T2FA: Transparent Two-Factor Authentication

Traditional username and password-based single-factor authentication is easy to deploy but vulnerable to dictionary attacks, snooping, and brute force attacks. Two-factor authentication (2FA) has been proposed to improve the security, where smart devices are used as the second authentication factor....

Full description

Bibliographic Details
Main Authors: Jiliang Zhang, Xiao Tan, Xiangqi Wang, Aibin Yan, Zheng Qin
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8386653/
_version_ 1818644943300722688
author Jiliang Zhang
Xiao Tan
Xiangqi Wang
Aibin Yan
Zheng Qin
author_facet Jiliang Zhang
Xiao Tan
Xiangqi Wang
Aibin Yan
Zheng Qin
author_sort Jiliang Zhang
collection DOAJ
description Traditional username and password-based single-factor authentication is easy to deploy but vulnerable to dictionary attacks, snooping, and brute force attacks. Two-factor authentication (2FA) has been proposed to improve the security, where smart devices are used as the second authentication factor. However, the interaction between human and the smart device is required, which is inconvenient to users. In addition, an attacker is able to get the second authentication factor through fraud, thus invalidating current 2FA mechanisms. In order to solve these problems, we propose a transparent two-factor authentication (T2FA) based on physical unclonable function (PUF) and voiceprint. The second authentication authenticates the user's mobile phone through the PUF. The third one is to determine whether the login terminal and the user's mobile phone are in the same environment with the environment voiceprint. The second and third authentication in the second factor is completely transparent to users. Therefore, T2FA avoids the tedious interaction and provides the same high user experience satisfaction as the single-factor authentication and exhibits high security simultaneously. Moreover, the fraud is eliminated technically due to the transparency of the authentication.
first_indexed 2024-12-17T00:22:53Z
format Article
id doaj.art-8d22716cb04a4360877c8db1e0d7b4ba
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-17T00:22:53Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-8d22716cb04a4360877c8db1e0d7b4ba2022-12-21T22:10:31ZengIEEEIEEE Access2169-35362018-01-016326773268610.1109/ACCESS.2018.28445488386653T2FA: Transparent Two-Factor AuthenticationJiliang Zhang0https://orcid.org/0000-0001-8712-2964Xiao Tan1Xiangqi Wang2Aibin Yan3Zheng Qin4College of Computer Science and Electronic Engineering, Hunan University, Changsha, ChinaCollege of Computer Science and Electronic Engineering, Hunan University, Changsha, ChinaCollege of Mathematics and Computational Science, Hunan First Normal University, Changsha, ChinaSchool of Computer Science and Technology, Anhui University, Hefei, ChinaCollege of Computer Science and Electronic Engineering, Hunan University, Changsha, ChinaTraditional username and password-based single-factor authentication is easy to deploy but vulnerable to dictionary attacks, snooping, and brute force attacks. Two-factor authentication (2FA) has been proposed to improve the security, where smart devices are used as the second authentication factor. However, the interaction between human and the smart device is required, which is inconvenient to users. In addition, an attacker is able to get the second authentication factor through fraud, thus invalidating current 2FA mechanisms. In order to solve these problems, we propose a transparent two-factor authentication (T2FA) based on physical unclonable function (PUF) and voiceprint. The second authentication authenticates the user's mobile phone through the PUF. The third one is to determine whether the login terminal and the user's mobile phone are in the same environment with the environment voiceprint. The second and third authentication in the second factor is completely transparent to users. Therefore, T2FA avoids the tedious interaction and provides the same high user experience satisfaction as the single-factor authentication and exhibits high security simultaneously. Moreover, the fraud is eliminated technically due to the transparency of the authentication.https://ieeexplore.ieee.org/document/8386653/Two-factor authenticationphysical unclonable function (PUF)voiceprint
spellingShingle Jiliang Zhang
Xiao Tan
Xiangqi Wang
Aibin Yan
Zheng Qin
T2FA: Transparent Two-Factor Authentication
IEEE Access
Two-factor authentication
physical unclonable function (PUF)
voiceprint
title T2FA: Transparent Two-Factor Authentication
title_full T2FA: Transparent Two-Factor Authentication
title_fullStr T2FA: Transparent Two-Factor Authentication
title_full_unstemmed T2FA: Transparent Two-Factor Authentication
title_short T2FA: Transparent Two-Factor Authentication
title_sort t2fa transparent two factor authentication
topic Two-factor authentication
physical unclonable function (PUF)
voiceprint
url https://ieeexplore.ieee.org/document/8386653/
work_keys_str_mv AT jiliangzhang t2fatransparenttwofactorauthentication
AT xiaotan t2fatransparenttwofactorauthentication
AT xiangqiwang t2fatransparenttwofactorauthentication
AT aibinyan t2fatransparenttwofactorauthentication
AT zhengqin t2fatransparenttwofactorauthentication