74,387 research outputs found

    Passport: Enabling Accurate Country-Level Router Geolocation using Inaccurate Sources

    Full text link
    When does Internet traffic cross international borders? This question has major geopolitical, legal and social implications and is surprisingly difficult to answer. A critical stumbling block is a dearth of tools that accurately map routers traversed by Internet traffic to the countries in which they are located. This paper presents Passport: a new approach for efficient, accurate country-level router geolocation and a system that implements it. Passport provides location predictions with limited active measurements, using machine learning to combine information from IP geolocation databases, router hostnames, whois records, and ping measurements. We show that Passport substantially outperforms existing techniques, and identify cases where paths traverse countries with implications for security, privacy, and performance

    Passport: enabling accurate country-level router geolocation using inaccurate sources

    Full text link
    When does Internet traffic cross international borders? This question has major geopolitical, legal and social implications and is surprisingly difficult to answer. A critical stumbling block is a dearth of tools that accurately map routers traversed by Internet traffic to the countries in which they are located. This paper presents Passport: a new approach for efficient, accurate country-level router geolocation and a system that implements it. Passport provides location predictions with limited active measurements, using machine learning to combine information from IP geolocation databases, router hostnames, whois records, and ping measurements. We show that Passport substantially outperforms existing techniques, and identify cases where paths traverse countries with implications for security, privacy, and performance.First author draf

    Unequal Access to Foreign Spaces: How States Use Visa Restrictions to Regulate Mobility in a Globalised World

    Get PDF
    Nation-states employ visa restrictions to manage the complex trade-off between facilitating the entrance to their territory by passport holders from certain countries for economic and political reasons and deterring individuals from other countries for reasons of perceived security and immigration-control. The resulting system is one of highly unequal access to foreign spaces, reinforcing existing inequalities. Trans- national mobility is encouraged for passport holders from privileged nations, particularly rich Western countries, at the expense of severe restrictions for others. Visa restrictions manifest states’ unfaltering willingness to monitor, regulate and control entrance to their territory in a globalised world.globalisation, visa restrictions, passport, borderless world, nation-state, mobility

    An E-Passport System with Multi-Stage Authentication : A Casestudy of the Security of Sri Lankaas E-Passport

    Get PDF
    E-passport or Electronic passport is one of the newly established research areas, especially since in the last few years there have been numerous reported attempts of illegal immigration across a number of country borders. Therefore, many countries are choosing to introduce electronic passports for their citizens and to automate the verification process at their border control security. The current e-passport systems are based on two technologies: RFID and Biometrics. New applications of RFID technology have been introduced in various aspects of people2019;s lives. Even though this technology has existed for more than a decade, it still holds considerable security and privacy risks. But together with RFID and biometric technologies an e-passport verification system can reduce fraud, identity theft and will help governments worldwide to improve security at their country borders. In 2017 Sri Lankan government proposed to introduce a new epassport scheme which will contain embedded RFID tags for person identification purpose. Therefore, this paper proposes a novel multi-stage e-passport verification scheme based on watermarking, biometrics and RFID

    Enhancing Security to Protect e-passport against Photo Forgery

    Get PDF
    Electronic Passport (e-passport) is one of the results of the electronic revolution in the World; since the passport is the document of the person in terms of identity and nationality and is the property of the country. One of the most important challenges is to protect this document from forgery. The common forgery for the passport is replacing its holder photo. The proposed system concentrates on the security part of the e-passport. It consists of two parts; the first part is hiding of the security code by using steganography and storing the same code in the RFID tag by the issuing country of the epassport. The other part will be operated at the control point of the destination country to make sure of the e-passport validity by checking the hidden code using NFC and verify it with the one in the RFID tag. If the two values are equal, then the system will compute a key using Diffie-Hellman Key Exchange. This key will be used to read the secret information in the tag

    Cryptanalysis of two mutual authentication protocols for low-cost RFID

    Full text link
    Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols which proposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols.Comment: 17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel system

    Composing security protocols: from confidentiality to privacy

    Get PDF
    Security protocols are used in many of our daily-life applications, and our privacy largely depends on their design. Formal verification techniques have proved their usefulness to analyse these protocols, but they become so complex that modular techniques have to be developed. We propose several results to safely compose security protocols. We consider arbitrary primitives modeled using an equational theory, and a rich process algebra close to the applied pi calculus. Relying on these composition results, we derive some security properties on a protocol from the security analysis performed on each of its sub-protocols individually. We consider parallel composition and the case of key-exchange protocols. Our results apply to deal with confidentiality but also privacy-type properties (e.g. anonymity) expressed using a notion of equivalence. We illustrate the usefulness of our composition results on protocols from the 3G phone application and electronic passport

    Migration control for mobile agents based on passport and visa

    Get PDF
    Research on mobile agents has attracted much attention as this paradigm has demonstrated great potential for the next-generation e-commerce. Proper solutions to security-related problems become key factors in the successful deployment of mobile agents in e-commerce systems. We propose the use of passport and visa (P/V) for securing mobile agent migration across communities based on the SAFER e-commerce framework. P/V not only serves as up-to-date digital credentials for agent-host authentication, but also provides effective security mechanisms for online communities to control mobile agent migration. Protection for mobile agents, network hosts, and online communities is enhanced using P/V. We discuss the design issues in details and evaluate the implementation of the proposed system

    Can science produce better passport control officers?

    Get PDF
    First paragraph: Passport officers often have to scrutinise hundreds of people each day. They have just a few seconds to stare through their glass screens at the impatient and perhaps slightly dishevelled traveller facing them and decide if their face matches the tiny photograph in their passport. And this isn’t just their job – it’s a matter of great national security
    corecore