Biometric multi-factor authentication: On the usability of the FingerPIN scheme

被引:6
|
作者
Marasco, Emanuela [1 ]
Albanese, Massimiliano [1 ]
Patibandla, Venkata Vamsi Ram [1 ]
Vurity, Anudeep [1 ]
Sriram, Sumanth Sai [1 ]
机构
[1] George Mason Univ, Ctr Secure Informat Syst, 4400 Univ Dr, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
biometrics; fingerprints; multi-factor authentication;
D O I
10.1002/spy2.261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fingerprint-based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password-based authentication. Despite the usability and accuracy of this technology, some significant concerns still exist, which can potentially hinder its further adoption. For instance, a fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric-based authentication. To mitigate this concern, we previously designed a multi-factor authentication approach that integrates Type-1 and Type-3 authentication factors into a fingerprint-based personal identification number (PIN). To authenticate, a subject is required to present a sequence of fingerprints corresponding to the digits of the PIN, based on a predefined secret mapping between digits and fingers. We conducted a preliminary vulnerability analysis and demonstrated that this approach is robust to the compromise of one or more of the subject's fingerprints. The objective of the work presented in this paper is to identify any usability issues for this FingerPIN scheme, collect qualitative and quantitative data through a user study, and determine the participants' satisfaction with the authentication mechanism. We carried out systematic usability tests, designed suitable performance metrics for assessing authentication usability on an initial cohort of 100 individuals, and performed a comparative analysis of the FingerPIN scheme against traditional sequential multi-factor authentication schemes.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] A proposal of multi-factor authentication scheme for secure iot environment
    Department of Industrial and Information Systems Engineering, Soongsil University, No. 369, Sangdo-Ro, Dongjak-Gu, Seoul
    156-743, Korea, Republic of
    [J]. ICIC Express Lett Part B Appl., 12 (3231-3236):
  • [22] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
    Nozaki, Shinnosuke
    Serizawa, Ayumi
    Yoshihira, Mizuho
    Fujita, Masahiro
    Shibata, Yoichi
    Yamanaka, Tadakazu
    Matsuda, Nori
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211
  • [23] Usability of Single- and Multi-factor Authentication Methods on Tabletops: A Comparative Study
    Bruun, Anders
    Jensen, Kenneth
    Kristensen, Dianna
    [J]. HUMAN-CENTERED SOFTWARE ENGINEERING, HCSE 2014, 2014, 8742 : 299 - 306
  • [24] Usability of single-and multi-factor authentication methods on tabletops: A comparative study
    Bruun, Anders
    Jensen, Kenneth
    Kristensen, Dianna
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8742 : 299 - 306
  • [25] A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks
    Ariffin, Noor Afiza Mohd
    Sani, Noor Fazlida Mohd
    [J]. 2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS 2018), 2018, : 43 - 48
  • [26] Multi-Factor Authentication as a Service
    Shah, Yogendra
    Choyi, Vinod
    Schmidt, Andreas U.
    Subramanian, Lakshmi
    [J]. 2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 144 - 150
  • [27] MULTI-FACTOR AUTHENTICATION MODELLING
    Dostalek, L.
    Safarik, J.
    [J]. RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2020, (02) : 106 - 116
  • [28] Multi-Factor Authentication: A Survey
    Ometov, Aleksandr
    Bezzateev, Sergey
    Makitalo, Niko
    Andreev, Sergey
    Mikkonen, Tommi
    Koucheryavy, Yevgeni
    [J]. CRYPTOGRAPHY, 2018, 2 (01) : 1 - 31
  • [29] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    [J]. 2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [30] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211