Post on 28-Jan-2016
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
UNIVERSITY OF SUNDERLAND
CSE306 RESEARCH – PROJECT PLAN
KABO MOTSHWARI
CENTER: BAC
REF: 129047326
BORDER SECURITY: A BIOMETRIC ENHENCED MODIFICATION OF THE TLOKWENG BORDER GATES PASSPORT CONTROL SYSTEM IN BOTSWANA
1.1 JUSTIFICATION OF THE RESEARCH PROPOSED
1.1 BACKGROUND OVERVIEW
With years gone by, the Information Technology arena has since experienced an enormous growth that has seen a vast number of new technologies emerging and coming to the fold year in and year out. This has therefore enabled Immigration centres across the globe to make use of some of some of this technology to ensure a controlled and maintained entrance of individuals into different countries of the world through the use of a passport, hence eliminating any fraudulent behaviour. By using a passport individuals are to be identified by their full names, date of birth, passport number, place of birth, signatures, finger prints etc., all embedded within this small booklet. As an added security feature in early 2010 the Immigration of Botswana saw it vital to issue out electronic passports that are to be scanned at the border gates instead of the manual stamping alone as was normally done. Descriptively an electronic passport, otherwise known as an E-passport is a machine readable travel document that holds both data printed on the passport and biometric information embedded on a small microchip either placed on the front page or back page of the passport, (chotia and Smirnorv, 2010)
However these personal identity features have over the years proved insufficient as criminals continue to temper with these passports in order to gain access into and out of the Botswana border gates under false pretence.
Page 1
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
1.2 THE CLIENTTlokweng border gate is a Botswana Immigration passport control centre that was established over 8 decades ago to allow visitors in and out of the country from various countries via the South African border post. Travellers passing though this terminal either possess a passport or a temporary traveller’s document that holds their personal identity details as declared by their respective national immigrations protocols. These travellers constitute of:
Citizens returning to the country Citizens going outside the country Diplomats Other foreign nationals coming into the country
The border gate has about 27 point of service teller machines operated by36 employees on a shift basis
1.2 THE PROJECT
Despite the E-passport technology that has recently come to the front as a way to reduce fraudulent acts as far as travellers identity is concerned, the border gate has since encountered cases where travellers continue to gain access are as follows:
Family members with close resemblance as far as facial appearance is concerned, they tend to use the same passport which makes it rather difficult for the migration officers to determine who is who. The holder’s information, fingerprints and all other credentials are embedded within the holder’s passport, it is therefore rather difficult to argue with what the system confirms and verifies after a checkup since no real time checkup is done.
The other concerning factor is that some travellers have tendencies of entering the country to work illegally and at times their duration of stay provided on the passport is less than what the individual needs, they therefore send their passports though public transport motorists to check them out so that it appears as if they had left the country whereas they are still within the Botswana borders.This project therefore seeks to analyse and bring forth an ultrasound fingerprint method that allows for real time check up to verify the authenticity and validity of the individual seeking to gain access into the country. Since the passport holder s prints are already embedded within the passport, this method then allows for real time finger scan to ensure that what has been confirmed legit by the system after reading the passport also matches to the live fingerprint scan as well. (Ahmadian and Gavrilova, 2012 states that ultrasound fingerprint sensors have readers that use high frequency waves of sound penetrating an epidermal layer of the skin, measuring the pulse response acquiring papillary lines of the finger tip, (Mordini, 2008) added. On the other hand (Ahmadian and Gavrilova, 2012) further described biometric identification as any generic trait that identifies an individual by either their physiological structure or behavioural by either fingerprints voice recognition etc.
Page 2
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
2.0 AIM:
This project is aimed at introducing an ultrasound fingerprint method that restricts illegal immigrants from gaining unauthorised access into the country at the border.
