T2FA: Transparent Two-Factor Authentication
Traditional username and password-based single-factor authentication is easy to deploy but vulnerable to dictionary attacks, snooping, and brute force attacks. Two-factor authentication (2FA) has been proposed to improve the security, where smart devices are used as the second authentication factor....
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8386653/ |
_version_ | 1818644943300722688 |
---|---|
author | Jiliang Zhang Xiao Tan Xiangqi Wang Aibin Yan Zheng Qin |
author_facet | Jiliang Zhang Xiao Tan Xiangqi Wang Aibin Yan Zheng Qin |
author_sort | Jiliang Zhang |
collection | DOAJ |
description | Traditional username and password-based single-factor authentication is easy to deploy but vulnerable to dictionary attacks, snooping, and brute force attacks. Two-factor authentication (2FA) has been proposed to improve the security, where smart devices are used as the second authentication factor. However, the interaction between human and the smart device is required, which is inconvenient to users. In addition, an attacker is able to get the second authentication factor through fraud, thus invalidating current 2FA mechanisms. In order to solve these problems, we propose a transparent two-factor authentication (T2FA) based on physical unclonable function (PUF) and voiceprint. The second authentication authenticates the user's mobile phone through the PUF. The third one is to determine whether the login terminal and the user's mobile phone are in the same environment with the environment voiceprint. The second and third authentication in the second factor is completely transparent to users. Therefore, T2FA avoids the tedious interaction and provides the same high user experience satisfaction as the single-factor authentication and exhibits high security simultaneously. Moreover, the fraud is eliminated technically due to the transparency of the authentication. |
first_indexed | 2024-12-17T00:22:53Z |
format | Article |
id | doaj.art-8d22716cb04a4360877c8db1e0d7b4ba |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-17T00:22:53Z |
publishDate | 2018-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-8d22716cb04a4360877c8db1e0d7b4ba2022-12-21T22:10:31ZengIEEEIEEE Access2169-35362018-01-016326773268610.1109/ACCESS.2018.28445488386653T2FA: Transparent Two-Factor AuthenticationJiliang Zhang0https://orcid.org/0000-0001-8712-2964Xiao Tan1Xiangqi Wang2Aibin Yan3Zheng Qin4College of Computer Science and Electronic Engineering, Hunan University, Changsha, ChinaCollege of Computer Science and Electronic Engineering, Hunan University, Changsha, ChinaCollege of Mathematics and Computational Science, Hunan First Normal University, Changsha, ChinaSchool of Computer Science and Technology, Anhui University, Hefei, ChinaCollege of Computer Science and Electronic Engineering, Hunan University, Changsha, ChinaTraditional username and password-based single-factor authentication is easy to deploy but vulnerable to dictionary attacks, snooping, and brute force attacks. Two-factor authentication (2FA) has been proposed to improve the security, where smart devices are used as the second authentication factor. However, the interaction between human and the smart device is required, which is inconvenient to users. In addition, an attacker is able to get the second authentication factor through fraud, thus invalidating current 2FA mechanisms. In order to solve these problems, we propose a transparent two-factor authentication (T2FA) based on physical unclonable function (PUF) and voiceprint. The second authentication authenticates the user's mobile phone through the PUF. The third one is to determine whether the login terminal and the user's mobile phone are in the same environment with the environment voiceprint. The second and third authentication in the second factor is completely transparent to users. Therefore, T2FA avoids the tedious interaction and provides the same high user experience satisfaction as the single-factor authentication and exhibits high security simultaneously. Moreover, the fraud is eliminated technically due to the transparency of the authentication.https://ieeexplore.ieee.org/document/8386653/Two-factor authenticationphysical unclonable function (PUF)voiceprint |
spellingShingle | Jiliang Zhang Xiao Tan Xiangqi Wang Aibin Yan Zheng Qin T2FA: Transparent Two-Factor Authentication IEEE Access Two-factor authentication physical unclonable function (PUF) voiceprint |
title | T2FA: Transparent Two-Factor Authentication |
title_full | T2FA: Transparent Two-Factor Authentication |
title_fullStr | T2FA: Transparent Two-Factor Authentication |
title_full_unstemmed | T2FA: Transparent Two-Factor Authentication |
title_short | T2FA: Transparent Two-Factor Authentication |
title_sort | t2fa transparent two factor authentication |
topic | Two-factor authentication physical unclonable function (PUF) voiceprint |
url | https://ieeexplore.ieee.org/document/8386653/ |
work_keys_str_mv | AT jiliangzhang t2fatransparenttwofactorauthentication AT xiaotan t2fatransparenttwofactorauthentication AT xiangqiwang t2fatransparenttwofactorauthentication AT aibinyan t2fatransparenttwofactorauthentication AT zhengqin t2fatransparenttwofactorauthentication |