparative study of an integrated QoS in WLAN and WiMAX", Journal of The Institute of Webcasting, Internet and Telecommunication, VOL.10, No.3, pp. 103-110, Jun., 2010.