Security enhanced multi-factor biometric authentication scheme using bio-hash function

被引:18
|
作者
Choi, Younsung [1 ]
Lee, Youngsook [1 ]
Moon, Jongho [2 ]
Won, Dongho [2 ]
机构
[1] Howon Univ, Dept Cyber Secur, Gunsan Si, Jeonrabuk Do 573718, South Korea
[2] Sungkyunkwan Univ, Dept Comp Engn, 2066 Seoburo, Suwon 440746, Gyeonggido, South Korea
来源
PLOS ONE | 2017年 / 12卷 / 05期
关键词
REMOTE USER AUTHENTICATION; KEY AGREEMENT; PASSWORD AUTHENTICATION; MUTUAL AUTHENTICATION; IMPROVEMENT; PROTOCOL; EXCHANGE;
D O I
10.1371/journal.pone.0176250
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
引用
收藏
页数:32
相关论文
共 50 条
  • [1] Multi-factor signcryption scheme for secure authentication using hyper elliptic curve cryptography and bio-hash function
    Rajasekar, Vani
    Premalatha, J.
    Sathya, K.
    [J]. BULLETIN OF THE POLISH ACADEMY OF SCIENCES-TECHNICAL SCIENCES, 2020, 68 (04) : 923 - 935
  • [2] Security analysis and enhancements of a multi-factor biometric authentication scheme
    Wu, Min
    Chen, Jianhua
    Zhu, Wenxia
    Yuan, Zhenyang
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2016, 8 (04) : 352 - 365
  • [3] Security analysis and enhancements of an improved multi-factor biometric authentication scheme
    Park, YoHan
    Park, KiSung
    Lee, KyungKeun
    Song, Hwangjun
    Park, YoungHo
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (08):
  • [4] Biometric multi-factor authentication: On the usability of the FingerPIN scheme
    Marasco, Emanuela
    Albanese, Massimiliano
    Patibandla, Venkata Vamsi Ram
    Vurity, Anudeep
    Sriram, Sumanth Sai
    [J]. SECURITY AND PRIVACY, 2023, 6 (01)
  • [5] Analysis and improvement of a multi-factor biometric authentication scheme
    Cao, Liling
    Ge, Wancheng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 617 - 625
  • [6] Security analysis and improvement of a multi-factor biometric-based remote authentication scheme
    Boonkrong, Sirapat
    [J]. IAENG International Journal of Computer Science, 2019, 46 (04): : 1 - 12
  • [7] Symmetric-Key Multi-factor Biometric Authentication Scheme
    Iftikhar, Jawad
    Hussain, Sajid
    Mansoor, Khwaja
    Ali, Zeeshan
    Chaudhry, Shehzad Ashraf
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2019, : 288 - 292
  • [8] Spectroscopically enhanced method and system for multi-factor biometric authentication
    Pishva, Davar
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1369 - 1379
  • [9] Using Bayes Factors For Multi-factor, Biometric Authentication
    Giffin, A.
    Skuka, J. D.
    Lao, P. A.
    [J]. BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING (MAXENT 2014), 2015, 1641 : 611 - 615
  • [10] Enhanced secure data backup scheme using multi-factor authentication
    Hu, Huidan
    Lin, Changlu
    Chang, Chin-Chen
    Chen, Lanxiang
    [J]. IET INFORMATION SECURITY, 2019, 13 (06) : 649 - 658