Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

An improved E-passport system with

secured IoT and wireless communication


technology
Cite as: AIP Conference Proceedings 2452, 060001 (2022); https://doi.org/10.1063/5.0113191
Published Online: 18 November 2022

T. Vignesh, K. K. Thyagharajan, R. Beaulah Jeyavathana, et al.

ARTICLES YOU MAY BE INTERESTED IN

Land use and land cover classification using Landsat-8 multispectral remote sensing images
and long short-term memory-recurrent neural network
AIP Conference Proceedings 2452, 070001 (2022); https://doi.org/10.1063/5.0113197

AIP Conference Proceedings 2452, 060001 (2022); https://doi.org/10.1063/5.0113191 2452, 060001

© 2022 Author(s).
An Improved E-Passport System with Secured IOT and Wireless
Communication Technology

T.Vignesh1,a), K.K.Thyagharajan2,b), R. Beaulah Jeyavathana3,c), Prasanna


Kumar.R4,d)
1
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram,
Andhra Pradesh, India.
2
Department of ECE, R.M.D Engineering College, Chennai, India
3
Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Thandalam,Chennai, India
4
Department of Computer Science and Engineering, Amrita School of Engineering,
Amrita Vishwa Vidyapeetham, Chennai, India
a)
Corresponding Author: vigneshthangathurai@gmail.com,
b)
kkthyagharajan@yahoo.com
c)
mahimajesus@gmail.com
d)
kumarprasanna.r@gmail.com

Abstract: A stepped forward E-Passports with IoT devices assumes an essential element in momentum research. Additionally,
getting the data, placed away on E-Passport is also an essential difficulty. In this paper, we've got proposed a stepped forward far-
off E-Visa framework with simple stage protection. The number one aim of this advanced system is to devise and foster an excessive
stage tremendous far-off identity and Savvy card which conveys the identity subtleties and visa limits. Radio Frequency
Identification (RFID) is a programmed ID innovation this is using Radio recurrence signals. Utilizing RFID labels as opposed to
identity and visa information to conquer the paper works and document lacking difficulty with IoT devices improvements the
superior protection highlights of an identity. Also, this advanced system provides high level security in customer information
storage.

Keywords: Wireless E-Passport, IoT devices, high-level security, Radio Frequency Identification (RFID), VISA

INTRODUCTION
The cycle to use for an identity and different tour statistics like VISA has several tedious cycles and calls for
reviews that have to be provided on extraordinary activities for a check [1]. Truth be told, on the whole, making use
of for a change VISA to a comparable country likewise requests to observe the very cycle that changed into
accompanied for the previous VISA. Individuals stay in lengthy traces for buying their migration exams completed
due to the paper-primarily based totally stepping measure [2,3]. There is continually tremendous trouble blanketed if
the visa is misplaced or the facts withinside the identity is inaccurate or settled. By and large, the difficulty people
face with their motion is the lengthy deferrals in making ready their motion data. The contemporary cycle is wasteful,
willing to blunders, and tedious because it consists of outsider and paper-primarily based totally affirmation executed
physically. Radio Frequency identification (RFID) is a programmed ID innovation using Radio Recurrence signals
[4]. Utilizing RFID labels in place of identity and visa statistics to overcome the paper works and document lacking
trouble.

Katarzyna Borkowski et al (2019) proposed [5] a certain collective shape that offers a better protection degree
to e-tour papers was invented. Proposed machine coordinates based on facemask, iris, specific mark photos. This
proposed system consists of 3 phases of safety: the important layer matches a biometric image to some other biometric
image that's known as bio image. Three making plans are proposed: the number one plan maps a solitary biometric
image to a solitary bioimage, the following plan maps double biometric photos to a solitary bioimage, the 0.33 plan
walls the biometric image into segments and publications every phase to diverse bioimage. A making plans capability
maps the pressure really well worth of each pixel withinside the biometric image to pixels with comparable electricity
withinside the bioimage. An agent pixel is haphazardly selected from the association of pixels, and its guidelines are
recorded withinside the place manual of the biometric image. In the following layer, the place map is encoded making
use of a finger impact fluffy vault. In the 0.33 layer, the encoded place map is blanketed up withinside the bioimage

International Conference on Smart Grid & Electric Vehicle (ICSGEV 2021)


AIP Conf. Proc. 2452, 060001-1–060001-9; https://doi.org/10.1063/5.0113191
Published by AIP Publishing. 978-0-7354-4263-4/$30.00

060001-1
making use of the steganography method. The bioimage which incorporates the encoded place map is placed away
withinside the e-visa's memory. Keeping quiet and through making use of the fingerprints fluffy vault to encode place
maps, the proposed technique offers a greater sizeable degree of protection towards misrepresentation.

Sanket Panchamia et al (2019) proposed [6] Presently in this automatic world, identity is as but a real element.
It is conveyed in any respect spots along with different travel-associated archives, for example, VISA and Migration
stamps which are moreover critical for the passport(s). Every state maintains up its facts set of motion associated facts
of people coming into and leaving the country. This paper consists of a dream of digitizing Identification, VISA, and
Movement reports. Digitizing Identification and VISA facilitates smoothing out and enhancing Identification and
VISA giving, reestablishing, denying, affirmation, and approval measures. For this cycle, we're offering a solution
depending on the circulated report for placing away and recuperating facts. When executed, this machine will assist
remove phony visas and VISA, unapproved and dreary records affirmation measures. Blockchain-primarily based
totally dispersed report execution will settle some troubles approximately paper-primarily based totally affirmation
and make advantages greater smoothed out, enhancing productiveness and conceivably decrease charges in any respect
levels.

Shruti Sharma, Harshali Zodpe (2017) proposed [7] Data Security is a substantial problem across the world.
Different advances are being taken to enhance and replace protection efforts. Boundary intersections throughout
international locations are becoming one in all of them. Thusly, the usage of traditional visas has caused a development
for the sake of E-global IDs. E-journey papers are more secure and are supposed with the aid of using an image. E-
journey papers incorporate a bit chip that shops the facts of visa holders. To make sure these facts Cryptography is
extensively applied. This paper indicates the correlation of unique augmentation techniques applied for RSA
calculations for 1024-digit key length. Xilinx ISE 14. three-level is applied to play out this encryption and deciphering
degree focusing at the Virtex-five FPGA board.

E. D. Madyatmadja et al (2019) proposed [8] This exam became led to evaluate the benefits of executing
Data and Innovation Frameworks withinside the Identification Line Application with the aid of using the Directorate
General of Movement. Assessment is accomplished to look the nearby place's acknowledgment of the software and
the adequacy of the software for the duration of the time spent making tour papers. The exploration relies upon a
gaggle of polls rotated to the general public who will make visas on the Movement office. In view of the records got,
the writer will gauge the presentation of the visa line software using a mix of the Innovation Acknowledgment Model
method and the Brought collectively Hypothesis of Acknowledgment and Utilization of Innovation. In mild of the
overall aftereffects of checking out the ballot records, it thoroughly can be presumed that the nearby place feels the
benefits and comfort of the visa Line software.

A. Dukyil et al (2017), proposed [9] The execution of RFID innovation has been starting to be continually
increasing prominence withinside the discernibility of gadgets as possibly the maximum kingdom of the artwork
advances. In any case, the RFID correspondence execution is profoundly motivated with the aid of using the predicted
obstructions among the RFID gadgets. It is also established upon greater fees in tasks that must be considered. In this
way, seeking out a financially savvy plan with a super correspondence execution for the RFID-empowered
frameworks will become a crucial thing for contending most of the gift-critical enterprise sectors. This paper fosters
a fluffy multi-goal version for an RFID-empowered visa international positioning framework below questionable
information. The research goals introducing a financially savvy plan for the proposed framework in portions of
associated places of work that must be set up. It moreover goals amplifying the execution and operational fees and
restricting the RFID peruser obstruction. To enhance the version, association techniques have been applied. Hence,
some other dynamic calculations become applied to select the fine association strategy. A contextual evaluation
becomes implemented to examine the materialness of the created version and the exhibition of the proposed
association techniques. Examination discoveries display that the created version is geared up for introducing a super
plan for the RFID-empowered visa international positioning framework and compromises most of the destinations.

