Skip to main content

Mobile Travel Credentials

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11358))

Included in the following conference series:

Abstract

The international travel continuum is a highly demanding environment in which the participating entities have goals which are sometimes in conflict. The traveler seeks the ability to plan trips in advance and to travel conveniently, minimizing line-ups and unforeseen problems. Service providers seek to make the most of specialized resources, maximize quality of service, intercept security threats, and enforce the controls appropriate for their zones of responsibility. This paper proposes a system to benefit the needs of these multiple stakeholders: the needs of the traveler for convenience, privacy and efficiency, and the needs of the service provider for security, reliability, and accountability. Today’s environment is characterized by paper documents, traditional biometric verification using facial and fingerprint images, and the manual processing of queues of passengers. Instead of this, we present a novel approach centered on fully electronic travel documents stored on the traveler’s phone, secured by cryptographic operations that utilize privacy-respecting biometric references. A prototype system has been developed and implemented, demonstrating the intended benefits for all stakeholders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ICAO 9303-Machine Readable Travel Documents. http://www.icao.int/publications/pages/publication.aspx?docnum=9303. Accessed 12 Sept 2018

  2. Safjanski, T.: Prospects for the development of the international criminal police organisation interpol. Intern. Secur. 7(2), 267 (2015)

    Google Scholar 

  3. Frontex: Best practice technical guidelines for automated border control (ABC) systems, Research and Development Unit, Warsaw (2012)

    Google Scholar 

  4. Nuppeney, M., Breitenstein, M., Niesing, M.: EasyPASS-evaluation of face recognition performance in an operational automated border control system. In: International Biometric Performance Conference (2010)

    Google Scholar 

  5. U.S. Department of Homeland Security, Privacy Impact Assessment for the Advance Passenger Information System (APIS) (2007)

    Google Scholar 

  6. Schouten, B., Bart, J.: Biometrics and their use in e-passports. Image Vis. Comput. 27(3), 305–312 (2009)

    Article  Google Scholar 

  7. Li, S.Z., Jain, A.: Handbook of Face Recognition, 2nd edn. Springer, London (2011). https://doi.org/10.1007/978-0-85729-932-1

    Book  MATH  Google Scholar 

  8. Bissessar, D., Adams, C., Stoianov, A.: Privacy, security and convenience: biometric encryption for smartphone-based electronic travel documents. In: Abielmona, R., Falcon, R., Zincir-Heywood, N., Abbass, H.A. (eds.) Recent Advances in Computational Intelligence in Defense and Security. SCI, vol. 621, pp. 339–366. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-26450-9_13

    Chapter  Google Scholar 

  9. Rathgeb, C., Andreas U.: A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inf. Secur. 2011(3), (2011). https://doi.org/10.1186/1687-417X-2011-3

  10. Sutcu, Y., Li, Q., Memon, N.: Protecting biometric templates with sketch: theory and practice. IEEE Trans. Inf. Forensics Secur. 2(3), 503–512 (2007)

    Article  Google Scholar 

  11. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_31

    Chapter  Google Scholar 

  12. ISO/IEC 18004:2000(E). Information Technology Automatic identification and data capture techniques Bar code symbology QR Code. Standard, International Organization for Standardization, Geneva

    Google Scholar 

  13. Australian eTA. https://www.australiantraveling.com/?utm_source=google&utm_medium=cpc&gclid=EAIaIQobChMIm9-p5bO93QIVFHdeCh0rMw4nEAAYAiAAEgIcY_D_BwE. Accessed 12 Sept 2018

  14. Canadian eTA. https://www.canadianevisa.com/?gclid=EAIaIQobChMI0vqMirS93QIVDDBpCh3P1wQVEAAYAiAAEgKTcPD_BwE. Accessed 12 Sept 2018

  15. United States Customs and Border Protection Services Electronic System for Travel Authorizations. https://esta.cbp.dhs.gov/esta/. Accessed 12 Sept 2018

  16. Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)

    Article  Google Scholar 

  17. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  18. Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002). https://doi.org/10.1007/978-3-662-04722-4

    Book  MATH  Google Scholar 

  19. Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison-Wesley Longman Publishing Co., Inc., Boston (2001)

    Google Scholar 

  20. Sherif, M.: Protocols for Secure Electronic Commerce, 2nd edn. CRC Press, Boca Raton (2016)

    Book  Google Scholar 

  21. JMRTD: An Open Source Java Implementation of Machine Readable Travel Documents. https://jmrtd.org/. Accessed 12 Sept 2018

  22. ACR122U USB NFC Reader. http://www.acs.com.hk/en/products/3/acr122u-usb-nfc-reader/. Accessed 12 Sept 2018

  23. ODroid USB camera product page. http://www.hardkernel.com/main/products/prdt_info.php?g_code=G146883099080. Accessed 12 Sept 2018

  24. ODroid XU4 product page. http://www.hardkernel.com/main/products/prdt_info.php. Accessed 12 Sept 2018

  25. Mostowski, W.I., Poll, E.: Electronic passports in a nutshell. ICIS, Nijmegen (2010)

    Google Scholar 

  26. Shaikh, R.A., Adi, K., Logrippo, L.: Dynamic risk-based decision methods for access control systems. Comput. Secur. 31(4), 447–464 (2012)

    Article  Google Scholar 

  27. Fall, D., Okuda, T., Kadobayashi, Y., Yamaguchi, S.: Risk adaptive authorization mechanism (RAdAM) for cloud computing. J. Inf. Process. 24(2), 371–380 (2016)

    Google Scholar 

  28. World Economic Forum: Canada to Test Advancements in Biometrics and Blockchain to Welcome International Travellers. https://www.weforum.org/press/2018/01/canada-to-test-advancements-in-biometrics-and-blockchain-to-welcome-international-travellers/. Accessed 12 Sept 2018

  29. Kaunert, C., Léonard, S., MacKenzie, A.: The social construction of an EU interest in counter-terrorism: US influence and internal struggles in the cases of PNR and SWIFT. Eur. Secur. 21(4), 474–496 (2012)

    Article  Google Scholar 

  30. Carpanelli, E., Lazzerini, N.: PNR: passenger name record, problems not resolved? The EU PNR conundrum after opinion 1/15 of the CJEU. Air Space Law 42(4), 377–402 (2017)

    Google Scholar 

  31. Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. pp. 1–25 (2017). https://arxiv.org/abs/1802.06993v2

  32. Cavoukian, A., Chibba, M.: Cognitive cities, big data and citizen participation: the essentials of privacy and security. In: Portmann, E., Finger, M. (eds.) Towards Cognitive Cities. SSDC, vol. 63, pp. 61–82. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33798-2_4

    Chapter  Google Scholar 

  33. Sheth, A., Anantharam, P., Henson, C.: Physical-cyber-social computing: an early 21st century approach. IEEE Intell. Syst. 1, 78–82 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maryam Hezaveh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bissessar, D., Hezaveh, M., Alshammari, F., Adams, C. (2019). Mobile Travel Credentials. In: Zincir-Heywood, N., Bonfante, G., Debbabi, M., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2018. Lecture Notes in Computer Science(), vol 11358. Springer, Cham. https://doi.org/10.1007/978-3-030-18419-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-18419-3_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-18418-6

  • Online ISBN: 978-3-030-18419-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics