Symmetric-Key Multi-factor Biometric Authentication Scheme

被引:0
|
作者
Iftikhar, Jawad [1 ]
Hussain, Sajid [1 ]
Mansoor, Khwaja [2 ]
Ali, Zeeshan [1 ]
Chaudhry, Shehzad Ashraf [1 ]
机构
[1] Int Islamic Univ, Dept Comp Sci, Islamabad, Pakistan
[2] Natl Univ Sci & Technol, Dept Informat Secur Islamabad, MCS, Islamabad, Pakistan
关键词
Authentication; Multi-factor; Biometric; ProVeri; Burrows-Abadi-Needham (BAN) logic; IMPROVEMENT;
D O I
10.1109/c-code.2019.8680999
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is achieved by using different techniques, like using smart-card, identity password and biometric techniques. Some of the proposed schemes use a single factor for authentication while others combine multiple ways to provide multi-factor authentication for better security. lately, a new scheme for multi-factor authentication was presented by Cao and Ge and claimed that their scheme is highly secure and can withstand against all known attacks. In this paper, it is revealed that their scheme is still vulnerable and have some loopholes in term of reflection attack. Therefore, an improved scheme is proposed to overcome the security weaknesses of Cao and Ge's scheme. The proposed scheme resists security attacks and secure. Formal testing is carried out under a broadly-accepted simulated tool ProVerif which demonstrates that the proposed scheme is well secure.
引用
收藏
页码:288 / 292
页数:5
相关论文
共 50 条
  • [1] Biometric multi-factor authentication: On the usability of the FingerPIN scheme
    Marasco, Emanuela
    Albanese, Massimiliano
    Patibandla, Venkata Vamsi Ram
    Vurity, Anudeep
    Sriram, Sumanth Sai
    [J]. SECURITY AND PRIVACY, 2023, 6 (01)
  • [2] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [3] Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange
    Griffin, Phillip H.
    [J]. COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 66 - 71
  • [4] Security analysis and enhancements of a multi-factor biometric authentication scheme
    Wu, Min
    Chen, Jianhua
    Zhu, Wenxia
    Yuan, Zhenyang
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 352 - 365
  • [5] Security analysis and enhancements of an improved multi-factor biometric authentication scheme
    Park, YoHan
    Park, KiSung
    Lee, KyungKeun
    Song, Hwangjun
    Park, YoungHo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08):
  • [6] Cryptanalysis of a Multi-factor Biometric-Based Remote Authentication Scheme
    Boonkrong, Sirapat
    [J]. RECENT ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGY 2018, 2019, 769 : 232 - 242
  • [7] Secure biometric template generation for multi-factor authentication
    Khan, Salman H.
    Akbar, M. Ali
    Shahzad, Farrukh
    Farooq, Mudassar
    Khan, Zeashan
    [J]. PATTERN RECOGNITION, 2015, 48 (02) : 458 - 472
  • [8] Security analysis and improvement of a multi-factor biometric-based remote authentication scheme
    Boonkrong, Sirapat
    [J]. IAENG International Journal of Computer Science, 2019, 46 (04): : 1 - 12
  • [9] A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks
    Ariffin, Noor Afiza Mohd
    Sani, Noor Fazlida Mohd
    [J]. 2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS 2018), 2018, : 43 - 48
  • [10] Using Bayes Factors For Multi-factor, Biometric Authentication
    Giffin, A.
    Skuka, J. D.
    Lao, P. A.
    [J]. BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING (MAXENT 2014), 2015, 1641 : 611 - 615