Cart (Loading....) | Create Account
Close category search window

A study on secure protocol using the public key infrastructure approach in an e-passport

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Yong-Sik Choi ; Dept. of Comput. Sci. & Eng., Univ. of Incheon, Incheon, South Korea ; Young-Jun Jeon ; Sang-Hyun Park

An e-passport is a passport that includes biometrics information and ID by an RFID chip inserted internally. An e-passport not only prevents forging of ID but also makes rapid progress at immigration. The number of forged passports is increasing worldwide; therefore, to strengthen national security against international terrorism or crime, nations all over the world are now driving to bring in electronic passports. The e-passport can prevent passport forgery and increase stability by intensifying the personal verification procedure. The fundamental weakness of a wireless channel, which is the instability of the link, limitation of physical protection of each node, there involves a high risk in the reality of the connection between nodes. In addition, there is no guarantee of security because of the fundamental weakness of the sensor node itself in hardware restriction. This paper designates the deduced security weakness and demands that could occur in an electronic passport, and suggests a direction for security service based on safe key distribution and an authorization technique. The proposed public key method to hash lock on reverse functional difficulty of a one-direction hash function to detect and verify a damaged electronic passport increases stability and creates resistance on capture. And to block illegal information on an authentication server, the kill Tag method is executed. The proposed method provides the high efficiency of a multi-leader management method through a mutual authentication mechanism and a multi-leader management method between the passport and the Reader. Therefore, the method can increase security by protecting from reprinting, wiretapping and meson efficiently.

Published in:

Advanced Communication Technology (ICACT), 2010 The 12th International Conference on  (Volume:1 )

Date of Conference:

7-10 Feb. 2010

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.