3.0 OBJECTIVES:
Objectives of this project are as listed below:
1. To do an investigation of the organisation identifying the problem area 2. To access the current process regarding passport check ups 3. To perform an in-depth review on literature regarding the various methods and
techniques used at boarder gates across the globe spectrum.4. To then take findings from 1, 2 and 3 and use them to compute a requirements
analysis for the proposed method.5. Based on the compiled requirement specification documents perform a design of the
proposed method.6. To develop, analyse and evaluate the prototype solution 7. To liaise with the immigration management to test and evaluate the prototype8. To critically analyse the whole project to insure its conformity to the focus of the
reference and the produce a well-documented project report.
4.0 Client’s Practical outcome
Tlokweng Boarder gate passport system will get a biometric enhanced ultrasound finger print reader that works in connection with the international immigration data centre to verify the credibility of individuals to gain access into Botswana.
5.0 Practical outcome for the scientific community
As far as the scientific community is concerned this project will seek to provide an eye opener for researchers across the board to explore the idea of Dactylography under biometrics as applied at border gate control system. Additionally this will allow researchers to also identify any loopholes existing within biometric identification networks and ways to remedy such insufficiencies. This is to be documented in the form of a research paper.
Page 3
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
6.0 Proposed Methodology & Evaluation
As means of achieving objectives of this proposed research information will be collected using a quantitative mode of data acquisition. The reasoning behind this choice of methodology over a qualitative approach or a survey is because it is much faster and reaches a wide range of people acquiring data over a short space of time, (Jain et al., 2004). Sources of this information will be the travellers themselves, boarder gate migration officers and the internal data auditors.
This will be carved out through services data acquiring channels thus observation, interviews and focus groups with regard to interviews whereby written interviews to all stakeholders probing a yes or no answer. Oral interviews on the other hand will require one on one session with inter viewers, asking open ended questions with the intention to get a broader view of the application area, (Hughes and Cotterell, 2009) added.
Moreover as far as observation is concerned, (Mordini, 2008) states thus; the researcher will have to observe the passport check-up process entirely in order to identify possible existing loopholes that will help with the computations of the requirements analysis furthermore. A small focus group of the Immigration management can be held to discuss and explore issues affecting the passport control centre this allows for a speak-all scenario with a wide range of responses and views derived from the attendants.
7.0 Evaluation
To cater for this section of the project the following factors will be put into consideration
a) Functionality
This is to make sure that the proposed method (ultrasound fingerprint reader) meets the user needs as expected. Therefore a confined lab experiment will be performed following an ultra-method that allows for measuring the pulse response of the fingertip upon scanning, collecting data to be reconstructed and measured. In support of the ultrasonic method a Reflected Pulse model(pulse method) will be used to generate impulses provided by the sender and decoded at the nearer end point (Shaikh and Rabaiotti, 2010) added on. The scanned prints will then be compared against those on the passport and those stored in the system database.
Page 4
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
b) Usability
This factor serves to determine how user-friendly the new method will be. How well the users and staff combined will adopt and familiarise themselves with it. Therefore to cater for that the method is to be run on trial bases of approximately 30 days ahead of its full implementation.
c) Robustness
This kind of evaluation will help identify how secure the proposed method is and whether it leaves room for backup in case of unexpected additional features introduced, hence ensuring systems reliability
8.0 Constraints
Lack of information available as literature review is concerned. In viewing travellers would prove rather difficult as they will be rushing to cross the
to their respective destinations Gathering resources to facilitate the implemented and testing phase could be
expensive
Page 5
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
1. REQUIRED RESOURCES
Ultrasound optical camera (for fingertip image acquisition) MS word office package (for document compilation) Ultrasonic pc cards Transmitters and Receivers Amplifiers and Flaw detectors Electronic journals (for information acquisition) Personal computer Java IDE installation
2. REFERENCES
Ahmadian, k. and Gavrilova, M. (2012) “Chaotic Neural network for Biometric pattern recognition”, Jourssnal of Biometric Applications vol. 2, pp 17-20
Chothia, T. and Smirnov, V. (2010) “A traceability attack against e-passport”, 14th International Conference on Financial cryptography and Data Security vol. 5, pp. 11-14.
