Security enhanced multi-factor biometric authentication scheme using bio-hash function.
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the securi...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Public Library of Science (PLoS)
2017-01-01
|
Series: | PLoS ONE |
Online Access: | http://europepmc.org/articles/PMC5411053?pdf=render |
_version_ | 1819177780084998144 |
---|---|
author | Younsung Choi Youngsook Lee Jongho Moon Dongho Won |
author_facet | Younsung Choi Youngsook Lee Jongho Moon Dongho Won |
author_sort | Younsung Choi |
collection | DOAJ |
description | With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. |
first_indexed | 2024-12-22T21:32:05Z |
format | Article |
id | doaj.art-e813e0c5297d44339e43665f73e488bc |
institution | Directory Open Access Journal |
issn | 1932-6203 |
language | English |
last_indexed | 2024-12-22T21:32:05Z |
publishDate | 2017-01-01 |
publisher | Public Library of Science (PLoS) |
record_format | Article |
series | PLoS ONE |
spelling | doaj.art-e813e0c5297d44339e43665f73e488bc2022-12-21T18:11:54ZengPublic Library of Science (PLoS)PLoS ONE1932-62032017-01-01125e017625010.1371/journal.pone.0176250Security enhanced multi-factor biometric authentication scheme using bio-hash function.Younsung ChoiYoungsook LeeJongho MoonDongho WonWith the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.http://europepmc.org/articles/PMC5411053?pdf=render |
spellingShingle | Younsung Choi Youngsook Lee Jongho Moon Dongho Won Security enhanced multi-factor biometric authentication scheme using bio-hash function. PLoS ONE |
title | Security enhanced multi-factor biometric authentication scheme using bio-hash function. |
title_full | Security enhanced multi-factor biometric authentication scheme using bio-hash function. |
title_fullStr | Security enhanced multi-factor biometric authentication scheme using bio-hash function. |
title_full_unstemmed | Security enhanced multi-factor biometric authentication scheme using bio-hash function. |
title_short | Security enhanced multi-factor biometric authentication scheme using bio-hash function. |
title_sort | security enhanced multi factor biometric authentication scheme using bio hash function |
url | http://europepmc.org/articles/PMC5411053?pdf=render |
work_keys_str_mv | AT younsungchoi securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction AT youngsooklee securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction AT jonghomoon securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction AT donghowon securityenhancedmultifactorbiometricauthenticationschemeusingbiohashfunction |