EXISTING SYSTEM
In the cutting-edge framework, there's no best-in-elegance approach saved as much as maintain the identity
and visa securely. International IDs are probably noted in unique situations to verify distinguishing proof, for example,
registration right into accommodation or at the same time as buying and selling coins to community cash and ID
measure [10]. In the cutting-edge framework, there would not gift any high-stage version to understand the visa, and

060001-2
different tour records restrict date [11]. According to the regulation of the general public authority, visa restrict
messages ought to come from the migration workplace but in all actuality, the displacement workplace would not
address it. Thus, people are confronting simple situations in unique nations, for example, are captured via way of
means of the community police [12]. The predominant risks of the cutting-edge framework as follows, extra
documentation works, the programmed concept isn't always given for increasing the visa time frame, and Less
security.

PROPOSED SYSTEM
To defeat the problems regarded withinside the beyond approach we've deliberate a Remote identity
framework. This framework makes use of eager card innovation to avoid fabrication and alongside those strains
expands security. These discounts a load of documentation and finally lessens time usage [13]. A microcontroller is
applied on this version framework so that you can be answerable for placing away the facts and getting ready it via
way of means of utilizing stability and demodulation of RF sign that's being dispatched via way of means of the
peruser [14]. The eager card will incorporate each one of the subtleties required like name, date of birth, ethnicity, and
UID range for the identity confirmation. At the factor whilst the man or woman locations the cardboard into the
cardboard peruser, the UID is perused and later on checked. In the occasion that the cardboard subtleties fit with the
introduced collectively facts set, it suggests the subtleties of the identity holder. Likewise, visa obstacle subtleties
moreover may be recognized via way of means of this card [15]. On the off risk that the visa date has to lapse, the
patron gets a proposal and the patron can call for visa date augmentation to the unique identity office. The proposed
configuration can moreover be stepped forward via way of means of including biometric facts, for example, palm
examines, fingerprints, iris filters, superior marks, and different dynamic approval withinside the identity framework
[16]. The maximum blessings of the proposed framework areas in line with the following, much less documentation
works, visa obstacle date is insinuated appropriately, no compelling motive to deliver each one of the files any area
we move and the usage of wise card innovation makes the framework focused and alongside those strains improves
the security [17]. The accompanying figure 1 delineates the layout graph of the proposed approach.

FIGURE 1. Architecture Diagram of the Proposed Passport System

EXPERIMENTAL ANALYSIS AND RESULT


The Arduino Bootloader devices the "delete Address" to zero each time the boot loader is called. ROBOTC is called
the "Heap Address" if you want to set the area in which we need to compose/confirm whilst downloading a program.
When composing an internet web page of memory to the Arduino, the Arduino bootloader will cast off the cutting-
edge net web page and compose a totally particular net web page. In the situation of downloading the firmware, the
entirety is terrific in slight of the fact that the Delete Address and the Stacked Location every beginning at nothing. In

060001-3
the situation of composing a customer program, we begin composing at memory area 0x7000, however, the Bootloader
eradicates information beginning at area zero in slight of the fact that the "Heap Address" order does now no longer
refresh in which to delete. The Arduino UNO may be fueled with the useful resource of the use of a USB affiliation
or with an outer stress delivery. The stress supply is selected naturally. The internal panel has artwork on an outer
inventory. Whenever furnished through beneath neath seven volts, nonetheless, the five volts pin might too
furthermore deliver beneath neath 5 volts and the board is probably insecure. On the off danger that the use of extra
than 12V, the voltage controller might also furthermore overheat and damage the board. The prescribed achieve is 7
to twelve volts. The assessment from all previous sheets in it does now no longer employ the FTDI USB-to-persistent
purpose pressure chip. All subjects being equal, it includes this device as a USB-to-persistent converter.

