A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing

被引:2
|
作者
Liu, Kaijun [1 ]
Zhou, Zhou [2 ]
Cao, Qiang [1 ]
Xu, Guosheng [1 ]
Wang, Chenyu [1 ]
Gao, Yuan [1 ]
Zeng, Weikai [1 ]
Xu, Guoai [1 ,3 ]
机构
[1] Beijing Univ Posts & Telecommun, Serv MoE, Key Lab Trustworthy Distributed Comp, Beijing 100876, Peoples R China
[2] RIOH High Sci & Technol Grp, Beijing 100088, Peoples R China
[3] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 07期
基金
中国国家自然科学基金;
关键词
security and privacy; two-factor authentication (2FA); elliptic curve cryptography (ECC); mobile computing; ProVerif; PASSWORD AUTHENTICATION; POWER ANALYSIS; SCHEME; SECURITY;
D O I
10.3390/app13074425
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The rapid development of mobile computing (e.g., mobile health, mobile payments, and smart homes) has brought great convenience to our lives. It is well-known that the security and privacy of user information from these applications and services is critical. Without the prevention provided by an authentication mechanism, safety vulnerabilities may accumulate, such as illegal intrusion access resulting in data leakage and fraudulent abuse. Luckily, the two-factor authentication (2FA) protocols can secure access and communication for mobile computing. As we understand it, existing 2FA authentication protocols weaken security in the pursuit of high efficiency. How efficiency can be achieved while preserving the protocol's security remains a challenge. In this study, we designed a robust and effective 2FA protocol based on elliptic curve cryptography (ECC) for authentication of users and service providers. We proved the robustness (respectively, the effectiveness) of the presented protocol with the heuristic analysis and security verification provided by the ProVerif tool (respectively, with a performance comparison based on six schemes). Performance comparisons in terms of message rounds, communication, and computation overheads showed that our scheme was superior to the exiting schemes or comparable as a whole; i.e., only two rounds, 1376 bits, and 1.818 ms were required in our scheme, respectively. The evaluation results showed that the proposed 2FA protocol provides a better balance between security and availability compared to state-of-the-art protocols.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Factorizing 2FA: Forensic analysis of two-factor authentication applications
    Berrios, Jessica
    Mosher, Elias
    Benzo, Sankofa
    Grajeda, Cinthya
    Baggili, Ibrahim
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 45
  • [2] Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication Notification Design Patterns
    Golla, Maximilian
    Ho, Grant
    Lohmus, Marika
    Pulluri, Monica
    Redmiles, Elissa M.
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 109 - 126
  • [3] A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT
    Zou, Shihong
    Cao, Qiang
    Wang, Chenyu
    Huang, Zifu
    Xu, Guoai
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4938 - 4949
  • [4] Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing
    Derhab, Abdelouahid
    Belaoued, Mohamed
    Guerroumi, Mohamed
    Khan, Farrukh Aslam
    [J]. IEEE ACCESS, 2020, 8 (08): : 28956 - 28969
  • [5] A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA)
    Albayram, Yusuf
    Khan, Mohammad Maifi Hasan
    Fagan, Michael
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2017, 33 (11) : 927 - 942
  • [6] Robust Mobile Two-Factor Authentication Leveraging Acoustic Fingerprinting
    Ren, Yanzhi
    Yang, Tingyuan
    Xia, Zhiliang
    Liu, Hongbo
    Yu, Jiadi
    Liu, Bo
    Li, Hongwei
    [J]. IEEE Transactions on Mobile Computing, 2024, 23 (12) : 11105 - 11120
  • [7] T2FA: Transparent Two-Factor Authentication
    Zhang, Jiliang
    Tan, Xiao
    Wang, Xiangqi
    Yan, Aibin
    Qin, Zheng
    [J]. IEEE ACCESS, 2018, 6 : 32677 - 32686
  • [8] Two-factor authentication for the Bitcoin protocol
    Christopher Mann
    Daniel Loebenberger
    [J]. International Journal of Information Security, 2017, 16 : 213 - 226
  • [9] Two-Factor Authentication for the Bitcoin Protocol
    Mann, Christopher
    Loebenberger, Daniel
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 155 - 171
  • [10] Two-factor authentication for the Bitcoin protocol
    Mann, Christopher
    Loebenberger, Daniel
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (02) : 213 - 226