Multifactor Authentication Protocol in a Mobile Environment

被引:20
|
作者
Maciej, Bartlomiejczyk [1 ]
Imed, El Fray [1 ]
Kurkowski, Miroslaw [2 ]
机构
[1] West Pomeranian Univ Technol, Fac Comp Sci & Informat Technol, PL-70310 Szczecin, Poland
[2] Cardinal Stefan Wyszynski Univ Warsaw, Inst Comp Sci, PL-01815 Warsaw, Poland
关键词
Authentication; electronic identification; electronic transactions; mobile platform; multifactor authentication; smartphone; three-factor authentication; 3-FACTOR AUTHENTICATION; USER AUTHENTICATION; SECURITY PROTOCOLS; MODEL CHECKING; SCHEME; FRAMEWORK; INTERNET; TOOL;
D O I
10.1109/ACCESS.2019.2948922
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The implementation of services that process confidential data in a mobile environment requires an adequate level of security with the strictest possible mechanisms of information protection. The dominance of mobile devices as client applications of distributed systems has led to the development of new techniques that combine traditional methods of protection with protocols leveraging the potential of numerous interfaces available from a smartphone. For this reason, an upward trend in the use of biometricsbased methods and dynamically generated OTP secrets can be observed. Mobile devices are increasingly used in complex business processes that require strong user authentication methods, which, according to the European Commission (Regulation), must use at least two authentication factors belonging to different categories. Therefore, on the basis of the analysis of the solutions presented so far, a distributed protocol has been proposed. It enables user authentication using three authentication factors: possession, knowledge, and inherence. The described authentication scheme refers to the possibility of carrying out the process in the mobile environment of the Android platform with guaranteed authentication support.
引用
收藏
页码:157185 / 157199
页数:15
相关论文
共 50 条
  • [1] Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment
    Korac, Dragan
    Simic, Dejan
    COMPUTERS & SECURITY, 2019, 85 : 313 - 332
  • [2] Multifactor TLS protocol for holistic security in mobile environment
    Talukder, Asoke K.
    Sharma, Devashish
    Rao, Vedula Bhaskar
    IETE JOURNAL OF RESEARCH, 2006, 52 (2-3) : 239 - 246
  • [3] Cryptanalysis of a Multifactor Authentication Protocol
    Likitha, Soorea
    Saravanan, R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1, 2019, 707 : 35 - 42
  • [4] An authentication protocol in mobile RFID environment
    Sun, Hung-Min
    Lu, Chen-En
    Chen, Shuai-Min
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 1143 - +
  • [5] Multifactor Authentication on Mobile Secure Attendance System
    Utomo, Subroto Budhi
    Hendradjaya, Bayu
    2018 INTERNATIONAL CONFERENCE ON ICT FOR SMART SOCIETY (ICISS), 2018, : 107 - 111
  • [6] Biometric based User Authentication Protocol for Mobile Cloud Environment
    Vivekanandan, Manojkumar
    Sastry, V. N.
    Reddy, U. Srinivasalu
    2019 5TH IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY, AND BEHAVIOR ANALYSIS (ISBA 2019), 2019,
  • [7] User Authentication Protocol Based on the Location Factor for a Mobile Environment
    Bartlomiejczyk, Maciej
    El Fray, Imed
    Kurkowski, Miroslaw
    Szymoniak, Sabina
    Siedlecka-Lamch, Olga
    IEEE ACCESS, 2022, 10 : 16439 - 16455
  • [8] An improved authentication protocol for mobile agent device in RFID environment
    Wei, Chia-Hui
    Hwang, Min-Shiang
    Chin, Augustin Yeh-Hao
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2012, 10 (05) : 508 - 520
  • [9] Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    2012 INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION (ASID), 2012,
  • [10] Password-based user authentication protocol for mobile environment
    Moon, Sung-Won
    Kim, Young-Gab
    Moon, Chang-Joo
    Baik, Doo-Kwon
    Information Networking: ADVANCES IN DATA COMMUNICATIONS AND WIRELESS NETWORKS, 2006, 3961 : 743 - 753