Our adjustment is to set the Heap Address and the Delete Address so the movement of composing a
consumer software does now not make the firmware be coincidentally eradicated. Continuous tickers ought now not
to be incorrect for every everyday registering or device timekeepers. Ongoing processing is a time period that alludes
to figuring framework advent and the way positive inner cutoff instances want to be met for precise frameworks to be
feasible in right all the way proper all of the manner right all the way down to earth programs. Equipment tickers, then
again, do tool quick time body stretches but do now not relate those statistics to seconds or mins or distinct human
clocks. LCD represents fluid treasured stone presentation. They are available several sizes 8x1, 8x2 , 10x2 , 16x1 ,
16x2 , 16x4 , 20x2 , 20x4 ,24x2 , 30x2 , 32x2 , 40x2 and so on . Numerous global organizations like Philips Hitachi
Panasonic make their unusual shape of LCD to be applied to their items. All the LCD'S play out comparable capacities
(display characters numbers super characters ASCII characters and so on) Their writing laptop programs are moreover
something comparable and all of them have comparable 14 pins (zero-13) or sixteen pins (zero to 15). Alphanumeric
displays are applied in an in-depth scope of utilizations, collectively with palmtop PCs, phrase processors, printers,
retail vicinity terminals, clinical instruments, phones, and so on Coffee's ESP8266EX conveys a profoundly included
Wi-Fi SoC solution for satisfying clients' everyday goals for powerful stress use, minimized plan, and stable execution
withinside the Web of Things industry.

The ATMEGA has 256 KB of blaze reminiscence for placing away code (of which eight KB is applied for
the bootloader), eight KB of SRAM, and four KB of EEPROM (which may be perused and composed with the
EEPROM library). Every one of the fifty-four-superior pin at the Mega may be applied as an information or yield,
making use of pinMode (), digitalWrite (), and digitalRead () capacities. The paintings at five volts. Each pin can
provide or get a limition of forty and has an indoors draw-up resistor (disengaged of course) of 20-50k Ohms. Pins
zero and 1 are moreover related to the regarding pins of the ATMEGA USB-to-TTL Sequential chip. Outside Intrudes
on: 2 (intrude with zero), 3 (intrude with 1), 18 (intrude with five), 19 (intrude with four), 20 (intrude with 3), and 21
(interfere on 2). These pins may be organized to reason prevent a low worth, a growing or falling edge, or evolving
esteem. See the attachInterrupt () paintings for subtleties. PWM: 0to13. These pins beneficial aid SPI correspondence,
which, but the truth that given through the hidden equipment, isn't a gift remembered for the Arduino language. The
SPI pins are likewise damaged out at the ICSP header, it's far sincerely possible with the Duemilanove and Decimal.

LED: 13. Note that those pins aren't in a comparable vicinity because of the truth the I2C pins at the
Duemilanove. The Arduino UNO has sixteen easy records sources, each genuinely one in all which provide 10 portions
of goal (i.e., 1024 tremendous qualities). Of course, they degree from floor to five volts, but is it practicable to extrude
the top brought about them obtain utilizing the AREF pin and analogReference () work. With the entire and unbiased
Wi-Fi organizing capacities, ESP8266EX can carry out every as an unbiased software program application or as a
captive to numerous MCU. At the factor whilst ESP8266EX has the software program application, it short boots up
from the blaze. The included speedy reserve assists with developing the framework execution and decorate the
framework memory. The accompanying determines 2 suggests the circuit institutions of the proposed technique. The
Arduino UNO has some workplaces for tell me with a PC, some distinctive Arduino, or brilliant microcontrollers. The
Arduino UNO offers 4 tool UARTs to TTL (5V) sequential correspondence. An ATMEGA at the board channels this
form of over USB and offers a digital comport to programming at the PC (Windows machines may want to require a
.inf record, but OSX and Linux machines will understand the board as a COM port consequently. The Arduino
programming consists of a chronic display which lets in sincere observed records to be shipped off and from the board.
The RX and TX LEDs at the board will streak whilst records are being dispatched through the ATmega8U2 chip and
USB affiliation with the PC (but no longer for sequential correspondence on pins zero and1). The tool UNO moreover
upholds I2C (TWI) and SPI correspondence. The Arduino programming consists of a Wire library to decorate at the
usage of the I2C transport; see the documentation at the Wiring net web website online on line for subtleties. To
appoint the SPI correspondence, if it's miles no longer an excessive amount of trouble, see the Arduino UNO datasheet.

