Skip to main content

Strengthening the Security of Machine-Readable Documents

  • Chapter
Networked RFID Systems and Lightweight Cryptography

Abstract

There is an on-going trend towards turning paper documents that store personal information or other valuable data into machine-readable form. An example of this trend is the electronic passport that will become common in the near future. In this paper we show how the security of these machine readable documents could be improved by combining RFID with optical memory devices. We propose integrating an optical memory device into the RFID enabled smart document and present methods how these two storage media can be combined to secure the document against threats like illicit scanning, eavesdropping and forgery. The presented approaches make use of the optical document-to-reader channel which is more secure than the radio-frequency communication interface. To demonstrate the potential of our approaches we show how they could overcomea number of existing security and privacy threats of electronic passports.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. American Association for Motor Vehicle Administrators: Current and Planned Technologies for U.S. Jurisdictions. Available from: http://www.aamva.org/ standards/stdUSLicenseTech.asp (22.3.2006)

    Google Scholar 

  2. Dimitriou, T.: A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. In Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, Athens, Greece, IEEE (2005)

    Google Scholar 

  3. U.S. Department of State: Visa-Waiver Program (VWP). Available from: http://travel.state.gov/visa/temp/without/without_1990.html (20.4.2006)

    Google Scholar 

  4. EPCglobal: Class-1 Generation-2 UHF RFID Conformance Requirements Specification v. 1.0.2. EPCglobal Public Document, February (2005)

    Google Scholar 

  5. RFID Gazette: E-passports. News article, November 8, 2005. Available from: http://www.rfidgazette.org/airline/index.html (28.3.2006)

    Google Scholar 

  6. Hagen, R. Bieringer, T.: Photoaddressable Polymers for Optical Data Storage. Advanced Materials Volume 13, Issue 23 (2001) 1805—1810

    Article  Google Scholar 

  7. Hammerschmidt, C.: Polymer electronics yet to realize promise. EETimes, November (2004). Available from: http://www.eetimes.com/ (28.3.2006)

    Google Scholar 

  8. ICAO: Document 9303, Machine Readable Travel Documents, October (2004). Available from: http://www.icao.int/mrtd/publications/doc.cfm (28.3.2006)

    Google Scholar 

  9. ICAO: PKI for Machine Readable Travel Documents offering ICC Read-Only Access, Technical Report, version 1.1, October (2004). Available from: http://www.icao.int/mrtd/publications/doc.cfm (28.3.2006)

    Google Scholar 

  10. International Herald Tribune: U.S. to alter passport design because of privacy fears. News Article, April 28, 2005. Available from: http://www.iht.com/articles/ 2005/04/27/news/passport.php (28.3.2006)

    Google Scholar 

  11. Juels, A. Pappu., R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright R. (ed.): Financial Cryptography – FC”03. Lecture Notes in Computer Science, Volume 2742, Springer-Verlag, Le Gosier, Guadeloupe, French West Indies, IFCA (2003) 103—121

    Google Scholar 

  12. Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-passports. In Conference on Security and Privacy for Emerging Areas in Communication Networks – SecureComm, Athens, Greece (2005)

    Google Scholar 

  13. Juels, A.: RFID Security and Privacy: A research Survey. IEEE Journal on Selected Areas in Communication, Vol. 24, Issue 2 (2006) 381—394

    Article  MathSciNet  Google Scholar 

  14. Juels, A. Weis, S.: Authenticating pervasive devices with human protocols. In Victor Shoup, editor, Advances in Cryptology – CRYPTO”05. Lecture Notes in Computer Science, Vol. 3126. Springer-Verlag, Santa Barbara, California (2005) 293–308

    Google Scholar 

  15. Juels, A.: Strengthening EPC Tags Against Cloning. In: Jakobsson, M., Poovendran, R. (ed.): ACM Workshop on Wireless Security (2005) 67–76

    Google Scholar 

  16. Kerckhoffs, A.: La Cryptographie Militaire. In Journal des Sciences Militaires (1883) 5—38. Available from: http://www.petitcolas.net/fabien/kerckhoffs/ (21.4.2006)

    Google Scholar 

  17. Pattison, N.: Securing and Enhancing the Privacy of the E-Passport with Contactless Electronic Chips. (2004) Contact: pattison@axalto.com.

    Google Scholar 

  18. RFID Journal: U.S. Tests E-Passports. News Article, November 2 (2004). Available from: http://www.rfidjournal.com/article/articleview/1218/1/1/ (19.4.2006)

    Google Scholar 

  19. RFID Journal: United States Sets Date for E-Passports. News Article, October 25, 2005. Available from: http://www.rfidjournal.com/article/articleview/1951/1/1/ (19.4.2006)

    Google Scholar 

  20. RFID Journal: Roman Lab to Offer Commercial Services. News Article, March 28, 2006. Available from: http://www.rfidjournal.com/article/articleview/2223/1/1/ (19.4.2006)

    Google Scholar 

  21. Staake, T., Thiesse, F., Fleisch, E.: Extending the EPC Network - The Potential of RFID in Anti-Counterfeiting. In Proceedings of the 2005 ACM symposium on Applied computing, ACM Press, New York (2005) 1607—1612

    Google Scholar 

  22. Takaragi, K., Usami, M., Imura, R., Itsuki, R., Satoh, T.: An Ultra Small Individual Recognition Security Chip. IEEE Micro, November-December (2001)

    Google Scholar 

  23. Tellkamp, C., Angerer, A., Fleisch, E., Corsten, D.: From Pallet to Shelf: Improving Data Quality in Retail Supply Chains using RFID. Cutter IT Journal - The Journal of Information Technology Management, Vol. 17, No. 9 (2004) 19—24

    Google Scholar 

  24. Tesa AG: Protection system by Tesa Scribos marks spare part packs (2006). Available from: http://www.tesa.com/corporate/211628.html (28.3.2006)

    Google Scholar 

  25. Tuyls, P., Batina, L.: RFID-tags for Anti-Counterfeiting. In: Pointcheval, D. (ed.): Topics in Cryptology – CT-RSA – The Cryptographers” Track at the RSA Conference. Lecture Notes in Computer Science, No. 115–131, Springer Verlag, San Jose (2006) 3860

    Google Scholar 

  26. Veritec Inc: VSCode®. Technology Overview (2006). Available from: http://www.veritecinc.com/vs_code.html (28.3.2006)

    Google Scholar 

  27. Weis, S.: RFID Privacy Workshop: Concerns, Consensus, and Questions. IEEE Security and Privacy, Vol. 02, No. 2 (2004) 48—50

    Google Scholar 

  28. Wong, K., Hui, P., Chan, A.: Cryptography and authentication on RFID passive tags for apparel products. Computers in Industry (2006)

    Google Scholar 

  29. Wickett, M.J.: Memories of the future. Emerging replacements for semiconductor memory, optical and magnetic disks. Multimedia Systems – MMS, South Hampton, UK (2002)

    Google Scholar 

  30. Raskar, R., Beardsley, P., Baar, J., Wang, Y., Dietz, P.H., Lee, J., Leigh, D., Willwacher T.: RFIG lamps: Interacting with a self-describing world via photosensing wireless tags and projectors. ACM Transactions on Graphics (TOG) SIGGRAPH, Vol. 23, No. 3 (2004) 406–415

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lehtonen, M., Staake, T., Michahelles, F., Fleisch, E. (2008). Strengthening the Security of Machine-Readable Documents. In: Cole, P., Ranasinghe, D. (eds) Networked RFID Systems and Lightweight Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71641-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71641-9_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71640-2

  • Online ISBN: 978-3-540-71641-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics