Symmetric-Key Multi-factor Biometric Authentication Scheme

被引:0
|
作者
Iftikhar, Jawad [1 ]
Hussain, Sajid [1 ]
Mansoor, Khwaja [2 ]
Ali, Zeeshan [1 ]
Chaudhry, Shehzad Ashraf [1 ]
机构
[1] Int Islamic Univ, Dept Comp Sci, Islamabad, Pakistan
[2] Natl Univ Sci & Technol, Dept Informat Secur Islamabad, MCS, Islamabad, Pakistan
关键词
Authentication; Multi-factor; Biometric; ProVeri; Burrows-Abadi-Needham (BAN) logic; IMPROVEMENT;
D O I
10.1109/c-code.2019.8680999
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Authentication is achieved by using different techniques, like using smart-card, identity password and biometric techniques. Some of the proposed schemes use a single factor for authentication while others combine multiple ways to provide multi-factor authentication for better security. lately, a new scheme for multi-factor authentication was presented by Cao and Ge and claimed that their scheme is highly secure and can withstand against all known attacks. In this paper, it is revealed that their scheme is still vulnerable and have some loopholes in term of reflection attack. Therefore, an improved scheme is proposed to overcome the security weaknesses of Cao and Ge's scheme. The proposed scheme resists security attacks and secure. Formal testing is carried out under a broadly-accepted simulated tool ProVerif which demonstrates that the proposed scheme is well secure.
引用
收藏
页码:288 / 292
页数:5
相关论文
共 50 条
  • [41] MAKA: Multi-Factor Authentication and Key Agreement Scheme for LoRa-Based Smart Grid Communication Services
    Mehta, Prarthana J.
    Parne, Balu L.
    Patel, Sankita J.
    [J]. IETE JOURNAL OF RESEARCH, 2024, 70 (05) : 4989 - 5005
  • [42] Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
    Gaurav Tyagi
    Rahul Kumar
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 260 - 276
  • [43] Multi-factor User Authentication Scheme for Multi-gateway Wireless Sensor Networks
    Wang, Chen-Yu
    Wang, Ding
    Wang, Fei-Fei
    Xu, Guo-Ai
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2020, 43 (04): : 683 - 700
  • [45] Dynamic Multi-factor Authentication for Smartphone
    Yohan, Alexander
    Lo, Nai-Wei
    Lie, Henry Roes
    [J]. 2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 2448 - 2453
  • [46] Ubiquitous Desktops with Multi-factor Authentication
    Doyle, Paul
    Deegan, Mark
    O'Driscoll, Ciaran
    Gleeson, Michael
    Gillespie, Brian
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 201 - 206
  • [47] Practical Threshold Multi-Factor Authentication
    Li, Wenting
    Cheng, Haibo
    Wang, Ping
    Liang, Kaitai
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3573 - 3588
  • [48] Enhanced Multi-factor Authentication on the Cloud
    Alyounis, Essa
    Dinah, Quanq
    [J]. INNOVATION MANAGEMENT AND SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE: FROM REGIONAL DEVELOPMENT TO GLOBAL GROWTH, VOLS I - VI, 2015, 2015, : 69 - 77
  • [49] Commentary: Multi-factor identification and authentication
    Morrison, Rodger
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2007, 24 (04) : 331 - 332
  • [50] Multi-Factor Authentication to Systems Login
    ALSaleem, Bandar Omar
    Alshoshan, Abdullah, I
    [J]. 2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1092 - 1095