Symmetric-Key Multi-factor Biometric Authentication Scheme

被引:0
|
作者
Iftikhar, Jawad [1 ]
Hussain, Sajid [1 ]
Mansoor, Khwaja [2 ]
Ali, Zeeshan [1 ]
Chaudhry, Shehzad Ashraf [1 ]
机构
[1] Int Islamic Univ, Dept Comp Sci, Islamabad, Pakistan
[2] Natl Univ Sci & Technol, Dept Informat Secur Islamabad, MCS, Islamabad, Pakistan
关键词
Authentication; Multi-factor; Biometric; ProVeri; Burrows-Abadi-Needham (BAN) logic; IMPROVEMENT;
D O I
10.1109/c-code.2019.8680999
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is achieved by using different techniques, like using smart-card, identity password and biometric techniques. Some of the proposed schemes use a single factor for authentication while others combine multiple ways to provide multi-factor authentication for better security. lately, a new scheme for multi-factor authentication was presented by Cao and Ge and claimed that their scheme is highly secure and can withstand against all known attacks. In this paper, it is revealed that their scheme is still vulnerable and have some loopholes in term of reflection attack. Therefore, an improved scheme is proposed to overcome the security weaknesses of Cao and Ge's scheme. The proposed scheme resists security attacks and secure. Formal testing is carried out under a broadly-accepted simulated tool ProVerif which demonstrates that the proposed scheme is well secure.
引用
收藏
页码:288 / 292
页数:5
相关论文
共 50 条
  • [21] Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy
    Xu, Yanbin
    Jian, Xinya
    Li, Tao
    Zou, Shuang
    Li, Beibei
    [J]. Mobile Information Systems, 2023, 2023
  • [22] A secure data backup scheme using multi-factor authentication
    Liu, Yining
    Zhong, Qi
    Chang, Liang
    Xia, Zhe
    He, Debiao
    Cheng, Chi
    [J]. IET INFORMATION SECURITY, 2017, 11 (05) : 250 - 255
  • [23] A proposal of multi-factor authentication scheme for secure iot environment
    Department of Industrial and Information Systems Engineering, Soongsil University, No. 369, Sangdo-Ro, Dongjak-Gu, Seoul
    156-743, Korea, Republic of
    [J]. ICIC Express Lett Part B Appl., 12 (3231-3236):
  • [24] SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things
    Zhang, Yunru
    He, Debiao
    Vijayakumar, Pandi
    Luo, Min
    Huang, Xinyi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 9716 - 9726
  • [25] Multi-observed Multi-factor Authentication: A Multi-factor Authentication Using Single Credential
    Nozaki, Shinnosuke
    Serizawa, Ayumi
    Yoshihira, Mizuho
    Fujita, Masahiro
    Shibata, Yoichi
    Yamanaka, Tadakazu
    Matsuda, Nori
    Ohki, Tetsushi
    Nishigaki, Masakatsu
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2022, 2022, 526 : 201 - 211
  • [26] A Symmetric-Key Broadcast Encryption Scheme with Shorter Transmissions
    Wang, Shyh-Yih
    Yang, Wu-Chuan
    Tzeng, Show-Shiow
    [J]. IEEE INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS 2013 (ISNE 2013), 2013,
  • [27] MULTI-FACTOR AUTHENTICATION MODELLING
    Dostalek, L.
    Safarik, J.
    [J]. RADIO ELECTRONICS COMPUTER SCIENCE CONTROL, 2020, (02) : 106 - 116
  • [28] Multi-Factor Authentication as a Service
    Shah, Yogendra
    Choyi, Vinod
    Schmidt, Andreas U.
    Subramanian, Lakshmi
    [J]. 2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015), 2015, : 144 - 150
  • [29] Multi-Factor Authentication Modeling
    Dostalek, Libor
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER INFORMATION TECHNOLOGIES (ACIT'2019), 2019, : 443 - 446
  • [30] Mobile Multi-Factor Authentication
    Bissada, Andrew
    Olmsted, Aspen
    [J]. 2017 12TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2017, : 210 - 211