Abstract
The international travel continuum is a highly demanding environment in which the participating entities have goals which are sometimes in conflict. The traveler seeks the ability to plan trips in advance and to travel conveniently, minimizing line-ups and unforeseen problems. Service providers seek to make the most of specialized resources, maximize quality of service, intercept security threats, and enforce the controls appropriate for their zones of responsibility. This paper proposes a system to benefit the needs of these multiple stakeholders: the needs of the traveler for convenience, privacy and efficiency, and the needs of the service provider for security, reliability, and accountability. Today’s environment is characterized by paper documents, traditional biometric verification using facial and fingerprint images, and the manual processing of queues of passengers. Instead of this, we present a novel approach centered on fully electronic travel documents stored on the traveler’s phone, secured by cryptographic operations that utilize privacy-respecting biometric references. A prototype system has been developed and implemented, demonstrating the intended benefits for all stakeholders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
ICAO 9303-Machine Readable Travel Documents. http://www.icao.int/publications/pages/publication.aspx?docnum=9303. Accessed 12 Sept 2018
Safjanski, T.: Prospects for the development of the international criminal police organisation interpol. Intern. Secur. 7(2), 267 (2015)
Frontex: Best practice technical guidelines for automated border control (ABC) systems, Research and Development Unit, Warsaw (2012)
Nuppeney, M., Breitenstein, M., Niesing, M.: EasyPASS-evaluation of face recognition performance in an operational automated border control system. In: International Biometric Performance Conference (2010)
U.S. Department of Homeland Security, Privacy Impact Assessment for the Advance Passenger Information System (APIS) (2007)
Schouten, B., Bart, J.: Biometrics and their use in e-passports. Image Vis. Comput. 27(3), 305–312 (2009)
Li, S.Z., Jain, A.: Handbook of Face Recognition, 2nd edn. Springer, London (2011). https://doi.org/10.1007/978-0-85729-932-1
Bissessar, D., Adams, C., Stoianov, A.: Privacy, security and convenience: biometric encryption for smartphone-based electronic travel documents. In: Abielmona, R., Falcon, R., Zincir-Heywood, N., Abbass, H.A. (eds.) Recent Advances in Computational Intelligence in Defense and Security. SCI, vol. 621, pp. 339–366. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-26450-9_13
Rathgeb, C., Andreas U.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(3), (2011). https://doi.org/10.1186/1687-417X-2011-3
Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: theory and practice. IEEE Trans. Inf. Forensics Secur. 2(3), 503–512 (2007)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_31
ISO/IEC 18004:2000(E). Information Technology Automatic identification and data capture techniques Bar code symbology QR Code. Standard, International Organization for Standardization, Geneva
Australian eTA. https://www.australiantraveling.com/?utm_source=google&utm_medium=cpc&gclid=EAIaIQobChMIm9-p5bO93QIVFHdeCh0rMw4nEAAYAiAAEgIcY_D_BwE. Accessed 12 Sept 2018
Canadian eTA. https://www.canadianevisa.com/?gclid=EAIaIQobChMI0vqMirS93QIVDDBpCh3P1wQVEAAYAiAAEgKTcPD_BwE. Accessed 12 Sept 2018
United States Customs and Border Protection Services Electronic System for Travel Authorizations. https://esta.cbp.dhs.gov/esta/. Accessed 12 Sept 2018
Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002). https://doi.org/10.1007/978-3-662-04722-4
Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (2001)
Sherif, M.: Protocols for Secure Electronic Commerce, 2nd edn. CRC Press, Boca Raton (2016)
JMRTD: An Open Source Java Implementation of Machine Readable Travel Documents. https://jmrtd.org/. Accessed 12 Sept 2018
ACR122U USB NFC Reader. http://www.acs.com.hk/en/products/3/acr122u-usb-nfc-reader/. Accessed 12 Sept 2018
ODroid USB camera product page. http://www.hardkernel.com/main/products/prdt_info.php?g_code=G146883099080. Accessed 12 Sept 2018
ODroid XU4 product page. http://www.hardkernel.com/main/products/prdt_info.php. Accessed 12 Sept 2018
Mostowski, W.I., Poll, E.: Electronic passports in a nutshell. ICIS, Nijmegen (2010)
Shaikh, R.A., Adi, K., Logrippo, L.: Dynamic risk-based decision methods for access control systems. Comput. Secur. 31(4), 447–464 (2012)
Fall, D., Okuda, T., Kadobayashi, Y., Yamaguchi, S.: Risk adaptive authorization mechanism (RAdAM) for cloud computing. J. Inf. Process. 24(2), 371–380 (2016)
World Economic Forum: Canada to Test Advancements in Biometrics and Blockchain to Welcome International Travellers. https://www.weforum.org/press/2018/01/canada-to-test-advancements-in-biometrics-and-blockchain-to-welcome-international-travellers/. Accessed 12 Sept 2018
Kaunert, C., Léonard, S., MacKenzie, A.: The social construction of an EU interest in counter-terrorism: US influence and internal struggles in the cases of PNR and SWIFT. Eur. Secur. 21(4), 474–496 (2012)
Carpanelli, E., Lazzerini, N.: PNR: passenger name record, problems not resolved? The EU PNR conundrum after opinion 1/15 of the CJEU. Air Space Law 42(4), 377–402 (2017)
Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. pp. 1–25 (2017). https://arxiv.org/abs/1802.06993v2
Cavoukian, A., Chibba, M.: Cognitive cities, big data and citizen participation: the essentials of privacy and security. In: Portmann, E., Finger, M. (eds.) Towards Cognitive Cities. SSDC, vol. 63, pp. 61–82. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33798-2_4
Sheth, A., Anantharam, P., Henson, C.: Physical-cyber-social computing: an early 21st century approach. IEEE Intell. Syst. 1, 78–82 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Bissessar, D., Hezaveh, M., Alshammari, F., Adams, C. (2019). Mobile Travel Credentials. In: Zincir-Heywood, N., Bonfante, G., Debbabi, M., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2018. Lecture Notes in Computer Science(), vol 11358. Springer, Cham. https://doi.org/10.1007/978-3-030-18419-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-18419-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-18418-6
Online ISBN: 978-3-030-18419-3
eBook Packages: Computer ScienceComputer Science (R0)