060001-4
The Arduino UNO may be changed with the Arduino programming (download). The Arduino UNO at the Arduino
UNO comes pre-ignited with a bootloader that lets in you to trade new code to it without the usage of an outer tool
software program application utility engineer. It imparts utilizing the primary STK500 convention (reference, C header
records). You can likewise keep away from the bootloader and application the microcontroller through the ICSP (In-
Circuit Sequential Programming) header; see those instructions for subtleties. Figure 2 illustrates the circuit
connection of proposed system and figure 3.a and 3.b illustrates the Bootloader instruction setup.

FIGURE 2. Circuit Connection of Proposed System

FIGURE 3.a. Bootloader Instruction Setup

060001-5
FIGURE 3.b. Bootloader Instruction Setup

The Arduino UNO has a resettable poly breaker that shields your PC's USB ports from shorts and overcurrent.
Albeit most PCs offer inner insurance, the breaker gives a in addition layer of security. On the off danger that greater
than 500mA is done to the USB port, the breaker will consequently break the association until the fast or over-burden
is eliminated. Additionally, ESP8266EX can be done to any microcontroller plan as a Wi-Fi connector through
SPI/SDIO or I2C/UART interfaces. ESP8266EX includes receiving cord switches, RF balun, electricity speaker, low
commotion gets enhancer, channels, and stress the board modules. The reduced plan limits the PCB period and
requires insignificant outer hardware.

Other than the Wi-Fi functionalities, ESP8266EX likewise includes an upgraded model of Tensilica's L106
Jewel affiliation 32-bit processor and on-chip SRAM. It has an unethical to be interfaced with outer sensors and one-
of-a-kind gadgets through the GPIOs. Programming Advancement Pack (SDK) gives test codes to one-of-a-kind
applications. Express, if Frameworks' Savvy Network Stage (ESCP) empowers contemporary-day highlights which
includes a quick switch among rest and wake-up mode for an electricity-talented purpose, bendy radio biasing for
low-electricity activity, enhance sign handling, prod abrogation, and radio conjunction systems for everyday cell,
Bluetooth, DDR, LVDS, LCD impedance moderation. The RF handset upholds the accompanying channels as
indicated with the beneficial useful resource of the usage of IEEE802.11b/g/n principles.

The 2.4 GHz collector down-modifications over the RF signs and signs and symptoms and symptoms and
signs and signs and symptoms and symptoms to quadrature baseband signs and signs and converts them to the
advanced area with 2 high-purpose rapid ADCs. To alter to differing signal channel conditions, RF channels,
programmed collect control (AGC), DC balance cancelation circuits, and baseband channels are included internal
ESP8266EX. The 2.4 GHz transmitter up-modifications over the quadrature baseband signs and signs and symptoms
and symptoms and signs and signs and symptoms and symptoms to 2.4 GHz and drives the radio cord with a high-
electricity CMOS electricity enhancer. The cappotential of advanced adjustment in addition improves the linearity of
the stress speaker, empowering the best-in-beauty execution of conveying +19.5 dBm everyday stress for 802.11b
transmission and +16 dBm for 802.11n transmission. The accompanying figures 4.ca and 4.b suggests the yield of the
proposed framework.

060001-6
FIGURE 4.a. Output of Passport Renewal System

FIGURE 4 b. Output of Passport Renewal System

• Extra adjustments are coordinated to counterbalance any flaws of the radio, for example,
• Transporter spillage
• I/Q stage coordinating
• Baseband nonlinearities
• These worked in adjustment capacities diminish the item test time and make the test hardware
superfluous

