A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks

被引:0
|
作者
Ariffin, Noor Afiza Mohd [1 ]
Sani, Noor Fazlida Mohd [1 ]
机构
[1] Fac Comp Sci & Informat Technol, Dept Comp Sci, Serdang, Malaysia
关键词
security; multi-factor authentication; biometric;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security plays an important role in many authentication applications. Modern era information sharing is boundless and becoming much easier to access with the introduction of the Internet and the World Wide Web. Although this can be considered as a good point, issues such as privacy and data integrity arise due to the lack of control and authority. For this reason, the concept of data security was introduced. Data security can be categorized into two which are secrecy and authentication. In particular, this research was focused on the authentication of data security. There have been substantial research which discusses on multi-factor authentication scheme but most of those research do not entirely protect data against all types of attacks. Most current research only focuses on improving the security part of authentication while neglecting other important parts such as the accuracy and efficiency of the system. Current multifactor authentication schemes were simply not designed to have security, accuracy, and efficiency as their main focus. To overcome the above issue, this research will propose a new multi-factor authentication scheme which is capable to withstand external attacks which are known security vulnerabilities and attacks which are based on user behavior. On the other hand, the proposed scheme still needs to maintain an optimum level of accuracy and efficiency. From the result of the experiments, the proposed scheme was proven to be able to withstand the attacks. This is due to the implementation of the attack recognition and key generator technique together with the use of multi-factor in the proposed scheme.
引用
收藏
页码:43 / 48
页数:6
相关论文
共 29 条
  • [11] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION
    Nikam, Rushikesh
    Potey, Manish
    [J]. 2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [12] A Lightweight Multi-factor Authentication Scheme based on Digital Watermarking Technique
    Trong-Minh Hoang
    Van-Hau Bui
    Ngoc-Tan Nguyen
    [J]. 2021 INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR COMMUNICATIONS (ATC 2021), 2021, : 270 - 274
  • [13] A secure data backup scheme using multi-factor authentication
    Liu, Yining
    Zhong, Qi
    Chang, Liang
    Xia, Zhe
    He, Debiao
    Cheng, Chi
    [J]. IET INFORMATION SECURITY, 2017, 11 (05) : 250 - 255
  • [14] Enhanced secure data backup scheme using multi-factor authentication
    Hu, Huidan
    Lin, Changlu
    Chang, Chin-Chen
    Chen, Lanxiang
    [J]. IET INFORMATION SECURITY, 2019, 13 (06) : 649 - 658
  • [15] Development of a Remote Tracking Security Box with Multi-Factor Authentication System Incorporates with a Biometric Sensing Device
    Fahim, Shahriar Rahman
    Shahriar, Saquib
    Islam, Omar Kamrul
    Rahm, Md Ilias
    Sarker, Subrata K.
    Akter, Shahela
    [J]. 2019 5TH IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE 2019), 2019,
  • [16] Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
    Gaurav Tyagi
    Rahul Kumar
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 260 - 276
  • [17] Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
    Tyagi, Gaurav
    Kumar, Rahul
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (01) : 260 - 276
  • [18] Quantum-attack-resilience OTP-based multi-factor mutual authentication and session key agreement scheme for mobile users
    Basu, Swagatam
    Islam, S. K. Hafizul
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [19] Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication
    Rizvi, Syed
    Imler, Jarrett
    Ritchey, Luke
    Tokar, Michael
    [J]. 2019 53RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2019,
  • [20] Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret
    Ogbanufe, Obi M.
    Baham, Corey
    [J]. INFORMATION SYSTEMS FRONTIERS, 2023, 25 (02) : 897 - 916