Mathematical Machine Readable Authentication Protocols for Network Security

Authors

  • R.M.L.S. Chandrarathna Lecturer, Department of Computer Mathematics, Sri Lanka Institute of Information Technology, (SLIIT), Sri Lanka

DOI:

https://doi.org/10.31033/abjar.2.2.2

Keywords:

mathematics, network security, machine

Abstract

Since the International Civil Aviation Organization created standards that allow passports to store biometric identification, electronic passports have been widely and quickly embraced throughout the world. The use of biometrics for identification has the potential to improve people's quality of life and make the world a safer place to live in. By more precisely identifying a person, biometric passports are meant to stop travelers from entering a nation illegally and to reduce the use of fake documents. This article examines the biometric e-passport design for the face, fingerprint, palmprint, and iris. This article focuses on the personal security and privacy of e-passport holders, as well as the actual security benefits that governments have gained from the use of face, fingerprint, palmprint, and iris recognition technology in e-passports. Researchers looked at the facial fingerprint, palmprint, and iris biometrics now utilized with e-passports as well as the key cryptographic elements and supporting procedures. The report also offers a security evaluation of the e-passport's use of face fingerprint, palmprint, and iris biometrics, which are meant to increase security by safeguarding the ePassport holder's biometric data.

Downloads

Download data is not yet available.

References

A.K. Jian. (1999). Biometrics personal identification in networked society. Technical Report.

C. Hesher. (2003). A novel method for face recognition using range images. in: 7th International Symposium on Signal Processing and Its Application.

Home Affairs Justice. (2006). EU standard specifications for security features and biometrics in passports and travel documents. Technical Report, European Union.

ICAO. (2006). Machine readable travel documents. ICAO.

Klugler, D. (2005). Advance security mechanisms for machine readable travel documents. Technical Report.

Downloads

Published

2023-03-31

How to Cite

R.M.L.S. Chandrarathna. (2023). Mathematical Machine Readable Authentication Protocols for Network Security. Applied Science and Biotechnology Journal for Advanced Research, 2(2), 6–12. https://doi.org/10.31033/abjar.2.2.2

Issue

Section

Articles