Security analysis and enhancements of an improved multi-factor biometric authentication scheme

被引:9
|
作者
Park, YoHan [1 ]
Park, KiSung [2 ]
Lee, KyungKeun [3 ]
Song, Hwangjun [4 ]
Park, YoungHo [2 ]
机构
[1] Korea Nazarene Univ, Div IT Convergence, Cheonan, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Daegu 702701, South Korea
[3] Samsung Elect, Mobile Div, Suwon, South Korea
[4] Pohang Univ Sci & Technol POSTECH, Dept Comp Sci & Engn, Pohang, South Korea
基金
新加坡国家研究基金会;
关键词
Biometrics; authentication; cryptanalysis; mobile networks; anonymity; REMOTE; EFFICIENT;
D O I
10.1177/1550147717724308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many remote user authentication schemes have been designed and developed to establish secure and authorized communication between a user and server over an insecure channel. By employing a secure remote user authentication scheme, a user and server can authenticate each other and utilize advanced services. In 2015, Cao and Ge demonstrated that An's scheme is also vulnerable to several attacks and does not provide user anonymity. They also proposed an improved multi-factor biometric authentication scheme. However, we review and cryptanalyze Cao and Ge's scheme and demonstrate that their scheme fails in correctness and providing user anonymity and is vulnerable to ID guessing attack and server masquerading attack. To overcome these drawbacks, we propose a security-improved authentication scheme that provides a dynamic ID mechanism and better security functionalities. Then, we show that our proposed scheme is secure against various attacks and prove the security of the proposed scheme using BAN Logic.
引用
下载
收藏
页数:12
相关论文
共 50 条
  • [21] On the Security of Multi-Factor Authentication: Several Instructive Examples
    Huang, Yun
    Xue, Weijia
    Huang, Geshi
    Lai, Xuejia
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 685 - 687
  • [22] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION
    Nikam, Rushikesh
    Potey, Manish
    2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [23] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836
  • [24] Multi-factor authentication scheme based on custom attributes
    Zhu, Dexin
    Zhou, Hu
    Li, Nianfeng
    Song, Lijun
    Zheng, Jun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7741 - 7756
  • [25] Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
    Tahir, Haseeb
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Ferzund, Javed
    Kumar, Neeraj
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14978 - 14986
  • [26] Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards
    An, Younghwa
    JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY, 2012,
  • [27] Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy
    Xu, Yanbin
    Jian, Xinya
    Li, Tao
    Zou, Shuang
    Li, Beibei
    Mobile Information Systems, 2023, 2023
  • [28] Smart Home Security: An Efficient Multi-Factor Authentication Protocol
    Sarbishaei, Ghazaleh
    Modarres, Amir Masoud Aminian
    Jowshan, Farahnaz
    Khakzad, Fateme Zahra
    Mokhtari, Hasti
    IEEE ACCESS, 2024, 12 : 106253 - 106272
  • [29] A Survey on the Security in Cyber Physical System with Multi-Factor Authentication
    Sain, Mangal
    Normurodov, Oloviddin
    Hong, Chen
    Hui, Kueh Lee
    2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 1322 - +
  • [30] A secure data backup scheme using multi-factor authentication
    Liu, Yining
    Zhong, Qi
    Chang, Liang
    Xia, Zhe
    He, Debiao
    Cheng, Chi
    IET INFORMATION SECURITY, 2017, 11 (05) : 250 - 255