An analysis of security weaknesses in the evolution of RFID enabled passport

Eyad Abdullah Bogari, P. Zavarsky, Dale Lindskog, Ron Ruhl
{"title":"An analysis of security weaknesses in the evolution of RFID enabled passport","authors":"Eyad Abdullah Bogari, P. Zavarsky, Dale Lindskog, Ron Ruhl","doi":"10.1504/IJITST.2012.054060","DOIUrl":null,"url":null,"abstract":"Since the introduction of Radio Frequency Identification (RFID) Enabled Passports, the system have been plagued with various vulnerability issues that prove to compromise the E-passport security. To date, three generations of E-passports have been introduced by the International Civil Aviation Organization (ICAO) and the European Union (EU). The first two generations of E-passports are being issued worldwide. This paper presents the evolution of these passports over the years to develop taxonomy of the weaknesses and to serve as a reference point detailing security vulnerabilities linked to the RFID E-passport features in the first and second E-passport generations. The findings can also assist in profiling possible attack vectors on the existing RFID enabled passports and in developing comprehensive RFID E-passport risk mitigation strategies. To illustrate the importance of a comprehensive risk strategy when using RFID E-passport, the attack process modeling method is used to highlight the possible attacks and weaknesses which could result from not using one or more security features.","PeriodicalId":216307,"journal":{"name":"World Congress on Internet Security (WorldCIS-2012)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"World Congress on Internet Security (WorldCIS-2012)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJITST.2012.054060","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Since the introduction of Radio Frequency Identification (RFID) Enabled Passports, the system have been plagued with various vulnerability issues that prove to compromise the E-passport security. To date, three generations of E-passports have been introduced by the International Civil Aviation Organization (ICAO) and the European Union (EU). The first two generations of E-passports are being issued worldwide. This paper presents the evolution of these passports over the years to develop taxonomy of the weaknesses and to serve as a reference point detailing security vulnerabilities linked to the RFID E-passport features in the first and second E-passport generations. The findings can also assist in profiling possible attack vectors on the existing RFID enabled passports and in developing comprehensive RFID E-passport risk mitigation strategies. To illustrate the importance of a comprehensive risk strategy when using RFID E-passport, the attack process modeling method is used to highlight the possible attacks and weaknesses which could result from not using one or more security features.
RFID护照发展过程中的安全弱点分析
自引入射频识别(RFID)护照以来,该系统一直受到各种漏洞问题的困扰,这些漏洞被证明会损害电子护照的安全性。迄今为止,国际民用航空组织(ICAO)和欧盟(EU)已经推出了三代电子护照。前两代电子护照正在全球发行。本文介绍了这些护照多年来的演变,以开发弱点分类,并作为参考点,详细介绍了第一代和第二代电子护照中与RFID电子护照特征相关的安全漏洞。研究结果还有助于分析现有RFID护照上可能的攻击媒介,并有助于制定全面的RFID电子护照风险缓解战略。为了说明在使用RFID电子护照时综合风险策略的重要性,使用攻击过程建模方法来突出可能的攻击和弱点,这些攻击和弱点可能由于不使用一个或多个安全特性而导致。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信