Multi-Factor Biometrics for Authentication: A False Sense of Security

被引:0
|
作者
Al-Assam, Hisham [1 ]
Sellahewa, Harin [1 ]
Jassim, Sabah [1 ]
机构
[1] Univ Buckingham, Dept Appl Comp, Buckingham MK18 1EG, England
关键词
Multi-factor biometrics; authentication; cancellable biometrics; security analysis; face recognition; fingerprint recognition;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-factor biometric recently to strengthen systems in addition to authentications have been proposed security and/or privacy of biometric enhancing authentication accuracy. An important approach to multi-factor biometric authentication is to apply User-Based Transformations (UBTs) on biometric features. Typically, UBTs rely on generating user-based transformation keys from a password/PIN or retrieved from a token. One significant advantage of employing UBTs is its ability to achieve zero or near zero Equal Error Rate (EER) i.e. a clear separation of genuine and imposter distributions. However, the effect of compromised transforrmation keys on authentication accuracy has not been tested rigorously. In this paper, we challenge the myth that has been repotted in the literature that in the case of stolen transformation key(s), accuracy drops but remains close to the accuracy of biometric only system. Moreover, we shall show that a multi-factor authentication system setup to operate at a zero EER has a serious security lapse in the event of stolen or compromised keys. In such a scenario, the False Acceptance Rate (FAR) of the system reaches unacceptable levels. We shall demonstrate this by experiments conducted on face and fingerprint biometrics, and show that an imposter with a stolen key needs no more than two attempts on average to be falsely accepted by the biometric system.
引用
收藏
页码:81 / 87
页数:7
相关论文
共 50 条
  • [1] Privacy preserving multi-factor authentication with biometrics
    Bhargav-Spantzel, Abhilasha
    Squicciarini, Anna
    Modi, Shimon
    Young, Matthew
    Bertino, Elisa
    Elliott, Stephen
    [J]. JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) : 529 - 560
  • [2] On the Security of Multi-Factor Authentication: Several Instructive Examples
    Huang, Yun
    Xue, Weijia
    Huang, Geshi
    Lai, Xuejia
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 685 - 687
  • [3] CLOUD STORAGE SECURITY USING MULTI-FACTOR AUTHENTICATION
    Nikam, Rushikesh
    Potey, Manish
    [J]. 2016 INTERNATIONAL CONFERENCE ON RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2016,
  • [4] Smart Home Security: An Efficient Multi-Factor Authentication Protocol
    Sarbishaei, Ghazaleh
    Modarres, Amir Masoud Aminian
    Jowshan, Farahnaz
    Khakzad, Fateme Zahra
    Mokhtari, Hasti
    [J]. IEEE ACCESS, 2024, 12 : 106253 - 106272
  • [5] A Survey on the Security in Cyber Physical System with Multi-Factor Authentication
    Sain, Mangal
    Normurodov, Oloviddin
    Hong, Chen
    Hui, Kueh Lee
    [J]. 2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, : 1322 - +
  • [6] Security analysis and enhancements of a multi-factor biometric authentication scheme
    Wu, Min
    Chen, Jianhua
    Zhu, Wenxia
    Yuan, Zhenyang
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 352 - 365
  • [7] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security
    Saqib, Rashad Mahmood
    Khan, Adnan Shahid
    Javed, Yasir
    Ahmad, Shakil
    Nisar, Kashif
    Abbasi, Irshad A.
    Haque, Muhammad Reazul
    Julaihi, Azlina Ahmadi
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03): : 1633 - 1647
  • [8] A Survey on the Security in Cyber Physical System with Multi-Factor Authentication
    Sain, Mangal
    Normurodov, Oloviddin
    Hong, Chen
    Hui, Kueh Lee
    [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 1322 - +
  • [9] Pick Location Security: Seamless Integrated Multi-Factor Authentication
    Ramatsakane, Kobosa Icconies
    Leung, Wai Sze
    [J]. 2017 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2017,
  • [10] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
    Nozaki, Shinnosuke
    Serizawa, Ayumi
    Yoshihira, Mizuho
    Fujita, Masahiro
    Shibata, Yoichi
    Yamanaka, Tadakazu
    Matsuda, Nori
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211