Hughes, B. and Cotterell, M. (2009) “Software Project Management”, 5th edition, London: McGraw-Hill.
Jain, K., Dass, S.C., and Nandakumar, K. (2004) “Soft Biometric Traits for personal recognition systems”, In Proceedings of the international conference on Biometric authentication vol. 7, pp. 23-26
Mordini, E. (2008) “Biometrics, Human Body and Medicine: A controversial History”. In ethical, legal and social issues in medical informatics vol. 2, pp. 33-35
Shaikh, S.A. and Rabaiotti, J.R. (2010) “Characteristic trade-offs in designing large-scale biometric-based identity management systems”, International journal of Network and Computer Applications vol. 33, pp. 223-225.
,
Page 6
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
3. PROJECT RATIONALE
This project is set to be completed within a period of 15 weeks, constituting of 600 hours in overall. Within this period, objectives will be broken down into major and subtasks, ensuring that each sub task does not exceed 20hours. The duration of this project is set to commence on the 23rd of August till the 29th of November 2013. To facilitate this, a project schedule and a Gantt chart will be used to depict these events as they occur.
3.1 PROJECT SCHEDULE
ID Task Effort (Hours)
Planned Start Date
Planned End Date
Deliverable
1.0 Client Investigation 901.1 Interview the Border
gate management20 23/08/2013 27/08/2013 Interview notes
1.2 Interview the Border gate staff
20 27/08/2013 29/08/2013 Interview notes
1.3 Interview arriving and departing travellers
20 30/08/2013 03/09/2013 Interview notes
1.4 Gather the findings 15 04/09/2013 05/09/2013 Interview notes1.5 Compute a findings
report15 05/09/2013 06/09/2013 Written report
2.0 Assess current passport check-up process
60
2.1 Observe the daily proceedings
15 06/09/2013 09/09/2013 Observation notes
`2.2 Gather observation findings
15 10/09/2013 12/09/2013 Observation notes
2.3 Assess and Evaluate the findings
20 13/09/2013 15/09/2013 Assessment notes
2.4 Document the findings
10 16/09/2013 18/09/2013 Observation report
3.0 Literature review 803.1 Browse and search
for relevant information from only reliable sources
20 17/09/2013 20/09/2013 Research information
3.2 Arrange and sort out the literature
20 21/09/2013 23/09/2013 Sorted research information
Page 7
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
information according to relevancy
3.3 Browse through and analyse each piece of information
10 24/09/2013 26/09/2013 Research information
3.4 Assess and evaluate the findings
10 27/09/2013 01/10/2013 Research evaluation
3.5 Produce a literature review report
20 01/10/2013 02/10/2013 Literature report
4.0 Carry out requirements elicitation and analysis
60
4.1 Analyse the problem 10 03/10/2013 03/10/2013 Problem analysis report
4.2 Identify possible solutions
15 04/10/2013 06/10/2013 A list of possible solutions
4.3 Evaluate recommended solutions
15 07/10/2013 08/10/2013 Critical analysis notes
4.4 Identify one solution 10 09/10/2013 10/10/2013 Solution notes4.5 Produce an analysis
report10 11/10/2013 13/10/2013 Requirements
analysis report
5.0 Design the proposed prototype solution
120
5.1 Compute and the requirements specification
20 14/10/2013 15/10/2013 Requirements specification document
5.2 Design the architecture
20 16/10/2013 18/10/2013 Architecture design document
5.3 Produce procedure design
20 19/10/2013 21/10/2013 Procedure design document
5.4 Perform logical design
20 22/10/2013 25/10/2013 Program code
5.5 Compile and execute the program
20 26/10/2013 27/10/2013 Fully functioning code
5.6 Fix errors and recompile
20 28/10/2013 01/11/2013 Error-free program
6.0 Produce the prototype solution
60
6.1 Design user interface 15 02/11/2013 03/11/2013 Screen dumps6.2 Implement test plans 15 04/11/2013 06/11/2013 Test plan table6.3 Perform unit testing 20 07/11/2013 09/11/2013 Test samples6.4 Document the design 10 10/11/2013 11/11/2013 Prototype report
7.0 Implement the prototype
60
7.1 Arrange for a meeting
10 12/11/2013 13/11/2013 Prepared contact list
7.2 Produce meeting agenda
10 14/11/2013 15/11/2013 Meeting agenda
7.3 Present the prototype to the client
15 16/11/2013 18/11/2013 Prototype solution
7.4 Carry out a lab experiment
15 19/11/2013 20/11/2013 Functioning prototype
Page 8
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
7.5 Record the experiment results
5 21/11/2013 21/11/2013 Experiment results
7.6 Request and note feedback
5 21/11/2013 22/11/2013 Feedback report
8.0 Critically analyse the project
70
8.1 Perform problem revision
20 23/11/2013 25/11/2013 Revision notes
8.2 Revise proposed solution
10 25/11/2013 26/11/2013 Revision notes
8.3 Revise client feedback
20 27/11/2013 28/11/2013 Revised client feedback
8.4 Produce final documentation
20 28/11/2013 29/11/2013 Final documented report
Page 9
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
1.2 GANTT CHART
ID Task Effort (Hrs)
W1 W2 W3 W4 W5 W6 W7 W8 W9 W 10
W 11
W 12
W 13
W 1 4
W 15
1.0 Client Investigation
90
1.1 Interview the Border gate management
20 20
1.2 Interview the Border gate staff
20 20
1.3 Interview arriving and departing travellers
20 20
1.4 Gather the findings
15 15
1.5 Compute a findings report
15 5 10
2.0 Assess current passport check-up process
60
2.1 Observe the daily proceedings
15 15
2.2 Gather observation findings
15 15
2.3 Assess and Evaluate the findings
20 20
2.4 Document the findings
10 10
3.0 Literature review
80
3.1 Browse and search for relevant information from only reliable sources
20 10 10
3.2 Arrange and sort out the literature information according to relevancy
20 20
3.3 Browse through and analyse each piece of information
10 10
3.4 Assess and evaluate the findings
10 10
3.5 Produce a 20 20
Page 10
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
literature review report
4.0 Carry out requirements elicitation and analysis
60
4.1 Analyse the problem
10 10
4.2 Identify possible solutions
15 15
4.3 Evaluate recommended solutions
15 15
4.4 Identify one solution
10 10
4.5 Produce an analysis report
10 10
5.0 Design the proposed prototype solution
120
5.1 Compute and the requirements specification
20 20
5.2 Design the architecture
20 10 10
5.3 Produce procedure design
20 20
5.4 Perform logical design
20 10 10
5.5 Compile and execute the program
20 20
5.6 Fix errors and recompile
20 10 10
6.0 Produce the prototype solution
60
6.1 Design user interface
15 15
6.2 Implement test plans
15 15
6.3 Perform unit testing
20 20
6.4 Document the design
10 10
7.0 Implement the prototype
60
7.1 Arrange for a meeting
10 10
7.2 Produce meeting agenda
10 10
7.3 Present the prototype to the client
15 15
7.4 Carry out a lab experiment
15 15
Page 11
KABO MOTSHWARI UNIVERSITY OF SUNDERLAND STUDENT NO. 129047326
7.5 Record the experiment results
5 5
7.6 Request and note feedback
5 5
8.0 Critically analyse the project
70
8.1 Perform problem revision
20 20
8.2 Revise proposed solution
10 10
8.3 Revise client feedback
20 20
8.4 Produce final documentation
20 20
TOTAL HOURS
600 40 40 40 40 40 40 40 40 40 40 40 40 40 40 40
Page 12