skip to main content
10.1145/3538806.3538812acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccbnConference Proceedingsconference-collections
research-article

MAFIS Overlay Network: Towards a Secure Network for Mobile Automated Fingerprint Identification System over Virtual Private Network (VPN)

Authors Info & Claims
Published:14 July 2022Publication History

ABSTRACT

The Philippines is an archipelago or string of over 7,640 islands in southeastern Asia. With the community's active support, the Philippine National Police (PNP) is entrusted with upholding the law, preventing and controlling crimes, maintaining peace and order, and ensuring public safety and internal security. There are currently 1,766 police stations across the country. With the geographical challenges, criminal identification procedures take time to complete. The Mobile Automated Fingerprint Identification System (MAFIS) addresses the issues. MAFIS is currently deployed and implemented in a cloud platform that can be accessed by authorized police personnel from the web and mobile application to expedite fingerprint identification procedures. In today's world, the internet has become the de facto standard for low-cost communications architecture, as well as a significant convenience for organizations and businesses seeking to expand their operations. Because the internet is widely available in practically every region, companies frequently demand it for their local presence. As a result, a secure route within this communication network is required to ensure confidential data crossing the public network. The fast rise of digital gadgets and their Internet connectivity has resulted in security vulnerabilities to user data. Security and privacy threats have become more sophisticated day by day, increasing the demand for an updated and highly secure medium to secure entities and their valuable information on the internet. Advanced measures and high technical skills adapted by attackers, security, and privacy threats have become more sophisticated day by day, increasing the demand for an updated and highly secure medium to secure entities and their valuable information into the internet. There are other alternatives available on the market today, but the Virtual Private Network (VPN) is the most popular for establishing a secure connection over the public internet. Constructing a tunnel between the sender and receiver provides the convenience of a shared network while also providing the security of a private network. The researchers took advantage of the opportunity to create the MAFIS Overlay Network, a secure network design for MAFIS that runs over a virtual private network (VPN). Two VPN implementations were considered on the strategy: a site-to-site VPN connecting all of the law-enforcement agencies' remote offices and a remote-access VPN for the scene-of-the-crime operatives (SOCO). Speed and performance tests were performed using the industry-standard method to ensure the framework's consistency for mobile and web applications. The overall performance scores were 99 and 87 for web and mobile apps, respectively. The speed and performance test results acquired on all of the system's modules in three different criteria in terms of performance, interaction, and visual stability are significantly better than the recommended value and are thus considered highly acceptable. Overall, MAFIS has satisfactorily passed the security and compliance tests conducted and is reflected as highly satisfactory.

References

  1. J. E. M. Angara, "An Act Establishing a National Crime Database," Republic of the Philippines Congress, Manila, Philippines, 2013.Google ScholarGoogle Scholar
  2. W. P. Rey & G. Rolluqui, "Mobile Automated Fingerprint Identification System (MAFIS): An Android-based Criminal Tracking System using Fingerprint Minutiae Structure," 2021 5th International Conference on E-Society, E-Education and E-Technology (ICSET 2021), Taipei, Taiwan, 2021Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Teare, "Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide," Cisco Press, Indianapolis, 2012.Google ScholarGoogle Scholar
  4. Samson, Tony, "Security Implications of Virtual Private Networks," Global Information Assurance Certification Paper, SANS Institute, 2002.Google ScholarGoogle Scholar
  5. M. D. Watkins, "CCNA Security Official Exam Certification Guide (Exam 640-553), Cisco Press, 2008.Google ScholarGoogle Scholar
  6. Oracle, "Oracle Documentations – Systems Administration Guide: IP Services," Oracle Corporation, 2010.Google ScholarGoogle Scholar
  7. Cisco, "Site-to-Site Tunnel Between IOS Routers Using SEAL Sample Configuration," Document ID: 50880, https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/50880-seal-rtr-tunnel-confg.html#configs, Cisco Systems, 2008.Google ScholarGoogle Scholar
  8. Cisco, "Cisco Firepower Threat Defense Configuration Guide for Firepower Device Manager, Version 6.2.1", San Jose, CA, Cisco Systems, 2018Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICCBN '22: Proceedings of the 10th International Conference on Communications and Broadband Networking
    February 2022
    82 pages
    ISBN:9781450387439
    DOI:10.1145/3538806

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 July 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format