Biometric multi-factor authentication: On the usability of the FingerPIN scheme

被引:6
|
作者
Marasco, Emanuela [1 ]
Albanese, Massimiliano [1 ]
Patibandla, Venkata Vamsi Ram [1 ]
Vurity, Anudeep [1 ]
Sriram, Sumanth Sai [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, 4400 Univ Dr, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
biometrics; fingerprints; multi-factor authentication;
D O I
10.1002/spy2.261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fingerprint-based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password-based authentication. Despite the usability and accuracy of this technology, some significant concerns still exist, which can potentially hinder its further adoption. For instance, a fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric-based authentication. To mitigate this concern, we previously designed a multi-factor authentication approach that integrates Type-1 and Type-3 authentication factors into a fingerprint-based personal identification number (PIN). To authenticate, a subject is required to present a sequence of fingerprints corresponding to the digits of the PIN, based on a predefined secret mapping between digits and fingers. We conducted a preliminary vulnerability analysis and demonstrated that this approach is robust to the compromise of one or more of the subject's fingerprints. The objective of the work presented in this paper is to identify any usability issues for this FingerPIN scheme, collect qualitative and quantitative data through a user study, and determine the participants' satisfaction with the authentication mechanism. We carried out systematic usability tests, designed suitable performance metrics for assessing authentication usability on an initial cohort of 100 individuals, and performed a comparative analysis of the FingerPIN scheme against traditional sequential multi-factor authentication schemes.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [2] Symmetric-Key Multi-factor Biometric Authentication Scheme
    Iftikhar, Jawad
    Hussain, Sajid
    Mansoor, Khwaja
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2019, : 288 - 292
  • [3] Security analysis and enhancements of a multi-factor biometric authentication scheme
    Wu, Min
    Chen, Jianhua
    Zhu, Wenxia
    Yuan, Zhenyang
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 352 - 365
  • [4] Security analysis and enhancements of an improved multi-factor biometric authentication scheme
    Park, YoHan
    Park, KiSung
    Lee, KyungKeun
    Song, Hwangjun
    Park, YoungHo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08):
  • [5] Cryptanalysis of a Multi-factor Biometric-Based Remote Authentication Scheme
    Boonkrong, Sirapat
    [J]. RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018, 2019, 769 : 232 - 242
  • [6] Secure biometric template generation for multi-factor authentication
    Khan, Salman H.
    Akbar, M. Ali
    Shahzad, Farrukh
    Farooq, Mudassar
    Khan, Zeashan
    [J]. PATTERN RECOGNITION, 2015, 48 (02) : 458 - 472
  • [7] Security analysis and improvement of a multi-factor biometric-based remote authentication scheme
    Boonkrong, Sirapat
    [J]. IAENG International Journal of Computer Science, 2019, 46 (04): : 1 - 12
  • [8] Using Bayes Factors For Multi-factor, Biometric Authentication
    Giffin, A.
    Skuka, J. D.
    Lao, P. A.
    [J]. BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING (MAXENT 2014), 2015, 1641 : 611 - 615
  • [9] Security enhanced multi-factor biometric authentication scheme using bio-hash function
    Choi, Younsung
    Lee, Youngsook
    Moon, Jongho
    Won, Dongho
    [J]. PLOS ONE, 2017, 12 (05):
  • [10] Implementing Open Source Biometric Face Authentication for Multi-factor Authentication Procedures
    Minakova, Natalya
    Mansurov, Alexander
    [J]. HIGH-PERFORMANCE COMPUTING SYSTEMS AND TECHNOLOGIES IN SCIENTIFIC RESEARCH, AUTOMATION OF CONTROL AND PRODUCTION, 2022, 1526 : 371 - 379