Security enhanced multi-factor biometric authentication scheme using bio-hash function

被引:18
|
作者
Choi, Younsung [1 ]
Lee, Youngsook [1 ]
Moon, Jongho [2 ]
Won, Dongho [2 ]
机构
[1] Howon Univ, Dept Cyber Secur, Gunsan Si, Jeonrabuk Do 573718, South Korea
[2] Sungkyunkwan Univ, Dept Comp Engn, 2066 Seoburo, Suwon 440746, Gyeonggido, South Korea
来源
PLOS ONE | 2017年 / 12卷 / 05期
关键词
REMOTE USER AUTHENTICATION; KEY AGREEMENT; PASSWORD AUTHENTICATION; MUTUAL AUTHENTICATION; IMPROVEMENT; PROTOCOL; EXCHANGE;
D O I
10.1371/journal.pone.0176250
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
引用
收藏
页数:32
相关论文
共 50 条
  • [21] Implementing Open Source Biometric Face Authentication for Multi-factor Authentication Procedures
    Minakova, Natalya
    Mansurov, Alexander
    [J]. HIGH-PERFORMANCE COMPUTING SYSTEMS AND TECHNOLOGIES IN SCIENTIFIC RESEARCH, AUTOMATION OF CONTROL AND PRODUCTION, 2022, 1526 : 371 - 379
  • [22] Ensuring privacy of biometric factors in multi-factor authentication systems
    Apampa, Kikelomo Maria
    Zhang, Tian
    Wills, Gary B.
    Argles, David
    [J]. SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 44 - 49
  • [23] Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange
    Griffin, Phillip H.
    [J]. COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 66 - 71
  • [24] Multi-Factor Challenge/Response Approach for Remote Biometric Authentication
    Al-Assam, Hisham
    Jassim, Sabah
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2011, 2011, 8063
  • [25] Development of a Remote Tracking Security Box with Multi-Factor Authentication System Incorporates with a Biometric Sensing Device
    Fahim, Shahriar Rahman
    Shahriar, Saquib
    Islam, Omar Kamrul
    Rahm, Md Ilias
    Sarker, Subrata K.
    Akter, Shahela
    [J]. 2019 5TH IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE 2019), 2019,
  • [26] On the Security of Multi-Factor Authentication: Several Instructive Examples
    Huang, Yun
    Xue, Weijia
    Huang, Geshi
    Lai, Xuejia
    [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 685 - 687
  • [27] Multi-Factor Biometrics for Authentication: A False Sense of Security
    Al-Assam, Hisham
    Sellahewa, Harin
    Jassim, Sabah
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 81 - 87
  • [28] A lightweight multi-factor mobile user authentication scheme
    Sun, Jianguo
    Zhong, Qi
    Kou, Liang
    Wang, Wenshan
    Da, Qingan
    Lin, Yun
    [J]. IEEE INFOCOM 2018 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2018, : 831 - 836
  • [29] Lightweight and Secure Multi-Factor Authentication Scheme in VANETs
    Tahir, Haseeb
    Mahmood, Khalid
    Ayub, Muhammad Faizan
    Saleem, Muhammad Asad
    Ferzund, Javed
    Kumar, Neeraj
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (11) : 14978 - 14986
  • [30] Multi-factor authentication scheme based on custom attributes
    Zhu, Dexin
    Zhou, Hu
    Li, Nianfeng
    Song, Lijun
    Zheng, Jun
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7741 - 7756