060001-7
CONCLUSION
In this paper, we've proposed and finished a RFID-primarily based totally solution for overseeing travel-
associated authorities’ facts like visas, VISA, and any migration. This association places forth a try and digitize the
records and keep the facts in a dispersed TAG. We have experimented with numerous IOT gadgets to assess the overall
performance of E-Passport system. Our experimental end result proved that; it overcomes the drawbacks of present
guide methods. Additionally, this concept may be reached out to on line site visitors observing, on line wellbeing
checking, ongoing vehicle, and coordination observing.
REFERENCE
[1] S. Saoudi, S. Yousfi and R. Robbana, "Elliptic Curve Cryptography on E-Passport Authentication Protocol," 2017
IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017, pp. 1253-1260.
[2] N. M. Abdal-Ghafour, A. A. Abdel-Hamid, M. E. Nasr and S. A. Khamis, "Authentication enhancement techniques
for BAC in 2G E-passport," 2016 12th International Conference on Innovations in Information Technology (IIT),
2016, pp. 1-6.
[3] A. Ahsan Jeny, M. Shah Junayed and S. Tanjila Atik, "PassNet - Country Identification by Classifying Passport
Cover Using Deep Convolutional Neural Networks," 2018 21st International Conference of Computer and
Information Technology (ICCIT), 2018, pp. 1-6.
[4] M. D. Shutin and D. V. Dolgov, "Creating a Digital Passport of the Object During the Survey of Transport
Infrastructure," 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering
(EIConRus), 2019, pp. 1485-1487.
[5] Katarzyna Bobkowska Khaled Nagaty Marek Przyborski, “Incorporating iris, fingerprint and face biometric for
fraud prevention in e‐passports using fuzzy vault”, IET Image Processing, Vol 13(13), pp. 2516-2528, 2019.
[6] S. Panchamia and D. K. Byrappa, "Passport, VISA and Immigration Management Using Blockchain," 2017 23RD
Annual International Conference in Advanced Computing and Communications (ADCOM), 2017, pp. 8-17.
[7] S. Sharma and H. Zodpe, "Implementation of cryptography algorithm for E-passport security," 2016 International
Conference on Inventive Computation Technologies (ICICT), 2016, pp. 1-3.
[8] E. D. Madyatmadja, J. Suhartono and W. N. Suliyanti, "Analysis of Community Interest in Using Passport Queue
Application," 2019 International Conference on Information Management and Technology (ICIMTech), 2019, pp.
305-308.
[9] A. Dukyil, A. Mohammed and M. Darwish, "A cost-effective decision-making algorithm for an RFID-enabled
passport tracking system: A fuzzy multi-objective approach," 2017 Computing Conference, 2017, pp. 88-95.
[10] E. A. Bogari, P. Zavarsky, D. Lindskog and R. Ruhl, "An analysis of security weaknesses in the evolution of
RFID enabled passport," World Congress on Internet Security (WorldCIS-2012), 2012, pp. 158-166.
[11] S. Saoudi, S. Yousfi and R. Robbana, "Elliptic Curve Cryptography on E-Passport Authentication Protocol,"
2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), 2017, pp. 1253-
1260.
[12] Jules, A., David Molnar, D., David Wagner, D.: ‘Security and privacy issues in e-passports’. IEEE First Int. Conf.
on Security and Privacy for Emerging Areas in Communications Networks, Athens, Greece, 2005

060001-8
[13] Jacobs, B.: ‘Biometry in passports. Available at: http://www.sos.cs.ru.nl/ research/society/passport/index.html
[14] Abid, M., Kanade, S., Petrovska-Delacretaz, D., et al.: ‘Iris based authentication mechanism for e-passports’. 2nd
Int. Workshop on Security and Communication Networks (IWSCN), Karlstad, Sweden, 2010
[15] H. Chabanne and M. Tibouchi, "Securing E-passports with Elliptic Curves," in IEEE Security & Privacy, vol. 9,
no. 2, pp. 75-78, March-April 2011.
[16] Wimalasiri, B, Jeyamohan, N: ‘An e-passport system with multi-stage authentication: a case study of the security
of Sri Lanka's e-passport’, Global J. Comput. Sci. Technol., 2018, 18, pp. 14–20, ISSN:0975-4172 Available at:
https://computerresearch.org/index.php/computer/article/view/1689, accessed 28 March 2019
[17] S. Sharma and H. Zodpe, "Implementation of cryptography algorithm for E-passport security," 2016 International
Conference on Inventive Computation Technologies (ICICT), 2016, pp. 1-3.

060001-9

You might also like