Security analysis and enhancements of an improved multi-factor biometric authentication scheme

被引:9
|
作者
Park, YoHan [1 ]
Park, KiSung [2 ]
Lee, KyungKeun [3 ]
Song, Hwangjun [4 ]
Park, YoungHo [2 ]
机构
[1] Korea Nazarene Univ, Div IT Convergence, Cheonan, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn, Daegu 702701, South Korea
[3] Samsung Elect, Mobile Div, Suwon, South Korea
[4] Pohang Univ Sci & Technol POSTECH, Dept Comp Sci & Engn, Pohang, South Korea
基金
新加坡国家研究基金会;
关键词
Biometrics; authentication; cryptanalysis; mobile networks; anonymity; REMOTE; EFFICIENT;
D O I
10.1177/1550147717724308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many remote user authentication schemes have been designed and developed to establish secure and authorized communication between a user and server over an insecure channel. By employing a secure remote user authentication scheme, a user and server can authenticate each other and utilize advanced services. In 2015, Cao and Ge demonstrated that An's scheme is also vulnerable to several attacks and does not provide user anonymity. They also proposed an improved multi-factor biometric authentication scheme. However, we review and cryptanalyze Cao and Ge's scheme and demonstrate that their scheme fails in correctness and providing user anonymity and is vulnerable to ID guessing attack and server masquerading attack. To overcome these drawbacks, we propose a security-improved authentication scheme that provides a dynamic ID mechanism and better security functionalities. Then, we show that our proposed scheme is secure against various attacks and prove the security of the proposed scheme using BAN Logic.
引用
下载
收藏
页数:12
相关论文
共 50 条
  • [41] Multi-Factor Authentication: A Survey
    Ometov, Aleksandr
    Bezzateev, Sergey
    Makitalo, Niko
    Andreev, Sergey
    Mikkonen, Tommi
    Koucheryavy, Yevgeni
    CRYPTOGRAPHY, 2018, 2 (01) : 1 - 31
  • [42] Multi-Factor Authentication on Cloud
    Khan, Salman H.
    Akbar, M. Ali
    2015 INTERNATIONAL CONFERENCE ON DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA), 2015, : 548 - 554
  • [43] Multi-Factor Authentication Modeling
    Dostalek, Libor
    2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [44] Bypassing Multi-Factor Authentication
    Russell S.
    ITNOW, 2023, 65 (01) : 42 - 45
  • [45] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211
  • [46] Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
    Mohammad Sabzinejad Farash
    Peer-to-Peer Networking and Applications, 2016, 9 : 82 - 91
  • [48] On Security of Fuzzy Commitment Scheme for Biometric Authentication
    Chang, Donghoon
    Garg, Surabhi
    Hasan, Munawar
    Mishra, Sweta
    INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 399 - 419
  • [49] Multi-Factor Security Enhanced Authentication Protocol for Wireless Sensor Networks
    Zhang L.
    Liang H.
    Deng D.
    Liu Y.
    Tang C.
    Chang Z.
    Gui S.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52 (05): : 699 - 708
  • [50] Security for Ambient Assisted Living Multi-factor Authentication in the Internet of Things
    Griffin, Phillip H.
    2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2015,