Symmetric-Key Multi-factor Biometric Authentication Scheme

被引:0
|
作者
Iftikhar, Jawad [1 ]
Hussain, Sajid [1 ]
Mansoor, Khwaja [2 ]
Ali, Zeeshan [1 ]
Chaudhry, Shehzad Ashraf [1 ]
机构
[1] Int Islamic Univ, Dept Comp Sci, Islamabad, Pakistan
[2] Natl Univ Sci & Technol, Dept Informat Secur Islamabad, MCS, Islamabad, Pakistan
关键词
Authentication; Multi-factor; Biometric; ProVeri; Burrows-Abadi-Needham (BAN) logic; IMPROVEMENT;
D O I
10.1109/c-code.2019.8680999
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is achieved by using different techniques, like using smart-card, identity password and biometric techniques. Some of the proposed schemes use a single factor for authentication while others combine multiple ways to provide multi-factor authentication for better security. lately, a new scheme for multi-factor authentication was presented by Cao and Ge and claimed that their scheme is highly secure and can withstand against all known attacks. In this paper, it is revealed that their scheme is still vulnerable and have some loopholes in term of reflection attack. Therefore, an improved scheme is proposed to overcome the security weaknesses of Cao and Ge's scheme. The proposed scheme resists security attacks and secure. Formal testing is carried out under a broadly-accepted simulated tool ProVerif which demonstrates that the proposed scheme is well secure.
引用
收藏
页码:288 / 292
页数:5
相关论文
共 50 条
  • [11] Multi-Factor Authentication in Key Management Systems
    de Souza, Rick Lopes
    Lung, Lau Cheuk
    Custodio, Ricardo Felipe
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 746 - 752
  • [12] Security enhanced multi-factor biometric authentication scheme using bio-hash function
    Choi, Younsung
    Lee, Youngsook
    Moon, Jongho
    Won, Dongho
    [J]. PLOS ONE, 2017, 12 (05):
  • [13] Implementing Open Source Biometric Face Authentication for Multi-factor Authentication Procedures
    Minakova, Natalya
    Mansurov, Alexander
    [J]. HIGH-PERFORMANCE COMPUTING SYSTEMS AND TECHNOLOGIES IN SCIENTIFIC RESEARCH, AUTOMATION OF CONTROL AND PRODUCTION, 2022, 1526 : 371 - 379
  • [14] Ensuring privacy of biometric factors in multi-factor authentication systems
    Apampa, Kikelomo Maria
    Zhang, Tian
    Wills, Gary B.
    Argles, David
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 44 - 49
  • [15] Multi-Factor Challenge/Response Approach for Remote Biometric Authentication
    Al-Assam, Hisham
    Jassim, Sabah
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2011, 2011, 8063
  • [16] Spectroscopically enhanced method and system for multi-factor biometric authentication
    Pishva, Davar
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1369 - 1379
  • [17] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836
  • [18] A Modular Framework for Multi-Factor Authentication and Key Exchange
    Fleischhacker, Nils
    Manulis, Mark
    Azodi, Amir
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2014, 2014, 8893 : 190 - 214
  • [19] Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
    Tahir, Haseeb
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Ferzund, Javed
    Kumar, Neeraj
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14978 - 14986
  • [20] Multi-factor authentication scheme based on custom attributes
    Zhu, Dexin
    Zhou, Hu
    Li, Nianfeng
    Song, Lijun
    Zheng, Jun
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7741 - 7756